Anonymity revocation

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Reexamination Certificate

active

07581107

ABSTRACT:
Methods and systems for anonymity revocation, enabling a trusted entity to identify a user computer within an anonymous system. A system comprises an attester computer providing attestation value cert from a security module public key and an identifying value. The user computer having a module providing the module public key and a security module attestation value, the user computer providing a user public key, a user attestation-signature value derived from the attestation value cert, and an encryption computable under use of a trusted-entity public key and a module-generated-identifier value, the module-generated-identifier value relating to the identifying value; a verification computer verifying validity of received user attestation-signature value and the encryption; and a trusted entity having a trusted entity secret key, wherein the trusted entity is able to derive the module-generated-identifier value from the encryption, the module-generated-identifier value being usable to identify the user computer with the security module.

REFERENCES:
patent: 7165181 (2007-01-01), Brickell
patent: 2002/0004900 (2002-01-01), Patel
patent: 2002/0038291 (2002-03-01), Petersen et al.
patent: 2003/0190046 (2003-10-01), Kamerman et al.
patent: 2003/0195857 (2003-10-01), Acquisti
patent: 2005/0216736 (2005-09-01), Smith
patent: 2009/0019285 (2009-01-01), Chen et al.
Jan Camenishch and Els Van Herreweghen. Design and Implementation of the idemix Anonymous Credential System. In the Proceedings of the 9th ACM conference on Computer and communications security, pp. 21-30. ACM press, Nov. 2002.
E. Brickell, J. Camenisch, and L. Chen. Direct anonymous attestation. In 11th ACM Conf. on Computer & Communications Security, pp. 132-145. ACM Press, 2004.
J. Camenish and A. Lysyanskaya. Signature Scheme with Efficient Protocols. In S. Cimato, C. Galdi, and G. Persiano, editors, Security in Communication Networks, Third Inernational Conference, SCN 2002, vol. 2576 of LNCS, pp. 268-289. Springer Verlag. 2003.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Anonymity revocation does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Anonymity revocation, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Anonymity revocation will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4094718

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.