Method of tracing and of resurgence of pseudonymized streams on communication networks, and method of sending informative streams able to secure the data traffic and its addressees
A communication network, receiver technology, applied in the field of identity devices
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
example 23
[0101] After the reading of this stream, a second type of tag, an informational attribute, may have the function of informing a communicator, such as the receiver or intermediary of the stream, of information, in particular a warning message for this stream. This information is called a sticker and can take any form, such as audible or visual. It can be easily expressed or reduced to signaling elements which can be standardized.
[0102] A third instance 23 (hereafter referred to as instance C) receives signals sent by instance B seeking behavioral reports as they are eg atypical or set to be culpable. Settings from these discoveries can be confirmed or rejected, especially the authentication of transmitted content. However, instance C does not have access to the data reported by instance B about the detailed behavior of the sender. It does not know whether these data are considered to represent illegal or legal behavior, typical or atypical, useful or useless, relative to t...
example A
[0144] - Instance A knows the real identity of the sender and its transplant, but not his pseudonym;
[0145] - Instance Z knows the real identity of the sender and his pseudonym, but is not able to detect and read his graft;
[0146] - Anonymous authority 72 is aware of aliases and transplanted ethnic groups, without functional access to real identities of interest.
[0147] Instance B is only interested in the first identity corresponding to the concealed transplant. It does not perform a search for the second corresponding to the pseudonym, just as it does not perform a search for the real identity of the stream and its sender.
[0148] Various applications are conceivable. The first application is to access pseudonyms based on possession or knowledge of hidden transplants, e.g. Figure 7 shown. In this example, Paul32 was provided with a transplant and a pseudonym. He requests access to Julie 39's site, and Julie 39 wants to know if he has approval to provide transpla...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 