PROTECTED USE OF IDENTITY IDENTIFIER OBJECTS
First Claim
1. A four way method for authenticating to third parties the ownership of an object, said method implemented on a computer system having processors configured to perform the steps of:
- providing a trustee, via a computer system, with personal information, at least two proofs of identity of a person, and said person'"'"'s proof of ownership of said object, the trustee performing the steps of;
verifying the identity of the person;
upon a positive authentication, enrolling said person as the object'"'"'s owner in trustee'"'"'s computer system by issuing one access password;
issuing an owner-data set comprising at least one proxy-identifier, and at least one identity-identifier-password along with at least one identity-identifier-character-string, all associated with at least one proxy-identity-identifier of the said owner;
creating encryption program code and procedure;
creating an owner-member-file comprising said program code and owner-data set;
saving said owner registration information along with a copy of owner-member-file in owner-account-data base;
storing said owner-member-file in at least one of a plug-in memory or a portable electronic device;
delivering said owner-member-file to said owner through secure means;
accepting and enrolling third party business organization users and user-groups of identity-identifier-objects as third party user members;
providing said business organization users and user-groups with computer login information and password, and storing said information in user-account-data base;
for each user-member programming a dedicated encryption-algorithm-rule-string, associating said string with a rule-number, and referencing said encryption algorithm-rule-string with at least one rule-number, and a user-number;
assigning one of said rule-string and rule-number to at least one third party user or user-group in the same business;
assigning, associating and storing a rule-number, said rule-string with a third party user-number in user-data set;
saving a copy of user-data set in user-account-data base;
recording said user-data set in built-in memory of a digital peripheral fit for use with third party user computer;
delivering said digital peripheral, and digital contents to said third party user via secure means;
owner generating an encrypted-proxy-identifier by applying third party rule-string to a combination of at least one of owner'"'"'s proxy-identifier, one of owner identity-identifier-passwords, and one of owner identity-identifier-character-strings;
owner delivering said encrypted-proxy-identifier to trustee;
trustee decrypting the received encrypted-proxy-identifier by applying decrypting algorithms and extracting owner proxy-identity-identifier-object and third party rule-string;
trustee searching owner-account-data base with owner proxy-identity-identifier-object and extracting owner-identity-identifier-object, and transmitting it to credit bureau'"'"'s computer system;
trustee searching third party user-account-data base with user-rule-string and extracting user-number with third party user information, and transmitting it to credit bureau'"'"'s computer system;
credit bureau searching its data base and matching transmitted owner-identity-identifier-object against its predisposed owner information on file;
credit bureau declaring the person to be the owner of said object upon positive match;
credit bureau searching its data base and matching transmitted user-number against its predisposed third party user information on file; and
credit bureau granting access to object'"'"'s pre-disposed information per credit bureau'"'"'s contract to third party user, excluding object'"'"'s original identifier.
0 Assignments
0 Petitions
Accused Products
Abstract
This invention states that any and all physical and virtual objects meeting certain criteria may be used as Identity-Identifier-Objects to authenticate people, businesses, organizations, as well as other physical or virtual objects. While accomplishing said task, this invention discloses objects, methods, and special data structures to hide said Identity-Identifier-Objects from exposure to the public, while being used in their intended roles. Additionally, the objects and methods introduced use ownership property of virtual and physical objects to control access and to implement access and licensing rights of physical and virtual objects. Numerous applications areas such as allocation of digital rights, licensing, notarization of digital signatures, and controlled use of personal photographs, fingerprints and other biometric identifier-objects are also illustrated.
39 Citations
33 Claims
-
1. A four way method for authenticating to third parties the ownership of an object, said method implemented on a computer system having processors configured to perform the steps of:
-
providing a trustee, via a computer system, with personal information, at least two proofs of identity of a person, and said person'"'"'s proof of ownership of said object, the trustee performing the steps of; verifying the identity of the person; upon a positive authentication, enrolling said person as the object'"'"'s owner in trustee'"'"'s computer system by issuing one access password; issuing an owner-data set comprising at least one proxy-identifier, and at least one identity-identifier-password along with at least one identity-identifier-character-string, all associated with at least one proxy-identity-identifier of the said owner; creating encryption program code and procedure; creating an owner-member-file comprising said program code and owner-data set; saving said owner registration information along with a copy of owner-member-file in owner-account-data base; storing said owner-member-file in at least one of a plug-in memory or a portable electronic device; delivering said owner-member-file to said owner through secure means; accepting and enrolling third party business organization users and user-groups of identity-identifier-objects as third party user members; providing said business organization users and user-groups with computer login information and password, and storing said information in user-account-data base; for each user-member programming a dedicated encryption-algorithm-rule-string, associating said string with a rule-number, and referencing said encryption algorithm-rule-string with at least one rule-number, and a user-number; assigning one of said rule-string and rule-number to at least one third party user or user-group in the same business; assigning, associating and storing a rule-number, said rule-string with a third party user-number in user-data set; saving a copy of user-data set in user-account-data base; recording said user-data set in built-in memory of a digital peripheral fit for use with third party user computer; delivering said digital peripheral, and digital contents to said third party user via secure means; owner generating an encrypted-proxy-identifier by applying third party rule-string to a combination of at least one of owner'"'"'s proxy-identifier, one of owner identity-identifier-passwords, and one of owner identity-identifier-character-strings; owner delivering said encrypted-proxy-identifier to trustee; trustee decrypting the received encrypted-proxy-identifier by applying decrypting algorithms and extracting owner proxy-identity-identifier-object and third party rule-string; trustee searching owner-account-data base with owner proxy-identity-identifier-object and extracting owner-identity-identifier-object, and transmitting it to credit bureau'"'"'s computer system; trustee searching third party user-account-data base with user-rule-string and extracting user-number with third party user information, and transmitting it to credit bureau'"'"'s computer system; credit bureau searching its data base and matching transmitted owner-identity-identifier-object against its predisposed owner information on file; credit bureau declaring the person to be the owner of said object upon positive match; credit bureau searching its data base and matching transmitted user-number against its predisposed third party user information on file; and credit bureau granting access to object'"'"'s pre-disposed information per credit bureau'"'"'s contract to third party user, excluding object'"'"'s original identifier. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33)
-
Specification