Systems and methods for data access control using a short-range transceiver

ABSTRACT

Systems and methods for controlling data access through the interaction of a short-range transceiver, such as a contactless card, with a client device are presented. An exemplary system and method may include establishing a database storing information for a plurality of accounts, receiving from a client device of the second account holder an account link request to link a first account with a second account, the account link request generated in response to a tap action between a contactless card and the client device, transmitting to a client device of the first account holder a link approval request to approve the account link request, receiving from the first account holder client device, a link approval message generated in response to an indication by the first account holder approving the account link request, and transmitting to the second account holder client device an account link.

FIELD OF THE DISCLOSURE

The present disclosure relates generally to user data control and, more specifically, to an exemplary system and method for active control of user access to data through the interaction of a short-range transceiver with a client device.

BACKGROUND

A typical user has multiple different accounts with one or more entities. When a user creates an account, the user will generally provide a certain amount of personal, identifying information regarding the user, as well as information for account access such as a username and password. Each entity may have, for example, different user data retention policies, different use policies, and different user data sharing policies. The policies of using user-information may further change without any notification to the user. In addition, the possessor of the user information may also change through a merger or buy-out of one entity by another, many times without any notice to the user.

Account access will often rely on log-in credentials (e.g., username and password) to confirm a cardholder's identity. However, if the log-in credentials are compromised, another person could have access to the user's account. In addition, the more entities or individuals that a user shares their personal information with, the greater the risk of the user's information being stolen by a breach at one of the entities. Further, a user may only desire to share certain pieces of personal information with an entity or individual for limited purposes or limited in time.

Thus, it may be beneficial to provide exemplary systems and methods which allow users to control the use of user information to overcome at least some of the deficiencies described herein.

SUMMARY

Aspects of the disclosed technology include systems and methods for controlling data access through the interaction of a short-range transceiver, such as a contactless card, with a client device. Data access control may be provided in the context of account information, including handling requests to link a first account with a second account, via the interaction of a short-range transceiver, such as a contactless card, with a client device such that disclosure of certain account identifier information, or account login information, need not be disclosed to individuals or entities requesting access to account data of another individual or entity.

Embodiments of the present disclosure provide a data access control system, comprising: a database storing information for a plurality of accounts comprising, for a first account associated with a first account holder, a first account identifier and first account data, and, for a second account associated with a second account holder, a second account identifier; a server configured to communicate over a network with a plurality of client devices, including a first client device associated with the first account holder and a second client device associated with the second account holder; a contactless card comprising a communications interface, a processor, and a memory, the memory storing an applet and a token, wherein the contactless card is associated with the first account holder; a client application comprising instructions for execution on at least one of the first client device or the second client device, the client application configured to: when executed on the second client device: in response to a tap action between the contactless card and the second client device: receive the token from the contactless card, and transmit to the server the token and an account link request to link the first account with the second account; and receive from the server an account link confirmation message including instructions for access to the first account data; and, when executed on the first client device: in response to a link approval request from the server to approve the account link request, transmit to the server a link approval message approving the account link request; and, a processor in data communication with the server and the database, the processor configured to: receive from the second client device the token and the account link request; identify the first account based on the token; transmit to the first client device the link approval request to approve the account link request; receive from the first client device the link approval message approving the account link request; and transmit to the second client device the account link confirmation message including instructions for access to the first account data.

Embodiments of the present disclosure provide a method for controlling data access, comprising: establishing a database storing information for a plurality of accounts comprising, for a first account associated with a first account holder, a first account identifier, first account data and data control parameters, and, for a second account associated with a second account holder, a second account identifier; receiving from a client device of the second account holder, via a network, an account link request to link the first account with the second account, the account link request generated in response to a tap action between a contactless card and the second account holder client device, the account link request accompanied by a token stored on the contactless card, wherein the contactless card is associated with the first account holder; identifying the first account based on the token; transmitting to a client device of the first account holder, via the network, a link approval request to approve the account link request; receiving from the first account holder client device, via the network, a link approval message, the link approval message generated in response to an indication by the first account holder approving the account link request; and transmitting to the second account holder client device, via the network, an account link confirmation message, the account link confirmation message confirming approval of the account link request and providing instructions for access to the first account data.

Embodiments of the present disclosure provide a method for controlling data access, comprising: establishing a database storing information for a plurality of accounts comprising, for a first account associated with a first account holder, a first account identifier, first account data and data control parameters, and, for a second account associated with a second account holder, a second account identifier; providing a contactless card comprising a communications interface, a processor, and a memory, the memory storing an applet and a token, wherein the communications interface is configured to support at least one of near field communication, Bluetooth, or Wi-Fi, and wherein the contactless card is associated with the first account holder; and providing a client application comprising instructions for execution on at least one of a first client device of the first account holder or a second client device of the second account holder, the client application configured to: when executed on the second client device: in response to a tap action between the contactless card and the second client device: receive the token from the contactless card, and transmit to the server the token and an account link request to link the first account with the second account; and receive from the server an account link confirmation message including instructions for access to the first account data, the data access provided according to the data control parameters; and, when executed on the first client device: determine a tap action between the contactless card and the first client device, the tap action in response to a link approval request to approve the account link request, the tap action indicating approval of the account link request; and transmit to the server a link approval message approving the account link request.

Further features of the disclosed design, and the advantages offered thereby, are explained in greater detail hereinafter with reference to specific example embodiments described below and illustrated in the accompanying drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1A is a diagram of a data access control system according to one or more example embodiments.

FIG. 1B is a diagram illustrating a sequence for providing data access control according to one or more example embodiments.

FIG. 2 illustrates components of a client device used in a data access control system according to one or more example embodiments.

FIG. 3 illustrates components of a short-range transceiver used in a data access control system according to one or more example embodiments.

FIG. 4 is diagram illustrating interaction between a client device and a short-range transceiver used in a data access control system according to one or more example embodiments.

FIG. 5 is diagram illustrating interaction between a client device and a short-range transceiver used in a data access control system according to one or more example embodiments.

FIG. 6 is a flowchart illustrating a method of data access control according to one or more example embodiments.

FIG. 7 is a flowchart illustrating a method of data access control according to one or more example embodiments.

FIG. 8 is a flowchart illustrating a method of data access control according to one or more example embodiments.

DETAILED DESCRIPTION

The following description of embodiments provides non-limiting representative examples referencing numerals to particularly describe features and teachings of different aspects of the invention. The embodiments described should be recognized as capable of implementation separately, or in combination, with other embodiments from the description of the embodiments. A person of ordinary skill in the art reviewing the description of embodiments should be able to learn and understand the different described aspects of the invention. The description of embodiments should facilitate understanding of the invention to such an extent that other implementations, not specifically covered but within the knowledge of a person of skill in the art having read the description of embodiments, would be understood to be consistent with an application of the invention.

Exemplary embodiments of the disclosed systems and methods provide for controlling data access through the interaction of a short-range transceiver, such as a contactless card, with a client device. Data access control may be provided in the context of controlling access to account information. Requests to link a first account with a second account may be handled via the interaction of a short-range transceiver, such as a contactless card, with a client device such that disclosure of certain account identifier information, or account login information, need not be disclosed to individuals or entities requesting access to account data of another individual or entity. Benefits of the disclosed technology may include improved data security for account information, improved fraud prevention, and improved user experience.

FIG. 1A shows a diagram illustrating a data access control system 100 according to one or more example embodiments. As discussed further below, system 100 may include client device 101, client device 103, short-range transceiver 105, server 110, processor 120 and database 130. Client device 101 and client device 103 may communicate with server 110 via network 115. Although FIG. 1 illustrates certain components connected in certain ways, system 100 may include additional or multiple components connected in various ways.

System 100 may include one or more client devices, such as client device 101 and/or client device 103, which may each be a network-enabled computer. As referred to herein, a network-enabled computer may include, but is not limited to a computer device, or communications device including, e.g., a server, a network appliance, a personal computer, a workstation, a phone, a handheld PC, a personal digital assistant, a thin client, a fat client, an Internet browser, or other device. Each of client devices 101 and 103 also may be a mobile device; for example, a mobile device may include an iPhone, iPod, iPad from Apple® or any other mobile device running Apple's iOS® operating system, any device running Microsoft's Windows® Mobile operating system, any device running Google's Android® operating system, and/or any other smartphone, tablet, or like wearable mobile device. Additional features that may be included in a client device, such as client device 101 and/or client device 103, are further described below with reference to FIG. 2.

System 100 may include one or more short-range transceivers, such as short-range transceiver 105. Short-range transceiver 105 may be in wireless communication with a client device, such as client device 101 and/or client device 103, within a short-range communications field such as, for example, near field communication (NFC). Short-range transceiver 105 may include, for example, a contactless card, a smart card, or may include a device with a varying form factor such as a fob, pendant or other device configured to communicate within a short-range communications field. In other embodiments, the short-range transceiver 105 may be the same or similar as the client devices 101, 103. Additional features that may be included in a short-range transceiver, such as such as short-range transceiver 105, are further described below with reference to FIG. 3.

System 100 may include one or more servers 110. In some example embodiments, server 110 may include one or more processors (such as, e.g., a microprocessor) which are coupled to memory. Server 110 may be configured as a central system, server or platform to control and call various data at different times to execute a plurality of workflow actions. Server 110 may be a dedicated server computer, such as bladed servers, or may be personal computers, laptop computers, notebook computers, palm top computers, network computers, mobile devices, or any processor-controlled device capable of supporting the system 100.

Server 110 may be configured for data communication (such as, e.g., via a connection) with one or more processors, such as processor 120. In some example embodiments, server 110 may incorporate processor 120. In some example embodiments, server 110 may be physically separate and/or remote from processor 120. Processor 120 may be configured to serve as a back-end processor. Processor 120 may be configured for data communication (such as, e.g., via a connection) with database 130 and/or server 110. Processor 120 may include one or more processing devices such as a microprocessor, RISC processor, ASIC, etc., along with associated processing circuitry. Processor 120 may include, or be connected to, memory storing executable instructions and/or data. Processor 120 may communicate, send or receive messages, requests, notifications, data, etc. to/from other devices, such as client devices 101 and/or 103, via server 110.

Server 110 may be configured for data communication (such as, e.g., via a connection) with one or more databases, such as database 130. Database 130 may be a relational or non-relational database, or a combination of more than one database. In some example embodiments, server 110 may incorporate database 130. In some example embodiments, database 130 may be physically separate and/or remote from server 110, located in another server, on a cloud-based platform, or in any storage device that is in data communication with server 110.

Connections between server 110, processor 120 and database 130 may be made via any communications line, link or network, or combination thereof, wired and/or wireless, suitable for communicating between these components. Such network may include network 115 and/or one or more networks of same or similar type as those described herein with reference to network 115. In some example embodiments, connections between server 110, processor 120 and database 130 may include a corporate LAN.

Server 110 and/or database 130 may include user login credentials used to control access to user accounts. The login credentials may include, without limitation, user names, passwords, access codes, security questions, swipe patterns, image recognition, identification scans (e.g., driver's license scan and passport scan), device registrations, telephone numbers, email addresses, social media account access information, and biometric identification (e.g., voice recognition, fingerprint scans, retina scans, and facial scans).

Database 130 may contain data relating to one or more accounts. Accounts may be maintained by (or on behalf of) and/or relate to any one or more of a variety of entities, such as, for example (and without limitation) a bank, merchant, online retailer, service provider, merchandizer, manufacturer, social media provider, provider or promoter of sporting or entertainment events, or hotel chain. For example, database 130 may include, without limitation, account identification information (e.g., account number, account owner identification number, account owner name and contact information—any one or more of which may comprise an account identifier), account characteristics (e.g., type of account, funding and trading limitations, and restrictions on access and other activity), and may include data pertinent to the account, including financial (such as balance information, payment history, and transaction history), social and/or personal information. Data stored in database 130 may be stored in any suitable format, and may be encrypted and stored in a secure format to prevent unauthorized access. Any suitable algorithm/procedure may be used for data encryption and for authorized decryption.

Server 110 may be configured to communicate with one or more client devices, such as such as client device 101 and/or client device 103, via one or more networks, such as network 115. Network 115 may include one or more of a wireless network, a wired network or any combination of wireless network and wired network, and may be configured to connect client devices 101 and/or 103 to server 110. For example, network 115 may include one or more of a fiber optics network, a passive optical network, a cable network, an Internet network, a satellite network, a wireless local area network (LAN), a Global System for Mobile Communication, a Personal Communication Service, a Personal Area Network, Wireless Application Protocol, Multimedia Messaging Service, Enhanced Messaging Service, Short Message Service, Time Division Multiplexing based systems, Code Division Multiple Access based systems, D-AMPS, Wi-Fi, Fixed Wireless Data, IEEE 802.11b, 802.15.1, 802.11n and 802.11g, Bluetooth, NFC, Radio Frequency Identification (RFID), Wi-Fi, and/or the like.

In addition, network 115 may include, without limitation, telephone lines, fiber optics, IEEE Ethernet 902.3, a wide area network, a wireless personal area network, a LAN, or a global network such as the Internet. In addition, network 115 may support an Internet network, a wireless communication network, a cellular network, or the like, or any combination thereof. Network 115 may further include one network, or any number of the exemplary types of networks mentioned above, operating as a stand-alone network or in cooperation with each other. Network 115 may utilize one or more protocols of one or more network elements to which they are communicatively coupled. Network 115 may translate to or from other protocols to one or more protocols of network devices. Although network 115 is depicted as a single network, it should be appreciated that according to one or more example embodiments, network 115 may comprise a plurality of interconnected networks, such as, for example, the Internet, a service provider's network, a cable television network, corporate networks, such as credit card association networks, a LAN, and/or home networks.

In some example embodiments, server 110 may access records, including records in database 130, to determine a method or methods for communicating with client device 101 and/or client device 103. The communication method may include an actionable push notification with an application stored on client device 101 and/or client device 103. Other communication methods may include a text message or an e-mail, or other messaging techniques appropriate in a network-based client/server configuration. Messages or requests by client devices 101 and/or 103 may be communicated to server 110 via an application on the client device, or may be sent by a text message or an e-mail, or other messaging techniques appropriate in a network-based client/server configuration. Communications originating with client device 101 or client device 103 may be sent to server 110 using the same communications method as communications originating with server 110, or via a different communications method.

FIG. 1B shows a diagram illustrating a sequence for providing data access control according to one or more example embodiments, which may include a request to link two accounts, each account held by separate account holders. FIG. 1B references similar components of example embodiment system 100 as illustrated in FIG. 1A. Client device 101 may be associated with a first account holder. The first account holder may have an associated first account, which may include a first account identifier and first account data. Client device 101 may include application 102, which may include instructions for execution by client device 101. Client device 101 may include features further described below with reference to FIG. 2. Application 102 may be configured to provide a user interface for the first account holder when using client device 101. Application 102 may be configured to communicate, via client device 101, with other client devices, with short-range transceiver 105, and with server 110. Application 102 may be configured to receive requests and send messages as described herein with reference to client device 101. Account information, including account identifiers and account data, may be stored in database 130.

Client device 103 may be associated with a second account holder. The second account holder may have an associated second account, which may include a second account identifier. Client device 103 may include application 104, which may include instructions for execution by client device 103. Client device 103 may include features further described below with reference to FIG. 2. Application 104 may be configured to provide a user interface for the second account holder when using client device 103. Application 104 may be configured to communicate, via client device 103, with other client devices, with short-range transceiver 105, and with server 110. Application 104 may be configured to send requests and receive messages as described herein with reference to client device 103.

Short-range transceiver 105 may be associated with the first account holder. Short-range transceiver 105 may include, for example, a contactless card, and may include features further described below with reference to FIG. 3. Short-range transceiver 105 may have memory storing an applet 106 and/or a token 107, token 107 being associated with the first account holder.

A token may be used to increase security through token authorization. Server 110 may send a validation request to client device 101 and/or 103, receive responsive information from client device 101 and/or 103, and if validated, send a validation token back to client device 101 and/or 103. The validation token may be based on a pre-determined token, or may be a dynamic token based on an algorithm that can be secret and known only to server 110 and client device 101 and/or 103; the algorithm may include live parameters independently verifiable by the participants, such as the temperature at a particular location or the time. The token may be used to verify the identity of the first account holder or the second account holder. The validation request and/or validation token may be based on token 107 stored on short-range transceiver 105.

In some example embodiments, application 104 may display an instruction on client device 103 prompting the second account holder to initiate a tap action between short-range transceiver 105 and client device 103. As used herein, a tap action may include tapping short-range transceiver 105 against client device 103 (or vice-versa). For example, if short-range transceiver 105 is a contactless card and client device 103 is a mobile device, the tap action may include tapping the contactless card on a screen or other portion of client device 103. However, a tap action is not limited to a physical tap by short-range transceiver 105 against client device 103, and may include other gestures, such as, e.g., a wave or other movement of short-range transceiver 105 in the vicinity of client device 103 (or vice-versa).

At label 150, there may be a tap action between short-range transceiver 105 and client device 103. The tap action may be in response to a prompt displayed on client device 103.

At label 152, application 104 may communicate (via client device 103) with short-range transceiver 105 (e.g., after short-range transceiver 105 is brought near client device 103). Communication between application 104 and short-range transceiver 105 may involve short-range transceiver 105 (such as, e.g., a contactless card) being sufficiently close to a card reader (not shown) of the client device 103 to enable NFC data transfer between application 104 and short-range transceiver 105, and may occur in conjunction with (or response to) a tap action between short-range transceiver 105 and client device 103 (such as, e.g., the tap action at label 150). The communication may include exchange of data or commands to establish a communication session between application 104 and short-range transceiver 105. The exchange of data may include transfer or exchange of one or more keys, which may be preexisting keys or generated as session keys. In some example embodiments, the communication may occur upon entry of short-range transceiver 105 into a short-range communication field of client device 103 prior to a tap action between short-range transceiver 105 and client device 103.

At label 154, short-range transceiver 105 may send token 107 associated with the first account holder to application 104. Token 107 may include the first account identifier, which may be unique to a specific user account. In an example embodiment, token 107 may include an identifier unique to the first account holder, but not to a specific account; in which case if the first account holder has more than one account, the second account holder would need to select the account to be linked. In some example embodiments, token 107 may include a key associated with the first account holder. In some example embodiments, the sending of token 107 to application 104 may be in conjunction with (or response to) a tap action between short-range transceiver 105 and client device 103 (such as, e.g., the tap action at label 150). In some example embodiments, the sending of token 107 to application 104 may occur upon entry of short-range transceiver 105 into a short-range communication field of client device 103 prior to a tap action between short-range transceiver 105 and client device 103.

At label 156, application 104 may send token 107 to server 110, along with an account link request to link the first account (associated with the first account holder) with the second account (associated with the second account holder). This may be carried out in response to a tap action between short-range transceiver 105 and client device 103 (such as, e.g., the tap action at label 150).

At label 158, processor 120 may receive (e.g., via server 110) the token and the account link request. Processor 120 may use the token to identify the first account associated with the first account holder. In some example embodiments, identifying the first account may be carried out by using the first account identifier in the token to look up account information in database 130. In some example embodiments, at label 159, if the token includes the key associated with the first account holder, processor 120 may use the key in the token to authenticate the first account holder as the first account holder associated with short-range transceiver 105.

At label 160, processor 120 may send (e.g., via server 110) a link approval request to client device 101, requesting that the first account holder approve the account link request, by the second account holder, to link the first account with the second account. The link approval request may include, for example, the name of the second account holder, and any information or instructions required by the first account holder to consider the request. The link approval request may include a notice that the first account holder may approve or deny the request. The link approval request may be sent as a push notification to application 102 (via client device 101). In some example embodiments, application 102 may display an instruction on client device 101 prompting the first account holder to initiate a tap action between short-range transceiver 105 and client device 101.

At label 162, there may be a tap action between short-range transceiver 105 and client device 101. The tap action may be responsive to the link approval request (and/or to a prompt displayed on client device 101), and may indicate approval by the first account holder of the account link request.

At label 164, application 102 may send a link approval message to the server, indicating approval by the first account holder of the account link request. This may be carried out in response to a tap action between short-range transceiver 105 and client device 101 (such as, e.g., the tap action at label 162). In an example embodiment, application 102 may instead send a denial message (not shown) to the server, indicating denial by the first account holder of the account link request.

At label 166, processor 120 may send (e.g., via server 110) a link confirmation message to client device 103, confirming approval of the request to link the first account with the second account. The link confirmation message may be sent as a push notification to application 104 (via client device 103). In some example embodiments, information for the first account and/or the second account in database 130 may be updated with the permission granted by the first account holder to link the first and second accounts.

In an example embodiment, processor 120 may instead send a denial notification (not shown) to client device 103, indicating denial by the first account holder of the account link request.

At label 168, processor 120 may send (e.g., via server 110) to client device 103 instructions for obtaining access to first account data in the first account. The instructions for access to the first account data may be included with the link confirmation message (at label 166), or may be sent as part of a separate communication, including a push notification to application 104.

Processor 120 may retrieve the requested first account data from database 130 and transmit the data to client device 103. Processor 120 may encrypt the requested first account data, prior to transmission to client device 103, using any suitable encryption method, such as Triple DES, RSA public-key private-key encryption, asymmetric encryption, Blowfish encryption, Twofish encryption, Advanced Encryption Standard (AES), quantum key distribution, Honey Encryption, etc. In some embodiments, the requested first account data may already be encrypted as stored in database 130 prior to retrieval by processor 120.

Upon receipt of the requested first account data, client device 103 may decrypt the information, if the information was encrypted prior to transmission by processor 120. Client device 103 may receive a decryption key separate from the first communication of encrypted first account data. The encryption may allow for control of access to first account data according to data control parameters. For example, the first account data may be encrypted in a manner that requires a new key to be requested by client device 103 from processor 120 each time client device 103 desires to gain access to the first account data, such that the data would need to be decrypted for each access by client device 103; this procedure would permit processor 120 to keep track of and ensure that the first account data is not accessed in a manner inconsistent with data control parameters.

In an example embodiment, the second account holder may login to the second account and, via data sharing on the backend, obtain access to first account data, in accordance with any data control parameters.

Application 104 executing on client device 103 may through the use of application programming interfaces (APIs), perform the steps of sending and receiving messages and requests with server 110/processor 120. Application 104 may be configured to receive, decrypt, and access the requested first account data. Through interaction with application 104, processor 120 may monitor access of the requested first account data by client device 103, including in accordance with data control parameters. For example, processor 120 may through interaction with application 104 determine the number of times client device 103 has obtained access to the requested first account data, or the period(s) of time such access occurred. In some embodiments, application 104 may be permitted to store the requested first account data on a time-limited, or limited number of uses, basis.

In an example embodiment, processor 120 may be configured to determine whether the first account is eligible to be linked with the second account. Eligibility for account linking may be based on, for example, the type of accounts involved (e.g., business accounts), or identity of the account holders (e.g., family members or members of the same business entity). Eligibility may also be based on whether the first account holder has previously approved or revoked approval of account linking, or whether requested access would violate data control parameters (discussed further below). Eligibility for account linking may, e.g., be indicated in a flag stored in database 130 or in memory of short-range transceiver 105.

In one or more example embodiments, access by the second account holder to first account data may be limited in accordance with data control parameters. In an example embodiment, data control parameters may be stored in database 130 with the first account information. Application 102 may provide an interface for the first account holder to select the data control parameters stored in database 130. The selected data control parameters may be stored in database 130 and may be applied to limit access by the second account holder to first account data. Application 102 may also transmit the selected data control parameters to short-range transceiver 105. In an example embodiment, data control parameters may be stored in memory of short-range transceiver 105. Data control parameters stored in memory of short-range transceiver 105 may be sent to application 104 and used by application 104 to limit access by the second account holder to first account data. Applet 106 may be configured to receive the data control parameters and store the data control parameters in memory of short-range transceiver 105. Applet 106 may be further configured to transmit the data control parameters to client device 103. In some example embodiments, the first account holder may select data control parameters at the time of approving the request to link accounts, and application 102 may transmit the selected data control parameters to server 110 along with the link approval message. The selected data control parameters may be stored in database 130 and may be applied to limit access by the second account holder to first account data.

In one or more example embodiments, data control parameters may be used to limit access by the second account holder to first account data in one or more ways. For example, the data control parameters may permit access only for a specific or limited period of time. As another example, the data control parameters may permit access to a single use by the second account holder. As another example, the data control parameters may permit access for an unlimited period of time, unless the first account holder revokes the approval of the request to link the first account with the second account. As another example, the data control parameters may permit access only to portions of first account data corresponding to a predefined category. As another example, the data control parameters may provide different access permissions based on the identity of the second account holder. As another example, the data control parameters may permit access only when short-range transceiver 105 is detected within range of a short-range communication field of client device 103. In some example embodiments, each time the second account holder attempts to access first account data after account linking approval is obtained, processor 120 may check to determine whether such access is permitted based on data control parameters and any revocation by the first account holder.

In an example embodiment, application 104 may be launched in response to a tap action between short-range transceiver 105 and client device 103. In an example embodiment, application 102 may be launched in response to a tap action between short-range transceiver 105 and client device 101.

FIG. 2 illustrates components of a client device 200 used in a data access control system according to one or more example embodiments. In one or more example embodiments, client device 200 may be one or more of client devices 101 and/or 103, described above with reference to FIG. 1A and FIG. 1B. Client device 200 may include one or more applications 201, one or more processors 202, a short-range communications interface 203, and a network interface 204. Application 201 may include a software application or executable program code to be executed on processor 202 and configured to carry out features described herein for any of the client devices, such as client devices 101 and/or 103, and/or any of the features described herein with reference to application 102. Application 201 may be configured, for example, to transmit and/or receive data with other devices via client device 200, such as via short-range communications interface 203 and/or network interface 204. For example, application 201 may be configured to initiate one or more requests, such as near field data exchange requests to a short-range transceiver (such as a contactless card). Application 201 may also be configured to provide a user interface via a display (not shown) for a user of the client device. Application 201 may be stored in memory in client device 200; the memory may include a read-only memory, write-once read-multiple memory and/or read/write memory, e.g., RAM, ROM, and EEPROM.

Processor 202 may include one or more processing devices such as a microprocessor, RISC processor, ASIC, etc., and may include associated processing circuitry. Processor 202 may include, or be connected to, memory storing executable instructions and/or data, as may be necessary or appropriate to control, operate or interface with the other features of client device 200, including application 201. Processor 202 (including any associated processing circuitry) may contain additional components including processors, memories, error and parity/CRC checkers, data encoders, anticollision algorithms, controllers, command decoders, security primitives and tamperproofing hardware, as necessary to perform the functions described herein.

Short-range communications interface 203 may support communication via a short-range wireless communication field, such as NFC, RFID, or Bluetooth. Short-range communications interface 203 may include a reader, such as a mobile device NFC reader. Short-range communications interface 203 may be incorporated into network interface 204, or may be provided as a separate interface.

Network interface 204 may include wired or wireless data communication capability. These capabilities may support data communication with a wired or wireless communication network, including the Internet, a cellular network, a wide area network, a local area network, a wireless personal area network, a wide body area network, any other wired or wireless network for transmitting and receiving a data signal, or any combination thereof. Such network may include, without limitation, telephone lines, fiber optics, IEEE Ethernet 902.3, a wide area network, a local area network, a wireless personal area network, a wide body area network or a global network such as the Internet.

Client device 200 may also include a display (not shown). Such display may be any type of device for presenting visual information such as a computer monitor, a flat panel display, or a mobile device screen, including liquid crystal displays, light-emitting diode displays, plasma panels, and cathode ray tube displays.

Client device 200 may also include one or more device inputs (not shown). Such inputs may include any device for entering information into the client device that is available and supported by the client device 300, such as a touch-screen, keyboard, mouse, cursor-control device, touch-screen, microphone, digital camera, video recorder, or camcorder. The device inputs may be used to enter information and interact with the client device 200 and, by extension, with the systems described herein.

FIG. 3 illustrates components of a short-range transceiver 300 used in a data access control system according to one or more example embodiments. In one or more example embodiments, short-range transceiver 300 may be one or more of short-range transceiver 105, described above with reference to FIG. 1A and FIG. 1B. Short-range transceiver 300 may include, for example, a contactless card, or may include a device with a varying form factor such as a fob, pendant or other device configured to communicate within a short-range communications field. Short-range transceiver 300 may include a processor 301, memory 302, and short-range communications interface 305.

Processor 301 may include one or more processing devices such as a microprocessor, RISC processor, ASIC, etc., and may include associated processing circuitry. Processor 301 may include, or be connected to, memory storing executable instructions and/or data, as may be necessary or appropriate to control, operate or interface with the other features of short-range transceiver 300, including applet 303. Processor 301 (including any associated processing circuitry) may contain additional components including processors, memories, error and parity/CRC checkers, data encoders, anticollision algorithms, controllers, command decoders, security primitives and tamperproofing hardware, as necessary to perform the functions described herein.

Memory 302 may be a read-only memory, write-once read-multiple memory or read/write memory, e.g., RAM, ROM, and EEPROM. Memory 302 may be configured to store one or more applets 303, and one or more tokens 304. Applet 303 may comprise one or more software applications configured to execute on processor 301, such as a Java Card applet that may be executable on a contactless card. However, it is understood that applet 303 is not limited to Java Card applets, and instead may be any software application operable on contactless cards or other devices having limited memory. Applet 303 may be configured to respond to one or more requests, such as near field data exchange requests from a client device, including requests from a device having a reader such as a mobile device NFC reader. Applet 303 may be configured to read (or write) data, including token 304, from (or to) memory 302 and provide the data, including token 304, in response to a request.

Token 304 may include a unique alphanumeric identifier assigned to a user of the short-range transceiver 300, and the identifier may distinguish the user of the short-range transceiver 300 from other users of other short-range transceivers (such as other contactless card users). In some example embodiments, token 304 may identify both a customer and an account assigned to that customer and may further identify the short-range transceiver (such as a contactless card) associated with the customer's account. In some example embodiments, token 304 may include a key unique to the user or customer with which the short-range transceiver is associated.

Short-range communications interface 305 may support communication via a short-range wireless communication field, such as NFC, RFID, or Bluetooth. Short-range transceiver 300 may also include one or more antennas (not shown) connected to short-range communications interface 305 to provide connectivity with a short-range wireless communications field.

FIG. 4 is diagram illustrating the interaction 400 between a client device 401 and a short-range transceiver 420 used in a data access control system according to one or more example embodiments, including embodiments described above with reference to FIGS. 1A-1B. Client device 401 may be client device 103 described above with reference to FIG. 1A and FIG. 1B. Client device 401 may be associated with the second account holder. User interface 402 may be generated by application 104 described above with reference to FIG. 1B. Short-range transceiver 420 may be short-range transceiver 105 described above with reference to FIG. 1A and FIG. 1B. Upon entry of short-range transceiver 420 into a short-range communication field of client device 401 (such as, e.g., via a tap action), client device 401 may communicate with short-range transceiver 420. Client device 401 may send data or commands to short-range transceiver 420 via transmit signal 431, and may receive data from short-range transceiver 420, including token 422, via receive signal 432. Communication between client device 401 and short-range transceiver 420 may proceed as described above with reference to FIG. 1B (e.g., client device 101 or 103 and short-range transceiver 105).

User interface 402 may present on client device 401 a screen display for an account link request 410, which may include field 411 and field 412. If necessary, the second account holder may enter a username in field 411 and password in field 412. The screen display may include an instruction 414 prompting the second account holder to tap short-range transceiver 420 (in the example shown, short-range transceiver 420 may be a contactless card) to initiate an account link request to link the first account with the second account. Instruction 414 may be a push notification from server 110 (shown in FIGS. 1A and 1B). Client device 401 may transmit an account link request to server 110 (shown in FIG. 1A and FIG. 1B) in response to a tap action.

FIG. 5 is diagram illustrating the interaction 500 between a client device 501 and a short-range transceiver 520 used in a data access control system according to one or more example embodiments, including embodiments described above with reference to FIGS. 1A-1B. Client device 501 may be client device 101 described above with reference to FIG. 1A and FIG. 1B. Client device 501 may be associated with the first account holder. User interface 502 may be generated by application 102 described above with reference to FIG. 1B. Short-range transceiver 520 may be short-range transceiver 105 described above with reference to FIG. 1A and FIG. 1B. Upon entry of short-range transceiver 520 into a short-range communication field of client device 501 (such as, e.g., via a tap action), client device 501 may communicate with short-range transceiver 520. Client device 501 may send data or commands to short-range transceiver 520 via transmit signal 531, and may receive data from short-range transceiver 520, including token 522, via receive signal 532. Communication between client device 501 and short-range transceiver 520 may proceed as described above with reference to FIG. 1B (e.g., client device 101 or 103 and short-range transceiver 105).

User interface 502 may present on client device 501 a screen display for an account link request 510, which may include field 511 and field 512. If necessary, the first account holder may enter a username in field 511 and password in field 512. The screen display may include an instruction 514 notifying the first account holder that the second account holder (named 2_Acc_Hldr as shown in the example) has requested to link the first account with the second account, and prompting the first account holder to tap short-range transceiver 520 (in the example shown, short-range transceiver 520 may be a contactless card) to approve the account link request to link the first account with the second account. Instruction 514 may result from a push notification from server 110 (shown in FIG. 1A and FIG. 1B). Client device 501 may transmit an account link approval message to server 110 in response to a tap action. In some example embodiments, user interface 502 may provide the first account holder the option to select data control parameters at the time of approving the request to link accounts. Client device 501 may transmit the selected data control parameters to server 110 along with the link approval message; the selected data control parameters may be stored and may be applied to limit access by the second account holder to first account data, as discussed above.

FIG. 6 is a flowchart illustrating a method of data access control 600 according to one or more example embodiments, with reference to components and features described above including but not limited to the figures and associated description. Data access control method 600 may be carried out by application 104 executing on client device 103 associated with the second account holder. Short-range transceiver 105 is associated with the first account holder.

At block 610, application 104 may cause client device 103 to display an account link request screen (such as shown in, and described above with reference to, FIG. 4). The account link request screen may include an instruction to tap short-range transceiver 105 with/against client device 103 to initiate the account link request. As described above with reference to FIG. 4, short-range transceiver 420 (and, hence, short-range transceiver 105) may be a contactless card.

At block 620, a tap action may be detected between short-range transceiver 105 and client device 103.

At block 630, token 107 may be received from short-range transceiver 105. Receiving token 107 may be in response to the tap action of block 620. Token 107 may include the first account identifier. In some example embodiments, token 107 may include a key associated with the first account holder.

At block 640, token 107 may be transmitted to server 110 along with an account link request to link the first account with the second account. Transmission of token 107 and the account link request to server 110 may be in response to the tap action of block 620.

At block 650, an account link confirmation message may be received from server 110 along with instructions for access to first account data. As discussed above, the instructions may be part of the account link confirmation message, or part of a separate message.

At block 660, the second account holder may access the first account data according to the received instructions. As discussed above, in some example embodiments access to first account data may be only provided in accordance with data control parameters. In some example embodiments, the data control parameters are stored in database 130 with the first account information, and data access is limited by processor 120. In some example embodiments, the data control parameters are stored in memory of short-range transceiver 105 and are received by application 104 from short-range transceiver 105. In some example embodiments, the first account data may be encrypted prior to receiving instructions for access to the first account data. Decryption of the encrypted first account data may be performed using the key associated with the first account holder.

FIG. 7 is a flowchart illustrating a method of data access control 700 according to one or more example embodiments, with reference to components and features described above including but not limited to the figures and associated description. Data access control method 700 may be carried out by application 102 executing on client device 101 associated with the first account holder. Short-range transceiver 105 is associated with the first account holder.

At block 710, a link approval request may be received from server 110 seeking approval to link the first account with the second account.

At block 720, application 102 may cause client device 101 to display an account link request screen (such as shown in, and described above with reference to, FIG. 5). The account link request screen may include an instruction to tap short-range transceiver 105 with/against client device 101 to approve the account link request. As described above with reference to FIG. 5, short-range transceiver 520 (and, hence, short-range transceiver 105) may be a contactless card.

At block 730, a tap action may be detected between short-range transceiver 105 and client device 101 indicating approval of the link approval request. The tap action may be responsive to the link approval request. In an example embodiment, approval may be indicated by other methods (such as, e.g. selecting a button).

At block 740, token 107 may be received from short-range transceiver 105. Token 107 may include the first account identifier. In some example embodiments, token 107 may include a key associated with the first account holder.

At block 750, a link approval message may be sent to server 110 indicating approval of the request to link the first account with the second account.

FIG. 8 is a flowchart illustrating a method of data access control 800 according to one or more example embodiments, with reference to components and features described above including but not limited to the figures and associated description. Data access control method 800 may be carried out by processor 120 in communication with, via server 110, client device 101 associated with the first account holder and/or client device 103 associated with the second account holder.

At block 810 an account link request may be received, along with token 107, from client device 103 associated with the second account holder, requesting to link the first account with the second account. Token 107 may include the first account identifier. In some example embodiments, token 107 may include a key associated with the first account holder.

At block 820, the sender of the account link request may be identified as the second account holder.

At block 830, the first account may be identified based on received token 107. In some example embodiments, when token 107 includes the key associated with the first account holder, the key associated with the first account holder may be used to authenticate the first account holder.

At block 840, the processor may confirm that the first account is eligible to be linked with the second account. As discussed above with reference to FIG. 1B, eligibility for account linking may be based on, for example, the type of accounts involved (e.g., business accounts), or identity of the account holders (e.g., family members or members of the same business entity).

At block 850, a link approval request may be sent to client device 101 associated with the first account holder seeking approval to link the first account with the second account.

At block 860, a link approval message may be received from client device 101, indicating approval of the request to link the first account with the second account.

At block 870, an account link confirmation message may be sent to client device 103 associated with the second account holder, along with instructions for access to first account data. As discussed above, the instructions may be part of the account link confirmation message, or part of a separate message. In some example embodiments, access to first account data may be limited in accordance with data control parameters. In some example embodiments, processor 120 may encrypt the first account data prior to providing client device 103 instructions for access to the first account data. Encryption of the first account data may be performed using the key associated with the first account holder.

The description of embodiments in this disclosure provides non-limiting representative examples referencing figures and numerals to particularly describe features and teachings of different aspects of the disclosure. The embodiments described should be recognized as capable of implementation separately, or in combination, with other embodiments from the description of the embodiments. A person of ordinary skill in the art reviewing the description of embodiments should be able to learn and understand the different described aspects of the disclosure. The description of embodiments should facilitate understanding of the disclosure to such an extent that other implementations, not specifically covered but within the knowledge of a person of skill in the art having read the description of embodiments, would be understood to be consistent with an application of the disclosure

Throughout the specification and the claims, the following terms take at least the meanings explicitly associated herein, unless the context clearly dictates otherwise. The term “or” is intended to mean an inclusive “or.” Further, the terms “a,” “an,” and “the” are intended to mean one or more unless specified otherwise or clear from the context to be directed to a singular form.

In this description, numerous specific details have been set forth. It is to be understood, however, that implementations of the disclosed technology may be practiced without these specific details. In other instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description. References to “some examples,” “other examples,” “one example,” “an example,” “various examples,” “one embodiment,” “an embodiment,” “some embodiments,” “example embodiment,” “various embodiments,” “one implementation,” “an implementation,” “example implementation,” “various implementations,” “some implementations,” etc., indicate that the implementation(s) of the disclosed technology so described may include a particular feature, structure, or characteristic, but not every implementation necessarily includes the particular feature, structure, or characteristic. Further, repeated use of the phrases “in one example,” “in one embodiment,” or “in one implementation” does not necessarily refer to the same example, embodiment, or implementation, although it may.

As used herein, unless otherwise specified the use of the ordinal adjectives “first,” “second,” “third,” etc., to describe a common object, merely indicate that different instances of like objects are being referred to, and are not intended to imply that the objects so described must be in a given sequence, either temporally, spatially, in ranking, or in any other manner.

While certain implementations of the disclosed technology have been described in connection with what is presently considered to be the most practical and various implementations, it is to be understood that the disclosed technology is not to be limited to the disclosed implementations, but on the contrary, is intended to cover various modifications and equivalent arrangements included within the scope of the appended claims. Although specific terms are employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.

This written description uses examples to disclose certain implementations of the disclosed technology, including the best mode, and also to enable any person skilled in the art to practice certain implementations of the disclosed technology, including making and using any devices or systems and performing any incorporated methods. The patentable scope of certain implementations of the disclosed technology is defined in the claims, and may include other examples that occur to those skilled in the art. Such other examples are intended to be within the scope of the claims if they have structural elements that do not differ from the literal language of the claims, or if they include equivalent structural elements with insubstantial differences from the literal language of the claims. 

1-40. (canceled)
 41. A method for controlling data access, comprising: receiving, by a server via a network, an account link request to link a first account associated with a first account holder with a second account associated with a second account holder, the account link request accompanied by a token; identifying, by the server, the first account based on the token; transmitting, by the server via the network, a link approval request to approve the account link request; receiving, by the server via the network, a link approval message generated in response to an indication by the first account holder approving the account link request; and transmitting, by the server via the network, an account link confirmation message, the account link confirmation message confirming approval of the account link request.
 42. The method of claim 41, wherein the token comprises a key associated with the first account holder.
 43. The method of claim 42, wherein identifying the first account based on the token comprises identifying the first account based on the key.
 44. The method of claim 41, wherein the token comprise a first identifier associated with the first account holder.
 45. The method of claim 41, wherein: the server is in data communication with a database storing information for a plurality of accounts, and the plurality of accounts includes at least the first account and the second account.
 46. The method of claim 45, wherein: for the first account, the database storing information comprising a first account identifier and first account data, and for the second account, a second account identifier.
 47. The method of claim 41, further comprising, prior to transmitting the link approval request, determining whether the first account is eligible for linking to the second account based on at least one selected from the group of an identity of the first account holder and an identity of the second account holder.
 48. The method of claim 47, wherein the identity of the first account holder and the identity of the second account holder are family members.
 49. The method of claim 47, wherein the identity of the first account holder and the identity of the second account holder are members of the same business entity.
 50. The method of claim 41, further comprising, prior to transmitting the link approval request, determining whether the first account is eligible for linking to the second account based on at least one selected from the group of an account type of the first account and an account type of the second account.
 51. The method of claim 50, wherein the account type of the first account and the account type of the second account are corporate accounts.
 52. A server, comprising: a processor; and a memory, wherein the processor is configured to: receive, via a network, an account link request and a token, wherein the account link request is to link a first account associated with a first account holder with a second account associated with a second account holder, identify the first account based on the token, transmit, via the network, a link approval request to approve the account link request, receive, via the network, a link approval message generated in response to an indication by the first account holder approving the account link request, and transmit, via the network, an account link confirmation message, the account link confirmation message confirming approval of the account link request.
 53. The server of claim 52, wherein: the processor is in data communication with a database, and the database stores information for a plurality of accounts, the information including: for the first account associated with the first account holder, a first account identifier and first account data, and, for the second account associated with a second account holder, a second account identifier.
 54. The server of claim 53, wherein the processor is further configured to: retrieve at least a portion of the first account data from the database, encrypt the at least a portion of the first account data to generate encrypted first account data, and following transmission of the account link confirmation message, transmit the encrypted first account data.
 55. The server of claim 54, wherein the processor is further configured to transmit, in a separate communication from the encrypted first account data, a decryption key.
 56. The server of claim 55, wherein the decryption key is a key associated with the first account holder.
 57. A system for data access control, comprising: a short-range transceiver comprising a processor and a memory, wherein: the short-range transceiver is associated with a first account holder, and the memory of the short-range transceiver contains a token; and a server comprising a processor and a memory, wherein the server is in data communication with a database storing information for a plurality of accounts, the information including, for a first account associated with the first account holder, a first account identifier, first account data, and, for a second account associated with a second account holder, a second account identifier, wherein the short-range transceiver is configured to transmit an account link request to link the first account with the second account and the token to the server, and wherein, after receipt of the account link request, the server is configured to: identify the first account based on the token, transmit a link approval request to approve the account link request, receive a link approval message generated in response to an indication by the first account holder approving the account link request, and transmit an account link confirmation message, the account link confirmation message confirming approval of the account link request.
 58. The system of claim 57, wherein the server is further configured to transmit instructions for access to the first account data.
 59. The system of claim 57, wherein the token comprises a key associated with the first account holder.
 60. The method of claim 59, wherein identifying the first account based on the token comprises identifying the first account based on the key. 