Maintaining Privacy for Transactions Performable by a User Device Having a Security Module
First Claim
1. A method for maintaining privacy for transactions comprising employing a user device having a security module with a privacy certification authority computers and a verification computer, the verification computer having obtained public keys from the privacy certification authority computer and from an issuer that provides attestation of the security module, the method further comprising the steps of:
- receiving a first and second set of attestation-signature values, the first set of attestation-signature values being generated by the user device using first attestation values obtained from the issuer and the second set of attestation-signature values being generated by the user device using second attestation values obtained from the privacy certification authority computer;
checking the validity of the first set of attestation-signature values with the public key of the issuer;
checking the validity of the second set of attestation-signature values with the public key of the privacy certification authority computer ;
and verifying whether or not the first and second sets of attestation-signature values relate to the user device.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention discloses a method and system for maintaining privacy for transactions performable by a user device having a security module with a privacy certification authority and a verifier. The system comprises an issuer providing an issuer public key PKI; a user device having a security module for generating a first set of attestation-signature values DAA1; a privacy certification authority computer for providing an authority public key PKPCA and issuing second attestation values AV2; and a verification computer for checking the validity of the first set of attestation signature values DAA1 with the issuer public key PKI and the validity of a second set of attestation-signature values DAA2 with the authority public key PKPCA, the second set of attestation-signature values DAA2 being derivable by the user device 20 from the second attestation values AV2, wherein it is verifiable that the two sets of attestation-signature values DAA1, DAA2 relate to the user device.
35 Citations
20 Claims
-
1. A method for maintaining privacy for transactions comprising employing a user device having a security module with a privacy certification authority computers and a verification computer, the verification computer having obtained public keys from the privacy certification authority computer and from an issuer that provides attestation of the security module, the method further comprising the steps of:
-
receiving a first and second set of attestation-signature values, the first set of attestation-signature values being generated by the user device using first attestation values obtained from the issuer and the second set of attestation-signature values being generated by the user device using second attestation values obtained from the privacy certification authority computer;
checking the validity of the first set of attestation-signature values with the public key of the issuer;
checking the validity of the second set of attestation-signature values with the public key of the privacy certification authority computer ;
andverifying whether or not the first and second sets of attestation-signature values relate to the user device. - View Dependent Claims (2, 3, 4, 5, 10, 11, 18, 19, 20)
-
-
6. A method for maintaining privacy for transactions comprising employing a user device having a security module with a privacy certification authority computer and a verification computer, the privacy certification authority computer having obtained a public key from an issuer that provides attestation of the security module;
- the method further comprising the steps of;
receiving an initial set of attestation-signature values (DAA1′
) from the user device, the initial set of attestation-signature values (DAA1′
) being generated by the user device using first attestation values obtained from the issuers;
checking the validity of the initial set of attestation-signature values with the public key of the issuer;
responsive to the checking step issuing second attestation values that relate to the initial set of attestation-signature values (DAA1′
); and
providing the second attestation values to the user device, a second set of attestation-signature values being derivable from the second attestation values, wherein it is verifiable that a first set of attestation-signature values and the second set of attestation-signature values relate to the user device, the first set of attestation-signature values is generatable by the user device using first attestation values obtained from the issuers. - View Dependent Claims (7, 13, 14)
- the method further comprising the steps of;
-
8. A method comprising maintaining privacy for transactions performable by a user device having a security module with a privacy certification authority computer and an verification computer, the user device having obtained first attestation values from an issuer and second attestation values from the privacy certification authority computer, the method step of maintaining comprising the steps of:
-
generating a first set of attestation-signature values by using the first attestation values and a second set of attestation-signature values by using the second attestation values ;
andsending the first and second set of attestation-signature values to the verification computer, wherein the verification computer is able to check the validity of the first set of attestation-signature values with an issuer public key (PKI) of the issuer, the validity of the second set of attestation-signature values with an authority public key (PKPCA) of the privacy certification authority computer and to verify that the first and second sets of attestation-signature value relate to the user device. - View Dependent Claims (9, 15, 16)
-
-
12. A system for maintaining privacy while computers performing transactions comprising:
-
an issuers providing an issuer public key (PKI);
a user device having a security module for generating a first set of attestation-signature values;
a privacy certification authority computer for providing an authority public key (PKPCA) and issuing second attestation values; and
a verification computer for checking the validity of the first set of attestation-signature values with the issuer public key (PKI)and the validity of a second set of attestation-signature values with the authority public key (PKPCA), the second set of attestation-signature values being derivable by the user device from the second attestation values, wherein it is verifiable that the first and second sets of attestation-signature values relate to the user device. - View Dependent Claims (17)
-
Specification