| CPC H04L 63/0407 (2013.01) [G06F 11/2023 (2013.01); H04L 9/0819 (2013.01); H04L 63/0428 (2013.01); H04W 12/033 (2021.01); H04W 12/041 (2021.01); G06F 9/45533 (2013.01); G06F 2201/805 (2013.01); H04L 63/0272 (2013.01); H04L 63/0435 (2013.01); H04L 63/0442 (2013.01)] | 20 Claims |

|
1. A computer, comprising:
an interface circuit configured to communicate with a second computer;
memory configured to store program instructions; and
a processor, coupled to the interface circuit and the memory, configured to execute the program instructions, wherein, when executed by the processor, the program instructions cause the computer to perform operations comprising:
receiving, at the interface circuit, a verification query associated with the second computer, wherein the verification query comprises information specifying a verified persona, wherein an identity of an individual associated with the verified persona is anonymous to the second computer and is known to the computer based at least in part on a secure, virtual personal network (SVPN) that comprises the individual, and wherein the verified persona is associated with a distributed token;
confirming that the verified persona is valid based at least in part on the verification query;
providing, from the interface circuit, a verification response addressed to the second computer, wherein the verification response indicates whether the verified persona is valid, while keeping the identity of the individual associated with the verified persona anonymous to at least the second computer;
receiving, at the interface circuit, a request associated with the second computer, wherein the request indicates there is an emergency associated with the verified persona, or unwanted, potentially dangerous or possible criminal activity associated with the verified persona;
determining the identity of the individual based at least in part on the request; and
providing, from the interface circuit, a response addressed to the second computer, wherein the response specifies the identity of the individual, so that the individual is no longer anonymous to the second computer.
|