WO2002049311A3 - Pseudonym credentialing system - Google Patents

Pseudonym credentialing system Download PDF

Info

Publication number
WO2002049311A3
WO2002049311A3 PCT/US2001/043927 US0143927W WO0249311A3 WO 2002049311 A3 WO2002049311 A3 WO 2002049311A3 US 0143927 W US0143927 W US 0143927W WO 0249311 A3 WO0249311 A3 WO 0249311A3
Authority
WO
WIPO (PCT)
Prior art keywords
pseudonym
clients
credentials
credentialing system
credentialing
Prior art date
Application number
PCT/US2001/043927
Other languages
French (fr)
Other versions
WO2002049311A2 (en
Inventor
Richard W Berenson
Original Assignee
Tritrust Com Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tritrust Com Inc filed Critical Tritrust Com Inc
Publication of WO2002049311A2 publication Critical patent/WO2002049311A2/en
Publication of WO2002049311A3 publication Critical patent/WO2002049311A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3218Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/42Anonymization, e.g. involving pseudonyms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/88Medical equipments
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data

Abstract

A Pseudonym Server provides credentials for pseudonyms to clients, which can then use those credentials in interactions with other clients. The credentials are based on proof of right to use a pseudonym, attestations, identity verifications, and/or aggregations. Communication between clients can be over a wide variety of media.
PCT/US2001/043927 2000-11-14 2001-11-14 Pseudonym credentialing system WO2002049311A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US71199900A 2000-11-14 2000-11-14
US09/711,999 2000-11-14

Publications (2)

Publication Number Publication Date
WO2002049311A2 WO2002049311A2 (en) 2002-06-20
WO2002049311A3 true WO2002049311A3 (en) 2003-01-03

Family

ID=24860370

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2001/043927 WO2002049311A2 (en) 2000-11-14 2001-11-14 Pseudonym credentialing system

Country Status (1)

Country Link
WO (1) WO2002049311A2 (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2541824A1 (en) * 2003-10-08 2005-04-14 Stephan J. Engberg Method and system for establishing a communication using privacy enhancing techniques
WO2006068998A1 (en) * 2004-12-20 2006-06-29 Rsa Security Inc. Consumer internet authentication service
GB2455099A (en) 2007-11-28 2009-06-03 Really Virtual Company Ltd Providing an anonymous interaction between a user and a service provider
WO2009098774A1 (en) * 2008-02-08 2009-08-13 Fujitsu Limited Transaction method and transaction system
US8976218B2 (en) 2011-06-27 2015-03-10 Google Technology Holdings LLC Apparatus for providing feedback on nonverbal cues of video conference participants
US9077848B2 (en) 2011-07-15 2015-07-07 Google Technology Holdings LLC Side channel for employing descriptive audio commentary about a video conference
WO2013181841A1 (en) 2012-06-08 2013-12-12 Nokia Corporation Privacy protection for participatory sensing system
US11824896B2 (en) * 2020-04-06 2023-11-21 Exonym GmbH Cross-service rulebook management in a dynamic and adversarial environment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5754938A (en) * 1994-11-29 1998-05-19 Herz; Frederick S. M. Pseudonymous server for system for customized electronic identification of desirable objects
US5798506A (en) * 1995-03-31 1998-08-25 Solaic Memory card and a method for making more reliable a request for access to an application
WO2000001108A2 (en) * 1998-06-30 2000-01-06 Privada, Inc. Bi-directional, anonymous electronic transactions

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5754938A (en) * 1994-11-29 1998-05-19 Herz; Frederick S. M. Pseudonymous server for system for customized electronic identification of desirable objects
US5798506A (en) * 1995-03-31 1998-08-25 Solaic Memory card and a method for making more reliable a request for access to an application
WO2000001108A2 (en) * 1998-06-30 2000-01-06 Privada, Inc. Bi-directional, anonymous electronic transactions

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
CHAUM D: "SHOWING CREDENTIALS WITHOUT IDENTIFICATION SIGNATURES TRANSFERRED BETWEEN UNCONDITIONALLY UNLINKABLE PSEUDONYMS", ADVANCES IN CRYPTOLOGY - ANNUAL INTERNATIONAL CRYPTOLOGY CONFERENCE, PROCEEDINGS, SPRINGER-VERLAG, XX, 1986, pages 241 - 244, XP002910114 *

Also Published As

Publication number Publication date
WO2002049311A2 (en) 2002-06-20

Similar Documents

Publication Publication Date Title
WO2005104446A3 (en) Presence-based management in a communication network
WO2006130615A3 (en) Secure login using single factor split key asymmetric cryptography and an augmenting factor
WO2003009561A3 (en) A system and method for supporting multiple certificate authorities on a mobile communication device
WO2006128481A3 (en) Method for auto-configuration of a network terminal address
GB0301159D0 (en) System and method for searching,finding and contacting dates on the internet in instant messaging networks and/or in other metods
CA2398783A1 (en) Network server
WO2003044643A3 (en) Systems, methods and devices for secure computing
WO2006075335A3 (en) Communications network system and methods for using same
WO2008111050A3 (en) A virtual identity system and method for web services
AU2003279439A1 (en) Identification of a terminal with a server
AU2003287649A1 (en) Method and apparatus to perform translation in a modular system comprising network nodes and a switching fabric
WO2001086439A3 (en) Event message endpoints in a distributed computing environment
GB2389497B (en) Network communication
WO2001072020A3 (en) Instant messaging with additional voice communication
WO2005070128A3 (en) Synchronous and asynchronous collaboration between heterogeneous applications
WO2007092035A3 (en) Anonymous communication system and method
WO2002051470A3 (en) Injection systems
WO2007001829A3 (en) Strengthening secure hash functions
WO2003058921A3 (en) Personal user agent
WO2006094899A8 (en) Method for transmitting data in a network of distributed stations, and network station
WO2005024559A3 (en) Universal application network architecture
GB2365729B (en) Protocols for anonymous electronic communication and double-blind transactions
WO2005084403A3 (en) Technique for maintaining secure network connections
WO2003012990A8 (en) Multicarrier modulation using frequency-domain equalizer and decision feedback
WO2005010682A3 (en) System and method for exchanging awareness information in a network environment

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): JP

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR

121 Ep: the epo has been informed by wipo that ep was designated in this application
122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP