An anonymous reporting system for use in reporting and following up on incidents, accidents, and the like. The system may be accessed via an Internet website. A reporting individual may select a type of incident to report. In one example, the reporting individual may select a level on anonymity and
An anonymous reporting system for use in reporting and following up on incidents, accidents, and the like. The system may be accessed via an Internet website. A reporting individual may select a type of incident to report. In one example, the reporting individual may select a level on anonymity and some, none or all of the individual's personal identification is displayed to the organization according to the selected level.
대표청구항▼
1. A computer implemented method of providing a reporting system for the exchange of confidential data between a reporting party and an organization, the method comprising: providing a report with a plurality of data fields configured for receiving confidential data input by a reporting party;receiv
1. A computer implemented method of providing a reporting system for the exchange of confidential data between a reporting party and an organization, the method comprising: providing a report with a plurality of data fields configured for receiving confidential data input by a reporting party;receiving the confidential data from the reporting party into the plurality of data fields;receiving a level of anonymity of the reporting party;associating the confidential data with the plurality of data fields in the report;storing the confidential data, the report and the level of anonymity in a database;providing a reporting party interface for the reporting party to retrieve and view the report, the reporting party interface comprising a graphical user interface for use with a browser on a computer connected to a network;providing an organization interface for the organization to retrieve and view the report, the organization interface comprising a graphical user interface for use with a browser on a computer connected to a network;displaying the report to the reporting party using the reporting party interface; anddisplaying the report to the organization using the organization interface, the report populated with confidential data based upon the level of anonymity;wherein at least one of the plurality of data fields is configured for receiving the level of anonymity of the reporting party;wherein the level of anonymity is chosen from a group consisting of remain completely anonymous, remain anonymous to organization, and do not care about anonymity; andwherein the level of anonymity of remains anonymous to organization comprises the reporting party providing personal identification information to an intermediary without providing the personal identification information to the organization. 2. The method of claim 1, wherein the plurality of data fields are configured for receiving information relating to an incident revealed by the reporting party. 3. The method of claim 1, wherein the personal identification information comprises a name of the reporting party and a phone number for the reporting party. 4. The method of claim 1, further comprising the reporting party selecting a level of anonymity, wherein the level of anonymity is chosen from a group consisting of remain completely anonymous, remain anonymous to organization and do not care about anonymity. 5. The method of claim 1, wherein the database is a relational database. 6. The method of claim 1, wherein the graphical user interface for use with a browser is a secure website having data encryption configured for encrypting confidential data transmitted over the network and the network is the Internet. 7. The method of claim 6, wherein the reporting party interface is a first portal and the organization interface is a second portal, the first portal having an interface configured to transmit and receive data between the reporting party and an intermediary and the second portal having an interface configured to transmit and receive data between the organization and the intermediary. 8. The method of claim 1, further comprising storing the associations between the plurality of data fields and the confidential data in the database. 9. A method for navigating a plurality of linked web pages on the Internet using a graphical user interface, the method comprising: accessing a first web page capable of being displayed on a browser of a computer; displaying the first web page, the first web page having embedded therein, a first plurality of data fields configured for receiving confidential incident data entered into a report,a second plurality of data fields configured for receiving confidential contact data relating to the reporting party,an anonymity data field configured for receiving a level of anonymity from the reporting party, wherein the level of anonymity includes selectable choices of a level of remain completely anonymous, a level of remain anonymous to organization, and a level of do not care about anonymity, wherein the level of remain anonymous to organization comprises the reporting party providing personal identification information to an intermediary without providing the personal identification information to the organization,a first plurality of graphical user interface controls configured for entering data into the first and second plurality of data fields and the anonymity data field, anda second plurality of graphical user controls configured for navigating from the first web page to a plurality of linked web pages,a database interface configured for receiving the confidential incident data in the first plurality of data fields, the confidential contact data in the second plurality of data fields and the level of anonymity in the anonymity data field and causing a storing operation of the confidential incident data, the confidential contact data, the level of anonymity and the report in a database;a control interface configured for both detecting user operation of the first plurality of graphical user interface controls by the reporting party and, in response, entering data into the first and second plurality of data fields and the anonymity data field and configured for detecting user operation of the second plurality of graphical user interface controls by the reporting party and, in response, navigating the plurality of linked web pages. 10. A graphical user interface for use with a browser on a computer connected to a network, the graphical user interface configured for facilitating the exchange of confidential information between a reporting party and an organization through an intermediary, the graphical user interface comprising: a web page capable of being displayed on the browser of the computer, the web page having embedded therein,a first plurality of data fields configured for receiving confidential incident data entered into a report,a second plurality of data fields configured for receiving confidential contact data relating to the reporting party,an anonymity data field configured for receiving a level of anonymity from the reporting party, wherein the level of anonymity includes at least selectable choices of remain completely anonymous and remain anonymous to organization, and wherein the level of remain anonymous to organization is adapted to provide personal identification information of the reporting party to the intermediary without providing said personal identification information to the organization,a first plurality of graphical user interface controls configured for entering data into the first and second plurality of data fields and the anonymity data field, anda second plurality of graphical user controls configured for navigating from the web page to a plurality of linked web pages,a database interface configured for receiving the confidential incident data in the first plurality of data fields, the confidential contact data in the second plurality of data fields and the level of anonymity in the anonymity data field and causing a storing operation of the confidential incident data, the confidential contact data, the level of anonymity and the report in a database; anda control interface configured for both detecting user operation of the first plurality of graphical user interface controls by the reporting party and, in response, entering data into the first and second plurality of data fields and the anonymity data field and configured for detecting user operation of the second plurality of graphical user interface controls by the reporting party and, in response, navigating the plurality of linked web pages. 11. The graphical user interface of claim 10, further comprising a display interface for detecting the level of anonymity from the reporting party and, in response, displaying a first portion of the confidential contact data to the organization. 12. The graphical user interface of claim 11, wherein the first portion of the confidential contact data is all of the confidential contact data for a level of do not care about anonymity. 13. The graphical user interface of claim 11, wherein the first portion of the confidential contact data is none of the confidential contact data for a level of remain completely anonymous. 14. The graphical user interface of claim 11, wherein the first portion of the confidential contact data is none of the confidential contact data for a level of remain anonymous to organization, wherein the confidential contact data is displayed to the intermediary. 15. The method of claim 1, wherein the personal identification information comprises a personal e-mail address for the reporting party.
Walker Jay S. ; Schneier Bruce ; Jorasch James A., Method and apparatus for a cryptographically-assisted commercial network system designed to facilitate and support exper.
Nordman,Ian; Alam��ki,Tero; V��nsk��,Marko; Tarkiainen,Mikko; Gyorb��r��,Norbert; Gripenberg,Casper, Method and apparatus for managing and enforcing user privacy.
Walker Jay S. ; Schneier Bruce ; Case T. Scott, Method and system for facilitating an employment search incorporating user-controlled anonymous communications.
Herz Frederick S. M. ; Eisner Jason M. ; Salganicoff Marcos, Pseudonymous server for system for customized electronic identification of desirable objects.
Mascarenhas,Desmond, System and method for anonymous transaction in a data network and classification of individuals without knowing their real identity.
Barnard Raymond F. (Endicott NY) Dohanich Stephen L. (North Potomac MD) Heinlein Philip D. (Binghamton NY), System for failure mode and effects analysis.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.