Method and system for temporary network identity
First Claim
Patent Images
1. A method for network communications comprising:
- assigning a first temporary fictitious identity from an identity intermediary to a service provider;
performing a transaction between a user interface and the service provider using the first temporary fictitious identity.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for network communications comprises assigning a temporary fictitious identity from a identity intermediary to at least one of a service provider and a user interface and performing a transaction between the user interface and the service provider using the temporary fictitious identity. A network identity intermediary system comprises a controller configured for assigning a temporary identity to at least one of a user interface and a service provider, and a database configured for maintaining private information of the at least one user interface and service provider in association with the temporary fictitious identity.
60 Citations
31 Claims
-
1. A method for network communications comprising:
-
assigning a first temporary fictitious identity from an identity intermediary to a service provider;
performing a transaction between a user interface and the service provider using the first temporary fictitious identity. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method of network communications comprising:
-
contacting an identity intermediary with a service provider to obtain a first temporary network identity for the service provider including;
assigning, via the identity intermediary, the temporary network identity to include at least one of a personal component, a financial component, and a location component; and
associating, via the identity intermediary, the personal component with a real name of a consumer, associating the financial component with at least one of a real credit card number and a bank number, and associating the location component with at least one of a physical street address and an IP address; and
preventing, via the identity intermediary, unauthorized access to a database of the identity intermediary that maintains the personal, financial, and location components; and
contacting an user interface with the first temporary network identity of the service provider to provide services pseudonymously to the user interface. - View Dependent Claims (8)
-
-
9. A method of network communications comprising:
-
contacting a service provider with a user interface;
prior to conveying personal information to the service provider, contacting an identity intermediary with the user interface to obtain a temporary network identity for the user interface; and
performing a transaction between the user interface and the service provider using the temporary network identity of the user interface to conceal a real identity of a consumer using the user interface. - View Dependent Claims (10)
-
-
11. A method of providing pseudonymous network identities comprising:
-
randomly generating a first temporary fictitious identity for a first service provider; and
maintaining a database of a plurality of temporary fictitious identities, including the first temporary fictitious identity, with each temporary fictitious identity being associated with a uniquely identified service provider, including the first service provider. - View Dependent Claims (12, 13)
-
-
14. A network identity intermediary comprising:
-
a network site for communicating with a service provider; and
a database configured for maintaining at least one temporary pseudonymous identity in association with a real identity of the service provider;
wherein the network site is configured for assigning the temporary pseudonymous identity to the service provider upon a request by the service provider.
-
-
15. A temporary network identity comprising:
-
a unique pseudonymous identifier temporarily associated with a service provider; and
an identifier source name associated with the pseudonymous identifier for identifying the source that generated the unique pseudonymous identifier. - View Dependent Claims (16)
-
-
17. A network identity intermediary database comprising:
-
an array of unique pseudonymous identifiers;
an array of real identities of consumers and service providers including at least one of financial information, personal information, and location information, with each one of the real identities being exclusively associated with only one of the unique pseudonymous identifiers. - View Dependent Claims (18)
-
-
19. A method of network communications comprising:
-
contacting an identity intermediary with a user interface, after an initial contact between the user interface and a service provider, to obtain a first temporary network identity for the user interface;
contacting the service provider with the first temporary network identity of the user interface to receive services pseudonymously from the service provider; and
charging at least one of the user interface and the service provider a fee for the temporary network identity.
-
-
20. A method of pseudonymous network communication comprising:
-
creating a temporary fictitious identity for each of a service provider and a user interface for pseudonymously performing a transaction between the user interface and the service provider using the temporary fictitious identity; and
obtaining a fee from at least one of the user interface, the service provider and an advertising sponsor for the temporary fictitious identity.
-
-
21. A network identity intermediary database comprising:
-
an array of unique pseudonymous identifiers being configured so that each identifier will be associated exclusively with a real identity of each consumer of a plurality of consumers and each first service provider of a plurality of service providers; and
a subscriber mechanism for assigning the identifiers to the plurality of consumers and the service providers based on a fee-for-service contractual relationship based on at least one of a first arrangement between the consumer and the service provider, a second arrangement between the consumer and an identity intermediary for creating the identifiers, and a third arrangement between the service provider and the identity intermediary.
-
-
22. A pseudonymous network identity system comprising:
-
a network identity intermediary configured for communicating with a user interface and a service provider and configured for assigning a different temporary pseudonymous identity to each of a user interface and a service provider;
a database configured for maintaining at least one different temporary pseudonymous identity in association with a real identity of each of the user interface and the service provider; and
a fee mechanism configured for obtaining payment from the user interface and the service provider in association with maintaining the database and assigning the identities.
-
-
23. A computer-readable medium having computer-executable instructions for performing a method of facilitating network communications, the method comprising:
-
assigning a first temporary fictitious identity from an identity intermediary to a service provider;
performing a transaction between a user interface and the service provider using the first temporary fictitious identity. - View Dependent Claims (24, 25)
-
-
26. A computer-readable medium having computer-executable instructions for performing a method of network communications, the method comprising:
-
contacting an identity intermediary with a service provider to obtain a first temporary network identity for the service provider including;
assigning, via the identity intermediary, the temporary network identity to include at least one of a personal component, a financial component, and a location component; and
associating, via the identity intermediary, the personal component with a real name of a consumer, associating the financial component with at least one of a real credit card number and a bank number, and associating the location component with at least one of a physical street address and an IP address; and
preventing, via the identity intermediary, unauthorized access to a database of the identity intermediary that maintains the personal, financial, and location components; and
contacting an user interface with the first temporary network identity of the service provider to provide services pseudonymously to the user interface.
-
-
27. A computer-readable medium having computer-executable instructions for performing a method of network communications, the method comprising:
-
contacting a service provider with a user interface;
prior to conveying personal information to the service provider, contacting an identity intermediary with the user interface to obtain a temporary network identity for the user interface; and
performing a transaction between the user interface and the service provider using the temporary network identity of the user interface to conceal a real identity of a consumer using the user interface.
-
-
28. A computer-readable medium having computer-executable instructions for performing a method of providing pseudonymous network identities, the method comprising:
-
randomly generating a first temporary fictitious identity for a first service provider; and
maintaining a database of a plurality of temporary fictitious identities, including the first temporary fictitious identity, with each temporary fictitious identity being associated with a uniquely identified service provider, including the first service provider.
-
-
29. A computer-readable medium having computer-executable instructions for performing a method of operating a network identity intermediary, the method comprising:
-
providing a network site for communicating with a service provider; and
maintaining a database in cooperation with the network site for associating at least one temporary pseudonymous identity with a real identity of the service provider; and
assigning the temporary pseudonymous identity to the service provider upon a request at the network site by the service provider.
-
-
30. A computer-readable medium having computer-executable instructions for performing a method of providing temporary network identities, the method comprising:
-
associating a unique pseudonymous identifier temporarily with a service provider; and
associating an identifier source name with the pseudonymous identifier for identifying the source that generated the unique pseudonymous identifier.
-
-
31. A computer-readable medium having computer-executable instructions for performing a method of providing a network identity intermediary database, the method comprising:
-
maintaining an array of unique pseudonymous identifiers;
maintaining an array of real identities of consumers and service providers including at least one of financial information, personal information, and location information, with each one of the real identities being exclusively associated with only one of the unique pseudonymous identifiers.
-
Specification