ANONYMITY-PRESERVING RECIPROCAL VETTING FROM A SYSTEM PERSPECTIVE
First Claim
Patent Images
1. A system comprising:
- a processor;
a memory in operable communication with the processor, the memory configured by instructions residing in the memory for causing the processor to perform a method of providing anonymity-preserving reciprocal vetting services to persons who do not know each other'"'"'s offline identities, the method including the steps of;
receiving electronically, from a first person, first personally identifying information which identifies the first person via offline identity information and which is unknown to a second person;
receiving electronically, from the second person, second personally identifying information which identifies the second person via offline identity information and which is unknown to the first person;
using the first personally identifying information to obtain a first background search result containing background information of the first person; and
using the second personally identifying information to obtain a second background search result containing background information of the second person.
1 Assignment
0 Petitions
Accused Products
Abstract
A vetting service protects personal information while nonetheless allowing its authorized use to perform background investigations of consenting participants. Raw background search results are filtered, redacted, and otherwise sanitized in compliance with an agreement by the participants, to produce background reports.
-
Citations
20 Claims
-
1. A system comprising:
-
a processor; a memory in operable communication with the processor, the memory configured by instructions residing in the memory for causing the processor to perform a method of providing anonymity-preserving reciprocal vetting services to persons who do not know each other'"'"'s offline identities, the method including the steps of; receiving electronically, from a first person, first personally identifying information which identifies the first person via offline identity information and which is unknown to a second person; receiving electronically, from the second person, second personally identifying information which identifies the second person via offline identity information and which is unknown to the first person; using the first personally identifying information to obtain a first background search result containing background information of the first person; and using the second personally identifying information to obtain a second background search result containing background information of the second person. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification