IDENTITY THEFT AND FRAUD PROTECTION SYSTEM AND METHOD
First Claim
1. A method for protecting against theft of personally identifiable information, said method comprising the steps of:
- registering an individual subscriber as a member of an identity protection system and obtaining personally identifiable information from the subscribing member as storable computer data;
establishing an anonymous email address on behalf of the subscribing member;
providing the anonymous email address to an email recipient when the subscribing member sends an email to the recipient;
receiving email communications from the recipient at the anonymous email address;
storing the routing information from the email communications;
scrubbing the email communications for electronic viruses;
forwarding the email communications received from the recipient at the anonymous email address to the subscribing member; and
forwarding email communications to the recipient that are sent from the subscribing member to the anonymous email address by matching the stored routing information without ever revealing the subscribing member'"'"'s real email address to the recipient.
12 Assignments
0 Petitions
Accused Products
Abstract
A system and method protects users against theft of personally identifiable information during both online and offline purchase transactions, registration transactions and identity authentication transactions. The system initially obtains a user'"'"'s personally identifiable information as storable computer data, establishes an anonymous email address on behalf of the subscribing user, provides the anonymous email address to an email recipient when the subscribing user sends an email to the recipient, receives email communications from the recipient at the anonymous email address, stores the routing information from the email communications, scrubs the email communications for electronic viruses, forwards the email communications received from the recipient at the anonymous email address to the subscribing user, and forwards email communications to the recipient that are sent from the subscribing user to the anonymous email address by matching the stored routing information without ever revealing the subscribing user'"'"'s real email address to the recipient.
-
Citations
16 Claims
-
1. A method for protecting against theft of personally identifiable information, said method comprising the steps of:
-
registering an individual subscriber as a member of an identity protection system and obtaining personally identifiable information from the subscribing member as storable computer data; establishing an anonymous email address on behalf of the subscribing member; providing the anonymous email address to an email recipient when the subscribing member sends an email to the recipient; receiving email communications from the recipient at the anonymous email address; storing the routing information from the email communications; scrubbing the email communications for electronic viruses; forwarding the email communications received from the recipient at the anonymous email address to the subscribing member; and forwarding email communications to the recipient that are sent from the subscribing member to the anonymous email address by matching the stored routing information without ever revealing the subscribing member'"'"'s real email address to the recipient. - View Dependent Claims (2, 3, 4)
-
-
5. A method for protecting against theft of personally identifiable information during a purchase transaction, said method comprising the steps of:
-
registering an individual subscriber as a member of an identity protection system and obtaining personally identifiable information from the subscribing member as storable computer data; generating an anonymous identification card upon request by the individual subscriber; notifying the individual subscriber that the anonymous identification card has been generated; activating and delivering the anonymous identification card to the individual subscriber upon request by the individual subscriber for use to conduct the purchase transaction; and confirming the identity of the user of the anonymous identification card upon presentation of the anonymous identification card during the purchase transaction by comparing the anonymous identification card with the storable computer data of the personally identifiable information of the individual subscriber, thereby confirming that the user is the individual subscriber. - View Dependent Claims (6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method for protecting against theft of personally identifiable information during online transactions comprising the steps of:
-
establishing a user as a member of an identity protection system; obtaining personally identifiable information from the member in the form of storable computer data; encrypting the obtained personally identifiable information and storing the personally identifiable information as encrypted data; fragmenting the encrypted data by a computer; storing portions of the fragmented encrypted data, by at least one computer, independently at separate computer storage locations; preventing third party access to the fragmented encrypted data; allowing the member to initiate an online transaction on a third party website on a global computer network; receiving a request for personally identifiable information of the member for use in conducting the online transaction; and generating virtual personally identifiable information in response to the request and providing the virtual personally identifiable information to the third party website without revealing the member'"'"'s real personally identifiable information. - View Dependent Claims (15, 16)
-
Specification