Doing business without SSN, EIN, and charge card numbers
First Claim
1. A changeable series of proxy identifiers resulting from permutations of one or more encryption algorithms that use as input the original identifier to be encrypted, an encryption key string, one or more identifier-owner'"'"'s predefined passwords, and a user-specific encryption rule in making such encrypted instances of an original identifier such that when decrypted each instance would yield the original source identifier designating the same person, company, service, or the object it did before encryption.
0 Assignments
0 Petitions
Accused Products
Abstract
This invention introduces encrypted identifiers to be used when the owner of an identifier wants to hide the original identifier away from public exposure but still be able to be uniquely identified through the encrypted form of the identifier. The logical requirement for such an encrypted identity is that it needs to be different for each user in order for it not to become public knowledge. The inventor refers to such changeable, proxy identifiers as “Pxy” identifiers. Pxy identifiers are generated using a Rule Number that references a user-specific algorithm and encryption key that is different for every user. To further privatize and facilitate tracing the ownership of a Pxy identifier to its owner, one or more identity-owner-specific passwords are also utilized. Pxy identity-identifiers examples include: PxySsn, PxyId, PxyEIN; and non-identity-identifier examples are: user-specific-encrypted-door-opener-codes, coded charge numbers, Pxy Software Keys, and so on.
206 Citations
8 Claims
- 1. A changeable series of proxy identifiers resulting from permutations of one or more encryption algorithms that use as input the original identifier to be encrypted, an encryption key string, one or more identifier-owner'"'"'s predefined passwords, and a user-specific encryption rule in making such encrypted instances of an original identifier such that when decrypted each instance would yield the original source identifier designating the same person, company, service, or the object it did before encryption.
-
2. A proxy identifier string that is associated to and is linked with its source identifier through a combination of changeable password(s) and codes from which the identity of the owner of such identifier can be established and referenced when the proxy identifier string, correct password(s), and a reference to algorithms that created the altered identifier are supplied to a third party entity that establishes, keeps, and maintains the identity strings, associated passwords, and the algorithm codes that created such a proxy identifier.
-
4. A method through which confidential and personal records of people can be referenced and searched through without people having to expose their Social Security Number to businesses, corporations, organizations, and/or their employees and associates, except but to one trusted entity, with the method using a plurality of
a. a proxy or original SSN, b. one or more passwords, c. some encryption rule(s) or references thereto, d. optional encryption key string(s), and e. a user-specific algorithm and data combination, called rule-number.
-
7. A computer, PDA, Mobile-Phone, or a similar device that can store and accept as input one or more identity and non-identity identifiers, passwords, encryption algorithms, rule numbers, and data to produce complex-data-items to be used as identity-identifiers that are transmitted/transferred to third-party-users'"'"' and machines for the purpose of identity identification, authentication, and/or ownership verification.
-
8. A method through which a person'"'"'s Social Security Number, an entity'"'"'s Employer/Tax Identification Number, or any other forms of Identity Identifiers vary and change in and for different entities and organizations using such identifiers in business to identify and authenticate the owners of such identifiers.
Specification