User controlled anonymity when evaluating into a role
First Claim
1. A system for anonymous role authentication, comprising:
- an anonymous authentication controller comprising at least one processor connected to a memory and communicatively connected to a role authenticator via a network;
said anonymous authentication controller for requesting a role authentication certificate from said role authenticator;
said anonymous authentication controller for providing a credential that enables said role authenticator to determine that said particular user is a member of a particular role and a plurality of blinded role authentication certificates identifying said particular role;
said role authenticator, responsive to receiving said credential that specifies said particular user is a member of said particular role and receiving said plurality of blinded role authentication certificates, for requesting blinding factors for a only a random selection of said plurality of blinded role authentication certificates;
said anonymous authentication controller, responsive to receiving said request for said blinding factors for only said random selection of said plurality of blinded role authentication certificates, for returning said selection of blinding factors for only said random selection of said plurality of blinded role authentication certificates;
said role authenticator, responsive to receiving said returned selection of blinding factors, for unblinding said random selection of said plurality of blinded role authentication certificates and comparing roles specified in said unblinded selection of said plurality of blinded role authenticated certificates with said particular role;
said role authenticator, responsive to detecting said roles specified in said unblinded selection of said plurality of blinded role authenticated certificates match said particular role, for applying a digital signature to a remaining blinded selection of said plurality of blinded role authentication certificates and returning said signed remaining blinded selection of said plurality of blinded role authentication certificates to said anonymous authentication controller, wherein said signed remaining blinded selection of said plurality of blinded role authentication certificates authenticate that a holder of said role authentication certificate is a member of a particular role without allowing said role authenticator issuing said role authentication certificate to track an identity of a particular user holding said role authentication certificate;
said anonymous authentication controller, responsive to verifying that said digital signature of said role authenticator on said signed remaining blinded selection of said plurality of blinded role authentication certificates does not contain a subliminal channel that allows said role authenticator to include an identity of said particular user, for unblinding said signed remaining blinded selection of said plurality of blinded role authentication certificates while preserving said digital signature of said role authenticator;
said anonymous authentication controller for establishing an anonymous channel for anonymously presenting one of unblended signed role certificates as said role authentication certificate to a resource protector via said network, wherein said resource protector requires said particular user to authenticate into said particular role to access a resource, wherein said role authentication certificate authenticates said particular user into said particular role without enabling said resource protector to ascertain said identity of said particular user.
0 Assignments
0 Petitions
Accused Products
Abstract
A method, system, and program for user controlled anonymity when evaluating into a role are provided. An anonymous authentication controller enables a user to control anonymity of the user'"'"'s identity for role based network accesses to resources, without requiring reliance on any single third party to maintain user anonymity. First, a role authentication certificate is received from a role authenticator, wherein the role authentication certificate certifies that the holder of the role authentication certificate is a member of a particular role without allowing the role authenticator issuing the role authentication certificate the ability to track an identity of a user holding the role authentication certificate. Next, an anonymous channel is established for anonymously presenting the role authentication certificate to a resource protector, wherein the resource protector requires the user to authenticate into the particular role to access a resource, wherein the role authentication certificate authenticates the user into the particular role without enabling the resource protector to ascertain the identity of the user, such that the user is in control of maintaining user anonymity for authenticated role-based accesses.
-
Citations
15 Claims
-
1. A system for anonymous role authentication, comprising:
-
an anonymous authentication controller comprising at least one processor connected to a memory and communicatively connected to a role authenticator via a network; said anonymous authentication controller for requesting a role authentication certificate from said role authenticator; said anonymous authentication controller for providing a credential that enables said role authenticator to determine that said particular user is a member of a particular role and a plurality of blinded role authentication certificates identifying said particular role; said role authenticator, responsive to receiving said credential that specifies said particular user is a member of said particular role and receiving said plurality of blinded role authentication certificates, for requesting blinding factors for a only a random selection of said plurality of blinded role authentication certificates; said anonymous authentication controller, responsive to receiving said request for said blinding factors for only said random selection of said plurality of blinded role authentication certificates, for returning said selection of blinding factors for only said random selection of said plurality of blinded role authentication certificates; said role authenticator, responsive to receiving said returned selection of blinding factors, for unblinding said random selection of said plurality of blinded role authentication certificates and comparing roles specified in said unblinded selection of said plurality of blinded role authenticated certificates with said particular role; said role authenticator, responsive to detecting said roles specified in said unblinded selection of said plurality of blinded role authenticated certificates match said particular role, for applying a digital signature to a remaining blinded selection of said plurality of blinded role authentication certificates and returning said signed remaining blinded selection of said plurality of blinded role authentication certificates to said anonymous authentication controller, wherein said signed remaining blinded selection of said plurality of blinded role authentication certificates authenticate that a holder of said role authentication certificate is a member of a particular role without allowing said role authenticator issuing said role authentication certificate to track an identity of a particular user holding said role authentication certificate; said anonymous authentication controller, responsive to verifying that said digital signature of said role authenticator on said signed remaining blinded selection of said plurality of blinded role authentication certificates does not contain a subliminal channel that allows said role authenticator to include an identity of said particular user, for unblinding said signed remaining blinded selection of said plurality of blinded role authentication certificates while preserving said digital signature of said role authenticator; said anonymous authentication controller for establishing an anonymous channel for anonymously presenting one of unblended signed role certificates as said role authentication certificate to a resource protector via said network, wherein said resource protector requires said particular user to authenticate into said particular role to access a resource, wherein said role authentication certificate authenticates said particular user into said particular role without enabling said resource protector to ascertain said identity of said particular user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A non-transitory machine-readable medium storing machine executable instructions for anonymous role authentication, wherein the machine executable instructions when executed on a computer causes the computer to:
-
request, by an anonymous authentication controller, a role authentication certificate from a role authenticator; provide, by said anonymous authentication controller, a credential that enables said role authenticator to determine that said particular user is a member of a particular role and a plurality of blinded role authentication certificates identifying said particular role; responsive to said role authenticator receiving said credential that specifies said particular user is a member of said particular role and receiving said plurality of blinded role authentication certificates, request, by said role authenticator, blinding factors for a only a random selection of said plurality of blinded role authentication certificates; responsive to said anonymous authentication controller receiving said request for said blinding factors for only said random selection of said plurality of blinded role authentication certificates, return, by said anonymous authentication controller, said selection of blinding factors for only said random selection of said plurality of blinded role authentication certificates; responsive to said role authenticator receiving said returned selection of blinding factors, unblind, by said role authenticator, said random selection of said plurality of blinded role authentication certificates and comparing roles specified in said unblinded selection of said plurality of blinded role authenticated certificates with said particular role; responsive to said role authenticator detecting said roles specified in said unblinded selection of said plurality of blinded role authenticated certificates match said particular role, apply a digital signature, by said role authenticator, to a remaining blinded selection of said plurality of blinded role authentication certificates and returning said signed remaining blinded selection of said plurality of blinded role authentication certificates to said anonymous authentication controller, wherein said signed remaining blinded selection of said plurality of blinded role authentication certificates authenticate that a holder of said role authentication certificate is a member of a particular role without allowing said role authenticator issuing said role authentication certificate to track an identity of a particular user holding said role authentication certificate; responsive to verifying, by said anonymous authentication controller, that said digital signature of said role authenticator on said signed remaining blinded selection of said plurality of blinded role authentication certificates does not contain a subliminal channel that allows said role authenticator to include an identity of said particular user, unblind, by said anonymous authentication controller, said signed remaining blinded selection of said plurality of blinded role authentication certificates while preserving said digital signature of said role authenticator; establish, by said anonymous authentication controller, an anonymous channel for anonymously presenting one of unblended signed role certificates as said role authentication certificate to a resource protector, wherein said resource protector requires said particular user to authenticate into said particular role to access a resource, wherein said role authentication certificate authenticates said particular user into said particular role without enabling said resource protector to ascertain said identity of said particular user, such that said particular user is in control of any disclosure of said identity for authenticated role-based accesses. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
Specification