User controlled anonymity when evaluating into a role
First Claim
1. A method for anonymous role authentication, comprising:
- receiving a role authentication certificate from a role authenticator, wherein said role authentication certificate certifies that the holder of said role authentication certificate is a member of a particular role without allowing said role authenticator issuing said role authentication certificate to track an identity of a particular user holding said role authentication certificate;
establishing an anonymous channel for anonymously presenting said role authentication certificate to a resource protector, wherein said resource protector requires said particular user to authenticate into said particular role to access a resource, wherein said role authentication certificate authenticates said particular user into said particular role without enabling said resource protector to ascertain said identity of said particular user, such that said particular user is in control of any disclosure of said identity for authenticated role-based accesses.
1 Assignment
0 Petitions
Accused Products
Abstract
A method, system, and program for user controlled anonymity when evaluating into a role are provided. An anonymous authentication controller enables a user to control anonymity of the user'"'"'s identity for role based network accesses to resources, without requiring reliance on any single third party to maintain user anonymity. First, a role authentication certificate is received from a role authenticator, wherein the role authentication certificate certifies that the holder of the role authentication certificate is a member of a particular role without allowing the role authenticator issuing the role authentication certificate the ability to track an identity of a user holding the role authentication certificate. Next, an anonymous channel is established for anonymously presenting the role authentication certificate to a resource protector, wherein the resource protector requires the user to authenticate into the particular role to access a resource, wherein the role authentication certificate authenticates the user into the particular role without enabling the resource protector to ascertain the identity of the user, such that the user is in control of maintaining user anonymity for authenticated role-based accesses.
74 Citations
26 Claims
-
1. A method for anonymous role authentication, comprising:
-
receiving a role authentication certificate from a role authenticator, wherein said role authentication certificate certifies that the holder of said role authentication certificate is a member of a particular role without allowing said role authenticator issuing said role authentication certificate to track an identity of a particular user holding said role authentication certificate;
establishing an anonymous channel for anonymously presenting said role authentication certificate to a resource protector, wherein said resource protector requires said particular user to authenticate into said particular role to access a resource, wherein said role authentication certificate authenticates said particular user into said particular role without enabling said resource protector to ascertain said identity of said particular user, such that said particular user is in control of any disclosure of said identity for authenticated role-based accesses. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for anonymous role authentication, comprising:
-
an anonymous authentication controller communicatively connected to a network;
said anonymous authentication controller further comprising;
means for receiving a role authentication certificate from a role authenticator via said network, wherein said role authentication certificate certifies that the holder of said role authentication certificate is a member of a particular role without allowing said role authenticator issuing said role authentication certificate to track an identity of a particular user holding said role authentication certificate; and
means for establishing an anonymous channel via said network for anonymously presenting said role authentication certificate to a resource protector, wherein said resource protector requires said particular user to authenticate into said particular role to access a resource, wherein said role authentication certificate authenticates said particular user into said particular role without enabling said resource protector to ascertain said identity of said particular user, such that said particular user is in control of said identity for authenticated role-based accesses. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer program product, residing on a computer readable medium, for anonymous role authentication, comprising:
-
means for receiving a role authentication certificate from a role authenticator via said network, wherein said role authentication certificate certifies that the holder of said role authentication certificate is a member of a particular role without allowing said role authenticator issuing said role authentication certificate to track an identity of a particular user holding said role authentication certificate;
means for establishing an anonymous channel via said network for anonymously presenting said role authentication certificate to a resource protector, wherein said resource protector requires said particular user to authenticate into said particular role to access a resource, wherein said role authentication certificate authenticates said particular user into said particular role without enabling said resource protector to ascertain said identity of said particular user, such that said particular user is in control of said identity for authenticated role-based accesses. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26)
-
Specification