Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2006-09-12
2006-09-12
Peeso, Thomas R. (Department: 2132)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C713S180000, C713S182000
Reexamination Certificate
active
07107447
ABSTRACT:
An apparatus and method is provided for allowing users to share services without sharing identities. Specifically, the apparatus and method allow users to share pseudonyms instead of actual user names, thus protecting both users from unwanted emails, IM messages, and the like. The invention provides an introduction scheme, which comprises a simple and secure way of establishing a user to user link. A preferred embodiment incorporates services of a linked federation network service, such as AOL's Liberty Alliance service, without exposing real user names to other users.
REFERENCES:
patent: 5245656 (1993-09-01), Loeb et al.
patent: 5521980 (1996-05-01), Brands
patent: 5604805 (1997-02-01), Brands
patent: 5682430 (1997-10-01), Kilian et al.
patent: 5754938 (1998-05-01), Herz et al.
patent: 5864667 (1999-01-01), Barkan
patent: 5884270 (1999-03-01), Walker et al.
patent: 5884272 (1999-03-01), Walker et al.
patent: 6014646 (2000-01-01), Vallee et al.
patent: 6061789 (2000-05-01), Hauser et al.
patent: 6064878 (2000-05-01), Denker et al.
patent: 6076078 (2000-06-01), Camp et al.
patent: 6161129 (2000-12-01), Rochkind
patent: 6253203 (2001-06-01), O'Flaherty et al.
patent: 6275824 (2001-08-01), O'Flaherty et al.
patent: 6385725 (2002-05-01), Baum-Waidner
patent: 6415270 (2002-07-01), Rackson et al.
patent: 6438691 (2002-08-01), Mao
patent: 6571279 (2003-05-01), Herz et al.
patent: 6717938 (2004-04-01), D'Angelo
patent: 6748366 (2004-06-01), Hurwitz et al.
patent: 6789191 (2004-09-01), Lapstun et al.
patent: 6889325 (2005-05-01), Sipman et al.
patent: 6952769 (2005-10-01), Dubey et al.
patent: 773 647 (1997-05-01), None
patent: 858 021 (1998-08-01), None
patent: 946 022 (1999-09-01), None
patent: 991 005 (2000-04-01), None
patent: 992 924 (2000-04-01), None
patent: 876 722 (2002-04-01), None
Dillich, Oct. 8, 1999, Surf the Web with Greater Freedom, vol. 15, iss. 38; p. 20.
Inside the Internet. Louisville: Apr. 2000, vol. 7, iss. 4; p. 1-4.
The Computer Lawyer. Englewood Cliffs, Jul. 2000, vol. 17, iss. 7; p. 23.
Tygar, 1996, Computer Science Department Carnegie Mellon University, p. 8-26.
Kaashoek, 1998, MIT Laboratory for Computer Science, p. 27-36.
Informational Self-Determination By Identity Management; Kohntopp, M.; Pfitzmann, A.; IT+TI Informationstechnik und Technische Informatik; Sep. 2001.
Identity Management And Its Support Of Multilateral Security; Clauss, S.; Kohntopp, M.; Computer Networks; Oct. 2001.
Secure Anonymous Signature-Based Transactions; Van Herreweghen, E.; Computer Security; 6th European Symposium on Research in Computer Security; 2000.
On Secure And Pseudonymous Client-Relationships With Multiple Servers; Bleichenbacher, D.; Gabber, E.; Gibbons, P.B.; Matias, Y.; Mayer, A.; Proceedings of the 3rd USENIX Workshop on Electronic Commerce; 1998.
Tarzan: A Peer-to-Peer Anonymizing Network Layer; M. Freedman, R. Morris; CCS'02, Nov. 18-22, 2002.
Pseudonym Systems; A. Lysyanskaya, R. Rivest, A. Sahai; MIT Laboratory for Computer Science; Jun. 1999.
On Pseudonymization Of Audit Data For Intrusion Detection; Biskup, J.; Flegel, U.; Designing Privacy Enhancing Technologies. International Workshop on Design Issues in Anonymity and Unobservability. Proceedings; 2001.
Identity Management Based on P3P; Berthold, O.; Kohntopp, M.; Designing Privacy Enhancing Technologies. International Workshop on Design Issues in Anonymity and Unobservability. Proceedings; 2001.
Can Pseudonymity Really Guarantee Privacy?; Rao, J.R.; Rohatgi, P.; Proceedings of the Ninth USENIX Security Symposium; 2000.
Distributed Temporary Pseudonyms: A New Approach For Protecting Location Information In Mobile Communication Networks; Kesdogan, D.; Reichl, P.; Junghartchen, K.; Computer Security—ESORICS 98. 5th European Symposium on Research in Computer Security. Proceedings; 1998.
Anonymity, Pseudonymity, Or Inescapable Identity On The Net; Johnson, D.G.; Miller, K.; Computers & Society; Jun. 1998.
Protecting Free Expression Online with Freenet; I. Clarke, T. Hong, S. Miller, O. Sandberg, B. Wiley; www.freenetproject.org.
PAST: A Large-Scale, Persistent Peer-to-Peer Storage Utility; P. Druschel, A. Rowstron, Microsoft Research Ltd.
The Social Cost of Cheap Pseudonyms; E. Friedman, Department of Economics, Rutgers University; P. Resnick, University of Michigan School of Information; Aug. 2000.
How to Make Personalized Web Browsing Simple, Secure, and Anonymous; E. Gabber, P. Gibbons, Y. Matias, A. Mayer; Bell Laboratories, Lucent Technologies; eran,gibbons,matias,alain@research.bell-labs.com.
Privacy-Enhancing Technologies for the Internet; I. Goldberg, D. Wagner, E. Brewer; UC Berkeley; iang,daw,brewer@cs.berkeley.edu.
Unlinkable Serial Transactions; P. Syverson, S. Stubblebine, D. Goldschlag; Financial Cryptography '97; Spring-Verlag LLNCS, 1997.
Cahill Conor P.
Sanin Aleksey
America Online Inc.
Glenn Michael A.
Glenn Patent Group
Peeso Thomas R.
LandOfFree
Use of pseudonyms vs. real names does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Use of pseudonyms vs. real names, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Use of pseudonyms vs. real names will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3559664