Method and apparatus for protecting personal information and for verifying identities
First Claim
1. A method for verifying the identity of a person, the method comprising the steps of:
- a. receiving a personal key from a person whose identity is to be verified;
b. transmitting the personal key to an electronic system, said electronic system containing personal information regarding the individual whose identity is to be verified; and
, c. receiving a confirmation from said computer system that the personal key is linked to the personal information of the individual whose identity is sought to be verified.
0 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides a method and apparatus for protecting private information and for verifying the identity of an individual, preferably as part of a commercial transaction. The present invention utilizes an electronic data base which contains information regarding the individual and a personal key which is associated with the private information. In the preferred embodiment, the private information is a Social Security Number. Alternative embodiments of the present invention utilize keys which are single use keys, multi-use keys or keys which have an expiration date. Alternative embodiments allow for the key to be received through a web browser interface, over a telephone or by other common electronic communication means. The subscriber can also enable a verification block feature so as to prevent the use of the private information for a period of time, thereby combating identity theft.
-
Citations
32 Claims
-
1. A method for verifying the identity of a person, the method comprising the steps of:
-
a. receiving a personal key from a person whose identity is to be verified;
b. transmitting the personal key to an electronic system, said electronic system containing personal information regarding the individual whose identity is to be verified; and
,c. receiving a confirmation from said computer system that the personal key is linked to the personal information of the individual whose identity is sought to be verified. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for verifying the identity of a person, the method comprising:
-
a. storing personal information regarding one or more persons in an electronic database;
b. receiving an electromagnetic signal pursuant to which the verification of personal information of one or more persons is requested;
c. verifying that the information in the electromagnetic signal is linked to certain personal information in the electronic database for one or more persons; and
d. confirming that the information in the electromagnetic signal and certain personal information are linked in the computer database. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system for protecting personal information comprising:
-
a. a computer system, said computer system including an electronic data storage device and operating instructions to manipulate data stored in said data storage device;
b. a personal key, said personal key being associated with data stored in said data storage device; and
,c. a communication interface, said communication interface being arranged to receive requests for verification from one or more sources and transmit a result of the manipulation of the data in the data storage device in response thereto. - View Dependent Claims (16, 17, 18, 19, 20)
-
-
21. A method for verifying personal information provided to a merchant by an individual in a commercial transaction, the steps comprising:
-
a. providing a code to the merchant together with personal information;
b. communicating the code and the personal information to computer for verifying that the code and the personal information is linked in the database of the computer; and
,c. receiving a confirmation that the code and the personal information are linked in the database of the computer before consummating the commercial transaction. - View Dependent Claims (22, 23, 24, 25, 26)
-
-
27. A system for protecting personal information, the system comprising:
-
a. an electronic data storage device, said electronic data storage device containing personal information for at least one individual;
b. a personal key generator, said personal key generator arranged to generate a personal key in response to a request by a person whose information is stored in the electronic data storage device;
c. a communication interface, said communication interface being in selective communication with said electronic data storage device and said personal key generator so as to respond to at least one of;
a request for the generation of a personal key, a request to transmit a personal key, and a request to verify that the personal information stored in said electronic storage device is associated with a previously generated personal key. - View Dependent Claims (28, 29, 30, 31, 32)
-
Specification