Method and system for preventing identity theft in electronic communications
First Claim
1. A method for preventing identity theft in electronic communications, comprising the steps of:
- sequencing an encryption key transaction from a trusted service for generating for an individual a consumer identifier by performing the steps of;
issuing from said trusted service a primary key to the individual;
issuing to the individual a unique identifier from said trusted service; and
permitting the individual to generate and maintain a consumer-defined sequence through said trusted service;
allowing the individual to control access to commercially related use of said consumer identifier by third parties;
generating a report for presentation to the individual when at least one of the third parties requests access to information related to the consumer identifier; and
allowing the individual to control which of the third parties that requested access can access information related to the individual.
5 Assignments
0 Petitions
Accused Products
Abstract
Preventing identity theft in electronic communications sequences (180) involves generating a consumer identifier (126) for an individual (92) from a trusted service (82), including a primary key (128), a unique identifier (130), and a consumer-defined sequence (132). The consumer-defined sequence (132) allows the individual (92) to control use of the consumer identifier (126) by third parties, such as business entities (112). The method and system further allows business entities (114) to verify use of the consumer identifier (126) by first initiating a verification process (196) via a secure connection (110). Verification includes comparing (200) the consumer identifier (126) with a pre-determined set of database records (86, 88, and 90). If the requesting business (108) has registered with the trusted service (82), the invention presents a positive or negative confirmation (208) to the requesting business (108) according to the inquiry (204). Then, the invention permits confirming (210) the requested information relating to the individual (92) via the secure connection (98, 102, 106), conditioned upon the requested information having previously been authorized by the individual for presenting to the requesting business (108).
49 Citations
20 Claims
-
1. A method for preventing identity theft in electronic communications, comprising the steps of:
-
sequencing an encryption key transaction from a trusted service for generating for an individual a consumer identifier by performing the steps of; issuing from said trusted service a primary key to the individual; issuing to the individual a unique identifier from said trusted service; and permitting the individual to generate and maintain a consumer-defined sequence through said trusted service; allowing the individual to control access to commercially related use of said consumer identifier by third parties; generating a report for presentation to the individual when at least one of the third parties requests access to information related to the consumer identifier; and allowing the individual to control which of the third parties that requested access can access information related to the individual. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for preventing identity theft in electronic communications, comprising:
-
a non-transitory computer-readable medium storing one or more instructions, wherein one or more of the instructions comprise; instructions for sequencing an encryption key transaction from a trusted service for generating for an individual a consumer identifier, said sequencing instructions further comprising; instructions for issuing from said trusted service a primary key to the individual; instructions for issuing to the individual a unique identifier from said trusted service; and instructions for permitting the individual to generate and maintain a consumer-defined sequence through said trusted service; and instructions for allowing the individual to control access to commercially related use of said consumer identifier by third parties; instructions for generating a report for presentation to the individual when at least one of the third parties requests access to information related to the consumer identifier; and instructions for allowing the individual to control which of the third parties that requested access can access information related to the individual. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A non-transitory computer-readable storage medium comprising a system for preventing identity theft in electronic communications, comprising:
-
instructions stored on said storage medium for sequencing an encryption key transaction from a trusted service for generating for an individual a consumer identifier, said sequencing instructions further comprising; instructions stored on said storage medium for issuing from said trusted service a primary key to the individual; instructions stored on said storage medium for issuing to the individual a unique identifier from said trusted service; instructions stored on said storage medium for permitting the individual to generate and maintain a consumer-defined sequence through said trusted service; and instructions stored on said storage medium for allowing the individual to control access to commercially related use of said consumer identifier by third parties; instructions for generating a report for presentation to the individual when at least one of the third parties requests access to information related to the consumer identifier; and instructions for allowing the individual to control which of the third parties that requested access can access information related to the individual. - View Dependent Claims (20)
-
Specification