×

Method and system for protecting sensitive information and preventing unauthorized use of identity information

  • US 7,603,320 B1
  • Filed: 09/02/2003
  • Issued: 10/13/2009
  • Est. Priority Date: 08/31/2002
  • Status: Active Grant
First Claim
Patent Images

1. A method of obtaining a piece of an information holder'"'"'s sensitive information stored in an information source computer system using a virtual identifier that corresponds to a piece of said information holder'"'"'s static information, comprising:

  • a) receiving from a first device of said information holder, said piece of static information of said information holder by a processing entity computer system;

    b) authenticating said information holder by said processing entity computer system using an authentication protocol and receiving validity information from said first device of said information holder or a second device of said information holder;

    c) creating said virtual identifier by said processing entity computer system;

    d) linking said virtual identifier to said information holder'"'"'s static information and said validity information by a data management system;

    e) transmitting said virtual identifier from said processing entity computer system to said first device of said information holder, said second device of said information holder or a third device of said information holder;

    f) receiving by said processing entity computer system a request for said piece of sensitive information of said information holder with said virtual identifier from a first device of a third party;

    g) identifying by said processing entity computer system said static information of said information holder using said virtual identifier;

    h) validating said virtual identifier by said processing entity computer system using said validity information;

    i) transmitting a request for obtaining said piece of sensitive information of said information holder to said information source computer system by said processing entity computer system;

    j) receiving said piece of sensitive information of said information holder from said information source computer system in response to said request for obtaining said piece of sensitive information;

    k) transmitting said piece of sensitive information of said information holder to said first device of said third party or a second device of said third party from said processing entity computer system.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×