Managing digital identity information
First Claim
1. In a computer operating environment, a method for managing digital identity information, comprising the computer-assisted steps of:
- obtaining from a user first digital identity information of the user;
causing the first digital identity information to be placed in a first profile in a database;
obtaining from the user second digital identity information of the user;
causing the second digital identity information to be placed in a second profile in the database, both the first and second profiles existing in a safe object of the database, the safe object existing in a vault object of the database;
providing the user with access rights to the digital identity information of the first and second profiles in the safe object to allow the user to update the digital identity information while also (1) wholly denying any system administrator of the computer operating environment access rights to the digital identity information of the first and second profiles in the safe object and (2) granting at least one system administrator access rights to the vault object to manage the safe object in the vault; and
at the exclusion of the any system administrator, providing an entity other than the user with read-only access to one of the first and second profiles of the user in response to instructions from the user.
12 Assignments
0 Petitions
Accused Products
Abstract
A basic architecture for managing digital identity information in a network such as the World Wide Web is provided. A user of the architecture can organize his or her information into one or more profiles which reflect the nature of different relationships between the user and other entities, and grant or deny each entity access to a given profile. Various enhancements which may be provided through the architecture are also described, including tools for filtering email, controlling access to user web pages, locating other users and making one'"'"'s own location known, browsing or mailing anonymously, filling in web forms automatically with information already provided once by hand, logging in automatically, securely logging in to multiple sites with a single password and doing so from any machine on the network, and other enhancements.
-
Citations
17 Claims
-
1. In a computer operating environment, a method for managing digital identity information, comprising the computer-assisted steps of:
-
obtaining from a user first digital identity information of the user; causing the first digital identity information to be placed in a first profile in a database; obtaining from the user second digital identity information of the user; causing the second digital identity information to be placed in a second profile in the database, both the first and second profiles existing in a safe object of the database, the safe object existing in a vault object of the database; providing the user with access rights to the digital identity information of the first and second profiles in the safe object to allow the user to update the digital identity information while also (1) wholly denying any system administrator of the computer operating environment access rights to the digital identity information of the first and second profiles in the safe object and (2) granting at least one system administrator access rights to the vault object to manage the safe object in the vault; and at the exclusion of the any system administrator, providing an entity other than the user with read-only access to one of the first and second profiles of the user in response to instructions from the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A configured computer-readable storage medium for managing digital identity information in a computer operating environment having multiple users, the storage medium configured to perform the steps of:
-
obtaining from a user first digital identity information of the user; causing the first digital identity information to be placed in a first profile in a memory configured as a database; obtaining from the user second digital identity information of the user; causing the second digital identity information to be placed in a second profile in the database, both the first and second profiles existing in a safe object of the database, the safe object existing in a vault object of the database; providing the user with access rights to the digital identity information of the first and second profiles in the safe object to allow the user to update the digital identity information while also (1) wholly denying any system administrator of the computer operating environment access rights to the digital identity information of the first and second profiles in the safe object and (2) granting at least one system administrator access rights to the vault object to manage the safe object in the vault; and providing an entity other than the user with read-only access to one of the first and second profiles of the user, the entity also having at least one profile of underlying digital identity information in at least one safe object in the vault of the database with access rights in the underlying digital identity information provided exclusively to the entity other than the user while at the same time the at least one system administrator is granted access rights to the vault object to manage the at least one safe object. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
Specification