Method for concealing user identities on computer systems through the use of temporary aliases
First Claim
Patent Images
1. A computer implemented method for concealing a user identification, the computer implemented method comprising:
- receiving user input, wherein the user input comprises a user alias;
verifying that the user alias is a valid user alias; and
obtaining a user identification associated with the valid user alias, wherein an association between the valid user alias and the user identification is a one-way association, from the valid user alias to the user identification.
2 Assignments
0 Petitions
Accused Products
Abstract
A user alias for concealing a user'"'"'s user identification is provided. When signing-on, the user inputs a user alias to a log-in shell. The log-in shell verifies the validity of the user alias. The log-in shell then obtains a user identification associated with the valid user alias.
42 Citations
20 Claims
-
1. A computer implemented method for concealing a user identification, the computer implemented method comprising:
-
receiving user input, wherein the user input comprises a user alias;
verifying that the user alias is a valid user alias; and
obtaining a user identification associated with the valid user alias, wherein an association between the valid user alias and the user identification is a one-way association, from the valid user alias to the user identification. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer program product comprising a computer usable medium including computer usable program code for concealing a user identification, said computer program product comprising:
-
computer usable program code for receiving user input, wherein the user input comprises a user alias;
computer usable program code for verifying that the user alias is a valid user alias; and
computer usable program code for obtaining a user identification associated with the valid user alias, wherein an association between the valid user alias and the user identification is a one-way association, from the valid user alias to the user identification. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15)
-
-
16. A data processing system for concealing a user identification, said data processing system comprising:
-
a storage device, wherein the storage device stores computer usable program code; and
a processor, wherein the processor executes the computer usable program code to receive user input, wherein the user input comprises a user alias;
to verify that the user alias is a valid user alias; and
to obtain a user identification associated with the valid user alias, wherein an association between the valid user alias and the user identification is a one-way association, from the valid user alias to the user identification. - View Dependent Claims (17, 18, 19, 20)
-
Specification