Trusted identities on a trusted computing platform
First Claim
1. A method of producing a trusted identity for a user of a trusted computing platform adapted to assure third parties interacting with the computer platform that the computer platform operates according to an indicated specification comprising:
- sending at least one existing identity certificate of the trusted computing platform and personal data of the user to a certification authority,the certification authority then verifying the at least one existing identity certificate and the personal data,on successful verification the certification authority producing at least one new identity certificate incorporating at least some of the personal data and sends the at least one new identity certificate to the user.
4 Assignments
0 Petitions
Accused Products
Abstract
A trusted certification authority service allows a user to control a combination or a subset of personal credentials associated with different trusted identities of the user to create a new identity that may be used by the user to entitle him to access or obtain a third party service. The copying and/or transfer of trust values (such as bank balances or loyalty points) between different trusted identities in order can maintain the anonymity of a person having one or more of said identities.
-
Citations
20 Claims
-
1. A method of producing a trusted identity for a user of a trusted computing platform adapted to assure third parties interacting with the computer platform that the computer platform operates according to an indicated specification comprising:
-
sending at least one existing identity certificate of the trusted computing platform and personal data of the user to a certification authority, the certification authority then verifying the at least one existing identity certificate and the personal data, on successful verification the certification authority producing at least one new identity certificate incorporating at least some of the personal data and sends the at least one new identity certificate to the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A trusted computing platform, including a processor and a memory, adapted to assure third parties interacting with the trusted computing platform that the trusted computing platform operates according to an indicated specification and having at least one existing identity certificate and being operable to send said at least one identity certificate and personal data of a user to a certification authority for verification, and in which the trusted computing platform is operable to receive from the certification authority a new identity certificate incorporating at least some of the personal data.
-
20. A certification authority, including a processor and a memory, for providing a trusted identity for a user of a trusted computing platform adapted to assure third parties interacting with the computer platform that the computer platform operates according to an indicated specification, wherein the certification authority is adapted to receive at least one existing identity certificate of the trusted computing platform and personal data of the user, to verify the at least one existing identity certificate and the personal data, and on successful verification, to produce at least one new identity certificate incorporating at least some of the personal data and sends the at least one new identity certificate to the user.
Specification