Methods and systems for protection of identity
First Claim
1. A method of a data processing center for processing requests of secondary identifications, the method comprising:
- receiving, with one or more computers of the data processing center, a primary identification for a requestor and a request for a secondary identification to be associated with the primary identification;
obtaining, with one or more computers of the data processing center, the secondary identification for the requestor;
associating, with one or more computers of the data processing center, the secondary identification with the primary identification for the requestor;
transmitting, from one or more computers of the data processing center, the secondary identification to the requestor; and
instructing, via one or more computers of the data processing center, a service provider to process, on behalf of the requestor, items that are received by the service provider due to delivery of the items to the secondary identification for the requestor.
5 Assignments
0 Petitions
Accused Products
Abstract
The present invention relates to a method to the creation and management of a secondary identification to avoid identify theft. Identity theft may occur over the internet, the purchase of goods and services by credit, and many other forms not yet known. The present invention creates a secondary identification for a person by creating one or more of the following secondary identifications which include a secondary email address, a secondary postal address, a secondary phone number, and any other identifying secondary information. The present invention describes methods and systems to create a secondary identification. Further, the present invention may be used to create a credit card containing the requestor'"'"'s secondary identification.
26 Citations
17 Claims
-
1. A method of a data processing center for processing requests of secondary identifications, the method comprising:
-
receiving, with one or more computers of the data processing center, a primary identification for a requestor and a request for a secondary identification to be associated with the primary identification; obtaining, with one or more computers of the data processing center, the secondary identification for the requestor; associating, with one or more computers of the data processing center, the secondary identification with the primary identification for the requestor; transmitting, from one or more computers of the data processing center, the secondary identification to the requestor; and instructing, via one or more computers of the data processing center, a service provider to process, on behalf of the requestor, items that are received by the service provider due to delivery of the items to the secondary identification for the requestor. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A non-transitory computer-readable storage medium, comprising a plurality of instructions, that in response to being executed, result in a computing system:
-
obtaining a secondary identification for a requestor in response to receiving a primary identification for the requestor and a request for a secondary identification to be associated with the primary identification; associating the secondary identification with the primary identification for the requestor; transmitting the secondary identification to the requestor; and instructing a service provider to process, on behalf of the requestor, items that are received by the service provider due to delivery of the items to the secondary identification for the requestor. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A computing system, comprising
a memory configured to store a plurality of instructions; - and
a processor, in response to executing the plurality of instructions, configured to cause the computing system to obtain a secondary identification for a requestor in response to receiving a primary identification for the requestor and a request for a secondary identification to be associated with the primary identification, associate the secondary identification with the primary identification for the requestor, transmit the secondary identification to the requestor, and instruct a service provider to process, on behalf of the requestor, items that are received by the service provider due to delivery of the items to the secondary identification for the requestor. - View Dependent Claims (14, 15, 16, 17)
- and
Specification