Apparatus and method for masking a real user controlling synthetic identities
First Claim
Patent Images
1. A machine, comprising:
- a processor, anda memory storing instructions executed by the processor to;
issue a challenge in response to a first request,evaluate a response to the challenge to establish confirmation that the first request originated from a human user,issue a user identification in response to the confirmation,store the user identification with encrypted identity data, wherein the instructions executed by the processor to store the user identification with encrypted identity data further comprise instructions to store an encrypted synthetic identification, a corresponding public key and corresponding client device information,receive a second request that includes the user identification, andreturn the encrypted identity data in response to the second request.
1 Assignment
0 Petitions
Accused Products
Abstract
A machine has a processor and a memory storing instructions executed by the processor to issue a challenge in response to a first request, evaluate a response to the challenge to establish confirmation that the first request originated from a human user, issue a user identification in response to the confirmation, store the user identification with encrypted identity data, receive a second request that includes the user identification, and return the encrypted identity data in response to the second request.
20 Citations
7 Claims
-
1. A machine, comprising:
-
a processor, and a memory storing instructions executed by the processor to; issue a challenge in response to a first request, evaluate a response to the challenge to establish confirmation that the first request originated from a human user, issue a user identification in response to the confirmation, store the user identification with encrypted identity data, wherein the instructions executed by the processor to store the user identification with encrypted identity data further comprise instructions to store an encrypted synthetic identification, a corresponding public key and corresponding client device information, receive a second request that includes the user identification, and return the encrypted identity data in response to the second request. - View Dependent Claims (2, 3, 4)
-
-
5. A non-transitory computer readable storage medium with instructions executed by a processor to:
-
coordinate a request for a user identification from a synthetic identity management service, store the user identification and a symmetric key, coordinate a request for a synthetic identification from the synthetic identity management service, encrypt the synthetic identification using the symmetric key to form encrypted synthetic identification, upload the encrypted synthetic identification to the synthetic identity management service, coordinate a request for the encrypted synthetic identification from the synthetic identity management service using the user identification, decrypt the encrypted synthetic identification to render a first synthetic identification, combine the first synthetic identification with a second synthetic identification, encrypt the first synthetic identification and the second synthetic identification using the symmetric key to form encrypted combined synthetic identification, and upload the combined synthetic identification to the synthetic identity management service. - View Dependent Claims (6, 7)
-
Specification