Method for concealing user identities on computer systems through the use of temporary aliases
First Claim
Patent Images
1. A computer implemented method for concealing a user identification, the computer implemented method comprising:
- receiving user input, wherein the user input comprises a user alias;
verifying that the user alias is a valid user alias;
obtaining a user identification associated with the valid user alias from a database comprising a one-way protected mapping of the valid user alias to the user identification, wherein only a trusted privileged process with a decryption key reverse maps the user identification back to the valid user alias, wherein if the valid user alias is compromised the valid user alias is removed without requiring change of the user identification required for permission;
determining whether the valid user alias is one of a plurality of permitted user aliases permitted for one time use in association with the user identification in a database, for connecting in a non-secure environment;
responsive to determining the valid user alias is one of a plurality of permitted user aliases specified for one time use in association with the user identification, discarding the valid user alias from the plurality of permitted user aliases stored in the database;
determining whether there is at least one remaining valid user alias stored as the plurality of permitted user aliases in the database;
responsive to detecting there is at least one remaining valid user alias, marking the next remaining valid user alias from among the plurality of permitted user aliases as the valid user alias; and
responsive to detecting there is not remaining valid user alias, generating an sending an electronic mail message to the user specifying there are no remaining permitted user aliases in the database.
2 Assignments
0 Petitions
Accused Products
Abstract
A user alias for concealing a user'"'"'s user identification is provided. When signing-on, the user inputs a user alias to a log-in shell. The log-in shell verifies the validity of the user alias. The log-in shell then obtains a user identification associated with the valid user alias.
14 Citations
17 Claims
-
1. A computer implemented method for concealing a user identification, the computer implemented method comprising:
-
receiving user input, wherein the user input comprises a user alias; verifying that the user alias is a valid user alias; obtaining a user identification associated with the valid user alias from a database comprising a one-way protected mapping of the valid user alias to the user identification, wherein only a trusted privileged process with a decryption key reverse maps the user identification back to the valid user alias, wherein if the valid user alias is compromised the valid user alias is removed without requiring change of the user identification required for permission; determining whether the valid user alias is one of a plurality of permitted user aliases permitted for one time use in association with the user identification in a database, for connecting in a non-secure environment; responsive to determining the valid user alias is one of a plurality of permitted user aliases specified for one time use in association with the user identification, discarding the valid user alias from the plurality of permitted user aliases stored in the database; determining whether there is at least one remaining valid user alias stored as the plurality of permitted user aliases in the database; responsive to detecting there is at least one remaining valid user alias, marking the next remaining valid user alias from among the plurality of permitted user aliases as the valid user alias; and responsive to detecting there is not remaining valid user alias, generating an sending an electronic mail message to the user specifying there are no remaining permitted user aliases in the database. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer executable program product comprising a tangible non-transitory computer readable storage device for concealing a user identification, wherein the computer usable program code when executed on a computer causes the computer to:
-
receive user input, wherein the user input comprises a user alias; verify that the user alias is a valid user alias; obtain a user identification associated with the valid user alias from a database comprising a one-way protected mapping of the valid user alias to the user identification, wherein only a trusted privileged process with a decryption key reverse maps the user identification back to the valid user alias, wherein if the valid user alias is compromised the valid user alias is removed without requiring change of the user identification required for permission; determine whether the valid user alias is one of a plurality of permitted user aliases permitted for one time use in association with the user identification in a database, for connecting in a non-secure environment; responsive to determining the valid user alias is one of a plurality of permitted user aliases specified for one time use in association with the user identification, discard the valid user alias from the plurality of permitted user aliases stored in the database; determine whether there is at least one remaining valid user alias stored as the plurality of permitted user aliases in the database; responsive to detecting there is at least one remaining valid user alias, mark the next remaining valid user alias from among the plurality of permitted user aliases as the valid user alias; and responsive to detecting there is not remaining valid user alias, generate an sending an electronic mail message to the user specifying there are no remaining permitted user aliases in the database. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
-
14. A data processing system for concealing a user identification, said data processing system comprising:
-
a storage device, wherein the storage device stores computer usable program code; and a processor, wherein the processor executes the computer usable program code to receive user input, wherein the user input comprises a user alias;
to verifythat the user alias is a valid user alias; and
to obtain a user identification associated with the valid user alias from a database comprising a one-way protected mapping of the valid user alias to the user identification, wherein only a trusted privileged process with a decryption key reverse maps the user identification back to the valid user alias, wherein if the valid user alias is compromised the valid user alias is removed without requiring change of the user identification required for permission;wherein the processor further executes; computer usable program code for determining whether the valid user alias is one of a plurality of permitted user aliases permitted for one time use in association with the user identification in a database, for connecting in a non-secure environment; computer usable program code, responsive to determining the valid user alias is one of a plurality of permitted user aliases specified for one time use in association with the user identification, for discarding the valid user alias from the plurality of permitted user aliases stored in the database; computer usable program code for determining whether there is at least one remaining valid user alias stored as the plurality of permitted user aliases in the database; computer usable program code, responsive to detecting there is at least one remaining valid user alias for marking the next remaining valid user alias from among the plurality of permitted user aliases as the valid user alias; and computer usable program code, responsive to detecting there is not remaining valid user alias, for generating an sending an electronic mail message to the user specifying there are no remaining permitted user aliases in the database. - View Dependent Claims (15, 16, 17)
-
Specification