Managing access to digital identity information
First Claim
1. In a computing system environment, a method for managing access to digital identity information, comprising:
- creating at least one first electronic identity profile comprising unique personal identity information of a first user, and storing said first identity profile and a first contact listing object that lists users granted access by the first user to the first identity profile in a first user vault object;
creating at least one second electronic identity profile comprising unique personal identity information of a second user, and storing said second identity profile and a second contact listing object that lists users granted access by the second user to the second identity profile in a second user vault object that is different from the first user vault object;
on completion of an acceptable contact between the first and second users, automatically federating identity information between the first and the second contact listing objects granting read-only access to the first and second users for the first user'"'"'s and the second user'"'"'s respective electronic identity profiles;
receiving an acceptable second user request for access to first user identity information;
providing said first identity information to the second user;
the creating at least one second user electronic identity profile comprising at least the first user identity information provided to the second user, the profile including at least one of text or graphics designated by the first user; and
providing the at least one second electronic identity profile to the first user.
4 Assignments
0 Petitions
Accused Products
Abstract
A basic architecture for managing digital identity information in a network such as the World Wide Web is provided. A user of the architecture can organize his or her information into one or more profiles which reflect the nature of different relationships between the user and other entities, and grant or deny each entity access to a given profile. Various enhancements which may be provided through the architecture are also described, including tools for filtering email, controlling access to user web pages, locating other users and making one'"'"'s own location known, browsing or mailing anonymously, filling in web forms automatically with information already provided once by hand, logging in automatically, securely logging in to multiple sites with a single password and doing so from any machine on the network, and other enhancements.
14 Citations
13 Claims
-
1. In a computing system environment, a method for managing access to digital identity information, comprising:
-
creating at least one first electronic identity profile comprising unique personal identity information of a first user, and storing said first identity profile and a first contact listing object that lists users granted access by the first user to the first identity profile in a first user vault object; creating at least one second electronic identity profile comprising unique personal identity information of a second user, and storing said second identity profile and a second contact listing object that lists users granted access by the second user to the second identity profile in a second user vault object that is different from the first user vault object; on completion of an acceptable contact between the first and second users, automatically federating identity information between the first and the second contact listing objects granting read-only access to the first and second users for the first user'"'"'s and the second user'"'"'s respective electronic identity profiles; receiving an acceptable second user request for access to first user identity information; providing said first identity information to the second user; the creating at least one second user electronic identity profile comprising at least the first user identity information provided to the second user, the profile including at least one of text or graphics designated by the first user; and providing the at least one second electronic identity profile to the first user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. In a computing system environment, a method for managing access to digital identity information, comprising:
-
creating at least one first electronic identity profile comprising unique personal identity information of a user, and storing said first identity profile and a first contact listing object listing entities granted access by the first user to the first identity profile in a first vault object; creating at least one second electronic profile comprising unique identity information of another entity in a second vault object that is different from the first vault object; on completion of an acceptable contact between the user and said other entity, automatically federating at least a portion of the user identity information between the first contact listing object and the other entity information across a network; receiving an acceptable other entity request for access to first user identity information; providing said first identity information to the other entity; the creating at least one second electronic identity comprising at least the first user identity information provided to the other entity, the profile including at least one of text or graphics designated by the first user; and providing the at least one second electronic profile to the first user. - View Dependent Claims (10, 11, 12, 13)
-
Specification