WO2001086373A2 - Protocoles d'assurance de protection de la confidentialité - Google Patents

Protocoles d'assurance de protection de la confidentialité Download PDF

Info

Publication number
WO2001086373A2
WO2001086373A2 PCT/IL2001/000411 IL0100411W WO0186373A2 WO 2001086373 A2 WO2001086373 A2 WO 2001086373A2 IL 0100411 W IL0100411 W IL 0100411W WO 0186373 A2 WO0186373 A2 WO 0186373A2
Authority
WO
WIPO (PCT)
Prior art keywords
virtual
data
quality
privacy
infrastructure
Prior art date
Application number
PCT/IL2001/000411
Other languages
English (en)
Other versions
WO2001086373A3 (fr
Inventor
Chaim Scheff
Original Assignee
First Global Ip, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by First Global Ip, Inc. filed Critical First Global Ip, Inc.
Priority to AU2001256625A priority Critical patent/AU2001256625A1/en
Publication of WO2001086373A2 publication Critical patent/WO2001086373A2/fr
Publication of WO2001086373A3 publication Critical patent/WO2001086373A3/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0272Virtual private networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0421Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/104Grouping of entities

Definitions

  • the present invention generally relates to command, control, and communications transaction processing methods, systems, and appurtenances. More specifically, the present invention relates to specific classes of electronic communications-infrastructure protocols that are useful for facilitating quasi-private information-type or business-type transactions.
  • Mapless-Networks substantially related to a new class of distributed asynchronous algorithms for dynamic data-communications channel allocation for wired, wireless, and mixed infrastructures.
  • the Mapless-Networks concept had not yet evolved to address numerous other issues, such as quality-of-privacy.
  • an extranet is a private network that uses the Internet protocols and the public telecommunication system to securely share part of a business's information or operations with outsiders; e.g. suppliers, vendors, partners, customers, or other businesses.
  • Netscape, Oracle, and Sun Microsystems are jointly standardizing on JavaScript and the Common Object Request Broker Architecture (CORBA) in order to facilitate mutual extranet implementation compatibility.
  • Microsoft is directing its extranet efforts to Point-to-Point Tunneling Protocol (PPTP) so that commercial credit transacting agencies can implement a standard for Open Buying on the Internet (OBI), and Lotus Corporation is promoting its own Group Ware product, Notes, for extranet use.
  • PPTP Point-to-Point Tunneling Protocol
  • OBI Open Buying on the Internet
  • Lotus Corporation is promoting its own Group Ware product, Notes, for extranet use.
  • an extranet requires special consideration of security and privacy issues. These considerations include special firewall server management, the issuance and use of digital certificates or similar means of user authentication, encryption of messages, and the use of virtual private networks (VPNs) that tunnel through the public network. Many of these security and privacy features are necessary because the extranet is a part of a company's intranet that is extended to users outside the company; and these external user are considered to be less trustworthy than internal users.
  • VPNs virtual private networks
  • the cooperative virtual topology of the extranet also is substantially enjoyed in the domain of wireless media; especially for personal information devices such as cellular telephones, wireless internet, and in experimental interactive multimedia projection apparatuses of internet II technologies. Nevertheless, designers of wireless personal data- communications devices, per se, do not generally appreciate this observation. Accordingly, an intermediate quality-of-privacy service policy has not been addressed by data-communications infrastructure facilitators for wireless personal devices.
  • the Virtual Quality-of-Privacy Assurance Protocol method of the present invention relates to a cost-benefit tradeoff between bandwidth efficient methods for utilizing a data-communications media and privacy protecting methods for transferring transactions over the media. While this aspect of the present invention may be of only passing technical interest for terrestrial network communications infrastructures, such as the Internet, this same aspect represents a novel utilization of scarce wireless bandwidth resources.
  • the Virtual Quality-of-Privacy Assurance Protocol method of the present invention relates to a class of asynchronous distributed transaction processes which electively propagate, numerous new forms of search transactions are directly facilitated; the preponderance of which are quality-of-privacy compliant.
  • Economic Issues The Virtual Quality-of-Privacy Assurance Protocol method of the present invention relates to two important classes of economic benefits. Firstly, for classical terrestrial data-communications networks, the present invention creates a new class of intermediate quality-of-privacy transactions which both allow new variations of mercantile intercourse and simultaneous preserve the global security of each participant from being disclosed. Secondly, for wireless and hybrid data-communications media utilization, the method of the present invention facilitates a potentially significant reduction in the associated rates and tariffs necessary for supporting these media.
  • the present invention generally relates to embodiments of A Virtual Quality-of-Privacy Assurance Protocol, for Multi-Distributed Database Networking, and to appurtenances useful therewith.
  • the present invention relates to A Virtual Quality-of-Privacy Assurance Protocol method (and to a system embodying this method), the method including the steps of: a) forming an ensemble of virtual circuits within a data-communications media's infrastructure; b) managing a transaction protocol between participants to at least one of the virtual circuits; and c) for any pair of mutually transacting participants over any virtual circuit of the ensemble of virtual circuits, maintaining substantial response-for-response parity for querying within at least one predetermined class of respectively maintained proprietary data.
  • a "data-communications media” generally relates to a media which supports multi-distributed database networking. More specifically, multi- distributed database networking is performed when the media supports a communications protocol for transferring a transaction between two address respectively associated portions of one or more databases within the media. For example, two telephones using respective interconnected service providers, two computer work-stations respective interconnected to a common internet or intranet or extranet, or two wireless communications devices interconnected using at least one common transmission frequency or using respective interconnected service providers' proximate base stations, or combinations of the aforesaid. So the media ultimately is the circuit or frequency that supports the transferring and also the active or passive facilitating interfaces and intrafaces associated therewith.
  • a data-communications media's "infrastructure” generally relates to specific aspects of the interfaces and intrafaces. For example, a frequency assignment table or algorithm, a switching circuit assigning table or algorithm, or a packet routing table or algorithm.
  • a "virtual circuit” relates to a specific static or dynamic configuration for an inter-related plurality of tables, algorithms, or mixtures thereof.
  • Each virtual circuit is essentially a conduit for broadcasting a transaction, a distance of one tier, to a t least one associate; or preferably to a plurality of associates.
  • quality-of-privacy relates, on one side, to an ability of a participant to disclose information to individual associates, and relates, on the other side, to a substantial inability of any participant to coherently aggregate enough disclosures (by the participant of the first side) to reveal important secrets of that party; such as personal life practices or proprietary business methods.
  • quality-of-privacy allows each first side participant to monitor and limit how much disclosure he conveys to any specific associate, and in addition quality-of-privacy substantially precludes any other participant from coherently aggregate the disclosures. Accordingly, the size of the ensemble must be sufficiently large to substantially preclude a clever participant from successfully correlating externally derived intelligence materials with dis-coherent aggregations of disclosure.
  • aspects of quality of privacy relate to using virtual circuits so as to preclude spurious breaches of transient disclosures, to using mutual transaction disclosing protocols between any two participants who accept conditions of bilateral association, and to preserving response-for- response parity between bilateral associates.
  • Preserving response-for-response parity prevents an associate to a bilateral relationship from unilaterally breaching the privacy of the other associate.
  • the preserving response-for- response parity may be on a temporal basis, such as not exceeding a predetermined disparity for transactions within the previous 30 days or the previous 500 operational cycles or the previous 5 randomly occurring spot-auditing events.
  • the preserving response-for-response parity may be on a half-life type basis formulation, in the same way that human associates tend to honor recent favors for recent favors more than they may honor calling up the repayment of an ancient favor.
  • the preserving response-for-response parity may be relaxed below some arbitrarily elected threshold by exchanging credits from one associate for credits to another associate, or by selling credits of some associate for cash or the likes.
  • the present invention furthermore relates to A Virtual Quality-of-Privacy Assurance Protocol currency economy including a) a virtual currency linked to substantially each two participant transaction of a predetermined Virtual Quality-of-Privacy Assurance Protocol; b) at least one virtual banking institution for managing accounts containing the virtual currency; c) at least one external auditing agent automated to preserve the currency's integrity for a preponderance of the participants and for substantially all of the institutions; and d) at least one central banking authority for administering exchange rates between the virtual currency and either nation-state recognized currencies or electronic- commerce facilitating information- value quantum.
  • the present invention also relates to numerous other embodiments and appurtenances for use therewith, including: a software Plug-in, a software Browser, and a trusted agency for use with a Virtual Quality-of-Privacy Assurance Protocol; articles of manufacture including a computer usable medium having computer readable program code embodied therein for use with A Virtual Quality-of-Privacy Assurance Protocol; and a program storage device readable by machine, tangibly embodying a program of instructions executable by the machine to perform method steps for A Virtual Quality-of- Privacy Assurance Protocol.
  • Figure 1 illustrates a schematic view of a data-communications media infrastructure
  • Figure 2 illustrates a schematic block diagram of the preferred virtual quality-of-privacy assurance protocol method
  • Figure 3-5 illustrate schematic block diagrams of further details of significant preferred sub-steps which may be applied to the preferred virtual quality-of-privacy assurance protocol method; as shown in figure 2;
  • Figure 6 illustrates a schematic view of a quality-of-privacy sensitive communication system
  • Figure 7 illustrates a schematic block diagram block diagram of a Virtual Quality-of- Privacy Assurance Protocol currency economy.
  • the present invention generally relates to A Virtual Quality-of-Privacy Assurance Protocol, for Multi-Distributed Database Networking, and appurtenances useful therewith.
  • FIG 1 a schematic illustration of a data-communications media infrastructure (101) supporting Multi-Distributed Database Networking transactions between a plurality of participants A-G (102-108).
  • Each participant maintains a database containing information with varying degrees of privacy associated with contents of the database, depending primarily on who is querying for that particular contents.
  • a first tier query transaction may proceed from participant A to his community of associates represented by G and B.
  • This first tier query may be transferred directly as respective bilateral queries between the participants or indirectly using the query propagation services of an external agency 109 who is mutually accessible to all of the participants. Should the first tier query fail to answer A's question, then A may further propagate the query to second tier participants; being all or some of the associates of both G and B.
  • G and B may have bilateral association or may have other common bilateral associates such as E, it will become difficult for A to recognize that certain types of redundancies in the aggregated reporting of the results of his propagated query.
  • a higher order tier query from one participant will substantially reach every other participant.
  • the degree of anonymity, of the sources of aggregated results increases with higher order tier queries, especially when using at least one external agency for propagating and aggregating results.
  • the present invention furthermore relates to a protocol and a method for transferring information between multiple levels of groups of users, wherein some users provide information directly to the seeker, or themselves respectively seek information on the seeker's behalf, in exchange for corresponding treatment by other users.
  • a key element of the invention is that the privacy and anonymity of the seeker, provider and transferor of the information is substantially maintained or otherwise preserved, such as by a mutual accounting of parity between cooperating participants on a bilateral basis.
  • Information has always been a valuable commodity. There is a well-established business in providing information. Some examples are: all people in a certain trade, all people in a certain geographic locality, or all people who purchased a certain commodity.
  • the present invention relates to a substantially automated method for conducting a common interpersonal activity, an inter-corporate activity, an inter-organizational activity, or an information sharing activity between disparate parties.
  • the common activity is the inquiring about and passing on of information of various sorts between individuals who interact with one another at varying degrees of familiarity.
  • this activity is done by people directly communicating with one another, the parties take into account, either knowingly or subconsciously, the need for privacy, business secrecy, and/or anonymity.
  • the present invention generally relates to a protocol method whereby participants can give and receive information, which would otherwise be withheld.
  • the invention teaches a program designed to let users exchange information, after selecting parameters or filters limiting the type and amount of information exchanged or shared with other members of the program.
  • One of the accountants may be in need of the name of a good tax lawyer, who can provide assistance in an investigation.
  • the seeker wants to know the name of a good tax attorney, but does not want others to know of the investigation. Similarly, others are prepared to provide him with the referral that is needed, but only on condition of anonymity.
  • a further level of anonymity can be offered if the provided information is only given to the seeker where the inquiry results in other responses.
  • the protocol would not reveal the name of any tax attorney, unless at least a certain predetermined minimal number, say four, tax attorneys were named. Thus any of the four or more providers of the name of their tax attorney, would feel shielded with this anonymity.
  • a still further level of anonymity can be offered if the provided information is only given to the seeker where the inquiry results in a minimal number of identical responses, e.g. Attorney John Doe is mentioned three times. Thus the providers of the name of this particular tax attorney would have a higher level of anonymity. The responses that did not meet this threshold would not be revealed.
  • users be they seekers of providers or transferors of requests and replies for information are described as having the ability to choose numerical value metrics to determine if the particular user in question is giving up too much information or too much privacy.
  • values are assigned to the information sought and provided, much like monetary values assigned to goods and services in the market place.
  • the values can be monetary in value, or they can be merely indicative of how much information any particular user has received from or provided to other users. Where the values are monetary, a normal cost-benefit approach will determine how much each user will participate. Where the values are relative to use of the system in either direction, a credit balance will permit further use, while a debit balance will restrict further use.
  • the invention is used as a means to connect users together, for the exchange of goods or services.
  • This embodiment provides a means for maximizing contacts in a geographically limited area. It should be noted that the trend to Internet marketing does just the opposite. Internet marketing has successfully matched two parties to a transaction, without regard to the geographic distance separating them.
  • This embodiment of the invention enables connection to be made between users of a similar geographic area, and takes advantage of the fact that not all parties to a transaction were seeking the transaction before it was consummated.
  • This embodiment is particularly suited, though not limited to, mobile personal communication devices; such as those in broad use today.
  • the user would communicate his offer through his personal communication device. He would reach all other members of the program within a certain geographic distance. If that area brought no purchaser for his tickets, the program would automatically seek out a customer in the next farther geographic area.
  • users could seek and offer ride sharing by being able to, on the one hand limit their offer to a relatively small geographic area, and on the other hand expand their offer to users who are not personally acquainted with each other.
  • the present invention generally relates to a protocol and a method for transferring information between multiple levels of groups of users, wherein some users provide information directly to the seeker, or themselves seek information on the seeker's behalf, in exchange for corresponding treatment by other users.
  • a key element of the invention is that the privacy and anonymity of the seeker, provider and transferor of the information is substantially maintained or otherwise preserved, such as by a mutual accounting of parity between cooperating participants.
  • Information has always been a valuable commodity. There is a well-established business in providing information. Some examples are: all people in a certain trade, all people in a certain geographic locality, or all people who purchased a certain commodity.
  • the present invention relates to a substantially automated method for conducting a common interpersonal activity, an inter-corporate activity, an inter-organizational activity, or an information sharing activity between disparate parties.
  • the common activity is the inquiring about and passing on of information of various sorts between individuals who interact with one another at varying degrees of familiarity.
  • this activity is done by people directly communicating with one another, the parties take into account, either knowingly or subconsciously, the need for privacy, business secrecy, and/or anonymity.
  • the present invention generally relates to a protocol method whereby participants can give and receive information, which would otherwise be withheld.
  • the invention teaches a program designed to let users exchange information, after selecting parameters or filters limiting the type and amount of information exchanged or shared with other members of the program.
  • One of the accountants may be in need of the name of a good tax lawyer, who can provide assistance in an investigation.
  • the seeker wants to know the name of a good tax attorney, but does not want others to know of the investigation. Similarly, others are prepared to provide him with the referral that is needed, but only on condition of anonymity.
  • a further level of anonymity can be offered if the provided information is only given to the seeker where the inquiry results in other responses.
  • the protocol would not reveal the name of any tax attorney, unless at least a certain predetermined minimal number, say four, tax attorneys were named. Thus any of the four or more providers of the name of their tax attorney, would feel shielded with this anonymity.
  • a still further level of anonymity can be offered if the provided information is only given to the seeker where the inquiry results in a minimal number of identical responses, e.g. Attorney John Doe is mentioned three times. Thus the providers of the name of this particular tax attorney would have a higher level of anonymity. The responses that did not meet this threshold would not be revealed.
  • values are assigned to the information sought and provided, much like monetary values assigned to goods and services in the market place.
  • the values can be monetary in value, or they can be merely indicative of how much information any particular user has received from or provided to other users.
  • a normal cost-benefit approach will determine how much each user will participate.
  • a credit balance will permit further use, while a debit balance will restrict further use.
  • the invention is used as a means to connect users together, for the exchange of goods or services.
  • This embodiment provides a means for maximizing contacts in a geographically limited area. It should be noted that the trend to Internet marketing does just the opposite. Internet marketing has successfully matched two parties to a transaction, without regard to the geographic distance separating them.
  • This embodiment of the invention enables connection to be made between users of a similar geographic area, and takes advantage of the fact that not all parties to a transaction were seeking the transaction before it was consummated.
  • This embodiment is particularly suited, though not limited to, mobile personal communication devices in broad use today.
  • the user would communicate his offer through his personal communication device. He would reach all other members of the program within a certain geographic distance. If that area brought no purchaser for his tickets, the program would automatically seek out a customer in the next farther geographic area.
  • users could seek and offer ride sharing by being able to, on the one hand limit their offer to a relatively small geographic area, and on the other hand expand their offer to users who are not personally acquainted with each other.
  • the present invention also generally relates to a group of participants connected by a common data or communications media, with each participant interacting directly only with a portion of the group, or with a community, and with each participant maintaining a list or database indicating how that participant interacts with his community.
  • the relationships between the various participants include varying degrees of trust and cooperation.
  • Embodiments of the present invention create mechanisms which allows a participant to ask his associates (members of his personally defined community) a question which he himself may not be able to answer, or where he wants a more specific or directed answer than would be available through other (e.g. public) channels.
  • the question may be directed to the entire community or to a predetermined subset of the community.
  • the answers are given anonymously to a secured mechanism, where they are pooled together and presented collectively to the party who asked the question, or are transferred using collateral agreements between the participants so as to maintain privacy of the source or to facilitate information sharing reciprocity between a predetermined pairing or plurality of participants.
  • a minimum number of answers may be required for the collection of answers to be revealed.
  • each member compiles a list of associates.
  • One's direct associates are labeled first tier friends.
  • a second tier source is friend of a friend, and by extension a further tier source is at least one further tier therefrom.
  • the measurement of tier source distance should be according to least distance, such a friend who is both a first tier friend and a third tier friend should be considered as a first tier friend only.
  • most transactions responses are aggregated and returned anonymously, reporting ambiguities and anomalies are possible.
  • the other member When an inter-friend establishment request is made, the other member is contacted for approval which may be granted or denied. The other member becomes a friend only if he grants the approval.
  • Periodically as new members join the community of first tier friends, one is encouraged to review the lists of new second tier friend members and make requests for direct reciprocal ties; when relevant.
  • broader sub-communities based on common ground such as membership in professional organizations or members' alma maters, exist, and each member may elect to join any of the sub-communities.
  • a profiles is maintained by and for each member, which includes organizational or personal profile information such as cooperate service and service rate structure or personal birth date, address, and electronic mail address, or a list of the member's friends or the sub-communities to which the member belongs.
  • the member may store additional information in his profiles, such as an address book, or a list of professional consultants or favorite restaurants. Members cannot access each others' profiles or personal directories or proprietary data banks directly. However, in the event that a member is seeking a recommendation, he may generate an automated query that goes to his first tier "friends"; his associates. The associates' profiles are then queried and the responses are returned under collateral privacy agreement or are stored anonymously in a designated trusted third party site. If at least a predetermined quantum such as 10 answers were received, the contents of the site are then forwarded to the member. If, however, fewer than 10 answers quantum were received, the member who originated the query receives an error message indicating that not enough data was given.
  • a predetermined quantum such as 10 answers were received
  • the associates to whom the query is directed may include a predetermined minimum quantum or all of one's associates, their respective propagation of the query to further tier friends, other members in the various sub-communities to which one belongs, or a smaller designated group from among them, such as the friends who also belong to the alma mater group.
  • the associates to whom the query was directed did not have the information requested.
  • the mechanism may be set to discard identical responses, and there was extensive overlap between the responses which were received.
  • the associates to whom the query was directed did not wish to share the information requested.
  • the query may be redirected by the first tier friends to second tier friends or beyond, or, where appropriate, to the friends of the members of one's common interest groups. For example, someone looking for a recommendation of a doctor in a given city may address her query to her friends. However, as none of her friends live in or near the given city, none can provide her with information.
  • the second reason why the number of responses may appear insufficient is that the secured mechanism, which accepts the responses, automatically may discard duplicate responses.
  • various systems for considering duplicate responses may be implemented according to the preferred system. The results may be misleading in any case, since the originator of the query does not know the origin of any given response, and the prominence of the response in the responder's overall profile, list, or database.
  • a recommendation for a professional for example, there may be 25 responders who have consulted with professional A once each, and another responder who consulted with professional B (in the same profession) 100 times, and continues to do so on an ongoing basis.
  • the issue is perhaps more pronounced when the community comprises not individuals, but businesses or companies, and the recommendation is also for a company or a service of some kind.
  • 14 may be for the same company, but all 14 together may give that company an annual volume of business amounting to a given sum.
  • the 15 th recommendation may be the only one for another company, but the volume of business between the responder and the company may far exceed the total of the other 14 responders. Since the originator of the question does not receive this information, and from the answers he cannot guess which responder gave which answer, he remains no better informed than if he had simply received the two recommendations. Hence, an alternative mechanism may sort the results by popularity without disclosing an actual vote count.
  • listing each answer only once, giving no weight to the number of times it was given is the preferred way to gather answers from a quality of privacy standpoint albeit not necessarily from a practicability standpoint.
  • This system may also be misleading, as the originator of the question cannot know the number of times that each response was given.
  • the originator of the query is aware that he is receiving limited information and must consider it as such.
  • members may place various restrictions, or filters, on the queries they receive and answer.
  • Members may, for example, limit the type of questions that they will accept.
  • a company may accept questions requesting information about suppliers, but not about financial information or volume of transactions, even if it pertains to the suppliers.
  • a doctor's office may accept questions about professional affiliations and types of treatments available, but not about patients or the number of times any given treatment has been performed.
  • Another type of filter may limit the questions originating from certain sources or block them altogether, but allow complete disclosure to other sources, depending on the member's relationship with the sources of the questions. A simple example of such a filter would be to limit queries to "first tier" queries.
  • filters may be symmetric or asymmetric. In other words, if one is unwilling to provide certain information to a certain party, he may or may not be able to receive similar information from that party, depending on the filter system that the other party has set. For instance, a company which refuses queries from its associates regarding suppliers in a certain country may be blocked from receiving similar information from their respective associates.
  • a debit or credit system may be established, and various types of queries may be "priced" differently.
  • a request for a recommendation for a school may "cost" 2 units, whereas a request for information about business contacts may "cost" 10 units.
  • Various members of the community may then place different values on different queries, depending on the information requested and the source of the request.
  • Members may also reach agreements regarding a maximum allowable debt between them. Two members may agree, for instance, that the maximum allowable debt between them is 50 units, knowing the tariff schedule for various queries. By placing a maximum on the allowable debt, each party has protected itself from excessive unilateral exposure.
  • the debit system is automatic, since members cannot know where the query results originated. Thus, it is the system itself which blocks the query according to predetermined criteria, and the party originating the query cannot even know which associates blocked his query.
  • Another currency system which may be used to limit members' access to each others' information is a "coupon" system which includes an expiration for query rights earned by a member.
  • Each query that a member answers entitles that member to request similar information from the associate that originated the query.
  • the right to request the specified information may be limited to a given time frame. For example, a company with a new project in the Los Angeles metropolitan may send 30 queries its associates over a span of six months, thereby giving each associate who provides an answer the right to request similar information.
  • Each request right is limited to 90 days from the original query. Thus, at the end of nine months, the company knows that it has no outstanding query debts.
  • a third way in which queries can be translated into currency is to place a value on transactions or sales not related to the query, where the earned amount can then be used to "purchase" information (in the form of queries).
  • the purchase (or sale) of an item entitles the purchaser (or seller) to query rights.
  • a wholesaler may agree to disclose certain types of information to a customer who purchases a specified amount annually.
  • queries may exist.
  • One other type of query is a request for a transaction referral.
  • the requester does not ask for a information regarding a job or service, whether it can be performed, or who can perform it. Instead, this type of query assumes that a job can be performed or a service can be given and requests this service.
  • a company wishing to purchase a large quantity of a given item within a certain (short) time frame may query 15 of its suppliers regarding the available quantity of the item. The query indicates that none has the complete quantity, but at least 6 suppliers exist with at least 15% of the desired quantity.
  • the company may place an "order query.” In other words, the company directs a query to its suppliers requesting a quantity equaling 15% of the total desired quantity to be shipped immediately. The company places the orders with trusted suppliers, without knowing specifically where the orders have been placed. In this manner, at least 90% of the desired quantity may be obtained quickly. (It is possible that a larger quantity will arrive, depending on how many of the suppliers were able to fill the order.)
  • a purchase sale may be divided among several agents. For example, someone wishing to buy or sell a large quantity of stock may wish to divide the sale among several brokers to make it less conspicuous. The seller may send out a transaction referral query to multiple brokers with whom he deals, requesting the sale of some portion of the stock. Each of the brokers would then sell that portion accordingly, without knowing directly that the larger quantity was being sold.
  • This query system provides a means for users of a common medium to access and give information and services to other users, while still placing restrictions on the types and quantity of information that can be viewed and who is allowed to view the information.
  • the privacy of individual users is also protected, while still allowing these users to disclose some amount of information.
  • the company can supply information and services, but do so anonymously and place various restrictions for different users.
  • a simple extranet doe not give this anonymity, and some companies are therefore more limited in what they can make available through an extranet.
  • a system that offers anonymity and varying restrictions however, more information can sometimes be disclosed when it is desirable.
  • individual members of a community with a common means of communication such as an intranet, an Internet community, or a wired or wireless connection
  • This system allows these members to automatically request and supply information in varying degrees from and to other members, while maintaining privacy and anonymity.
  • the system may thus be used to obtain recommendations for anything from an ethnic restaurant to a medical specialist.
  • the requester does not know the source of the recommendation, but he knows that it is from someone whom he trusts to some degree either personally or professionally.
  • the system may be used to request a service. For instance, in a community linked by hand-held communication devices (such as cellular telephones which are also wireless two-way radios and include a chip containing information), an individual may receive a query requesting that the nearest doctor be paged to the site of a local medical emergency. The request is then passed to the community, and doctors are paged to the site. The query results do not indicate the identity of the doctors or any other information about them. The result of the query is simply to page the doctor, and to indicate how many doctors were paged.
  • hand-held communication devices such as cellular telephones which are also wireless two-way radios and include a chip containing information
  • the dispatching system may receive a request for a maintenance engineer.
  • the dispatching system automatically pages the engineers, and those within range of the problem respond.
  • the system does not reveal to the requester the identity of the responding engineers. Instead, it indicates only that the problem will be addressed.
  • the system thus protects the privacy and anonymity of the responder, while providing information or a service to the requester.
  • FIG. 2 is a block diagram presenting the most significant categorical steps of this method, and figures 3-5 present further details of significant preferred sub-steps which may be applied therein.
  • This method (200) includes the steps of: a) forming (201) an ensemble of virtual circuits within a data-communications media's infrastructure; b) managing (202) a transaction protocol between participants to at least one of the virtual circuits; and c) for any pair of mutually transacting participants over any virtual circuit of the ensemble of virtual circuits, maintaining (203) substantial response-for-response parity for querying within at least one predetermined class of respectively maintained proprietary data.
  • a proof for Quality-of-Privacy Assurance may be constructed by considering a worst case scenario.
  • a competitor desires to disclose the business methods of a successful establishment.
  • the competitor may have direct business contact with this establishment and also with numerous associates of this establishment.
  • the competitor In order for the competitor to breach the privacy of the establishment to a degree that the business methods will be disclosed, the competitor must substantially trade information with the establishment and the establishment's associates.
  • the information that the competitor will need to reveal must be of sufficient interest for the establishment and the establishment's associates to unilaterally query the competitor; otherwise no substantially response-for-response parity can exist.
  • the competitor must be larger, in an information quanta evaluation sense, than the aggregate of the establishment and the establishment's associates the establishment and the establishment's associates. It is excessively unlikely that the gigantic competitor will be willing to reveal its entire proprietary information archive in order to perhaps discover some secret of a comparatively infinitesimal establishment.
  • This dis-proportionality is so large that introduction of controlled relaxation of the basic bilateral response-for-response parity metrics will not substantially improve a competitor's ability to breach the secrecy of a target establishment.
  • This relaxation may include exchanging metrics for money or allowing metrics to accumulate or to be traded or the like.
  • the Quality-of-Privacy for that establishment remains Assured.
  • forming (201) an ensemble of virtual circuits within a data-communications media's infrastructure includes: a) substantially each participant of a plurality of participants agreeing (301) with at least one other participant of the plurality of participants to the establishment of a mutual virtual circuit data-communications conduit facility in the infrastructure; b) accessing (302) or establishing (303) of at least one mutual virtual circuit data- communications conduit facility in the infrastructure; and c) each of the agreeing participants respectively adding (304) a tuple to a private databank of mutually agreeing participants, wherein the tuple provides a record of predetermined communications enabling particulars of the at least one other participant and of accessing a mutual virtual circuit of the at least one mutual virtual circuit data-communications conduit facility.
  • agreeing (301) includes negotiating (305) via a mutually trusted participant.
  • forming (201) an ensemble of virtual circuits within a data- communications media's infrastructure includes specifying (306A) a terrestrial network or subset thereof as the data-communications media's infrastructure.
  • a terrestrial network is a wide area network or a telephone system, or a cable-based communications system or a community of wireless base stations or the like or a mutual service mixture of any combination of the aforesaid.
  • forming (201) an ensemble of virtual circuits within a data- communications media's infrastructure includes specifying (306B) a predetermined Internet or a subset thereof as the data-communications media's infrastructure.
  • forming (201) an ensemble of virtual circuits within a data- communications media's infrastructure includes specifying (306C) at least one wireless data- communications service provider or a subset thereof as the data-communications media's infrastructure.
  • forming (201) an ensemble of virtual circuits within a data- communications media's infrastructure includes specifying (306D) at least one intermediary base station or a subset thereof as requisite to the data-communications media's infrastructure. Furthermore, according to an aspect of the Virtual Quality-of-Privacy Assurance Protocol method of the present invention, forming (201) an ensemble of virtual circuits within a data- communications media's infrastructure includes specifying (306F) at least one transmission frequency and at least one reception frequency as requisite to the data-communications media's infrastructure.
  • forming (201) an ensemble of virtual circuits within a data-communications media's infrastructure includes specifying (306G) at least one encryption standard as requisite to the data-communications media's infrastructure.
  • forming (201) an ensemble of virtual circuits within a data-communications media's infrastructure includes specifying (306H) a terrestrial telephone end user identification as requisite to the data-communications media's infrastructure.
  • forming (201) an ensemble of virtual circuits within a data-communications media's infrastructure includes verifying (3061) a referral from one participant to another participant of a third participant.
  • managing (202) a transaction protocol between participants to at least one of the virtual circuits includes using (401) an extranet.
  • managing (202) a transaction protocol between participants to at least one of the virtual circuits includes, for a query that originated at a first participant, an intermediary participant propagating (402A) the query to at least one other participant who is associated with the intermediary participant.
  • managing (202) a transaction protocol between participants to at least one of the virtual circuits includes, for a query that originated at a first participant, using a central data-communications emulation repository to bypass an intermediary participant while simultaneously propagating (402B) the query to at least one other participant who is associated with the intermediary participant.
  • maintaining (203) substantial response-for-response parity for querying within at least one predetermined class of respectively maintained proprietary data includes defining (503) at least one discrete or fuzzy data category.
  • maintaining (203) substantial response-for-response parity for querying within at least one predetermined class of respectively maintained proprietary data includes, to a trusted external participant, at least one participant of a pair of mutually transacting participants reporting (504) a parity-metric of transaction weight or volume for transactions between the pair.
  • maintaining (203) substantial response-for-response parity for querying within at least one predetermined class of respectively maintained proprietary data includes a trusted external participant finding (505) a set of known intermediary participants that are common to a plurality of two-or-more mutually transacting participants.
  • managing (202) a transaction protocol between participants to at least one of the virtual circuits includes docketing (406) the transaction using a transaction-type specific continuation of transaction-events schedule and, thereafter according to the docketing, sending (407) alerts or alarms or reports, to at least one party to the transaction, according to predetermined messaging recipients specified substantially at the time of docketing or to subsequently designated proxy recipients specified thereafter.
  • managing (202) a transaction protocol between participants to at least one of the virtual circuits includes, automatically propagating (408) a query to a predetermined tier of participant association.
  • the present invention also relates to A quality-of-privacy sensitive communication system; schematically illustrated in figure 6.
  • the system (600) includes: a) an ensemble of virtual circuits (601) located within a data-communications media's infrastructure (602); b) first software (603A-603E) substantially resident at each data-communications terminal interface of a plurality of participants with the media's infrastructure, wherein the software conforms any elected transaction a predetermined class of transactions into a predetermined Virtual Quality-of-Privacy Assurance protocol (such as is illustrated in figure 2) between the respective participants and an at least one of the virtual circuit of the ensemble; and c) linked to the first software, second software (604) wherein for any pair of mutually transacting participants over any virtual circuit of the ensemble of virtual circuits, the second software maintains substantial response-for-response parity for query-type transactions within at least one predetermined class of respectively maintained proprietary data.
  • the second software (604A-604C) is resident proximate to the first software.
  • the second software is resident in at least one server (605) of the data- communications media's infrastructure.
  • the second software (604E) is resident in at least one base station (606 A, 606B) of a wireless interface to the data-communications media's infrastructure.
  • the second software is resident in at least one base station of a wireless interface (604D) to a participant's data-communications terminal interface.
  • the present invention furthermore relates to A quality-of-privacy sensitive communication system; A Virtual Quality-of-Privacy Assurance Protocol currency economy, illustrated in figure 7.
  • the economy (700) of the present invention includes: a) a virtual currency (701) linked to substantially each two participant transaction of a predetermined Virtual Quality-of-Privacy Assurance Protocol (702), such as is illustrated in figure 2; b) at least one virtual banking institution (703) for managing accounts containing the virtual currency; c) at least one external auditing agent (703 A, 703B) automated to preserve the currency's integrity for a preponderance of the participants and for substantially all of the institutions; and d) at least one central banking authority (704) for administering exchange rates between the virtual currency and either nation-state recognized currencies or electronic-commerce facilitating information- value quantum.
  • the preferred embodiment of the Virtual Quality-of-Privacy Assurance Protocol currency economy furthermore includes at least one electronic-commerce facilitating information-value virtual-quantum (705) debit or credit selected from the list: a Virtual Quality-of-Privacy Assurance Protocol compatible currency, a Virtual Quality-of-Privacy Assurance Protocol compatible coupon, a Virtual Quality-of-Privacy Assurance Protocol compatible check, a Virtual Quality-of-Privacy Assurance Protocol compatible bond, a Virtual Quality-of-Privacy Assurance Protocol compatible stock, a Virtual Quality-of-Privacy Assurance Protocol compatible promissory note, a Virtual Quality-of-Privacy Assurance Protocol compatible receipt, a Virtual Quality-of-Privacy Assurance Protocol compatible certificate, or the like.
  • a Virtual Quality-of-Privacy Assurance Protocol compatible currency a Virtual Quality-of-Privacy Assurance Protocol compatible coupon, a Virtual Quality-of-Privacy Assurance Protocol compatible check, a Virtual Quality-of-Privacy Assurance Protocol compatible bond, a Virtual Quality-of
  • the present invention substantially furthermore relates to A Virtual Quality-of- Privacy Assurance Protocol software Plug-in (710) for transferring, from a source in a data- communications media's infrastructure to a participant to a quality of privacy sensitive communications system (such as is illustrated in figure 6), at least one operational thread or kernel of first software substantially resident at a data-communications terminal interface of a participants with the media's infrastructure, wherein the software conforms any elected transaction a predetermined class of transactions into a predetermined Virtual Quality-of- Privacy Assurance protocol between the participant and an at least one virtual circuit of the infrastructure.
  • a Virtual Quality-of- Privacy Assurance Protocol software Plug-in 710) for transferring, from a source in a data- communications media's infrastructure to a participant to a quality of privacy sensitive communications system (such as is illustrated in figure 6), at least one operational thread or kernel of first software substantially resident at a data-communications terminal interface of a participants with the media's infrastructure, wherein the software conforms any elected transaction a predetermined class of transactions into a predetermined Virtual Quality
  • the present invention also substantially relates to A Virtual Quality-of-Privacy Assurance Protocol software Browser (720) for transferring queries or respective responses, between on a far side either a source in a data-communications media's infrastructure or at least one designated participant associated there with and on a near side a participant to a quality of privacy sensitive communications system (such as is illustrated in figure 6), at least one operational thread or kernel of first software substantially resident at a data-communications terminal interface of a participants with the media's infrastructure, wherein the software conforms any elected transaction a predetermined class of transactions into a predetermined Virtual Quality-of-Privacy Assurance protocol between the participant and an at least one virtual circuit of the infrastructure.
  • a Virtual Quality-of-Privacy Assurance Protocol software Browser 720 for transferring queries or respective responses, between on a far side either a source in a data-communications media's infrastructure or at least one designated participant associated there with and on a near side a participant to a quality of privacy sensitive communications system (such as is illustrated in figure 6), at least one
  • the present invention relates to A trusted agency for use with a Virtual Quality-of-Privacy Assurance Protocol
  • the trusted agency includes software (730) for use by at least one external auditing agent automated to preserve integrity of currency in a Virtual Quality-of-Privacy Assurance Protocol currency economy (such as is illustrated in figure 7), and the software is resident in a data-communications media's infrastructure having a quality-of-privacy sensitive communication system (such as is illustrated in figure 6) associated therewith.
  • the present invention relates to an article of manufacture (740) including a computer usable medium having computer readable program code embodied therein for use with A Virtual Quality-of-Privacy Assurance Protocol, the computer readable program code in the article of manufacture including: computer readable program code for causing a computer to form at least one virtual circuits of an ensemble of virtual circuits, and a preponderance of the virtual circuits are within a data-communications media's infrastructure.
  • the computer usable medium having computer readable program code embodied therein for use with A Virtual Quality-of-Privacy Assurance Protocol, is integral to a private base station that manages wireless communications with on one side at least one personal communications device and on the other side a data-communications media's infrastructure which has associated therewith - at least one other private base station or at least one public-service-provider base station or at least one data-communications conduit to a wide area network or at least one data-communications conduit to a local area network or at least one data-communications conduit to a public-service-provider telephone network.
  • An article of manufacture including a computer usable medium having computer readable program code embodied therein for use with A Virtual Quality-of-Privacy Assurance Protocol, the computer readable program code in the article of manufacture including: computer readable program code for causing a computer to manage a transaction protocol between at least two participants associated with a data-communications transmission over at least one of the virtual circuit of an ensemble of virtual circuits, and a preponderance of the virtual circuits are within a data-communications media's infrastructure.
  • the present invention likewise relates to An article of manufacture (770) including a computer usable medium having computer readable program code embodied therein for use with A Virtual Quality-of-Privacy Assurance Protocol, the computer readable program code in the article of manufacture including: computer readable program code for causing a computer to maintain substantial response-for-response parity, for querying within at least one predetermined class of respectively maintained proprietary data, for at least one pair of mutually transacting participants over at least one virtual circuit of the ensemble of virtual circuits, and a preponderance of the ensemble of virtual circuits are within a data- communications media's infrastructure.
  • the present invention also relates to A program storage device (780) readable by machine, tangibly embodying a program of instructions executable by the machine to perform method steps for A Virtual Quality-of-Privacy Assurance Protocol, the method steps including: a) forming an ensemble of virtual circuits within a data-communications media's infrastructure; b) managing a transaction protocol between participants to at least one of the virtual circuits; and c) for any pair of mutually transacting participants over any virtual circuit of the ensemble of virtual circuits, maintaining substantial response-for-response parity for querying within at least one predetermined class of respectively maintained proprietary data.
  • each facet of the preferred embodiment is, in and of itself, a top-down specification for at least one implementation, such as those that are referred to in the General Description of the Invention section.

Abstract

L'invention concerne un protocole virtuel d'assurance de protection de la confidentialité pour une interconnexion de bases de données à répartition multiple ainsi que des dispositifs associés à ce protocole. L'assurance comprend un procédé et un système permettant de réaliser ce procédé. Ce procédé consiste : à créer un ensemble de circuits virtuels dans une infrastructure de supports de transmission de données; à gérer un protocole de transaction entre des participants à au moins un des circuits virtuels; et, pour chaque paire de participants effectuant des transactions sur un des circuits de l'ensemble de circuits virtuels, à sensiblement maintenir une parité réponse-réponse afin d'interroger au moins une classe prédéterminée de données de propriétaire maintenue respectivement. L'invention concerne également une économie monétaire associée à ce protocole d'assurance de protection de la confidentialité. Le mode de réalisation préféré concerne des dispositifs sans fil, constituant des parties du protocole et destinés à être utilisés avec des dispositifs de communication portables ou avec des stations de base publiques ou privées associées à ces dispositifs.
PCT/IL2001/000411 2000-05-11 2001-05-10 Protocoles d'assurance de protection de la confidentialité WO2001086373A2 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2001256625A AU2001256625A1 (en) 2001-05-10 2001-05-10 A quality-of-privacy assurance protocol

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IL136077 2000-05-11
IL13607700A IL136077A0 (en) 2000-05-11 2000-05-11 A virtual quality-of-privacy assurance protocol, for multi-distributed database networking, and appurtenances useful therewith

Publications (2)

Publication Number Publication Date
WO2001086373A2 true WO2001086373A2 (fr) 2001-11-15
WO2001086373A3 WO2001086373A3 (fr) 2002-03-28

Family

ID=11074117

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IL2001/000411 WO2001086373A2 (fr) 2000-05-11 2001-05-10 Protocoles d'assurance de protection de la confidentialité

Country Status (2)

Country Link
IL (1) IL136077A0 (fr)
WO (1) WO2001086373A2 (fr)

Cited By (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9794074B2 (en) 2016-02-04 2017-10-17 Nasdaq Technology Ab Systems and methods for storing and sharing transactional data using distributed computing systems
US9892460B1 (en) 2013-06-28 2018-02-13 Winklevoss Ip, Llc Systems, methods, and program products for operating exchange traded products holding digital math-based assets
US10068228B1 (en) 2013-06-28 2018-09-04 Winklevoss Ip, Llc Systems and methods for storing digital math-based assets using a secure portal
US10097356B2 (en) 2015-07-02 2018-10-09 Nasdaq, Inc. Systems and methods of secure provenance for distributed transaction databases
US10108812B2 (en) 2016-01-28 2018-10-23 Nasdaq, Inc. Systems and methods for securing and disseminating time sensitive information using a blockchain
US10269009B1 (en) 2013-06-28 2019-04-23 Winklevoss Ip, Llc Systems, methods, and program products for a digital math-based asset exchange
US10354325B1 (en) 2013-06-28 2019-07-16 Winklevoss Ip, Llc Computer-generated graphical user interface
US10373158B1 (en) 2018-02-12 2019-08-06 Winklevoss Ip, Llc System, method and program product for modifying a supply of stable value digital asset tokens
US10373129B1 (en) 2018-03-05 2019-08-06 Winklevoss Ip, Llc System, method and program product for generating and utilizing stable value digital assets
US10438290B1 (en) 2018-03-05 2019-10-08 Winklevoss Ip, Llc System, method and program product for generating and utilizing stable value digital assets
US10484376B1 (en) 2015-01-26 2019-11-19 Winklevoss Ip, Llc Authenticating a user device associated with a user to communicate via a wireless network in a secure web-based environment
US10540654B1 (en) 2018-02-12 2020-01-21 Winklevoss Ip, Llc System, method and program product for generating and utilizing stable value digital assets
US10693632B1 (en) 2015-03-16 2020-06-23 Winklevoss Ip, Llc Autonomous devices
US10915891B1 (en) 2015-03-16 2021-02-09 Winklevoss Ip, Llc Autonomous devices
US10929842B1 (en) 2018-03-05 2021-02-23 Winklevoss Ip, Llc System, method and program product for depositing and withdrawing stable value digital assets in exchange for fiat
US11139955B1 (en) 2018-02-12 2021-10-05 Winklevoss Ip, Llc Systems, methods, and program products for loaning digital assets and for depositing, holding and/or distributing collateral as a token in the form of digital assets on an underlying blockchain
US11200569B1 (en) 2018-02-12 2021-12-14 Winklevoss Ip, Llc System, method and program product for making payments using fiat-backed digital assets
US11200564B2 (en) 2015-03-31 2021-12-14 Nasdaq, Inc. Systems and methods of blockchain transaction recordation
US11282139B1 (en) 2013-06-28 2022-03-22 Gemini Ip, Llc Systems, methods, and program products for verifying digital assets held in a custodial digital asset wallet
US11308487B1 (en) 2018-02-12 2022-04-19 Gemini Ip, Llc System, method and program product for obtaining digital assets
US11334883B1 (en) 2018-03-05 2022-05-17 Gemini Ip, Llc Systems, methods, and program products for modifying the supply, depositing, holding and/or distributing collateral as a stable value token in the form of digital assets
US11475442B1 (en) 2018-02-12 2022-10-18 Gemini Ip, Llc System, method and program product for modifying a supply of stable value digital asset tokens
US11501370B1 (en) 2019-06-17 2022-11-15 Gemini Ip, Llc Systems, methods, and program products for non-custodial trading of digital assets on a digital asset exchange
US11522700B1 (en) 2018-02-12 2022-12-06 Gemini Ip, Llc Systems, methods, and program products for depositing, holding and/or distributing collateral as a token in the form of digital assets on an underlying blockchain
US11909860B1 (en) 2018-02-12 2024-02-20 Gemini Ip, Llc Systems, methods, and program products for loaning digital assets and for depositing, holding and/or distributing collateral as a token in the form of digital assets on an underlying blockchain

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5701480A (en) * 1991-10-17 1997-12-23 Digital Equipment Corporation Distributed multi-version commitment ordering protocols for guaranteeing serializability during transaction processing
US5764897A (en) * 1993-02-25 1998-06-09 Sun Microsystems, Inc. Method and apparatus for managing transactions in an object-oriented distributed system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5701480A (en) * 1991-10-17 1997-12-23 Digital Equipment Corporation Distributed multi-version commitment ordering protocols for guaranteeing serializability during transaction processing
US5764897A (en) * 1993-02-25 1998-06-09 Sun Microsystems, Inc. Method and apparatus for managing transactions in an object-oriented distributed system

Cited By (65)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11615404B1 (en) 2013-06-28 2023-03-28 Gemini Ip, Llc Systems, methods, and program products for a digital math-based asset exchange
US11087313B1 (en) 2013-06-28 2021-08-10 Winklevoss Ip, Llc Systems, methods, and program products for a digital math-based asset exchange
US9898782B1 (en) 2013-06-28 2018-02-20 Winklevoss Ip, Llc Systems, methods, and program products for operating exchange traded products holding digital math-based assets
US9965805B1 (en) 2013-06-28 2018-05-08 Winklevoss Ip, Llc Systems, methods, and program products for operating exchange traded products holding digital math-based assets
US9965804B1 (en) 2013-06-28 2018-05-08 Winklevoss Ip, Llc Systems, methods, and program products for operating exchange traded products holding digital math-based assets
US10002389B1 (en) 2013-06-28 2018-06-19 Winklevoss Ip, Llc Systems, methods, and program products for an application programming interface generating a blended digital math-based assets index
US10068228B1 (en) 2013-06-28 2018-09-04 Winklevoss Ip, Llc Systems and methods for storing digital math-based assets using a secure portal
US11282139B1 (en) 2013-06-28 2022-03-22 Gemini Ip, Llc Systems, methods, and program products for verifying digital assets held in a custodial digital asset wallet
US11568398B1 (en) 2013-06-28 2023-01-31 Gemini Ip, Llc Systems and methods for storing digital math-based assets using a secure portal
US11164251B1 (en) 2013-06-28 2021-11-02 Winklevoss Ip, Llc Computer-generated graphical user interface
US10255635B1 (en) 2013-06-28 2019-04-09 Winklevoss Ip, Llc Systems, methods, and program products for an application programming interface generating a blended digital math-based assets index
US10269009B1 (en) 2013-06-28 2019-04-23 Winklevoss Ip, Llc Systems, methods, and program products for a digital math-based asset exchange
US10325257B1 (en) 2013-06-28 2019-06-18 Winklevoss Ip, Llc Systems and methods for storing digital math-based assets using a secure portal
US10354325B1 (en) 2013-06-28 2019-07-16 Winklevoss Ip, Llc Computer-generated graphical user interface
US11928732B1 (en) 2013-06-28 2024-03-12 Gemini Ip, Llc Computer-generated graphical user interface
US11580532B1 (en) 2013-06-28 2023-02-14 Gemini Ip, Llc Systems, methods, and program products for a digital math-based asset exchange
US9892460B1 (en) 2013-06-28 2018-02-13 Winklevoss Ip, Llc Systems, methods, and program products for operating exchange traded products holding digital math-based assets
US11423482B1 (en) 2013-06-28 2022-08-23 Gemini Ip, Llc Systems, methods, and program products for an application programming interface generating a blended digital math-based assets index
US11783417B1 (en) 2013-06-28 2023-10-10 Gemini Ip, Llc Systems for redeeming shares in an entity holding digital math-based assets
US11017381B1 (en) 2013-06-28 2021-05-25 Winklevoss Ip, Llc Systems, methods, and program products for a digital math-based asset exchange
US10984472B1 (en) 2013-06-28 2021-04-20 Winklevoss Ip, Llc Systems, methods, and program products for an application programming interface generating a blended digital math-based assets index
US10984470B1 (en) 2013-06-28 2021-04-20 Winklevoss Ip, Llc Systems for redeeming shares in an entity holding digital math-based assets
US10650376B1 (en) 2013-06-28 2020-05-12 Winklevoss Ip, Llc Systems and methods for storing digital math-based assets using a secure portal
US10929929B1 (en) 2013-06-28 2021-02-23 Winklevoss Ip, Llc Systems for purchasing shares in an entity holding digital math-based assets
US10484376B1 (en) 2015-01-26 2019-11-19 Winklevoss Ip, Llc Authenticating a user device associated with a user to communicate via a wireless network in a secure web-based environment
US10778682B1 (en) 2015-01-26 2020-09-15 Winklevoss Ip, Llc Authenticating a user device associated with a user to communicate via a wireless network in a secure web-based environment
US11283797B2 (en) 2015-01-26 2022-03-22 Gemini Ip, Llc Authenticating a user device associated with a user to communicate via a wireless network in a secure web-based environment
US10693632B1 (en) 2015-03-16 2020-06-23 Winklevoss Ip, Llc Autonomous devices
US10915891B1 (en) 2015-03-16 2021-02-09 Winklevoss Ip, Llc Autonomous devices
US11783323B1 (en) 2015-03-16 2023-10-10 Gemini Ip, Llc Autonomous devices
US11362814B1 (en) 2015-03-16 2022-06-14 Gemini Ip, Llc Autonomous devices
US11200564B2 (en) 2015-03-31 2021-12-14 Nasdaq, Inc. Systems and methods of blockchain transaction recordation
US11734675B2 (en) 2015-03-31 2023-08-22 Nasdaq, Inc. Systems and methods of blockchain transaction recordation
US10097356B2 (en) 2015-07-02 2018-10-09 Nasdaq, Inc. Systems and methods of secure provenance for distributed transaction databases
US11792017B2 (en) 2015-07-02 2023-10-17 Nasdaq, Inc. Systems and methods of secure provenance for distributed transaction databases
US11522716B2 (en) 2015-07-02 2022-12-06 Nasdaq, Inc. Systems and methods of secure provenance for distributed transaction databases
US10630485B2 (en) 2015-07-02 2020-04-21 Nasdaq, Inc. Systems and methods of secure provenance for distributed transaction databases
US10108812B2 (en) 2016-01-28 2018-10-23 Nasdaq, Inc. Systems and methods for securing and disseminating time sensitive information using a blockchain
US11188673B2 (en) 2016-01-28 2021-11-30 Nasdaq, Inc. Systems and methods for securing and disseminating time sensitive information using a blockchain
US11704429B2 (en) 2016-01-28 2023-07-18 Nasdaq, Inc. Systems and methods for securing and disseminating time sensitive information using a blockchain
US10579819B2 (en) 2016-01-28 2020-03-03 Nasdaq Inc. Systems and methods for securing and disseminating time sensitive information using a blockchain
US11095462B2 (en) 2016-02-04 2021-08-17 Nasdaq Technology Ab Systems and methods for storing and sharing transactional data using distributed computer systems
US10541821B2 (en) 2016-02-04 2020-01-21 Nasdaq Technology Ab Systems and methods for storing and sharing transactional data using distributed computing systems
US9794074B2 (en) 2016-02-04 2017-10-17 Nasdaq Technology Ab Systems and methods for storing and sharing transactional data using distributed computing systems
US11695578B2 (en) 2016-02-04 2023-07-04 Nasdaq Technology Ab Systems and methods for storing and sharing transactional data using distributed computer systems
US10084607B2 (en) 2016-02-04 2018-09-25 Nasdaq Technology Ab Systems and methods for storing and sharing transactional data using distributed computing systems
US11475442B1 (en) 2018-02-12 2022-10-18 Gemini Ip, Llc System, method and program product for modifying a supply of stable value digital asset tokens
US10540654B1 (en) 2018-02-12 2020-01-21 Winklevoss Ip, Llc System, method and program product for generating and utilizing stable value digital assets
US10373158B1 (en) 2018-02-12 2019-08-06 Winklevoss Ip, Llc System, method and program product for modifying a supply of stable value digital asset tokens
US11308487B1 (en) 2018-02-12 2022-04-19 Gemini Ip, Llc System, method and program product for obtaining digital assets
US11522700B1 (en) 2018-02-12 2022-12-06 Gemini Ip, Llc Systems, methods, and program products for depositing, holding and/or distributing collateral as a token in the form of digital assets on an underlying blockchain
US11909860B1 (en) 2018-02-12 2024-02-20 Gemini Ip, Llc Systems, methods, and program products for loaning digital assets and for depositing, holding and/or distributing collateral as a token in the form of digital assets on an underlying blockchain
US11200569B1 (en) 2018-02-12 2021-12-14 Winklevoss Ip, Llc System, method and program product for making payments using fiat-backed digital assets
US11139955B1 (en) 2018-02-12 2021-10-05 Winklevoss Ip, Llc Systems, methods, and program products for loaning digital assets and for depositing, holding and/or distributing collateral as a token in the form of digital assets on an underlying blockchain
US10540653B1 (en) 2018-02-12 2020-01-21 Winklevoss Ip, Llc System, method and program product for modifying a supply of stable value digital asset tokens
US10929842B1 (en) 2018-03-05 2021-02-23 Winklevoss Ip, Llc System, method and program product for depositing and withdrawing stable value digital assets in exchange for fiat
US11334883B1 (en) 2018-03-05 2022-05-17 Gemini Ip, Llc Systems, methods, and program products for modifying the supply, depositing, holding and/or distributing collateral as a stable value token in the form of digital assets
US11720887B1 (en) 2018-03-05 2023-08-08 Gemini Ip, Llc System, method and program product for depositing and withdrawing stable value digital assets in exchange for fiat
US11727401B1 (en) 2018-03-05 2023-08-15 Gemini Ip, Llc System, method and program product for generating and utilizing stable value digital assets
US10540640B1 (en) 2018-03-05 2020-01-21 Winklevoss Ip, Llc System, method and program product for generating and utilizing stable value digital assets
US11017391B1 (en) 2018-03-05 2021-05-25 Winklevoss Ip, Llc System, method and program product for generating and utilizing stable value digital assets
US10438290B1 (en) 2018-03-05 2019-10-08 Winklevoss Ip, Llc System, method and program product for generating and utilizing stable value digital assets
US10373129B1 (en) 2018-03-05 2019-08-06 Winklevoss Ip, Llc System, method and program product for generating and utilizing stable value digital assets
US11562333B1 (en) 2018-03-05 2023-01-24 Gemini Ip, Llc System, method and program product for generating and utilizing stable value digital assets
US11501370B1 (en) 2019-06-17 2022-11-15 Gemini Ip, Llc Systems, methods, and program products for non-custodial trading of digital assets on a digital asset exchange

Also Published As

Publication number Publication date
WO2001086373A3 (fr) 2002-03-28
IL136077A0 (en) 2001-05-20

Similar Documents

Publication Publication Date Title
WO2001086373A2 (fr) Protocoles d'assurance de protection de la confidentialité
Hoffman et al. Information privacy in the marketspace: Implications for the commercial uses of anonymity on the Web
US6920434B1 (en) Computerized system and method for establishing a loan participation network
US20060245553A1 (en) Method and system for anonymous communication of information about a home
US10387943B2 (en) Cloud-based item storage system
US20060041436A1 (en) System, method, service method, and program product for managing entitlement with identity and privacy applications for electronic commerce
US20030004859A1 (en) Method and system for facilitating secure transactions
US20030158960A1 (en) System and method for establishing a privacy communication path
US20040193685A1 (en) Method and apparatus for managing and sharing personal identities in a peer-to-peer environment
US20010047276A1 (en) Business to business technology exchange and collaboration system and method
US20060248573A1 (en) System and method for developing and using trusted policy based on a social model
US20070129966A1 (en) Method and system for anonymous communication of information
JP2002032596A (ja) 電子商取引方法および電子商取引に用いられるプロフィール変換装置
Chang et al. Trust and reputation relationships in service-oriented environments
US20020128939A1 (en) Method and system for sharing investor information over an electronic network
WO2009005837A1 (fr) Procédés et systèmes pour faciliter des connexions entre des acheteurs et des vendeurs ou des échangeurs tout en conservant la confidentialité
US20070143173A1 (en) Method and system for anonymous communication of information about a home
CN1947143B (zh) 管理经纪人和交易人之间的关系
JP3622789B2 (ja) 汎用的組織内個人認証システム
WO2001090968A1 (fr) Systeme et procede d'etablissement d'une voie de communication secrete
Weber et al. Trading user data: A Blockchain based approach
KR20150020457A (ko) 소셜 네트워크 서비스를 이용한 전자 상거래 시스템 및 방법
EP1269293A2 (fr) Echange d'informations par l'intermediaire d'un reseau de personnes de confiance
Jakobsson et al. On assurance structures for WWW commerce
Rose A market response to the european union directive on privacy

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
AK Designated states

Kind code of ref document: A3

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A3

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP