Method and system for establishing a communication using privacy enhancing techniques

A communication and data communication technology, applied in transmission systems, digital transmission systems, payments involving neutral parties, etc., to achieve the effect of solving technical obstacles

Inactive Publication Date: 2007-01-10
史蒂芬·J·英格博格
View PDF6 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0030] The present invention solves the problem of how an end user can enter into an anonymous transaction, how to collect transaction data such as a digital manifest or bond for personal use, and how to determine exactly how many information connections to generate for a service or product provider
[0031] The present invention solves the problem of instant cancellation of PKI-type digital signatures and prevents chip card from being stolen by ensuring that no information that can be abused and not easily canceled is stored on the chip card and the chip card is completely invalid

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for establishing a communication using privacy enhancing techniques
  • Method and system for establishing a communication using privacy enhancing techniques
  • Method and system for establishing a communication using privacy enhancing techniques

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0070] Figure 3 shows a preferred configuration of a multi-application chip card infrastructure. The chip card 10 communicates with the card reader 42 via the communication channel 56 over an IP connection of a fixed network or over another compatible open protocol, such as a wireless channel, with the card reader 42 . The card reader is connected to the merchant computer 44, in another embodiment the card reader is directly linked using eg a wireless communication protocol. This one-time reference is forwarded to the service provider 46 together with the instructions encrypted in the chip card. Clients link from their client base station 48 to control transactions through a mixnet or other anonymous network 50 or identity provider 54 / pseudonym unit through either communication channel 66 without revealing their true identity. Depending on the encrypted instructions, the service provider 46 can work with the financial institution 52 to directly verify the anonymous payment o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method of establishing a communication path from a first legal entity in a data communication network comprises the steps of providing at least one private reference point comprised in the data communication network and establishing a communication path from the first legal entity to the private reference point. The method further comprises verifying the authentication of the first legal entity relative to the private reference point from the first legal entity and still further a method of establishing communication from the private reference point to a second legal entity through the data communication network without disclosing the identity of the first legal entity without disclosing the identity of the first legal entity.

Description

technical field [0001] The disappearance of personal information security in private and public aspects brought about by technological changes and social development is threatening the progress and stability of the information society. These problems are becoming central discourses in every corner of the world without good solutions. [0002] One of the fundamental questions is this: if at the heart of the matter is anonymity or identification, it means either the indulgence of individual behavior or the increasing reliance on credit and regulation to control the misuse of identified personal data . The situation is even worse if trusted parties use pseudonyms to prevent abuse, which can lead to the concentration of business or government power. [0003] The present invention consists of several parts closely related to each other and integrated into one body, which can achieve a balance between responsibility, freedom, convenience and efficiency. The result is the free flo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08G06F21/32G06F21/34G06F21/35
CPCG06Q20/02H04L63/0823H04L63/0421H04L2463/102H04L63/0853H04L63/0407H04L67/14H04L69/329G06Q20/3823H04L9/0822H04L9/0825G06Q20/386
Inventor 史蒂芬·J·英格博格
Owner 史蒂芬·J·英格博格
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products