Method and apparatus for providing an anonymous identity for a user
First Claim
1. A method in a data processing system for an organization to provide anonymity to a user, the method comprising the data processing system implemented steps of:
- receiving a request from the user for an anonymous identity;
generating the anonymous identity for the user, wherein the anonymous identity includes contact information for the organization;
associating the anonymous identity with the user, wherein the user uses the anonymous identify to provide information on a network data processing system;
receiving a contact directed to the anonymous identity; and
selectively forwarding the contact to the user based on a policy.
2 Assignments
0 Petitions
Accused Products
Abstract
A method, apparatus, and computer implemented instructions for an organization to provide anonymity to a user in a data processing system. A request is received from the user for an anonymous identity. The anonymous identity is generated for a user, wherein the anonymous identity includes contact information for the organization. The anonymous identity is associated with the user, wherein the user uses the anonymous identify to provide information on a network data processing system. Contacts received under the anonymous by the organization are selectively forwarded to the user.
-
Citations
84 Claims
-
1. A method in a data processing system for an organization to provide anonymity to a user, the method comprising the data processing system implemented steps of:
-
receiving a request from the user for an anonymous identity;
generating the anonymous identity for the user, wherein the anonymous identity includes contact information for the organization;
associating the anonymous identity with the user, wherein the user uses the anonymous identify to provide information on a network data processing system;
receiving a contact directed to the anonymous identity; and
selectively forwarding the contact to the user based on a policy. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 15, 16, 17, 18, 19, 20, 21)
-
-
14. A method in a data processing system for providing anonymity to a user, the method comprising the data processing system implemented steps of:
-
receiving a contact, wherein the contact includes an identification of an entity;
comparing the identification of an entity in the contact to a database of aliases; and
responsive to identifying the user, selectively forwarding the contact to the user based on a policy.
-
-
22. A data processing system comprising:
-
a bus system;
a communications unit connected to the bus system;
a memory connected to the bus system, wherein the memory includes as set of instructions; and
a processing unit connected to the bus system, wherein the processing unit executes the set of instructions to receive a request from the user for an anonymous identity;
generate the anonymous identity for the user, wherein the anonymous identity includes contact information for the organization;
associate the anonymous identify with the user, wherein the user uses the anonymous identity to provide information on a network data processing system;
receive a contact directed to the anonymous identity; and
selectively forward the contact to the user based on a policy. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 36, 37, 38, 39, 40, 41, 42)
-
-
35. A data processing system comprising:
-
a bus system;
a communications unit connected to the bus system;
a memory connected to the bus system, wherein the memory includes as set of instructions; and
a processing unit connected to the bus system, wherein the processing unit executes the set of instructions to receive a contact, wherein the contact includes an identification of an entity;
compare the identification of an entity in the contact to a database of aliases; and
selectively forward the contact to the user based on a policy in response to identifying the user.
-
-
43. A data processing system for an organization to provide anonymity to a user, comprising:
-
first receiving means for receiving a request from the user for an anonymous identity;
generating means for generating the anonymous identity for the user, wherein the anonymous identity includes contact information for the organization;
associating means for associating the anonymous identity with the user, wherein the user uses the anonymous identify to provide information on a network data processing system;
second receiving means for receiving a contact directed to the anonymous identity; and
forwarding means for selectively forwarding the contact to the user based on a policy. - View Dependent Claims (44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 57, 58, 59, 60, 61, 62, 63)
-
-
56. A data processing system for providing anonymity to a user comprising:
-
receiving means for receiving a contact, wherein the contact includes an identification of an entity;
comparing means for comparing the identification of an entity in the contact to a database of aliases; and
forwarding means, responsive to identifying the user, for selectively forwarding the contact to the user based on a policy.
-
-
64. A computer program product in a computer readable medium an organization to provide anonymity to a user, the computer program product comprising:
-
first instructions for receiving a request from the user for an anonymous identity; and
second instructions for generating the anonymous identity for the user, wherein the anonymous identity includes contact information for the organization;
third instructions for associating the anonymous identity with the user, wherein the user uses the anonymous identify to provide information on a network data processing system;
fourth instructions for receiving a contact directed to the anonymous identity; and
fifth instructions for selectively forwarding the contact to the user based on a policy. - View Dependent Claims (65, 66, 67, 68, 69, 70, 71, 72, 75, 76)
-
-
77. A computer program product in a computer readable medium for providing anonymity to a user, the computer program product comprising:
-
first instructions for receiving a contact, wherein the contact includes an identification of an entity;
second instructions for comparing the identification of an entity in the contact to a database of aliases; and
third instructions, responsive to identifying the user, for selectively forwarding the contact to the user based on a policy. - View Dependent Claims (73, 74, 78, 79, 80, 81, 82, 83, 84)
-
Specification