-
公开(公告)号:AU2003300244A1
公开(公告)日:2004-07-22
申请号:AU2003300244
申请日:2003-12-19
Applicant: IBM
Inventor: BLAKELEY BURNETTE D , LOTSPIECH JEFFREY B , SRINIVASAN SAVITHA , SIGFREDO NIN I , DALIT NAOR , RAM REDDY
Abstract: A system, method, business method, and computer program product for conducting electronic transactions with a potentially untrusted server while maintaining user anonymity and transaction privacy, yet allowing the server to verify the user is a valid subscriber entitled to participate in the transaction. Anonymous service requests are sent to the server. The server transmits responses that have been encrypted such that only valid subscribers can decrypt them. Broadcast encryption schemes that enable selective revocation of misbehaving subscribers will tip off requestors that the server is trying to identify them. Transaction and content quantity can be monitored for usage-based billing while maintaining anonymity. Each content item may be uniquely encrypted with a content key that is then encrypted by a session key and included in encrypted form with a response, to reduce the computational workload.
-
公开(公告)号:DE60315726T2
公开(公告)日:2008-06-05
申请号:DE60315726
申请日:2003-12-19
Applicant: IBM
Inventor: LOTSPIECH JEFFREY B , SRINIVASAN SAVITHA , SIGFREDO NIN I , DALIT NAOR , RAM REDDY , BLAKELEY BURNETTE D
Abstract: A system, method, business method, and computer program product for conducting electronic transactions with a potentially untrusted server while maintaining user anonymity and transaction privacy, yet allowing the server to verify the user is a valid subscriber entitled to participate in the transaction. Anonymous service requests are sent to the server. The server transmits responses that have been encrypted such that only valid subscribers can decrypt them. Broadcast encryption schemes that enable selective revocation of misbehaving subscribers will tip off requestors that the server is trying to identify them. Transaction and content quantity can be monitored for usage-based billing while maintaining anonymity. Each content item may be uniquely encrypted with a content key that is then encrypted by a session key and included in encrypted form with a response, to reduce the computational workload.
-
公开(公告)号:DE60315726D1
公开(公告)日:2007-09-27
申请号:DE60315726
申请日:2003-12-19
Applicant: IBM
Inventor: LOTSPIECH JEFFREY B , SRINIVASAN SAVITHA , SIGFREDO NIN I , DALIT NAOR , RAM REDDY , BLAKELEY BURNETTE D
Abstract: A system, method, business method, and computer program product for conducting electronic transactions with a potentially untrusted server while maintaining user anonymity and transaction privacy, yet allowing the server to verify the user is a valid subscriber entitled to participate in the transaction. Anonymous service requests are sent to the server. The server transmits responses that have been encrypted such that only valid subscribers can decrypt them. Broadcast encryption schemes that enable selective revocation of misbehaving subscribers will tip off requestors that the server is trying to identify them. Transaction and content quantity can be monitored for usage-based billing while maintaining anonymity. Each content item may be uniquely encrypted with a content key that is then encrypted by a session key and included in encrypted form with a response, to reduce the computational workload.
-
公开(公告)号:CA2511061A1
公开(公告)日:2004-07-15
申请号:CA2511061
申请日:2003-12-19
Applicant: IBM
Inventor: LOTSPIECH JEFFREY B , SRINIVASAN SAVITHA , BLAKELEY BURNETTE D , RAM REDDY , DALIT NAOR , SIGFREDO NIN I
Abstract: A system, method, business method, and computer program product for conducti ng electronic transactions with a potentially untrusted server while maintainin g user anonymity and transaction privacy, yet allowing the server to verify th e user is a valid subscriber entitled to participate in the transaction. Anonymous service requests are sent to the server. The server transmits responses that have been encrypted such that only valid subscribers can decrypt them. Broadcast encryption schemes that enable selective revocation of misbehaving subscribers will tip off requestors that the server is trying to identify them. Transaction and content quantity can be monitored for usage- based billing while maintaining anonymity. Each content item may be uniquely encrypted with a content key that is then encrypted by a session key and included in encrypted form with a response, to reduce the computational workload.
-
-
-