METHOD AND SYSTEM FOR ANONYMOUS INFORMATION VERIFICATION
First Claim
1. A user verification method, comprising:
- verifying an item of information, associated with a first user, is within a predefined range;
providing a code generator to the first user after the verifying, wherein the code generator includes no first user information;
generating a code for the first user by the code generator; and
running a code verifier with an input of the code from the first user, resulting in a verification of the item of information is within the predefined range.
0 Assignments
0 Petitions
Accused Products
Abstract
A first user contacts a verification host and claims that an item of the first user'"'"'s information is in a predefined range with relevant information submitted. The verification host verifies the first user'"'"'s claim, and provides a code generator to the first user if the claim is valid. The first user generates a code by running the code generator with an input only known to the first user. The code generator combines an input determined by the verification host and the input by the first user into a combined input, encrypts the combined input, and generates a code based on the encrypted combined input. The generated code contains a first portion, which is determined by the verification host and contains no any first user'"'"'s information, and a second portion, which is related to the first user'"'"'s input when running the code generator. Only the first user knows that the generated code belongs to the first user. A second user contacts the verification host to obtain a code verifier for a need to verify that the item of the first user'"'"'s information is in the predefined range. The verification host provides a code verifier to the second user. When the second user needs to verify that an item of the first user'"'"'s information is in a predefined range, the second user only needs to verify the relevant code submitted by the first user by running the code verifier. The code verifier decrypts the code submitted by the first user, compares a part of the code verifier determined by the verification host, which contains no any first user'"'"'s information, with the first portion of the decrypted code, and return a result to the second user. The first user'"'"'s identity and privacy are fully protected during the code verification process with the method and system disclosed here.
16 Citations
20 Claims
-
1. A user verification method, comprising:
-
verifying an item of information, associated with a first user, is within a predefined range; providing a code generator to the first user after the verifying, wherein the code generator includes no first user information; generating a code for the first user by the code generator; and running a code verifier with an input of the code from the first user, resulting in a verification of the item of information is within the predefined range. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A user verification apparatus comprising:
-
a code generator designed to generate a code associated with an item of information of a first user is in a predefined range to be verified, wherein the code generator is run by the first user with an input only known to the first user; and a code verifier designed to receive the code and generate a confirmation that the item of information of the first user is within the predefined range, wherein the code generator and code verifier include no the first user'"'"'s information. - View Dependent Claims (11, 12, 13)
-
-
14. A system for user verification, comprising:
-
a first user; a second user requesting a verification of the first user if an item of information associated with the first user is within a predefined range; and a verification host providing a code generator to the first user after verifying the item of information associated with the first user is within the predefined range, and providing a code verifier to the second user. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification