×

Identity broker tools and techniques for use with forward proxy computers

  • US 9,514,459 B1
  • Filed: 03/15/2001
  • Issued: 12/06/2016
  • Est. Priority Date: 03/24/2000
  • Status: Active Grant
First Claim
Patent Images

1. A method for managing identities while accessing the Internet, the method comprising the following steps performed with a forward proxy computer:

  • acquiring from a person by the forward proxy computer data that is placed by the forward proxy computer in an identity broker data structure defining a plurality of different identities for said person, and acquiring data that defines presentation information to identify and/or authenticate the forward proxy computer to a remote Internet site using one of said plurality of identities, the forward proxy computer acts on behalf of the person in interactions with the Internet site and preserves the anonymity of the person during those interactions with and between the remote Internet site, and the forward proxy computer supplies information to the remote Internet site to gain access thereto but preserves the anonymity of the person in that interaction;

    receiving, by the forward proxy computer and from a user computer, a request by the person for desired information from the remote Internet site, the user computer configured to directly interact with the forward proxy computer, and the person via the user computer initially logs into the forward proxy computer and provides instructions to the forward proxy computer to communicate with the remote Internet site and to not reveal a true identity of the person or user computer to the remote Internet site, and the user computer retains administrative oversight of the forward proxy computer;

    determining, by the forward proxy computer, which of the plurality of identities of the person should be used as a specified identity in making a corresponding request of the remote Internet site for the desired information;

    presenting, by the forward proxy computer, the specified identity to the remote Internet site, the specified identity presented by using the presentation information, and masking the true identity of the person via the specified identity to preserve the anonymity of the true identity with respect to the remote Internet site;

    requesting, by the forward proxy computer, the desired information from the remote Internet site in a communication by identifying the forward proxy computer as the source of the request, via the specified identity, so as to not identify the user computer;

    receiving, by the forward proxy computer and from the remote Internet site identity information that identifies the forward proxy computer as the requester and identity-independent information;

    forwarding, by the forward proxy computer, the identity-independent information to the user computer;

    storing the identity information by the forward proxy computer in a storage location at the forward proxy computer, the identify information being stored as a cookie that can be written to by the remote Internet site in response to a communication from the remote Internet site; and

    transparently operating the forward proxy computer relative to the remote Internet site as the specified identity in place of the user computer and forwarding identity-independent information from the remote Internet site to the user computer, and providing by the forward proxy computer identity substitution and identity mapping on behalf of the person.

View all claims
  • 7 Assignments
Timeline View
Assignment View
    ×
    ×