Method and apparatus for managing and sharing personal identities in a peer-to-peer environment
First Claim
1. A method for interacting with a user over a peer-to-peer network comprising:
- receiving a file from a user via a third party;
receiving with the file an alias identifying the user; and
storing in the third party identity information about the user in association with the alias; and
linking the alias to a valid legal identity and financial account while maintaining control and privacy over the valid legal identify and the financial account.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for performing a file transfer in a peer-to-peer environment enables transfers with controlled anonymity. According to this method, a file is received from a user via a third party along with a content rating from the user. Along with the file, an alias is received identifying the user. Identity information about the user is stored in the third party in association with the alias. The user can select one or more information elements within the identity information that can be sent along with the alias. Among that which can be included as the information elements are one or more of the following: an email address, a name, a mailing address, a telephone number, a social security number, a bank account number, a credit card number, an age, a birth date, income information, employment information, purchasing preference information, and an education history. Any content rating are aggregated with other content rankings from other users and identified with the alias. The third party can then act as an intermediary between the user and other users to protect the privacy of the user and to enable financial transactions to occur between the user and another user or company. One or more of these elements 51-56 can be performed together to create various useful methods for transferring files and other information between users and others.
110 Citations
20 Claims
-
1. A method for interacting with a user over a peer-to-peer network comprising:
-
receiving a file from a user via a third party;
receiving with the file an alias identifying the user; and
storing in the third party identity information about the user in association with the alias; and
linking the alias to a valid legal identity and financial account while maintaining control and privacy over the valid legal identify and the financial account. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for protecting personal information in a peer-to-peer environment comprising:
-
storing in a third party server personal information for a plurality of users and one or more aliases for each of the plurality of users; and
sending a file from a first user of the plurality of users to a second user of the plurality of users through the third party server without identifying a source of the file other than by an alias of the first user and without identifying a destination of the file other than by an alias of the second user. - View Dependent Claims (9, 10, 11)
-
-
12. A method for transmitting files in a peer-to-peer environment comprising:
-
receiving at a third party server a request from a first user for a particular file in possession of a second user;
retrieving the particular file from the second user without identifying the first user except with a first alias; and
sending the particular file to the first user without identifying the second user expect with a second alias. - View Dependent Claims (13, 14, 15, 16)
-
-
17. An apparatus for transmitting one or more files in a peer-to-peer environment, comprising:
-
a database storing identity information for at least two users along with one or more aliases for each of the at least two users; and
a server to receive requests for the one or more files from a destination user of the at least two users, to upload a requested file from a source user of the at least two users, and to transmit said requested file to the destination user along with an alias of the source user and to transmit an alias of the destination user to the source user. - View Dependent Claims (18, 19, 20)
-
Specification