×

Method and apparatus for implementing traceable electronic cash

  • US 5,889,862 A
  • Filed: 07/15/1996
  • Issued: 03/30/1999
  • Est. Priority Date: 07/17/1995
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for implementing traceable electronic cash, comprising the steps:

  • (1) wherein a user sends a first institution public information N corresponding to his real name IDU and first secret information;

    (2) wherein said first institution recognizes the identity of said user, then generates a pseudonym I of said user and keeps secret the correspondence between at least either one of said pseudonym I and said public information N and said real name IDU ;

    (3) wherein said first institution attaches a signature to said public information N and said pseudonym I and sends said signature and said pseudonym I to said user;

    (4) wherein said user obtain a license B from said signature sent from said first institution and stores it together with said pseudonym I;

    (5) wherein said user uses said first secret information to calculate second secret information S corresponding to said pseudonym I and said public information N and holds said second secret information S;

    (6) wherein said user sends information containing at least a random number R and said license B and an amount of money A to a second institution to request it to issue electronic cash;

    (7) wherein said second institution adds a signature to said received information containing said license B and sends it to said user as information containing electronic cash C;

    (8) wherein said user checks said signed information from said second institution to see if said license B bears a signature to said public information N and said pseudonym I and if said electronic cash C is usable under said license B, thereafter making a payment to a third party through the use of said random number and said second secret information S;

    (9) wherein said third party sends said second institution all information of communication with said user so as to seek a settlement concerning said electronic cash C; and

    (10) wherein, when there is a likelihood of an attack, the correspondence between at least either one of said pseudonym I and said public information N and said real name IDU kept secret by said first institution is retrieved and said pseudonym I and said public information N are revealed to preclude the possibility of said attack.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×