Method and system for securing online identities
First Claim
1. A method for associating a fictitious user name with verifiable personal information, in an electronic communications system, comprising:
- providing a Global Identity Certification Service (“
GICS”
) containing a database containing Certified Global Identity (“
CGI”
) records, coupled to the internet;
receiving a first fictitious user name;
determining a user of the first fictitious user name;
receiving identity information for the user;
verifying the identity information of the user;
determining if the user is an owner of the identity information that has been verified; and
recording the first fictitious user name and the identity information that has been verified in a first CGI record stored in the database containing the CGI records.
0 Assignments
0 Petitions
Accused Products
Abstract
Various methods, systems and apparatus for associating fictitious user identities (e.g. screen names, user names, handles, etc.) used in electronic communications (e.g. over the internet via instant messenger, e-mail, social networks, eCommerce and auction websites, etc.) with real personal information (e.g. the true identity of an individual such as their name, address, credit score, driving record, etc.) are disclosed. One such method may include storing real personal information, associated with fictitious user identities, in a CGI, hosted by a GICS. The CGI may be a unique record for an individual person and may contain real personal information verified with proper authorities (e.g. a name, address and driving record of the individual verified with a department of motor vehicles), as well as fictitious user identities used by the individual, feedback receiving from other users, etc. The method may further include allowing a remote user to submit a query to the GICS requesting information associated with a fictitious user identity, whereby the GICS may search for a CGI associating information with the fictitious user identity; and, transmit some or all of the information to the remote user. One apparatus, according to aspects of the present invention, may include means of associating real personal information, submitted by a user, with fictitious user identities, means of verifying the real personal information and the ownership of the real personal information by the submitting user, means of receiving a request for some personal information associated with a fictitious user identity, from a remote user, means for identifying the CGI associated with the fictitious user identity, means of retrieving some of the personal information from the CGI and means of transmitting some of the information to the remote user. The system may further include means of limiting the information transmitted to the remote user. (e.g. the remote user may be transmitted the credit score of the person owning a fictitious screen name, without being transmitted any further information identifying the person.)
-
Citations
31 Claims
-
1. A method for associating a fictitious user name with verifiable personal information, in an electronic communications system, comprising:
-
providing a Global Identity Certification Service (“
GICS”
) containing a database containing Certified Global Identity (“
CGI”
) records, coupled to the internet;receiving a first fictitious user name; determining a user of the first fictitious user name; receiving identity information for the user; verifying the identity information of the user; determining if the user is an owner of the identity information that has been verified; and recording the first fictitious user name and the identity information that has been verified in a first CGI record stored in the database containing the CGI records. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for retrieving verifiable personal information associated with a fictitious user name, in an electronic communications system, comprising:
-
providing a Global Identity Certification Service (“
GICS”
) containing a plurality of Certified Global Identity (“
CGI”
) records, coupled to the internet;
wherein each of the CGI records contains at least one fictitious user name and at least some verifiable personal information;receiving the fictitious user name from a remote user; determining the CGI record containing the fictitious user name; retrieving the verifiable personal information from the CGI record; and transmitting at least some of verifiable personal information to the remote user. - View Dependent Claims (12, 13, 14)
-
-
15. A method for associating feedback with a fictitious user name, in an electronic communications system, comprising:
-
providing a Global Identity Certification Service (“
GICS”
) containing a plurality of Certified Global Identity (“
CGI”
) records, coupled to the internet wherein each of the CGI records contains at least one fictitious user name and at least some verifiable personal information;receiving the fictitious user name from a remote user; receiving feedback associated with the fictitious user name from the remote user; determining the CGI record containing the fictitious user name; and recording the feedback in the CGI record containing the fictitious user name. - View Dependent Claims (16, 17)
-
-
18. A method for automatically determining whether to accept an electronic communication from a remote user using a fictitious user name, in an electronic communications system, comprising:
-
providing a Global Identity Certification Service (“
GICS”
) containing a plurality of Certified Global Identity (“
CGI”
) records, coupled to the internet wherein each of the CGI records contains at least one fictitious user name and verifiable personal information and feedback;receiving the electronic communication from the remote user of the fictitious user name; determining the GICS containing the CGI record containing the fictitious user name; and requesting from the GICS, at least some of the verifiable personal information and at least some of the feedback stored in the CGI record; comparing the information and the feedback received from the CGI record with pre-determined ranges of values; and accepting the electronic communication if the received information or the feedback is within the pre-determined ranges of values. - View Dependent Claims (19, 20, 21, 22)
-
-
23. A method for exchanging select personal information between a first user and a second user, the first user and the second user each using fictitious user names, in an electronic communications system, comprising:
-
means for receiving from the first user the fictitious user name used by the second user; means for identifying a Certified Global Identity (“
CGI”
) record in a Global Identity Certification Service (“
GICS”
), wherein the CGI record contains information associated with the fictitious user name used by the second user;means for determining a portion of the information in the CGI record to transmit to the first user; and means for transmitting the portion of the information in the CGI record to the first user. - View Dependent Claims (24, 25, 26, 27)
-
-
28. A method for targeting advertising content, in an electronic communications system, comprising:
-
providing a Global Identity Certification Service (“
GICS”
) coupled to the internet;providing a plurality of Certified Global Identity (“
CGI”
) records, each containing at least one fictitious user name and at least some verifiable personal information, wherein the CGI records are stored in the GICS;providing a database containing advertising content; receiving the fictitious user name; transmitting the fictitious user name to the CGI record; receiving from the CGI record the verifiable personal information; selecting from the database a portion of the advertising content based upon the verifiable personal information; and transmitting the portion of the advertising content that has been selected to the user of the fictitious user name. - View Dependent Claims (29, 30, 31)
-
Specification