Method and apparatus for anonymous and trustworthy authentication in pervasive social networking
First Claim
Patent Images
1. An apparatus, comprising:
- at least one processor; and
at least one memory comprising computer program code,the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to at least;
issue token information to a first node registered with the apparatus, wherein the token information indicates a first token and a backup token to enable the first node to change from the first token to the backup token for anonymous authentication, the first token including a first validity period for the first token, a first pseudonym identifier to enable the anonymous authentication of the first node with a second node, a first trust value for the first validity period, and the backup token including a second validity period for the backup token, a second pseudonym identifier to enable the anonymous authentication of the first node, and a second trust value for the second validity period, the first token and the backup token being issued at the same time as part of the token information; and
distribute a token list to a plurality of nodes registered with the apparatus, wherein the token list is associated with tokens for the plurality of nodes comprising at least the first node and a second node, and wherein the token information and the token list enable the anonymous authentication between the first node and the second node, wherein the backup token is used for the anonymous authentication between the first node and the second node after the first validity period has expired and the apparatus is unavailable to the first node and/or the second node.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for anonymous authentication may comprise: issuing token information to a first node registered with a network entity, wherein the token information indicates one or more tokens for the first node; distributing a token list to a plurality of nodes registered with the network entity, wherein the token list is associated with respective tokens for the plurality of nodes comprising at least the first node and a second node, and wherein the token information and the token list are used for an anonymous authentication between the first node and the second node.
-
Citations
12 Claims
-
1. An apparatus, comprising:
-
at least one processor; and at least one memory comprising computer program code, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to at least; issue token information to a first node registered with the apparatus, wherein the token information indicates a first token and a backup token to enable the first node to change from the first token to the backup token for anonymous authentication, the first token including a first validity period for the first token, a first pseudonym identifier to enable the anonymous authentication of the first node with a second node, a first trust value for the first validity period, and the backup token including a second validity period for the backup token, a second pseudonym identifier to enable the anonymous authentication of the first node, and a second trust value for the second validity period, the first token and the backup token being issued at the same time as part of the token information; and distribute a token list to a plurality of nodes registered with the apparatus, wherein the token list is associated with tokens for the plurality of nodes comprising at least the first node and a second node, and wherein the token information and the token list enable the anonymous authentication between the first node and the second node, wherein the backup token is used for the anonymous authentication between the first node and the second node after the first validity period has expired and the apparatus is unavailable to the first node and/or the second node. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An apparatus, comprising:
-
at least one processor; and at least one memory comprising computer program code, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to at least; obtain token information from a network entity with which the apparatus is registered, wherein the token information indicates a first token and a backup token to enable the apparatus to change from the first token to the backup token for anonymous authentication, the first token including a first validity period for the first token, a first pseudonym identifier to enable the anonymous authentication of the apparatus with a second node, a first trust value for the first validity period, and the backup token including a second validity period for the backup token, a second pseudonym identifier to enable the anonymous authentication of the apparatus, a second trust value for the second validity period, the first token and the backup token being obtained at the same time as part of the token information; generate security information for the apparatus based at least in part on the backup token information in response to the first validity period expiring and the network entity being unavailable to the apparatus and/or the second node; and send a message with authentication information to the second node, wherein the authentication information is associated with the security information and used for an anonymous authentication between the apparatus and the second node. - View Dependent Claims (9, 10, 11)
-
-
12. A non-transitory a computer-readable medium including computer program code which when executed by at least one processor causes operations comprising:
-
obtaining token information from a network entity with which a first node is registered, wherein the token information indicates a first token and a backup token to enable the first node to change from the first token to the backup token for anonymous authentication, the first token including a first validity period for the first token, a first pseudonym identifier to enable the anonymous authentication of the first node with a second node, a first trust value for the first validity period, and the backup token including a second validity period for the backup token, a second pseudonym identifier to enable the anonymous authentication of the first node, a second trust value for the second validity period, the first token and the backup token being obtained at the same time as part of the token information; generating security information for the first node based at least in part on the backup token information in response to the first validity period expiring and the network entity being unavailable to the first node and/or the second node; and sending a message with authentication information to the second node from the first node, wherein the authentication information is associated with the security information and used for the anonymous authentication between the first node and the second node.
-
Specification