A Method and Apparatus for Anonymous and Trustworthy Authentication in Pervasive Social Networking
2 Assignments
0 Petitions
Accused Products
Abstract
A method for anonymous authentication may comprise: issuing token information to a first node registered with a network entity, wherein the token information indicates one or more tokens for the first node; distributing a token list to a plurality of nodes registered with the network entity, wherein the token list is associated with respective tokens for the plurality of nodes comprising at least the first node and a second node, and wherein the token information and the token list are used for an anonymous authentication between the first node and the second node.
-
Citations
72 Claims
-
1-55. -55. (canceled)
-
56. An apparatus, comprising:
-
at least one processor; and at least one memory comprising computer program code, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to perform at least the following; issuing token information to a first node registered with the apparatus, wherein the token information indicates one or more tokens for the first node; distributing a token list to a plurality of nodes registered with the apparatus, wherein the token list is associated with respective tokens for the plurality of nodes comprising at least the first node and a second node, and wherein the token information and the token list are used for an anonymous authentication between the first node and the second node. - View Dependent Claims (57, 58, 59, 60, 61, 62)
-
-
63. An apparatus, comprising:
-
at least one processor; and at least one memory comprising computer program code, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to perform at least the following; obtaining token information from a network entity with which the apparatus is registered, wherein the token information indicates one or more tokens for the apparatus; generating security information for the apparatus based at least in part on the token information; and sending a message with authentication information to another apparatus from the apparatus, wherein the authentication information is associated with the security information and used for an anonymous authentication between the apparatus and the another apparatus. - View Dependent Claims (64, 65, 66, 67)
-
-
68. A computer program product comprising a computer-readable medium bearing computer program code embodied therein for use with a computer, the computer program code comprising:
-
code for obtaining token information from a network entity with which a first node is registered, wherein the token information indicates one or more tokens for the first node; code for generating security information for the first node based at least in part on the token information; and code for sending a message with authentication information to a second node from the first node, wherein the authentication information is associated with the security information and used for an anonymous authentication between the first node and the second node. - View Dependent Claims (69, 70, 71, 72)
-
Specification