Methods and systems for protection of identity
First Claim
1. A method for creating online transaction privacy, the method being executed by a computer system, comprising:
- one or more processors, andmemory,the memory storing one or more instructions which cause the computer system to;
receive actual user identity information;
store the received actual user identity information;
generate anonymous payment information or anonymous identity information;
associate at least one of the anonymous payment information or anonymous identity information with the actual user identity information;
transmit the generated anonymous payment information or anonymous identity information to a client over a network;
store transaction information, where the transaction information corresponds to a transaction with the anonymous payment information or anonymous identity information; and
associate the transaction information with at least one of the actual user identity information, the anonymous payment information, or the anonymous identity information.
5 Assignments
0 Petitions
Accused Products
Abstract
The present invention relates to a method to the creation and management of a secondary identification to avoid identify theft. Identity theft may occur over the internet, the purchase of goods and services by credit, and many other forms not yet known. The present invention creates a secondary identification for a person by creating one or more of the following secondary identifications which include a secondary email address, a secondary postal address, a secondary phone number, and any other identifying secondary information. The present invention describes methods and systems to create a secondary identification. Further, the present invention may be used to create a credit card containing the requestor'"'"'s secondary identification.
24 Citations
12 Claims
-
1. A method for creating online transaction privacy, the method being executed by a computer system, comprising:
-
one or more processors, and memory, the memory storing one or more instructions which cause the computer system to; receive actual user identity information; store the received actual user identity information; generate anonymous payment information or anonymous identity information; associate at least one of the anonymous payment information or anonymous identity information with the actual user identity information; transmit the generated anonymous payment information or anonymous identity information to a client over a network; store transaction information, where the transaction information corresponds to a transaction with the anonymous payment information or anonymous identity information; and associate the transaction information with at least one of the actual user identity information, the anonymous payment information, or the anonymous identity information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A non-transitory computer-readable memory having computer-executable instructions for instructing a computer processor of a server apparatus to perform the steps of:
-
receiving actual user identity information; storing the received actual user identity information; generating anonymous payment information or anonymous identity information; associating at least one of the anonymous payment information or anonymous identity information with the actual user identity information; transmitting the generated anonymous payment information or anonymous identity information to a client over a network; storing transaction information, where the transaction information corresponds to a transaction with the anonymous payment information or anonymous identity information; and associating the transaction information with at least one of the actual user identity information, the anonymous payment information, or the anonymous identity information.
-
-
12. A computer server apparatus for creating online transaction privacy, the apparatus having one or more programs stored in memory, the one or more programs comprising instructions to:
-
receive actual user identity information; store the received actual user identity information; generate anonymous payment information or anonymous identity information; associate at least one of the anonymous payment information or anonymous identity information with the actual user identity information; transmit the generated anonymous payment information or anonymous identity information to a client over a network; store transaction information, where the transaction information corresponds to a transaction with the anonymous payment information or anonymous identity information; and associate the transaction information with at least one of the actual user identity information, the anonymous payment information, or the anonymous identity information.
-
Specification