Method and Apparatus for Anonymous Authentication on Trust in Social Networking
2 Assignments
0 Petitions
Accused Products
Abstract
A method for anonymous trust authentication may comprise: issuing trust information to a first node from a network entity, wherein the trust information indicates a trust evaluation for the first node; distributing a trust list to a plurality of nodes comprising at least the first node and a second node, wherein the trust list is associated with the trust evaluation for the first node, and wherein the trust information and the trust list are used for an anonymous trust authentication between the first node and the second node.
30 Citations
80 Claims
-
1-60. -60. (canceled)
-
61. An apparatus, comprising:
-
at least one processor; and at least one memory comprising computer program code, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to perform at least the following; issue trust information to a first node from the apparatus, wherein the trust information indicates a trust evaluation for the first node; distribute a trust list to a plurality of nodes comprising at least the first node and a second node, wherein the trust list is associated with the trust evaluation for the first node, and wherein the trust information and the trust list are used for an anonymous trust authentication between the first node and the second node. - View Dependent Claims (62, 63, 64, 65, 66, 67)
-
-
68. An apparatus, comprising:
-
at least one processor; and at least one memory comprising computer program code, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to perform at least the following; obtain respective trust information from one or more network entities, wherein the trust information from a corresponding network entity indicates a trust evaluation for the apparatus by the corresponding network entity; generate security information for the apparatus based at least in part on the respective trust information; and send a message with authentication information to another apparatus from the apparatus, wherein the authentication information is associated with the security information and used for an anonymous trust authentication between the apparatus and the another apparatus. - View Dependent Claims (69, 70, 71, 72)
-
-
73. An apparatus, comprising:
-
at least one processor; and at least one memory comprising computer program code, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to perform at least the following; obtain, from one or more network entities, respective trust lists of which at least one trust list is associated with a trust evaluation for another apparatus; receive a message with authentication information at the apparatus from the another apparatus, wherein the authentication information is associated with at least one trust evaluation for the another apparatus; and perform an anonymous trust authentication between the apparatus and the another apparatus based at least in part on the authentication information and the respective trust lists. - View Dependent Claims (74, 75, 76, 77, 78, 79, 80)
-
Specification