US 12,321,471 B1
Systems and processes for providing secure client controlled and managed exchange of data between parties
Paul Della Maggiora, Greenville, SC (US); David Olds, Woodstock, GA (US); and Wanda Glover, Brookhaven, GA (US)
Assigned to GOBEEP, INC., Greenville, SC (US)
Filed by GOBEEP, INC., Greenville, SC (US)
Filed on Nov. 8, 2023, as Appl. No. 18/505,015.
Application 18/505,015 is a continuation of application No. 18/166,871, filed on Feb. 9, 2023, granted, now 11,841,960.
Application 18/166,871 is a continuation of application No. 17/104,255, filed on Nov. 25, 2020, granted, now 11,610,012, issued on Mar. 21, 2023.
Claims priority of provisional application 62/940,466, filed on Nov. 26, 2019.
This patent is subject to a terminal disclaimer.
Int. Cl. G06F 21/62 (2013.01); G06F 16/27 (2019.01); G06F 21/64 (2013.01); H04L 9/08 (2006.01); H04L 9/40 (2022.01)
CPC G06F 21/62 (2013.01) [G06F 16/27 (2019.01); G06F 21/6218 (2013.01); G06F 21/64 (2013.01); H04L 9/0825 (2013.01); H04L 63/062 (2013.01); H04L 63/08 (2013.01); G06F 2221/2113 (2013.01); G06F 2221/2141 (2013.01)] 12 Claims
OG exemplary drawing
 
1. A method for managing data, comprising the steps of:
receiving, from a first computing device, client data associated with a user, wherein the user is associated with a client key that uniquely identifies the user;
storing the client data;
receiving a request from a second computing device for access to the client data, the request comprising a requestor key corresponding to a requestor associated with the second computing device, wherein the requestor key is a rotating requestor key and each request received from the second computing device is associated with a different requestor key;
determining if the requestor is authorized to access the client data by validating the requestor key based at least in part on the client key;
upon determining that the requestor is authorized to access the client data:
retrieving the client data; and
providing, to the second computing device, access to the client key and the client data;
receiving, from the first computing device, a request to cancel requestor access to the client data; and
preventing further access to the client data for the second computing device by at least populating incorrect values for the client key to ensure the client data is no longer usable by the second computing device.