Personal information protection method, personal information protection system, processing device, portable transmitter/receiver, and program
First Claim
1. A private information protection method protecting private information on a network through a computer system, characterized in:
- a virtual person creation step of creating a prescribed virtual person for allowing a real person in the actual world to pretend to be the virtual person and act as the virtual person when acting on the network;
a registration step of registering information capable of specifying the association between said real person and said virtual person in a prescribed institution having the duty of confidentiality;
an electronic certificate issuance step of issuing an electronic certificate for said virtual person; and
an address set step for setting the address of said virtual person to a different address from said real person;
for rendering acceptance limitation for identification data transmitted from a site for identifying a user variable with a case of acting on the network as said real person and with a case of acting on the network as said virtual person.
3 Assignments
0 Petitions
Accused Products
Abstract
A prescribed virtual person was created for allowing a real person (user) in the actual world to pretend to be the virtual person (virtual person) and act as the virtual person when acting on a network and registered in a database 12a of a financial institution 7 for enabling the user to make shopping or the like as the virtual person with an electronic certificate issued by the financial institution 7 for the virtual person when pretending to be the virtual person and acting on the network, and the address of the virtual person necessary as the destination of a purchased article was set to a nearby convenience store. When acting on the network as the virtual person, cookies are rendered easily acceptable as compared with the case of the real person.
-
Citations
25 Claims
-
1. A private information protection method protecting private information on a network through a computer system, characterized in:
-
a virtual person creation step of creating a prescribed virtual person for allowing a real person in the actual world to pretend to be the virtual person and act as the virtual person when acting on the network;
a registration step of registering information capable of specifying the association between said real person and said virtual person in a prescribed institution having the duty of confidentiality;
an electronic certificate issuance step of issuing an electronic certificate for said virtual person; and
an address set step for setting the address of said virtual person to a different address from said real person;
for rendering acceptance limitation for identification data transmitted from a site for identifying a user variable with a case of acting on the network as said real person and with a case of acting on the network as said virtual person.
-
-
2. A private information protection system protecting private information on a network through a computer system, including:
-
virtual person creation processing means performing processing of creating a prescribed virtual person for allowing a real person in the actual world to pretend to be the virtual person and act as the virtual person when acting on the network; and
registration processing means for performing processing of registering information capable of specifying the association between said real person and said virtual person in a prescribed institution having the duty of confidentiality. - View Dependent Claims (3)
-
-
4. A private information protection system protecting private information on a network through a computer system, including:
-
virtual person creation processing means performing processing of creating a prescribed virtual person for allowing a real person in the actual world to pretend to be the virtual person and act as the virtual person when acting on the network; and
electronic certificate issuance processing means performing processing for issuing an electronic certificate for said virtual person. - View Dependent Claims (5)
-
-
6. A private information protection system protecting private information on a network through a computer system, including:
-
virtual person creation processing means performing processing for creating a prescribed virtual person for allowing a real person in the actual world to pretend to be the virtual person and act as the virtual person when acting on the network; and
address set means performing processing for setting the address of said virtual person to a different address from said real person. - View Dependent Claims (7)
-
-
8. A private information protection system protecting private information on a network through a computer system, including:
-
virtual person creation processing means performing processing for creating a prescribed virtual person for allowing a real person in the actual world to pretend to be the virtual person and act as the virtual person when acting on the network; and
credit number issuance processing means performing processing for issuing a credit number for said virtual person, for allowing the real person to make payment on credit as said virtual person through the credit number issued by said credit number issuance processing means.
-
-
9. A private information protection system protecting private information on a network through a computer system, including:
-
virtual person creation processing means performing processing for creating a prescribed virtual person for allowing a real person in the actual world to pretend to be the virtual person and act as the virtual person when acting on the network; and
account opening processing means performing processing for opening a bank account for said virtual person, for allowing the real person to settle accounts as said virtual person through funds in the account opened by said account opening processing means.
-
-
10. A private information protection system protecting private information on a network through a computer system, including:
-
virtual person creation processing means performing processing for creating a prescribed virtual person for allowing a real person in the actual world to pretend to be the virtual person and act as the virtual person when acting on the network, for rendering acceptance limitation for identification data transmitted from a site for identifying a user variable with a case of acting on the network as said real person and with a case of acting on the network as said virtual person.
-
-
11. A processor employed for protection of private information on a network, including:
-
request acceptance means accepting a request for creating a prescribed virtual person for allowing a real person in the actual world to pretend to be the virtual person and act as the virtual person when acting on the network;
virtual person creation processing means performing processing for creating the prescribed virtual person on condition that the request is accepted by said request acceptance means; and
association storage processing means performing processing for storing information capable of specifying the association between the virtual person created by said virtual person creation processing means and said real person corresponding to this virtual person as a database.
-
-
12. A processor for protecting private information on a network, including:
-
public key storage processing means performing processing for accepting input of a public key for a prescribed virtual person created for allowing a real person in the actual world to pretend to be the virtual person and act as the virtual person when acting on the network and storing this input public key in a database; and
electronic certificate creation/issuance processing means for performing processing of creating and issuing an electronic certificate for said virtual person corresponding to said stored public key, wherein said electronic certificate creation/issuance processing means performs creation/publishing office processing for the electronic certificate on condition that it is registered said virtual person for whom information capable of specifying the association between said real person and said virtual person is registered in a prescribed institution having the duty of confidentiality.
-
-
13. A processor for protecting private information on a network, including:
-
payment approval processing means for performing approval processing for payment when a purchase request by credit payment is received through a credit number issued for a prescribed virtual person created for allowing a real person in the actual world to pretend to be the virtual person and act as the virtual person when acting on the network; and
payment request processing means performing processing for issuing a request for credit payment approved by said payment approval processing means to a credit card issuing company, wherein said payment approval processing means approves payment after confirming an electronic certificate issued for said virtual person.
-
-
14. A processor for protecting private information on a network, including:
-
charge request acceptance processing means performing processing for accepting a charge request charging funds in a bank account opened for a prescribed virtual person created for allowing a real person in the actual world to pretend to be the virtual person and act as the virtual person when acting on the network for settling accounts; and
charge processing means performing processing for deducing the bank account corresponding to corresponding said virtual person and remitting a fund corresponding to the sum of the charge request from the funds in said bank account when said charge request acceptance processing means accepts the charge request.
-
-
15. A processor for protecting private information on a network,
said processor being set on an address of a prescribed virtual person created for allowing a real person in the actual world to pretend to be the virtual person and act as the virtual person when acting on the network, said address being different from the address of said real person, and including: -
storage processing means performing processing for storing information capable of specifying said virtual person employing the address where this processor is set as his/her address in a database;
keep information storage processing means performing processing for storing information capable of specifying that an article purchased by the virtual person stored in this storage processing means and delivered to the address where said processor is set has been kept; and
delivery approval processing means confirming, when receiving a delivery request for said kept article, that a virtual person issuing this delivery request is the virtual person stored in said database and performing processing for issuing approval for delivery of the corresponding article on condition that it is the virtual person whose article is kept.
-
-
16. A program for protecting private information on a network,
for letting a computer function as: -
creation request determination means determining whether or not a request operation for creating a prescribed virtual person for allowing a real person in the actual world to pretend to be the virtual person and act as the virtual person when acting on the network has been made;
birth request transmission means performing processing for transmitting a birth request for said virtual person to a prescribed institution when said creation request determination means determines that the creation request has been made; and
prescribed information transmission means performing processing for transmitting information capable of specifying said real person making the birth request for said virtual person and necessary for bearing said virtual person to said prescribed institution.
-
-
17. A processor for protecting private information on a network, wherein
said processor is a portable processor enabled to transfer and receive information to and from a terminal of a user and carried by the user, and used when a real person as said user pretends to be a prescribed virtual person and acts on the network as said virtual person, and constituted to be capable of storing, when identification data transmitted from a site for identifying the user is transmitted to said terminal, said identification data on behalf of said terminal.
-
22. A portable transmitter-receiver carried by a user for performing transmission/receiving with a nearby base station by radio and capable of entering a network through said base station, comprising:
-
a processing function for a virtual person for allowing a real person in the actual world to pretend to be the virtual person and act as the virtual person when acting on the network, and comprising different route enter means for the virtual person for performing processing of directly making radio communication to a terminal connected to the network when the user enters the network as the virtual person with said processing function for the virtual person and entering the network not through an enter route from said base station but from said terminal.
-
-
23. A private information protection system allowing a real person in the actual world to pretend to be a virtual person and act as the virtual person when acting on a network, including:
access means accessing a site not intended by said real person in response to a request from said real person. - View Dependent Claims (24, 25)
Specification