Information processing system and method
First Claim
1. A method of providing a point of presence on a network for a user whose identity has been verified, the point of presence providing a source of verified information corresponding to the user or a destination for received information directed to the user, the method comprising:
- storing on a secure server verified information corresponding to the user based on a verified identity of the user;
providing to the user one or more keys enabling access to the information, the server being configured to permit the user, on validation of at least one key, to release verified information from the secure server or to access received information but not to modify the verified information.
0 Assignments
0 Petitions
Accused Products
Abstract
Information processing methods, systems and ancillary apparatus are disclosed which are generally concerned with the principle of making use of verified information concerning a user whose identity has been verified and stored on a secure server. The server effectively provides a point of presence which third parties may make use of to send or receive information to or from or concerning a specific user reliably, whilst enabling the user to retain control over the information, typically by means of a key such as a smartcard. This may facilitate a variety of transactions over a network, such as the Internet, which would otherwise require separate verification processes to provide the same level of reliability and thereby lead to a surprising improvement in efficiency of the network.
24 Citations
2 Claims
-
1. A method of providing a point of presence on a network for a user whose identity has been verified, the point of presence providing a source of verified information corresponding to the user or a destination for received information directed to the user, the method comprising:
-
storing on a secure server verified information corresponding to the user based on a verified identity of the user;
providing to the user one or more keys enabling access to the information, the server being configured to permit the user, on validation of at least one key, to release verified information from the secure server or to access received information but not to modify the verified information.
-
-
2-61. -61. (canceled)
Specification