Preventing identity theft
First Claim
1. A method of determining whether to remotely authorize an action on behalf of a requester, comprising:
- having the requester provide a privacy token;
remotely obtaining data from the privacy token; and
authorizing the action if the data from the privacy token verifies that the requester is authorized to take the action.
5 Assignments
0 Petitions
Accused Products
Abstract
Determining whether to remotely authorize an action on behalf of a requester includes having the requester provide a privacy token, remotely obtaining data from the privacy token, and authorizing the action if the data from the privacy token verifies that the requester is authorized to take the action. The action may include issuing a credit card for the requester. The privacy token may be a smart card. The data may be digitally signed. Determining whether to remotely authorize an action on behalf of a requester may also include authorizing the action if the requester had previously indicated a desire not to require presentation of the privacy token. The action may be authorized only if the data from the privacy token verifies the identity of the requester.
73 Citations
20 Claims
-
1. A method of determining whether to remotely authorize an action on behalf of a requester, comprising:
-
having the requester provide a privacy token;
remotely obtaining data from the privacy token; and
authorizing the action if the data from the privacy token verifies that the requester is authorized to take the action. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A privacy token, comprising:
-
an electronic identifier that stores data;
a data communicator coupled to the electronic identifier; and
data, provided on the electronic identifier, that binds the privacy token to a holder thereof, wherein the data is authenticated by an authority that is trusted by a provider of service to the holder. - View Dependent Claims (13, 14)
-
-
15. A method of administering privacy tokens that have data that binds each of the privacy tokens to a holder thereof using authenticated data, the method comprising:
-
receiving, from a token issuing authority, authenticated information indicating that a particular privacy token has been issued; and
providing a transaction authority with authenticated information indicating that the particular privacy token has been issued by the token issuing authority, wherein the transaction authority authorizes use of the privacy token in response to receiving the second authenticated information. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification