METHOD FOR SECURE ANONYMOUS COMMUNICATION
First Claim
Patent Images
1. A method for secure anonymous communication between a first party and a second party comprising:
- establishing an identity with a third party;
obtaining an anonymous certificate having a selected attribute from the third party; and
presenting the anonymous certificate to the second party to establish the anonymous communication.
1 Assignment
0 Petitions
Accused Products
Abstract
Secure anonymous communication between a first party and a second party is accomplished by establishing an identity of the first party with a third party, obtaining an anonymous certificate having a selected attribute by the first party from the third party, and presenting the anonymous certificate by the first party to the second party for verification to establish the anonymous communication.
-
Citations
33 Claims
-
1. A method for secure anonymous communication between a first party and a second party comprising:
-
establishing an identity with a third party;
obtaining an anonymous certificate having a selected attribute from the third party; and
presenting the anonymous certificate to the second party to establish the anonymous communication. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method of providing a secure anonymous certificate to a first party by a third party comprising:
-
requesting information corresponding to at least one personal attribute of the first party;
receiving the information from the first party;
establishing an account for the first party with the information;
providing the first party with credentials for accessing the account;
receiving a request for an anonymous certificate having a selected attribute and the credentials from the first party;
verifying an identity of the first party using the credentials; and
creating the anonymous certificate asserting the selected attribute of the first party. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A method for secure anonymous communication between a first party and a second party comprising:
-
receiving a request for communication from a first party;
requesting proof of a selected attribute of the first party;
receiving an anonymous certificate asserting the selected attribute;
verifying the selected attribute; and
allowing the anonymous communication. - View Dependent Claims (16, 17, 18, 19, 20)
-
-
21. An article comprising:
a machine readable medium having a plurality of machine readable instructions, wherein when the instructions are executed by a processor the instructions cause a first party to establish an identity with a third party, to obtain an anonymous certificate having a selected attribute from the third party; and
to present the anonymous certificate to a second party to establish secure anonymous communication between the first party and the second party.- View Dependent Claims (22, 23)
-
24. An article comprising:
a machine readable medium having a plurality of machine readable instructions, wherein when the instructions are executed by a processor the instructions cause a third party to request information corresponding to at least one personal attribute of a first party, to receive the information from the first party, to establish an account for the first party with the information, to provide the first party with credentials for accessing the account, to receive a request for an anonymous certificate having a selected attribute and the credentials from the first party, the anonymous certificate to be used for secure anonymous communication with a second party, to verify an identity of the first party using the credentials, and to create the anonymous certificate asserting the selected attribute of the first party. - View Dependent Claims (25, 26, 27)
-
28. An article comprising:
a machine readable medium having a plurality of machine readable instructions, wherein when the instructions are executed by a processor the instructions cause a second party to receive a request for communication from a first party, to request proof of a selected attribute of the first party, to receive an anonymous certificate asserting the selected attribute, to verify the selected attribute, and to allow secure anonymous communication between the first party and the second party. - View Dependent Claims (29, 30)
-
31. A system for secure anonymous communication comprising:
-
a first party to establish an identity, to obtain an anonymous certificate having a selected attribute corresponding to the first party, and to present the anonymous certificate to establish the secure anonymous communication;
a second party to request the anonymous certificate having the selected attribute and to allow secure anonymous communication between the first party and the second party when the selected attribute is verified; and
a third party to request information corresponding to at least one personal attribute of the first party, the at least one personal attribute comprising the selected attribute, to receive the information from the first party, to receive a request for an anonymous certificate having the selected attribute from the first party, and to create the anonymous certificate asserting the selected attribute of the first party based on the established identity. - View Dependent Claims (32, 33)
-
Specification