Managing digital identity information
First Claim
1. A method for managing digital identity information, comprising the computer-assisted steps of:
- obtaining from a user first digital identity information of the user;
causing the first digital identity information to be placed in a first profile in a database;
obtaining from the user second digital identity information of the user;
causing the second digital identity information to be placed in a second profile in the database;
providing the user with access to the profiles to allow the user to update the digital identity information while denying such access to other entities; and
providing an entity other than the user with read-only access to a profile of the user in response to instructions from the user.
12 Assignments
0 Petitions
Accused Products
Abstract
A basic architecture for managing digital identity information in a network such as the World Wide Web is provided. A user of the architecture can organize his or her information into one or more profiles which reflect the nature of different relationships between the user and other entities, and grant or deny each entity access to a given profile. Various enhancements which may be provided through the architecture are also described, including tools for filtering email, controlling access to user web pages, locating other users and making one'"'"'s own location known, browsing or mailing anonymously, filling in web forms automatically with information already provided once by hand, logging in automatically, securely logging in to multiple sites with a single password and doing so from any machine on the network, and other enhancements.
395 Citations
17 Claims
-
1. A method for managing digital identity information, comprising the computer-assisted steps of:
-
obtaining from a user first digital identity information of the user;
causing the first digital identity information to be placed in a first profile in a database;
obtaining from the user second digital identity information of the user;
causing the second digital identity information to be placed in a second profile in the database;
providing the user with access to the profiles to allow the user to update the digital identity information while denying such access to other entities; and
providing an entity other than the user with read-only access to a profile of the user in response to instructions from the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A configured computer-readable storage medium for managing digital identity information, the storage medium configured to perform the steps of:
-
obtaining from a user first digital identity information of the user;
causing the first digital identity information to be placed in a first profile in a database;
obtaining from the user second digital identity information of the user;
causing the second digital identity information to be placed in a second profile in the database;
providing the user with access to the profiles to allow the user to update the digital identity information while denying such access to other entities; and
providing an entity other than the user with read-only access to a profile of the user in response to instructions from the user. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
Specification