Methods and systems for protection of identity
First Claim
1. A computer-implemented method performed by a computer server apparatus for processing requests for secondary identifications comprising the steps of:
- receiving from a requestor a request to the computer server apparatus for a secondary identification;
receiving from the requestor an authorization to the computer server apparatus to generate the secondary identification;
transmitting from the computer server apparatus the authorization to a secondary identification services, the services of the secondary identification services comprising;
A secondary postal address,A secondary email address,and A secondary phone number, or A secondary postal address and A secondary email address, or A secondary postal address and A secondary phone numberassociating at the computer server apparatus the secondary identification with the requestor;
storing the secondary identification; and
transmitting from the computer server apparatus the secondary identification to the requestor.
5 Assignments
0 Petitions
Accused Products
Abstract
The present invention relates to a method to the creation and management of a secondary identification to avoid identify theft. Identity theft may occur over the internet, the purchase of goods and services by credit, and many other forms not yet known. The present invention creates a secondary identification for a person by creating one or more of the following secondary identifications which include a secondary email address, a secondary postal address, a secondary phone number, and any other identifying secondary information. The present invention describes methods and systems to create a secondary identification. Further, the present invention may be used to create a credit card containing the requestor'"'"'s secondary identification.
-
Citations
50 Claims
-
1. A computer-implemented method performed by a computer server apparatus for processing requests for secondary identifications comprising the steps of:
-
receiving from a requestor a request to the computer server apparatus for a secondary identification; receiving from the requestor an authorization to the computer server apparatus to generate the secondary identification; transmitting from the computer server apparatus the authorization to a secondary identification services, the services of the secondary identification services comprising; A secondary postal address, A secondary email address, and A secondary phone number, or A secondary postal address and A secondary email address, or A secondary postal address and A secondary phone number associating at the computer server apparatus the secondary identification with the requestor; storing the secondary identification; and transmitting from the computer server apparatus the secondary identification to the requestor. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. A computer-readable memory having computer-executable instructions for instructing a computer processor of a server apparatus to perform the steps of:
-
receiving from a requestor a request for a secondary identification; receiving from the requestor an authorization to generate the secondary identification; associating the request with the authorization by comparing identifying information associated with the request and identifying information associated with the authorization; transmitting the request and authorization to a secondary identification service, the services of the secondary identification services comprising; A secondary postal address, A secondary email address, and A secondary phone number or A secondary postal address and A secondary email address, or A secondary postal address and A secondary phone number associating the secondary identification with the request by finding a relationship between he identifying information associated with secondary identification and the identifying information associated with the request; storing a digital copy of the secondary identification; and
transmitting the secondary identification to the requestor authorized.
-
-
27. A computer server apparatus for processing requests for secondary identifications, the apparatus having one or more programs stored in memory, the one or more programs comprising instructions to:
-
receive from a requestor a request to the computer server apparatus for a secondary identification; receive from the requestor an authorization to the computer server apparatus to generate the secondary identification; transmit from the computer server apparatus the authorization to a secondary identification services, the services of the secondary identification services comprising; a secondary postal address, a secondary email address, and a secondary phone number, or a secondary postal address and a secondary email address, or a secondary postal address and a secondary phone number; associate at the computer server apparatus the secondary identification with the requestor;
store the secondary identification; andtransmit from the computer server apparatus the secondary identification to the requestor. - View Dependent Claims (28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50)
-
Specification