Reputation system and method
First Claim
1. A method for securing a transaction system using a reputation system, an end device having a security module, and a portable data carrier, the method comprising the steps of:
- receiving, by the security module, data from the portable data carrier that proofs a digital identity stored in the security module;
storing, by the security module, authentication data and the digital identity, wherein the digital identity is associated with one or more digital pseudonyms;
accessing, by the security module, at least one digital pseudonym using the authentication data;
sending, by the security module, the digital identity or at least one digital pseudonym to the reputation system;
mutually authenticating with the portable data carrier by the security module and based on the mutual authentication creating a channel between the portable data carrier and the end device;
authenticating, by the security module, a user of the end device through the channel using the authentication data;
based on the authenticating of the user, sending, by the security module, the authentication data to the reputation system;
identifying, by the reputation system, a transaction associated with the user;
based on the identified transaction, updating, by the reputation system, a reputation value; and
sending, by the reputation system, the reputation value to the security module, wherein the reputation value is a rating of the user or of the reputation system, andwherein the reputation value is stored in the security module.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for securing a transaction in a reputation system includes the following steps: authenticating a user vis-à-vis an end device by means of an electronic proof of identity for releasing authentication data for the digital identity that are stored on the end device, and authenticating the digital pseudonym assigned to the user vis-à-vis the reputation system by means of the end device while employing the stored authentication data pertaining to the digital pseudonym. The electronic proof of identity can be present as an electronic identity card in the form of a portable data carrier.
-
Citations
8 Claims
-
1. A method for securing a transaction system using a reputation system, an end device having a security module, and a portable data carrier, the method comprising the steps of:
-
receiving, by the security module, data from the portable data carrier that proofs a digital identity stored in the security module; storing, by the security module, authentication data and the digital identity, wherein the digital identity is associated with one or more digital pseudonyms; accessing, by the security module, at least one digital pseudonym using the authentication data; sending, by the security module, the digital identity or at least one digital pseudonym to the reputation system; mutually authenticating with the portable data carrier by the security module and based on the mutual authentication creating a channel between the portable data carrier and the end device; authenticating, by the security module, a user of the end device through the channel using the authentication data; based on the authenticating of the user, sending, by the security module, the authentication data to the reputation system; identifying, by the reputation system, a transaction associated with the user; based on the identified transaction, updating, by the reputation system, a reputation value; and sending, by the reputation system, the reputation value to the security module, wherein the reputation value is a rating of the user or of the reputation system, and wherein the reputation value is stored in the security module. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
Specification