METHOD FOR ENSURING PRIVACY IN ELECTRONIC TRANSACTIONS WITH SESSION KEY BLOCKS

    公开(公告)号:AU2003300244A1

    公开(公告)日:2004-07-22

    申请号:AU2003300244

    申请日:2003-12-19

    Applicant: IBM

    Abstract: A system, method, business method, and computer program product for conducting electronic transactions with a potentially untrusted server while maintaining user anonymity and transaction privacy, yet allowing the server to verify the user is a valid subscriber entitled to participate in the transaction. Anonymous service requests are sent to the server. The server transmits responses that have been encrypted such that only valid subscribers can decrypt them. Broadcast encryption schemes that enable selective revocation of misbehaving subscribers will tip off requestors that the server is trying to identify them. Transaction and content quantity can be monitored for usage-based billing while maintaining anonymity. Each content item may be uniquely encrypted with a content key that is then encrypted by a session key and included in encrypted form with a response, to reduce the computational workload.

    2.
    发明专利
    未知

    公开(公告)号:DE60315726T2

    公开(公告)日:2008-06-05

    申请号:DE60315726

    申请日:2003-12-19

    Applicant: IBM

    Abstract: A system, method, business method, and computer program product for conducting electronic transactions with a potentially untrusted server while maintaining user anonymity and transaction privacy, yet allowing the server to verify the user is a valid subscriber entitled to participate in the transaction. Anonymous service requests are sent to the server. The server transmits responses that have been encrypted such that only valid subscribers can decrypt them. Broadcast encryption schemes that enable selective revocation of misbehaving subscribers will tip off requestors that the server is trying to identify them. Transaction and content quantity can be monitored for usage-based billing while maintaining anonymity. Each content item may be uniquely encrypted with a content key that is then encrypted by a session key and included in encrypted form with a response, to reduce the computational workload.

    3.
    发明专利
    未知

    公开(公告)号:DE60315726D1

    公开(公告)日:2007-09-27

    申请号:DE60315726

    申请日:2003-12-19

    Applicant: IBM

    Abstract: A system, method, business method, and computer program product for conducting electronic transactions with a potentially untrusted server while maintaining user anonymity and transaction privacy, yet allowing the server to verify the user is a valid subscriber entitled to participate in the transaction. Anonymous service requests are sent to the server. The server transmits responses that have been encrypted such that only valid subscribers can decrypt them. Broadcast encryption schemes that enable selective revocation of misbehaving subscribers will tip off requestors that the server is trying to identify them. Transaction and content quantity can be monitored for usage-based billing while maintaining anonymity. Each content item may be uniquely encrypted with a content key that is then encrypted by a session key and included in encrypted form with a response, to reduce the computational workload.

    METHOD FOR ENSURING PRIVACY IN ELECTRONIC TRANSACTIONS WITH SESSION KEY BLOCKS

    公开(公告)号:CA2511061A1

    公开(公告)日:2004-07-15

    申请号:CA2511061

    申请日:2003-12-19

    Applicant: IBM

    Abstract: A system, method, business method, and computer program product for conducti ng electronic transactions with a potentially untrusted server while maintainin g user anonymity and transaction privacy, yet allowing the server to verify th e user is a valid subscriber entitled to participate in the transaction. Anonymous service requests are sent to the server. The server transmits responses that have been encrypted such that only valid subscribers can decrypt them. Broadcast encryption schemes that enable selective revocation of misbehaving subscribers will tip off requestors that the server is trying to identify them. Transaction and content quantity can be monitored for usage- based billing while maintaining anonymity. Each content item may be uniquely encrypted with a content key that is then encrypted by a session key and included in encrypted form with a response, to reduce the computational workload.

Patent Agency Ranking