Virtual identity apparatus and method for using same
First Claim
Patent Images
1. An apparatus, comprising:
- at least one processor; and
at least one memory, wherein the at least one processor and the at least one processor provide operations comprising;
storing one or more virtual identity cards comprising a plurality of identities for a user with associated functionality, wherein at least two of the identities have different nymity levels, wherein the nymity levels comprise a verinym including an identity traced to the user, a pseudonym including a persistent fictitious name, and an unlinkable anonymity, wherein the verinym identifies the user by a verinym name or associated private data, wherein the one or more virtual identity cards further comprise one or more credentials and the associated private data to enable personalization to a service provider, and wherein a mobile operator provides at least one of the pluralities of identities;
selecting a virtual identity card from the one or more virtual identity cards based on a nymity level corresponding to the nymity level required by a physical service card for a transaction at the service provider for the transaction; and
accessing and operating on functionality associated with the selected virtual identity card, whereinthe user is enabled to securely use the selected virtual identity card for the transaction at the service provider for the transaction.
2 Assignments
0 Petitions
Accused Products
Abstract
A system according to an embodiment of the invention provides a means whereby a user or user device may be authenticated by an identity provider. The authentication may provide a trust relationship between the user and a service provider. An IdentityCard, a virtual version of traditional ID cards seamlessly expands the end user'"'"'s ID card experience and related services to a personal device, like a mobile station or a Personal Digital Assistant (PDA), as well as to the Web browser.
91 Citations
12 Claims
-
1. An apparatus, comprising:
-
at least one processor; and at least one memory, wherein the at least one processor and the at least one processor provide operations comprising; storing one or more virtual identity cards comprising a plurality of identities for a user with associated functionality, wherein at least two of the identities have different nymity levels, wherein the nymity levels comprise a verinym including an identity traced to the user, a pseudonym including a persistent fictitious name, and an unlinkable anonymity, wherein the verinym identifies the user by a verinym name or associated private data, wherein the one or more virtual identity cards further comprise one or more credentials and the associated private data to enable personalization to a service provider, and wherein a mobile operator provides at least one of the pluralities of identities; selecting a virtual identity card from the one or more virtual identity cards based on a nymity level corresponding to the nymity level required by a physical service card for a transaction at the service provider for the transaction; and accessing and operating on functionality associated with the selected virtual identity card, wherein the user is enabled to securely use the selected virtual identity card for the transaction at the service provider for the transaction. - View Dependent Claims (2, 3)
-
-
4. A method, comprising:
-
storing one or more virtual identity cards comprising a plurality of identities for a user with associated functionality, wherein at least two of the identities have different nymity levels, wherein the nymity levels comprise a verinym including an identity traced to the user, a pseudonym including a persistent fictitious name, and an unlinkable anonymity, wherein the verinym identifies the user by a verinym name or associated private data, and wherein the one or more virtual identity cards further comprise one or more credentials and the associated private data to enable personalization to a service provider; selecting a virtual identity card from the one or more virtual identity cards based on a nymity level corresponding to the nymity level required by a physical service card for a transaction at the service provider for the transaction; and accessing and operating on functionality associated with the selected virtual identity card, wherein the user is enabled to securely use the selected virtual identity card for the transaction at the service provider for the transaction. - View Dependent Claims (5, 6, 7, 8, 9)
-
-
10. A non-transitory computer program embodied on a computer readable storage medium, the computer program being configured to control a processor to perform a process, the process comprising:
-
storing one or more virtual identity cards comprising a plurality of identities for a user with associated functionality, wherein at least two of the identities have different nymity levels, wherein the nymity levels comprise a verinym including an identity traced to the user, a pseudonym including a persistent fictitious name, and an unlinkable anonymity, wherein the verinym identifies the user by a verinym name or associated private data, and wherein the one or more virtual identity cards further comprise one or more credentials and the associated private data to enable personalization to a service provider; selecting a virtual identity card from the one or more virtual identity cards based on a nymity level corresponding to the nymity level required by a physical service card for a transaction at the service provider for the transaction; and accessing and operating on functionality associated with the selected virtual identity card, wherein the user is enabled to securely use the selected virtual identity card for the transaction at the service provider for the transaction. - View Dependent Claims (11, 12)
-
Specification