Methods and systems for protection of identity
First Claim
1. A computer-implemented method performed by a computer system for creating transaction privacy, comprising the steps of:
- receiving a request for issuance of a credit card, where the request includes personal data transmitted over a network;
creating an identification code for the request;
associating the identification code with the request and the personal data transmitted over the network;
creating a secondary identification and linking the secondary identification to the personal data transmitted over the network;
sending the personal data to a credit agency;
receiving credit information from the credit agency;
processing the credit information to determine whether to authorize the issuance of the credit card; and
,authorizing the issuance of the credit card bearing the secondary identification and not bearing the personal data.
5 Assignments
0 Petitions
Accused Products
Abstract
The present invention relates to a method to the creation and management of a secondary identification to avoid identify theft. Identity theft may occur over the internet, the purchase of goods and services by credit, and many other forms not yet known. The present invention creates a secondary identification for a person by creating one or more of the following secondary identifications which include a secondary email address, a secondary postal address, a secondary phone number, and any other identifying secondary information. The present invention describes methods and systems to create a secondary identification. Further, the present invention may be used to create a credit card containing the requestor'"'"'s secondary identification.
-
Citations
6 Claims
-
1. A computer-implemented method performed by a computer system for creating transaction privacy, comprising the steps of:
-
receiving a request for issuance of a credit card, where the request includes personal data transmitted over a network; creating an identification code for the request; associating the identification code with the request and the personal data transmitted over the network; creating a secondary identification and linking the secondary identification to the personal data transmitted over the network; sending the personal data to a credit agency; receiving credit information from the credit agency; processing the credit information to determine whether to authorize the issuance of the credit card; and
,authorizing the issuance of the credit card bearing the secondary identification and not bearing the personal data. - View Dependent Claims (2, 3, 4)
-
-
5. A non-transitory computer-readable memory having computer-executable instructions for instructing a computer processor of a server apparatus to perform the steps of:
-
receiving a request for the issuance of a credit card, where the request includes personal data transmitted over a network, the personal data including a personal identification; creating an identification code for the request; associating the identification code with the request and the personal data transmitted over the network; creating a secondary identification and linking the secondary identification to the personal data transmitted over the network; sending the personal data to a credit agency; receiving credit information from the credit agency; processing the credit information to determine whether to issue the credit card; and
,authorizing the issuance of the credit card bearing the secondary identification and not the personal identification.
-
-
6. A computer server apparatus for processing requests for secondary identifications, the apparatus comprising:
- one or more processors; and
memory, wherein one or more programs are stored in the memory, the one or more programs comprising instructions to;receive a request for the issuance of a credit card, where the request includes personal data transmitted over a network; create an identification code for the request; associate the identification code with the request and the personal data transmitted over the network; create a secondary identification and link the secondary identification to the personal data transmitted over the network; send the personal data to a credit agency; receive credit information from the credit agency; process the credit information to determine whether to issue the credit card; and
,authorize the issuance of the credit card with the secondary identification and not the personal data.
- one or more processors; and
Specification