摘要 |
<p>A computer system (110) verifies a user (101) over a public data network (102) to a third party (103) by transferring information (214) about the user (101) that has been independently verified. The computer system (110) receives and processes an order from the user (101) to establish verified user information (214). The computer system (210) later receives a request from the user (101) identifying a selected portion of the verified user information (214). In response, the computer system (110) associates a token with the selected portion of the verified user information (214) and transfers the token to the user (101). The user (101) then transfers their token to the third party (103), and the computer system (110) receives the token from the third party (103). In response, the computer system (110) transfers the selected portion of the verified user information (214) to the third party (103). <IMAGE></p> |