Patent Issued for Data access control (USPTO 11803658): United Services Automobile Association - Insurance News | InsuranceNewsNet

InsuranceNewsNet — Your Industry. One Source.™

Sign in
  • Subscribe
  • About
  • Advertise
  • Contact
Home Now reading Newswires
Topics
    • Advisor News
    • Annuity Index
    • Annuity News
    • Companies
    • Earnings
    • Fiduciary
    • From the Field: Expert Insights
    • Health/Employee Benefits
    • Insurance & Financial Fraud
    • INN Magazine
    • Insiders Only
    • Life Insurance News
    • Newswires
    • Property and Casualty
    • Regulation News
    • Sponsored Articles
    • Washington Wire
    • Videos
    • ———
    • About
    • Meet our Editorial Staff
    • Advertise
    • Contact
    • Newsletters
  • Exclusives
  • NewsWires
  • Magazine
  • Newsletters
Sign in or register to be an INNsider.
  • AdvisorNews
  • Annuity News
  • Companies
  • Earnings
  • Fiduciary
  • Health/Employee Benefits
  • Insurance & Financial Fraud
  • INN Exclusives
  • INN Magazine
  • Insurtech
  • Life Insurance News
  • Newswires
  • Property and Casualty
  • Regulation News
  • Sponsored Articles
  • Video
  • Washington Wire
  • Life Insurance
  • Annuities
  • Advisor
  • Health/Benefits
  • Property & Casualty
  • Insurtech
  • About
  • Advertise
  • Contact
  • Editorial Staff

Get Social

  • Facebook
  • X
  • LinkedIn
Newswires
Newswires RSS Get our newsletter
Order Prints
November 17, 2023 Newswires
Share
Share
Post
Email

Patent Issued for Data access control (USPTO 11803658): United Services Automobile Association

Insurance Daily News

2023 NOV 17 (NewsRx) -- By a News Reporter-Staff News Editor at Insurance Daily News -- From Alexandria, Virginia, NewsRx journalists report that a patent by the inventors Fernandez, Gabriel Carlos (San Antonio, TX, US), Hartshorn, Joel S. (Olalla, WA, US), Jonak, Sumita T. (San Antonio, TX, US), Krishnaswamy, Pooja (Cedar Park, TX, US), Russell, Christopher (San Antonio, TX, US), Schwarz, Jr., Thomas Wayne (Helotes, TX, US), filed on October 29, 2020, was published online on October 31, 2023.

The patent’s assignee for patent number 11803658 is United Services Automobile Association (San Antonio, Texas, United States).

News editors obtained the following quote from the background information supplied by the inventors: “Many companies and organizations have set up their corporate information technology (IT) networks so that their employees can work from any place that has Internet access. To remotely access a corporate IT network, an employee may be required to log into a computer using credentials, such as a username and password. Today, employees regularly log into and access their corporate networks from home, coffee shops, or airports. For example, a consultant who regularly travels may use his or her laptop to access certain documents or send and receive emails at an airport or hotel. In another example, a software engineer can avoid rush-hour traffic in the morning by writing or reviewing software code from home or coffee shop until after the traffic subsides. Technology has made it possible for employees to have the flexibility to work from any place that has Internet access including their corporate offices. However, companies and organizations that offer remote access capabilities to their employees also face certain security risks. For example, an unauthorized person may hack into the corporate server that provides sensitive customer data to computers remotely operated by employees. In another example, an employee may himself or herself remotely log into the corporate network for such nefarious purposes.

“The techniques introduced here may be better understood by referring to the following Detailed Description in conjunction with the accompanying drawings, in which like reference numerals indicate identical or functionally similar elements. Moreover, while the technology is amenable to various modifications and alternative forms, specific embodiments have been shown by way of example in the drawings and are described in detail below. The intention, however, is not to limit the technology to the particular embodiments described. On the contrary, the technology is intended to cover all modifications, equivalents, and alternatives falling within the scope of the technology as defined by the appended claims.”

As a supplement to the background information on this patent, NewsRx correspondents also obtained the inventors’ summary information for this patent: “Employers are increasingly allowing their employees to access documents remotely which poses certain security risks. For example, a remote employee of a company may download sensitive personal information of the customers of the company. In another example, a remote employee’s laptop, username, and password may be stolen and an unauthorized person may access a secure database to download or access sensitive personal information of the customers of the company.

“This patent document describes example systems, methods, and apparatus that can prevent or deter a person from obtaining or accessing sensitive personal information about a person from a server. For example, a customer of a company or other user may control who can access his or her sensitive personal information by identifying his or her access preferences included in an access control list, where the access preference describes a level of access that at least one remote employee or person may have to the customer’s sensitive personal information. A corporate data protection server may containerize the sensitive personal information and the access control list of the person in a data protection container. If a remote employee or a person requests access the customer’s sensitive personal information, the corporate data protection server may provide the sensitive personal information to the remote employee or person by determining, using the access preference in the access control list, that the remote employee or person has access privilege to the customer’s sensitive personal information and by determining that the remote employee or person’s authentication information (e.g., username, password, biometric information) matches or is the same as an authorized authentication information stored on the corporate data protection server. Although references are made to a “corporate” server, “corporate” data protection server, and “corporate” network system, the techniques and systems described are applicable to servers and systems other than those of a company. Additionally, the techniques described are applicable to any sensitive information of any type of entity. For example, the sensitive information can be personal information of a person, classified documents of the government, or confidential documents of a company.”

The claims supplied by the inventors are:

“1. A data protection system, comprising: a first computer comprising a processor configured to: receive, via a graphical user interface, an access preference included in an access control list, wherein the access preference describes a level of access, provided by a customer of an enterprise, to sensitive personal information about the customer by at least one additional person associated with the enterprise, wherein the first computer is associated with the customer, and wherein the access preference includes a type of user associated with the enterprise permitted to access the sensitive personal information; send, to a server, a first message comprising the access control list that includes the access preference; a second computer comprising a processor configured to: send, to the server, a second message comprising a request to access the sensitive personal information and authentication information of the at least one additional person that initiated the request; the server comprising a processor configured to: receive the first message from the first computer and the second message from the second computer; containerize, after receiving the first message, the sensitive personal information and the access control list associated with the sensitive personal information in a data protection container; determine, based on the access preference included in the first message and the authentication information included in the second message, that the at least one additional person is not the type of user associated with the enterprise permitted to access the sensitive personal information; in response to determining that the at least one additional person is not permitted to access the sensitive personal information, obtain, from a pre-determined data set, a set of inaccurate personal information for the customer, wherein the set of inaccurate personal information is different from the sensitive personal information about the customer; and send the set of inaccurate personal information to the second computer associated with the at least one additional person, wherein the second computer is configured to display the set of inaccurate personal information.

“2. The system of claim 1, wherein the sensitive personal information is containerized by including a watermark of an identifier of the at least one additional person that initiated the request to access the sensitive personal information, and in response to determining that the second computer is approved to access the sensitive personal information, send the watermark to the second computer to be displayed with the sensitive personal information.

“3. The system of claim 1, wherein the sensitive personal information is containerized by including a watermark of an identifier of the customer associated with the sensitive personal information, and in response to determining that the second computer is approved to access the sensitive personal information, send the watermark to the second computer to be displayed with the sensitive personal information.

“4. The system of claim 1, wherein the access preference indicates that the level of access is a one-time access where the at least one additional person is allowed to access the sensitive personal information once.

“5. The system of claim 1, wherein the second message includes a public Internet Protocol (IP) address or a media access control (MAC) address associated with the second computer, and wherein the server comprising the processor is further configured to: determine that the public IP address or the MAC address associated with the second computer is not approved to access the sensitive personal information of the customer; and delete the sensitive personal information from the data protection container upon determining that the second computer is not approved to access the sensitive personal information.

“6. The system of claim 1, wherein the second message includes a public Internet Protocol (IP) address associated with the second computer, and wherein the server comprising the processor is further configured to: determine that the public IP address associated with the second computer is associated with a location that is outside of a previously approved geo-fenced area for the second computer; and delete the sensitive personal information from the data protection container upon determining that the second computer is located outside of the previously approved geo-fenced area.

“7. The system of claim 1, wherein the second message includes a public Internet Protocol (IP) address or a media access control (MAC) address associated with the second computer, and wherein the server comprising the processor is further configured to: determine that the public IP address or the MAC address associated with the second computer is not approved to access the sensitive personal information of the customer; obtain, from a pre-determined data set, a set of inaccurate personal information for the customer upon determining that the second computer is not approved to access the sensitive personal information, wherein the inaccurate personal information is different from the sensitive personal information about the customer; and send the inaccurate personal information about the customer to the second computer.

“8. The system of claim 1, wherein the sensitive personal information is containerized by including a pre-determined sensitive personal information about a fictional person, and wherein the server comprising the processor is further configured to: determine that the pre-determined sensitive personal information about the fictional person is leaked by detecting a presence of at least some of the pre-determined sensitive personal information in a data set.

“9. A data protection method, comprising: receiving a first message from a first computer and a second message from a second computer, wherein the first message includes an access control list that includes an access preference, wherein the access preference describes a level of access, provided by a customer of an enterprise, to sensitive personal information about the customer by at least one additional person associated with the enterprise, wherein the first computer is associated with the customer, and wherein the access preference includes a type of user associated with the enterprise permitted to access the sensitive personal information, and wherein the second message comprises a request to access the sensitive personal information and authentication information of the at least one additional person that initiated the request; containerizing, after receiving the first message, the sensitive personal information and the access control list associated with the sensitive personal information in a data protection container; determining, based on the access preference included in the first message and the authentication information included in the second message, that the at least one additional person is not the type of user associated with the enterprise permitted to access the sensitive personal information; in response to determining that the at least one additional person is not permitted to access the sensitive personal information, obtain, from a pre-determined data set, a set of inaccurate personal information for the customer, wherein the set of inaccurate personal information is different from the sensitive personal information about the customer; and sending the set of inaccurate personal information to the second computer associated with the at least one additional person, wherein the second computer is configured to display the set of inaccurate personal information.

“10. The method of claim 9, wherein the sensitive personal information is containerized by including a watermark of an identifier of the at least one additional person that initiated the request to access the sensitive personal information, and in response to determining that the second computer is approved to access the sensitive personal information, sending the watermark to the second computer to be displayed with the sensitive personal information.

“11. The method of claim 9, wherein the sensitive personal information is containerized by including a watermark of an identifier of the customer associated with the sensitive personal information, and in response to determining that the second computer is approved to access the sensitive personal information, sending the watermark to the second computer to be displayed with the sensitive personal information.

“12. The method of claim 9, wherein the access preference indicates that the level of access is a one-time access where the at least one additional person is allowed to access the sensitive personal information once.

“13. The method of claim 9, wherein the second message includes a public Internet Protocol (IP) address or a media access control (MAC) address associated with the second computer, and wherein the method further comprises: determining that the public IP address or the MAC address associated with the second computer is not approved to access the sensitive personal information of the customer; and deleting the sensitive personal information from the data protection container upon determining that the second computer is not approved to access the sensitive personal information.

“14. The method of claim 9, wherein the second message includes a public Internet Protocol (IP) address associated with the second computer, and wherein the method further comprises: determining that the public IP address associated with the second computer is associated with a location that is outside of a previously approved geo-fenced area for the second computer; and deleting the sensitive personal information from the data protection container upon determining that the second computer is located outside of the previously approved geo-fenced area.”

There are additional claims. Please visit full patent to read further.

For additional information on this patent, see: Fernandez, Gabriel Carlos. Data access control. U.S. Patent Number 11803658, filed October 29, 2020, and published online on October 31, 2023. Patent URL (for desktop use only): https://ppubs.uspto.gov/pubwebapp/external.html?q=(11803658)&db=USPAT&type=ids

(Our reports deliver fact-based news of research and discoveries from around the world.)

Older

Black and white adults have similar health care expenditure levels in racially and economically integrated communities: Johns Hopkins Bloomberg School of Public Health

Newer

Patent Application Titled “Systems And Methods For Analyzing Vehicle Sensor Data Via A Blockchain” Published Online (USPTO 20230350869): Patent Application

Advisor News

  • The untapped potential of Qualified Longevity Annuity Contracts
  • NYC's fiscal outlook on downslide over budget gaps
  • Health insurance premium tax bill moving in Iowa House
  • Rising health care costs drive sharp increase in retirement anxiety
  • Health insurance premium tax bill moving in House
More Advisor News

Annuity News

  • An Application for the Trademark “GREAT-WEST LIFE & ANNUITY INSURANCE COMPANY” Has Been Filed by Great-West Life & Annuity Insurance Company: Great-West Life & Annuity Insurance Company
  • The forces shaping life and annuities in 2026
  • Variable annuity sales surge as market confidence remains high, Wink finds
  • New Allianz Life Annuity Offers Added Flexibility in Income Benefits
  • How to elevate annuity discussions during tax season
More Annuity News

Health/Employee Benefits News

  • Data on Pain and Central Nervous System Reported by Researchers at National Health Insurance Service (Unintended Consequences of Expanded Magnetic Resonance Imaging Reimbursement: A Nationwide Analysis Revealing Low Clinical Efficiency): Pain and Central Nervous System
  • Studies Conducted at Harvey L. Neiman Health Policy Institute on Managed Care Recently Reported (Increasing-Yet Varying-Radiologist Workforce Attrition Across Subspecialties): Managed Care
  • Researchers at University of Pittsburgh Release New Data on Insurance (Distributed fusion R-learner of heterogeneous treatment effect using distributed medicaid data): Insurance
  • Brooklyn nurses lose health care for weeks despite $15M from state
  • Prime Healthcare’s hospitals could soon be out-of-network for Blue Cross and Blue Shield of Illinois members
More Health/Employee Benefits News

Life Insurance News

  • Oaktree grabs control of Atlantic Coast Life Co. in blockbuster A-Cap deal
  • AM Best Removes From Under Review With Developing Implications and Downgrades Credit Ratings of Banner Life Insurance Company and William Penn Life Insurance Company of New York
  • The forces shaping life and annuities in 2026
  • Advantage Capital Holdings, LLC and Oaktree Sign Master Transaction Agreement
  • PHL Variable liquidation: Regulators, investors pivot legal fire to Nassau
More Life Insurance News

- Presented By -

Top Read Stories

More Top Read Stories >

NEWS INSIDE

  • Companies
  • Earnings
  • Economic News
  • INN Magazine
  • Insurtech News
  • Newswires Feed
  • Regulation News
  • Washington Wire
  • Videos

FEATURED OFFERS

Elevate Your Practice with Pacific Life
Taking your business to the next level is easier when you have experienced support.

Your Cap. Your Term. Locked.
Oceanview CapLock™. One locked cap. No annual re-declarations. Clear expectations from day one.

Ready to make your client presentations more engaging?
EnsightTM marketing stories, available with select Allianz Life Insurance Company of North America FIAs.

Press Releases

  • RFP #T02226
  • YourMedPlan Appoints Kevin Mercier as Executive Vice President of Business Development
  • ICMG Golf Event Raises $43,000 for Charity During Annual Industry Gathering
  • RFP #T25521
  • ICMG Announces 2026 Don Kampe Lifetime Achievement Award Recipient
More Press Releases > Add Your Press Release >

How to Write For InsuranceNewsNet

Find out how you can submit content for publishing on our website.
View Guidelines

Topics

  • Advisor News
  • Annuity Index
  • Annuity News
  • Companies
  • Earnings
  • Fiduciary
  • From the Field: Expert Insights
  • Health/Employee Benefits
  • Insurance & Financial Fraud
  • INN Magazine
  • Insiders Only
  • Life Insurance News
  • Newswires
  • Property and Casualty
  • Regulation News
  • Sponsored Articles
  • Washington Wire
  • Videos
  • ———
  • About
  • Meet our Editorial Staff
  • Advertise
  • Contact
  • Newsletters

Top Sections

  • AdvisorNews
  • Annuity News
  • Health/Employee Benefits News
  • InsuranceNewsNet Magazine
  • Life Insurance News
  • Property and Casualty News
  • Washington Wire

Our Company

  • About
  • Advertise
  • Contact
  • Meet our Editorial Staff
  • Magazine Subscription
  • Write for INN

Sign up for our FREE e-Newsletter!

Get breaking news, exclusive stories, and money- making insights straight into your inbox.

select Newsletter Options
Facebook Linkedin Twitter
© 2026 InsuranceNewsNet.com, Inc. All rights reserved.
  • Terms & Conditions
  • Privacy Policy
  • InsuranceNewsNet Magazine

Sign in with your Insider Pro Account

Not registered? Become an Insider Pro.
Insurance News | InsuranceNewsNet