Reputation System and Method
2 Assignments
0 Petitions
Accused Products
Abstract
A method for securing a transaction in a reputation system includes the following steps: authenticating a user vis-à-vis an end device by means of an electronic proof of identity for releasing authentication data for the digital identity that are stored on the end device, and authenticating the digital pseudonym assigned to the user vis-à-vis the reputation system by means of the end device while employing the stored authentication data pertaining to the digital pseudonym. The electronic proof of identity can be present as an electronic identity card in the form of a portable data carrier.
-
Citations
30 Claims
-
1-15. -15. (canceled)
-
16. A method for securing a transaction in a reputation system which comprises an end device of a user having a security module, and a further security module, a computer and/or a server, having the steps of:
-
supplying an electronic proof of identity on the security module in order to assign the user a digital identity; and authenticating a digital pseudonym assigned to the user of the end device vis-à
-vis the reputation system by means of the end device while employing authentication data pertaining to the digital pseudonym;carrying out the transaction; wherein the steps of authenticating the user of the end device by means of the electronic proof of identity for releasing the authentication data of the digital identity before authenticating vis-à
-vis the reputation system;supplying a reputation value by the reputation system pertaining to the digital identity before the transaction; and updating the reputation value of the digital identity pertaining to the transaction by the reputation system after the transaction. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. An end device, comprising a reputation securing device which is arranged to carry out an authentication of a digital pseudonym assigned to a user of the end device vis-à
- -vis a reputation system while employing authentication data pertaining to the digital pseudonym that are stored by the end device, wherein the reputation securing device is arranged
to carry out an authorization of the user on the basis of an electronic proof of identity of the user that is coupled with the end device, to release the authentication data pertaining to a digital pseudonym that are stored on the end device only after successful authorization of the user on the basis of the electronic proof of identity, and to create a cryptogram which is suitable for supplying reputation values pertaining to the digital identity by the reputation system. - View Dependent Claims (27, 28)
- -vis a reputation system while employing authentication data pertaining to the digital pseudonym that are stored by the end device, wherein the reputation securing device is arranged
-
29. A reputation system for securely supplying a reputation value of a user, wherein the reputation system comprises a security module and/or an end device of the user, the security module and/or the end device supplies an electronic proof of identity pertaining to the user, wherein the security module and/or end device of the user is configured to carry out an authentication of a digital pseudonym assigned to the user of the end device and/or security module vis-à
- -vis a reputation system while employing authentication data pertaining to the digital pseudonym that are stored in the end device and/or security module, and the reputation system supplies a reputation value for the digital identity of the user on the basis of the authentication data.
- View Dependent Claims (30)
Specification