User Controlled Identity Authentication
First Claim
1. A system, method for user controlled identity authentication comprising:
- A) At least one central computer having at least one user within a user database having user data and at least one service provider within a service provider database with service provider data;
B) At least one service provider having electronic communication with the central computer;
C) At least one user having electronic devices capable of communications with the central computer and service provider;
D) Providing a user with a set of controls within the central computer to customize privacy, security and authentication of the user data;
E) Providing a set of access rights within the service provider data of the central computer having a set of transaction rules for the service provider;
0 Assignments
0 Petitions
Accused Products
Abstract
A system, method for user controlled identity authentication comprising: a) At least one central computer having at least one user within a user database having user data and at least one service provider within a service provider database with service provider data; b) At least one service provider having electronic communication with the central computer; c) At least one user having electronic devices capable of communications with the central computer and service provider; e) Providing a user with a set of controls within the central computer to customize privacy, security and authentication of the user data; f) Providing a set of access rights within the service provider data of the central computer having a set of transaction rules for the service provider.
-
Citations
19 Claims
-
1. A system, method for user controlled identity authentication comprising:
-
A) At least one central computer having at least one user within a user database having user data and at least one service provider within a service provider database with service provider data; B) At least one service provider having electronic communication with the central computer; C) At least one user having electronic devices capable of communications with the central computer and service provider; D) Providing a user with a set of controls within the central computer to customize privacy, security and authentication of the user data; E) Providing a set of access rights within the service provider data of the central computer having a set of transaction rules for the service provider; - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A system, method for user controlled identity authentication comprising:
-
A) At least one central computer having at least one user within a user database having user data and at least one service provider within a service provider database with service provider data; B) At least one service provider having electronic communication with the central computer; C) At least one user having electronic devices capable of communications with the central computer and service provider; D) Providing a user with a set of controls within the central computer to customize privacy, security and authentication of the user data; E) Providing a set of access rights within the service provider data of the central computer having a set of transaction rules for the service provider; F) At least one service provider with communications with a resource; - View Dependent Claims (18, 19)
-
Specification