Privacy and Security Method and System for a World-Wide-Web Site
0 Assignments
0 Petitions
Accused Products
Abstract
Personal information of users is used to customize the browsing experiences of the users on a World-Wide-Web site. To ensure privacy of the users'"'"' personal information, each user is assigned a unique Universal Anonymous Identifier (UAI). The UAI is generated by a trusted third party and provided to the Web site operator. The Web site operator then indexes the users'"'"' personal information by UAI. Only the user has the ability to correlate his/her true identity with his/her personal information.
37 Citations
79 Claims
-
1-13. -13. (canceled)
-
14. A method of receiving personal information of a plurality of users, said method comprising the steps:
- receiving at a second computer de-identified personal information of said users transferred from a first computer;
receiving at said second computer anonymous IDs for each of said users which anonymously identify each user transferred from a third computer;
correlating on said second computer said anonymous IDs with said de-identified personal information; and
storing in a database accessible to said second computer said de-identified personal information of said users indexed by anonymous ID. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
- receiving at a second computer de-identified personal information of said users transferred from a first computer;
-
25. A method of registering an anonymous user of a World-Wide-Web (WWW) site, said user requiring a valid Web ID and password to log on to said WWW site, said method comprising the steps:
- verifying the identity of said anonymous user on a first server;
if the identity of said anonymous user is verified, creating and storing said password on a second server;
if a password is created, creating and storing said Web ID on a third server;
wherein the only party that has access to the identity, Web ID and password of the anonymous user is the user. - View Dependent Claims (26, 27, 28)
- verifying the identity of said anonymous user on a first server;
-
29. A method of registering an anonymous user of a World-Wide-Web (WWW) site, said user requiring a valid Web ID and digital certificate to log on to said WWW site, said method comprising the steps:
- verifying the identity of said anonymous user on a first server;
if the identity of said anonymous user is verified, creating said digital certificate on a second server and storing said digital certificate on a computer which will be used by said user to access said WWW site;
wherein the only party that has access to the identity, Web ID and digital certificate of the user is the user. - View Dependent Claims (30, 31, 32)
- verifying the identity of said anonymous user on a first server;
-
33. A method of processing a computer-generated communication, said method comprising the steps:
- generating a transaction token on a second computer and uploading said transaction token to a first computer over a first communications network;
linking, over said first communications network, said first computer to a third computer that will process said communication; and
transferring said communication from said second computer to said third computer, said communication being transferred to said third computer over a second communications network;
wherein said first computer presents said transaction token to said third computer over said first communications network for validation and wherein said third computer processes said communication only if said transaction token is valid. - View Dependent Claims (34, 35, 36, 37, 38, 39, 40)
- generating a transaction token on a second computer and uploading said transaction token to a first computer over a first communications network;
-
41-53. -53. (canceled)
-
54. A system for receiving personal information of a plurality of users comprising:
- a computer, said computer being configured to (1) receive de-identified personal information of said users transferred from a second computer, (2) receive anonymous IDs for each of said users transferred from a third computer, (3) correlate said anonymous IDs with said de-identified personal information, and (4) store in an accessible database said de-identified personal information of said users indexed by anonymous ID.
- View Dependent Claims (55, 56, 57, 58, 59, 60, 61, 62, 63, 64)
-
65. A system for registering an anonymous user of a World-Wide-Web (WWW) site, said user requiring a valid Web ID and password to log on to said WWW site, said system comprising:
- a first server for verifying the identity of said anonymous user;
a second server for creating and storing said password if the identity of said anonymous user is verified by said first server, and a third server for creating and storing said Web ID if said password is created by said second server;
wherein the only party that has access to the identity, web ID and password of the anonymous user is the user. - View Dependent Claims (66, 67, 68)
- a first server for verifying the identity of said anonymous user;
-
69. A system for registering an anonymous user of a World-Wide-Web (WWW) site, said user requiring a valid Web ID and digital certificate to log on to said WWW site, said method comprising the steps:
- a first server for verifying the identity of said anonymous user;
a second server for creating said digital certificate and storing said digital certificate on a computer which will be used by said user to access said WWW site password if the identity of said anonymous user is verified by said first server;
wherein the only party that has access to the identity, Web ID and digital certificate of the anonymous user is the user. - View Dependent Claims (70)
- a first server for verifying the identity of said anonymous user;
-
71. A system for processing a computer-generated communication comprising:
- a first computer, a second computer and third computer;
said second computer being configured to generate a transaction token, upload said transaction token to said first computer over a first communications network, and link said first computer to said third computer over said first communications network;
said second computer being further configured to transfer said communication to said third computer over a second communications network, said first computer being configured to present said transaction token to said third computer over said first communications network for validation;
said third computer being configured to validate said transaction token and process said communication only if said transaction token is valid. - View Dependent Claims (72, 73, 74, 75, 76, 77, 78)
- a first computer, a second computer and third computer;
-
79. A system for processing a computer-generated communication comprising:
- a computer, said second computer being configured to (1) generate a transaction token, (2) upload said transaction token to a first computer over a first communications network, (3) link said first computer to a third computer over said first communications network, and (4) transfer said communication to said third computer over a second communications network;
wherein said first computer presents said transaction token to said third computer over said first communications network for validation; and
wherein said third computer validates said transaction token and processes said communication only if said transaction token is valid.
- a computer, said second computer being configured to (1) generate a transaction token, (2) upload said transaction token to a first computer over a first communications network, (3) link said first computer to a third computer over said first communications network, and (4) transfer said communication to said third computer over a second communications network;
Specification