Transmission of Anonymous Information Through a Communication Network
First Claim
1. A method for anonymously collecting response data from Respondent computer nodes connected to a wide area computer network by providing such data to a Collector computer node via a Mediator computer node, the method comprising the steps of:
- at the Respondent,originating response data to ultimately be sent to the Collector;
encrypting the response data so that it cannot be read by the Mediator;
forwarding the encrypted response data to the Mediator as an anonymous response message;
at the Mediator,receiving the response message;
authenticating the source of the response message as being a member of a group of authorized Respondents, without compromising the anonymous identity of the Respondent;
forwarding the response message to the Collector as an authenticated response;
at the Collector;
receiving the authenticated message; and
decrypting the response data so that it can be read.
1 Assignment
0 Petitions
Accused Products
Abstract
A system that enables anonymous data collection from Respondents, such as over the Internet using public key technologies, where the anonymity and authenticity of Respondents is provided by a trusted mediation service. The invention provides a simple and secure solution that allows authentication of research Respondents while maintaining their anonymity. The Collector cannot link Respondent'"'"'s real identification and their responses, and a Mediator provides a communication service but has no access to the content of information exchanged between the Respondents and the Collector. According to one aspect of the invention, a Collector requests a list of anonymous Ids from the Mediator. The Mediator then generates a list of anonymous tokens which can then be used by the Respondents when they communicate with the Collector through the Mediator.
43 Citations
11 Claims
-
1. A method for anonymously collecting response data from Respondent computer nodes connected to a wide area computer network by providing such data to a Collector computer node via a Mediator computer node, the method comprising the steps of:
-
at the Respondent, originating response data to ultimately be sent to the Collector; encrypting the response data so that it cannot be read by the Mediator; forwarding the encrypted response data to the Mediator as an anonymous response message; at the Mediator, receiving the response message; authenticating the source of the response message as being a member of a group of authorized Respondents, without compromising the anonymous identity of the Respondent; forwarding the response message to the Collector as an authenticated response; at the Collector; receiving the authenticated message; and decrypting the response data so that it can be read. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for collecting data from Respondents over a wide area computer network and providing such data to a Collector via a Mediator, the method comprising the steps of:
-
at the Collector, requesting a list of anonymous identifiers (IDs) from a Mediator;
at the Mediator,generating a list of anonymous IDs; and delivering an anonymous ID to research Respondents to use when contacting a Collector; then, back at the Collector, providing a Respondent with an anonymous ID to use to send data to the Collector via the Mediator, but in a manner which prevents the Mediator from associating the anonymous ID with the Respondent'"'"'s real identity. - View Dependent Claims (10, 11)
-
Specification