Information processing system and method
First Claim
1. A method of providing a point of presence on a network for a user whose identity has been verified, the point of presence providing a source of verified information corresponding to the user or a destination for received information directed to the user, the method comprising:
- storing on a secure server verified information corresponding to the user based on a verified identity of the user;
providing to the user one or more keys enabling access to the information, the server being configured to permit the user, on validation of at least one key, to release verified information from the secure server or to access received information but not to modify the verified information.
1 Assignment
0 Petitions
Accused Products
Abstract
Information processing methods, systems and ancillary apparatus are disclosed which are generally concerned with the principle of making use of verified information concerning a user whose identity has been verified and stored on a secure server. The server effectively provides a point of presence which third parties may make use of to send or receive information to or from or concerning a specific user reliably, whilst enabling the user to retain control over the information, typically by means of a key such as a smartcard. This may facilitate a variety of transactions over a network, such as the Internet, which would otherwise require separate verification processes to provide the same level of reliability and thereby lead to a surprising improvement in efficiency of the network.
77 Citations
61 Claims
-
1. A method of providing a point of presence on a network for a user whose identity has been verified, the point of presence providing a source of verified information corresponding to the user or a destination for received information directed to the user, the method comprising:
-
storing on a secure server verified information corresponding to the user based on a verified identity of the user;
providing to the user one or more keys enabling access to the information, the server being configured to permit the user, on validation of at least one key, to release verified information from the secure server or to access received information but not to modify the verified information. - View Dependent Claims (2, 3, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 18, 19, 27, 37, 38, 39, 40, 50, 58)
-
-
4. A method of supplying verified information concerning a user over a network to a recipient, the method comprising:
-
storing on a secure server verified information corresponding to the user whose identity has been verified and based on the verified identity;
receiving at the secure server a request from the user to provide at least a portion of the information to a recipient over the network;
verifying at least one key provided by the user to validate the request;
in response to successful validation providing verified information to the recipient from the secure server over the network.
-
-
15. A method of supplying verified information concerning a user over a network to an authorised recipient, the method comprising:
-
storing on a secure server verified information corresponding to the user whose identity has been verified and based on the verified identity;
receiving at the secure server a request from the recipient to provide at least a portion of the information over the network;
verifying at least one key provided by the recipient to validate the request;
in response to successful validation providing information to the recipient from the secure server over the network.
-
-
16. A method of transmitting data concerning a user to a recipient, the method comprising transmitting the data concerning the user to the recipient over a network from a secure server and further comprising transmitting an identifier indicating that at least a portion of the data transmitted comprises verified information stored on the secure server following verification of the identity of the user.
-
17. A method of obtaining over a network verified information concerning a user whose identity has been verified, comprising:
-
requesting information from a user;
establishing communication over a network with a secure server on which is stored verified information concerning the user based on a verified identity of the user;
following provision of at least one key by the user and validation by the secure server of the or each key supplied, receiving verified information from the secure server over the network.
-
-
20. A method of processing a debit or credit transaction request comprising, at a secure server on which is stored a database of information corresponding to a plurality of users the identity of whom has been verified, the steps of:
-
receiving the transaction request, the request including an identifier of a target user with whom a transaction is requested and an identifier of the requester;
searching the database for information identifying at least one banking server capable of processing the transaction request for the target user and, if successful, forwarding the transaction request from the secure server to a banking server with authorisation to complete the requested transaction in accordance with at least one predetermined condition, or returning an identifier of a banking server and account to the requester. - View Dependent Claims (21, 22, 23, 24, 36)
-
-
25. A method of receiving a document destined for a user for which acknowledgment of receipt is required, the method comprising, at a secure server on which is stored a database of information corresponding to a plurality of users the identity of whom has been verified, the steps of:
-
receiving from a source a document and an identifier of a target user;
searching for notification information for the target user in the database, and, if successful, notifying the user of receipt of the document based on information stored in the database;
following successful notification, signalling to the source that the document has been notified to the target user.
-
-
26. A method of controlling delivery of a physical item to a user, the method comprising, at a secure server storing a database of information corresponding to a plurality of users the identity of whom has been verified, the steps of:
-
receiving over a network a request from a source to deliver a physical item to a target user;
searching for delivery preference information for the target user in the database and, if successful, communicating to the source delivery preference information for the target user.
-
-
28. A secure server configured to provide a point of presence on a network for a user whose identity has been verified, the point of presence providing a source of verified information corresponding to the user or a destination for received information directed to the user, the server comprising:
-
means configured to receive an input signalling that the identity of the user has been verified;
means configured to store verified information corresponding to the user based on the verified identity;
means configured to connect to the network to supply verified information corresponding to the user or to receive information directed to the user;
means configured to validate at least one key supplied by user;
means operative in response to successful validation to permit the user to release verified information from the secure server over the network or to access received information directed to the user, wherein the server is configured not to permit the user to modify the verified information.
-
-
29. A network terminal device comprising:
-
means configured to read a key carrier containing a key affording access to verified information concerning a user whose identity has been verified stored on a secure server;
means configured to connect over a network to the secure server to validate the key;
means configured to receive input from a user; and
means configured to forward a command over the network to the secure server to authorise supply of the verified information to a recipient in response to the user input or to provide access by a user to information directed to the user received at the secure server. - View Dependent Claims (30)
-
-
31. A data packet comprising information concerning a user and an identifier indicating that the information has been stored on and transmitted from a secure server following verification of the identity of the user.
-
32. A multi-application smartcard comprising means for storing a plurality of applications on the smartcard and means for communicating common information concerning the identity of a user between the applications based on information which has been verified and stored on a secure server.
- 33. A method of managing applications on a multi-application smartcard comprising displaying a list of applications on the smartcard and in response to a request from a user, which request is validated by key or secondary security feature, modifying the applications stored on the smartcard.
-
35. A mobile communications device comprising:
-
means configured to connect over a network to a secure server on which is stored verified information concerning a user whose identity has been verified;
means configured to validate a key with the secure server; and
means configured to send a command to the secure server to release at least a portion of.the verified information over the network or to access information directed to the user.
-
-
41. Use of verified information, based on a verified identity of a user and stored on a secure server, in a transaction over a network.
-
42. A method of directing information or an object from at least one source to a user, the method comprising:
-
providing information identifying an object or information of interest to the user to at least one source;
providing a severable communication pathway from the at least one source to the user;
after a period of time, severing the communication pathway. - View Dependent Claims (43, 44, 45, 46, 47, 48, 49)
-
-
51. A method of processing a financial transaction via a computer network having verified information concerning at least one of a donor and recipient of funds stored on a secure server, the method comprising:
-
forwarding a request for funds to a banking server associated with the donor configured to output a data packet comprising an electronic bankers'"'"' draft;
forwarding the data packet to the recipient;
forwarding the data packet from the recipient to a banking server associated with the recipient;
transferring funds between the banking server associated with the donor and the banking server associated with the recipient to complete the transaction. - View Dependent Claims (52, 53, 54)
-
-
55. A data packet transmitted over a network comprising an electronic bankers'"'"' draft originating from a banking server and containing information to credit an amount of funds pre-allocated by the banking server, the packet being authenticated by the banking server.
-
56. A method of processing data comprising:
-
at least partially processing a payment transaction or request at a secure server at which verified information concerning a user is stored, at least part of which verified information is under the control of the user, and modifying a credit history record associated with the user based on the payment transaction or request.
-
-
57. A method of recording a transaction concerning first and second users, the first user having a first key to a first point of presence on a secure server providing first user data concerning the first user, the second user having a second key to a second point of presence on a secure server providing second user data concerning the second user, the method comprising:
-
receiving the first and second keys;
storing a record associated with the first user data containing first information concerning the transaction and identifying the second user;
storing a record associated with the second user data containing second information concerning the transaction and identifying the first user with the second user data. - View Dependent Claims (59, 60, 61)
-
Specification