Method of purchasing insurance or validating an anonymous transaction
First Claim
1. A method of conducting a transaction between a first entity and a second entity where as part of the transaction the second entity or an examination agent operating on behalf of the second entity requires information to assess a level of risk associated with transacting with the first entity, the method comprising the steps of:
- a) a data processor acting on behalf of the first entity requesting a data processor acting on behalf of the second entity to provide data about itself;
b) the data processor acting on behalf of the first entity analysing the response and determining an assessment of trust of the data processor operating on behalf of the second entity;
c) defining a pseudonymous identity for the first entity; and
d) providing data about the first entity to the second entity where data is selectively withheld or generalised in response to the assessment of trust.
2 Assignments
0 Petitions
Accused Products
Abstract
A method purchasing insurance is provided , the method comprising the steps of entering into a contract of insurance with the insurer based solely on the generalised identity (perhaps created for that particular purpose) that is associated with selected policy attributes (possibly generalised to ranges etc.) or statements that the user'"'"'s attributes satisfy a policy, such that other attributes, including the real identity of the user, remain unknown to the insurer. The degree of which information is withheld or generalised is based on an assessment of the trustworthiness of the insurer'"'"'s computer system.
61 Citations
16 Claims
-
1. A method of conducting a transaction between a first entity and a second entity where as part of the transaction the second entity or an examination agent operating on behalf of the second entity requires information to assess a level of risk associated with transacting with the first entity, the method comprising the steps of:
-
a) a data processor acting on behalf of the first entity requesting a data processor acting on behalf of the second entity to provide data about itself;
b) the data processor acting on behalf of the first entity analysing the response and determining an assessment of trust of the data processor operating on behalf of the second entity;
c) defining a pseudonymous identity for the first entity; and
d) providing data about the first entity to the second entity where data is selectively withheld or generalised in response to the assessment of trust. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 12)
-
-
10. A method of purchasing insurance, comprising the steps of:
-
i) an insurer making its conditions for insurance available to a third party;
ii) a customer making its responses to the conditions for insurance available to the third party, and iii) the third party analysing the responses and determining whether insurance can be offered to the customer and if so validating to the insurer that a policy has been issued to the customer and that the customer satisfies the insurer'"'"'s conditions, wherein iv) the customer enters their data onto a trusted computer together with their policy agent which defines how information relating to the customer can be disclosed to an insurance examination agent, and the trusted computer interrogates the data processing environment and policies of the third party to determine how trustworthy the third parties is, and adjusts the way in which it discloses information about the customer on the basis of the determination of trustworthiness. - View Dependent Claims (11, 13)
-
-
14. An apparatus for conducting a transaction comprising a first data processor acting on behalf of a second entity, and where as part of the transaction the second entity or an examination agent operating on behalf of the second entity requires information to assess a level of risk associated with transacting with the first entity, wherein:
-
a) the first data processor requests the second data processor to provide information about itself and the policies of the second entity;
b) the first data processor analyses the response and assesses the amount of trust that should be attributed to the second data processor and/or the second entity;
c) the first data processor defines a pseudonymous identity for the first entity; and
d) the first data processor provides information about the first entity to the second data processor where information is associated with the pseudonymous identity and information is selectively withheld or generalised in response to the assessment of the amount of trust attributed to the second data processor. - View Dependent Claims (15, 16)
-
Specification