Method and system for commerce with full anonymity
First Claim
Patent Images
1. A method of performing electronic commerce without a candidate customer being forced to disclose private data together with an identity of the candidate customer, to a business entity requiring said private data, said method comprising:
- establishing an intermediary relationship with a third party between the candidate customer and the business entity;
providing a proprietary item to said customer such that the customer can be identified as a legitimate owner of the item without revealing the identity of said customer;
performing electronic commerce between said customer and said business entity through said third party, utilizing said proprietary item and a document; and
replacing, by said third party, identification data of said candidate customer in said document with an identifier, and transmitting said document including said identifier to said business entity, such that an identity of said customer is kept from said business entity,wherein said business entity is provided with information identifying said customer as a transactional party in said electronic business transaction,wherein a Fourth Party delivers to the customer a portable device P(C) which carries biometrics of the customer such that the customer can be identified as a legitimate owner of the portable device P(C) without revealing the identity of said customer,wherein the device P(C) delivers a number S(C) at each transaction, and the number S(C) is readable from the portable device P(C) only in the presence of the customer,wherein said portable device P(C) generates numbers S(C,n), where n is an integer belonging to a set {1, 2, . . . , N}, andwherein for at least one of a new business entity and another partner of the customer, a new number n is chosen for all further transactions between the customer and said at least one of said new business unit and said another partner.
1 Assignment
0 Petitions
Accused Products
Abstract
A method (and system) of conducting business electronically between a first party and a second party, includes providing a third party who knows the identity of the first party but no privacy-compromising information regarding a proposed electronic business transaction between the first and second parties, and conducting the electronic business transaction between the first and second parties through the third party such that the identity of the first party is kept from the second party.
25 Citations
14 Claims
-
1. A method of performing electronic commerce without a candidate customer being forced to disclose private data together with an identity of the candidate customer, to a business entity requiring said private data, said method comprising:
-
establishing an intermediary relationship with a third party between the candidate customer and the business entity; providing a proprietary item to said customer such that the customer can be identified as a legitimate owner of the item without revealing the identity of said customer; performing electronic commerce between said customer and said business entity through said third party, utilizing said proprietary item and a document; and replacing, by said third party, identification data of said candidate customer in said document with an identifier, and transmitting said document including said identifier to said business entity, such that an identity of said customer is kept from said business entity, wherein said business entity is provided with information identifying said customer as a transactional party in said electronic business transaction, wherein a Fourth Party delivers to the customer a portable device P(C) which carries biometrics of the customer such that the customer can be identified as a legitimate owner of the portable device P(C) without revealing the identity of said customer, wherein the device P(C) delivers a number S(C) at each transaction, and the number S(C) is readable from the portable device P(C) only in the presence of the customer, wherein said portable device P(C) generates numbers S(C,n), where n is an integer belonging to a set {1, 2, . . . , N}, and wherein for at least one of a new business entity and another partner of the customer, a new number n is chosen for all further transactions between the customer and said at least one of said new business unit and said another partner.
-
-
2. A method of performing electronic commerce without a candidate customer being forced to disclose private data together with an identity of the candidate customer, to a business entity requiring said private data, said method comprising:
-
establishing an intermediary relationship with a third party between the candidate customer and the business entity; providing a proprietary item to said customer such that the customer can be identified as a legitimate owner of the item without revealing the identity of said customer; performing electronic commerce between said customer and said business entity through said third party, utilizing said proprietary item and a document; and replacing, by said third party, identification data of said candidate customer in said document with an identifier, and transmitting said document including said identifier to said business entity, such that an identity of said customer is kept from said business entity, wherein said business entity is provided with information identifying said customer as a transactional party in said electronic business transaction, wherein the business entity chooses a set of verifiers Vj, j=1, 2, . . . N, and wherein said verifiers are each equipped to verify portable devices, and are connectable to a network so as to output information to a third party T using privacy protection.
-
-
3. A method of performing electronic commerce without a candidate customer being forced to disclose private data together with an identity of the candidate customer, to a business entity requiring said private data, said method comprising:
-
establishing an intermediary relationship with a third party between the candidate customer and the business entity; providing a proprietary item to said customer such that the customer can be identified as a legitimate owner of the item without revealing the identity of said customer; performing electronic commerce between said customer and said business entity through said third party, utilizing said proprietary item and a document; and replacing, by said third party, identification data of said candidate customer in said document with an identifier, and transmitting said document including said identifier to said business entity, such that an identity of said customer is kept from said business entity, wherein said business entity is provided with information identifying said customer as a transactional party in said electronic business transaction, wherein said establishing an intermediary relationship includes sending by the customer to the third party said document to register with said business entity and software to encrypt the document using a public key pu1(I) included in a public signature scheme (Pr1(I),pu1(I)) of the business entity, said software further allowing the customer to compute a public signature scheme (Pr2(I,C),pu2(I,C)), and said document being provided over a network connected to said business entity. - View Dependent Claims (4, 5)
-
-
6. A method of performing electronic commerce without a candidate customer being forced to disclose private data together with an identity of the candidate customer, to a business entity requiring said private data, said method comprising:
-
establishing an intermediary relationship with a third party between the candidate customer and the business entity; providing a proprietary item to said customer such that the customer can be identified as a legitimate owner of the item without revealing the identity of said customer; performing electronic commerce between said customer and said business entity through said third party, utilizing said proprietary item and a document; and replacing, by said third party, identification data of said candidate customer in said document with an identifier, and transmitting said document including said identifier to said business entity, such that an identity of said customer is kept from said business entity, wherein said business entity is provided with information identifying said customer as a transactional party in said electronic commerce transaction, wherein, before establishing an intermediary relationship, the customer accesses one or more verifiers Vj, and wherein the customer identifies itself to each verifier Vj using a number S(C) associated with the proprietary item, and requests Vj to send S(C) to the business entity, together with data verified by Vj. - View Dependent Claims (7, 8)
-
-
9. A method of selecting a purveyor of goods or services in a confidential manner over a network, comprising:
-
sending, by a customer to a third party, an application and software for encrypting the application using a public key pu1(I), wherein said application is taken electronically from a business entity, wherein a public signature scheme of said business entity is (Pr1(I),pu1(I)), software allowing the customer to compute a public signature scheme (Pr2(I,C),pu2(I,C)), and wherein said business entity is provided with information identifying said customer only as a transactional party in said electronic business transaction, wherein said third party replaces identification data of said customer with an identifier in said application which is transmitted to said business entity, wherein said method further comprises; establishing a customer-purveyor contact over the network, said establishing comprising when submitting a transaction request, encrypted using pi1(I), the customer addresses the request to the third party, after selectively accessing one or more verifiers Vj; transmitting, by the third party T, the transaction request to the business entity after removing a header and attaching a number Ntransaction(T,C,I,Transaction) thereto; processing the request by the business entity; sending, by the business entity, a communication to the third party; transmitting said communication, after or while processing the transaction request, to the third party, said request being encrypted using the public key pu2(I,C); and transmitting, by the third party, the communication to the customer. - View Dependent Claims (10, 11, 12, 13, 14)
-
Specification