×

Personal information protection method, personal information protection system, processing device, portable transmitter/receiver, and program

  • US 8,171,556 B2
  • Filed: 10/10/2001
  • Issued: 05/01/2012
  • Est. Priority Date: 10/17/2000
  • Status: Expired due to Fees
First Claim
Patent Images

1. A private information protection method protecting private information on a network through a computer system, including:

  • said computer system performing a step of creating a prescribed virtual person for generating specification data for a virtual person for specifying the virtual person different from specification data for a real person for specifying the real person in the actual world and allowing the real person in the actual world to present specification data for said virtual person instead of specification data for said real person in response to a request of private information of a user and act as the virtual person when the real person acts on the network;

    said computer system performing a step of registering information capable of specifying the association between said real person and said virtual person in a prescribed institution having the duty of confidentiality and capable of determining said real person corresponding to this virtual person with information capable of specifying said association when said real person acts on the network as the virtual person and takes illegal action;

    said computer system performing a step of issuing an electronic certificate for said virtual person;

    said computer system performing a step of setting the address of the destination of an article purchased when said real person acts on the network as said virtual person to a different address from said real person, which is an address existing in the actual world; and

    said computer system performing a step of distinguishing a first identification data transmitted from a site for identifying the user when accessing said site as the real person from a second identification data transmitted from the site for identifying the user when accessing the site as the virtual person, and storing said their identification data, and blocking the first identification data from being transmitted to the site even if the first identification data was transmitted from the site before when accessing said site as the virtual person and transmitting the second identification data to said site when the second identification data was transmitted from said site before as well as blocking the second identification data from being transmitted to said site even if the second identification data was transmitted from said site before when accessing said site as the real person and transmitting the first identification data to said site when the first identification data was transmitted from said site before.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×