摘要:
A non-transitory computer readable storage medium has instructions executed by a processor to collect mobile device environment parameters. Identity attributes including real identity attributes for a real individual and at least one set of synthetic identity attributes are stored. An electronic communication attempt by a designated entity corresponding to either the real identity attributes or the at least one set of synthetic identity attributes is monitored. The electronic communication attempt is analyzed in connection with the mobile device environment parameters and identity attributes to identify a rule transgression. A warning is supplied in connection with the electronic communication attempt in response to the rule transgression.
摘要:
A machine has a processor and a memory connected to the processor. The memory stores instructions executed by the processor to match a communication sender number or a communication receiver number associated with a communication to a synthetic identity. A parameter associated with the synthetic identity is selected. Delivery of the communication is coordinated such that the recipient of the communication views the parameter upon receipt of the communication.
摘要:
A non-transitory computer readable storage medium with instructions executed by a processor maintains different digital identities for different internet browsing personas associated with a real user. Persona selection rules are invoked to automatically designate a selected digital identity for a current internet browsing session. Browser state for the selected digital identity is loaded.
摘要:
An apparatus has a network interface circuit providing connectivity to a network with network connected client machines hosting email client modules controlling email inboxes. A processor is connected to the network interface circuit. A memory is connected to the processor. The memory stores instructions executed by the processor to scan the email inboxes to identify statistically infrequently received emails from different network connected service providers. Protocols utilized by the different network connected service providers to accept user data delete requests are identified. The protocols are executed.
摘要:
An apparatus has a processor and a memory connected to the processor. The memory stores instructions executed by the processor to compute computer network activity reputation attributes for a digital identity. The digital identity has identity attributes different than identity attributes associated with a real individual utilizing the digital identity for computer network activity. The storage of the computer network activity reputation attributes for the digital identity is coordinated within a block chain system distributed across a block chain network of computers. Computer network activity reputation attributes for the digital identity are supplied in response to a request from a machine. The computer network activity reputation attributes are communicated over a network of computers to the machine.
摘要:
A machine has a processor and a memory storing instructions executed by the processor to issue a challenge in response to a first request, evaluate a response to the challenge to establish confirmation that the first request originated from a human user, issue a user identification in response to the confirmation, store the user identification with encrypted identity data, receive a second request that includes the user identification, and return the encrypted identity data in response to the second request.
摘要:
A machine has a network interface circuit to provide connectivity to networked machines. A processor is connected to the network interface circuit. A memory is connected to the processor and the network interface circuit. The memory stores cryptographically protected data, an identity management contract and identity stewards specifying individuals to administer the identity management contract. The memory stores instructions executed by the processor to receive a request to identify a legal identity for a digital identity, collect from certain networked machines, via the network interface circuit, consent from the identity stewards, where the consent includes cryptographic identity packets. The cryptographic identity packets are combined to render the legal identity for the digital identity. Transaction data specifying the legal identity for the digital identity is supplied. The transaction data is recorded to a distributed ledger associated with at least a subset of the networked machines.
摘要:
An apparatus has a processor and a memory connected to the processor. The memory stores instructions executed by the processor to store identity attributes including real identity attributes for a real individual and a digital identity with digital identity data attributes operative as a personal privacy proxy for the real individual. Web site input forms are automatically filled alternately using the real identity attributes and the digital identity attributes.
摘要:
An apparatus includes a processor and a memory connected to the processor. The memory stores instructions executed by the processor to store identity attributes including real identity attributes for a real individual and a digital identity with digital identity data attributes operative as a personal privacy proxy for the real individual. A digital identity management system is hosted to communicate with digital identity applications that observe a common application program interface. Each digital identity application implements at least one digital network function for the digital identity.
摘要:
A machine has a processor and a memory connected to the processor. The memory stores instructions executed by the processor to collect synthetic identity activity information characterizing computer network activity associated with a synthetic identity. A synthetic identity reputation score is computed based upon a current synthetic identity reputation score, a synthetic identity activity value and an activity provider weighting.