摘要 |
<p>A service subscriber s personal details are protected from malicious attacks, e.g. by hackers . Real personal details of the user 10, e.g. an email address, password or credit-card number, are received from the service providerâ s system 100 over a network. Virtual personal details are generated based on the real personal details, preferably at a location 230 other than that of the service providerâ s system, and stored 120 on the service providerâ s system. The real personal details are encrypted and the encrypted details are stored 240 at a location other than that of the service provider. The real personal details are used in a transaction or operation, carried out by the service providerâ s system, at a location other than that of the service providerâ s system, e.g. to send email 130, 250 without the userâ s presence. In an embodiment, real personal details of a registered subscriber are used to regenerate virtual personal details for comparison with virtual details previously stored at the service provider. If the virtual details match then the subscriber is allowed access to the service.</p> |