METHOD FOR ANONYMOUS COMMUNICATION, METHOD FOR REGISTRATION, METHOD AND SYSTEM FOR TRANSMITTING AND RECEIVING INFORMATION
First Claim
1. A method for anonymous communication, which is applied in an architecture network with identification identifier and locator separation, comprising:
- after receiving an anonymous communication request initiated by a terminal, the network allocating an anonymous identification identifier to the terminal, and recording a state of the terminal as an anonymous communication state;
when the terminal is in the anonymous communication state, an access gateway device where the terminal is located replacing a source access identifier in data message with the anonymous identification identifier while receiving the data message transmitted by the terminal;
and replacing an anonymous identification identifier in data message transmitted to the terminal with the access identifier of the terminal while receiving the data message transmitted to the terminal.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and a system for anonymous communication are disclosed in the present invention, which are applied in an architecture network with Identification (ID) identifier and locator separation. The method includes: after receiving an anonymous communication request initiated by a terminal, the network allocating an anonymous ID identifier to the terminal, and recording a state of the terminal as an anonymous communication state; when the terminal is in the anonymous communication state, an access gateway device where the terminal is located replacing a source access identifier in data message transmitted by the terminal with the anonymous ID identifier while receiving the data message; and replacing an anonymous ID identifier in data message transmitted to the terminal with the access identifier of the terminal while receiving the data message transmitted to the terminal.
23 Citations
21 Claims
-
1. A method for anonymous communication, which is applied in an architecture network with identification identifier and locator separation, comprising:
-
after receiving an anonymous communication request initiated by a terminal, the network allocating an anonymous identification identifier to the terminal, and recording a state of the terminal as an anonymous communication state; when the terminal is in the anonymous communication state, an access gateway device where the terminal is located replacing a source access identifier in data message with the anonymous identification identifier while receiving the data message transmitted by the terminal; and replacing an anonymous identification identifier in data message transmitted to the terminal with the access identifier of the terminal while receiving the data message transmitted to the terminal. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for forwarding data message, comprising:
-
a source node transmitting data message to a destination node, wherein, the data message comprises a destination address and a first source address; when receiving the data message, a source access node replacing the first source address contained in the data message with a second source address allocated to a terminal, and forwarding the data message to a destination access node according to the destination address; and after receiving the data message, the destination access node forwarding the received data message to the destination node. - View Dependent Claims (9, 10)
-
-
11. A registration method for anonymous communication, which is applied in an architecture network with identification identifier and locator separation at least comprising a first node, an authentication center, a first access node and a first allocation node, wherein, the first node is allocated with an actual identification identifier, and the method comprising:
-
the first node transmitting an anonymous communication request to the authentication center via the first access node; the authentication center receiving the anonymous communication request and determining whether the first node has an access to anonymous communication; and in a condition that the first node has an access to anonymous communication, the first access node transmitting an identification identifier allocation request to the first allocation node, and the first allocation node allocating an anonymous identification identifier to the first node and storing a corresponding relationship between the anonymous identification identifier of the first node and the actual identification identifier of the first node, or a corresponding relationship between the anonymous identification identifier of the first node and the actual identification identifier and a location identifier of the first node. - View Dependent Claims (12, 13, 14)
-
-
15. A registration method for anonymous communication, which is applied in an architecture network with identification identifier and locator separation at least comprising a first node, a first access node, and a first storage node, wherein, the first node is allocated with an actual identification identifier, and the method comprising:
-
the first node transmitting an anonymous communication request to an authentication center via the first access node; the authentication center receiving the anonymous communication request and determining whether the first node has an access to anonymous communication; and in a condition that the first node has an access to anonymous communication, the first access node allocating an anonymous identification identifier to the first node, and meanwhile registering a corresponding relationship between the anonymous identification identifier of the first node and the actual identification identifier of the first node, or a corresponding relationship between the anonymous identification identifier of the first node and the actual identification identifier and a location identifier of the first node, with the first storage node. - View Dependent Claims (16, 17)
-
-
18. A method for transmitting information, comprising:
-
a first node transmitting information to a second node via a first access node to which the first node belongs, wherein, the information at least comprises a first identifier of the first node and a first identifier of the second node; and after replacing the first identifier of the first node with an updated first identifier of the first node, the first access node to which the first node belongs encapsulating the updated first identifier of the first node and the first identifier of the second node by using a second identifier of the first node and a second identifier of the second node to transmit to a second access node to which the second node belongs, and transmitting the information obtained after de-encapsulated by the second access node to which the second node belongs to the second node. - View Dependent Claims (19, 20)
-
-
21-23. -23. (canceled)
Specification