WO2001069839A3 - Automatic identity protection system with remote third party monitoring - Google Patents

Automatic identity protection system with remote third party monitoring Download PDF

Info

Publication number
WO2001069839A3
WO2001069839A3 PCT/IB2001/000358 IB0100358W WO0169839A3 WO 2001069839 A3 WO2001069839 A3 WO 2001069839A3 IB 0100358 W IB0100358 W IB 0100358W WO 0169839 A3 WO0169839 A3 WO 0169839A3
Authority
WO
WIPO (PCT)
Prior art keywords
remote
protection system
party
identity protection
party monitoring
Prior art date
Application number
PCT/IB2001/000358
Other languages
French (fr)
Other versions
WO2001069839A2 (en
Inventor
Hakon Gudbjartsson
Sverrir Karlsson
Skeggi Thormar
Original Assignee
Decode Genetics Ehf
Hakon Gudbjartsson
Sverrir Karlsson
Skeggi Thormar
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Decode Genetics Ehf, Hakon Gudbjartsson, Sverrir Karlsson, Skeggi Thormar filed Critical Decode Genetics Ehf
Priority to GB0221138A priority Critical patent/GB2375697B/en
Priority to DE10195924T priority patent/DE10195924T1/en
Priority to MXPA02008919A priority patent/MXPA02008919A/en
Priority to AU2001244426A priority patent/AU2001244426B2/en
Priority to AU4442601A priority patent/AU4442601A/en
Priority to JP2001567171A priority patent/JP2003527035A/en
Priority to CA2403488A priority patent/CA2403488C/en
Publication of WO2001069839A2 publication Critical patent/WO2001069839A2/en
Publication of WO2001069839A3 publication Critical patent/WO2001069839A3/en
Priority to SE0202712A priority patent/SE520078C2/en
Priority to IS6547A priority patent/IS2078B/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/383Anonymous user system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0414Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden during transmission, i.e. party's identity is protected against eavesdropping, e.g. by using temporary identifiers, but is known to the other party or parties involved in the communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2115Third party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/04Masking or blinding
    • H04L2209/043Masking or blinding of tables, e.g. lookup, substitution or mapping
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/42Anonymization, e.g. involving pseudonyms

Abstract

This invention provides an automated system for the processing of data packets, composed of personal identifiers and personal data, such that the personally identifiable data sent by one party may be considered anonymous once received by a second party. The invention uses secret sharing techniques to facilitate distributed key management of the mapping functions and strong authentication to allow the system to be operated remotely.
PCT/IB2001/000358 2000-03-17 2001-03-13 Automatic identity protection system with remote third party monitoring WO2001069839A2 (en)

Priority Applications (9)

Application Number Priority Date Filing Date Title
GB0221138A GB2375697B (en) 2000-03-17 2001-03-13 Automatic identity protection system with remote third party monitoring
DE10195924T DE10195924T1 (en) 2000-03-17 2001-03-13 Automatic identity protection system with remote monitoring by a third party
MXPA02008919A MXPA02008919A (en) 2000-03-17 2001-03-13 Automatic identity protection system with remote third party monitoring.
AU2001244426A AU2001244426B2 (en) 2000-03-17 2001-03-13 Automatic identity protection system with remote third party monitoring
AU4442601A AU4442601A (en) 2000-03-17 2001-03-13 Automatic identity protection system with remote third party monitoring
JP2001567171A JP2003527035A (en) 2000-03-17 2001-03-13 Automatic identification protection system with remote third party monitoring
CA2403488A CA2403488C (en) 2000-03-17 2001-03-13 Automatic identity protection system with remote third party monitoring
SE0202712A SE520078C2 (en) 2000-03-17 2002-09-13 Acoustic identification protection system with remote monitoring by third parties
IS6547A IS2078B (en) 2000-03-17 2002-09-13 Automatic third-party authentication system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US19026200P 2000-03-17 2000-03-17
US60/190,262 2000-03-17

Publications (2)

Publication Number Publication Date
WO2001069839A2 WO2001069839A2 (en) 2001-09-20
WO2001069839A3 true WO2001069839A3 (en) 2002-03-07

Family

ID=22700614

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2001/000358 WO2001069839A2 (en) 2000-03-17 2001-03-13 Automatic identity protection system with remote third party monitoring

Country Status (10)

Country Link
US (1) US7404079B2 (en)
JP (1) JP2003527035A (en)
AU (2) AU4442601A (en)
CA (1) CA2403488C (en)
DE (1) DE10195924T1 (en)
GB (1) GB2375697B (en)
IS (1) IS2078B (en)
MX (1) MXPA02008919A (en)
SE (1) SE520078C2 (en)
WO (1) WO2001069839A2 (en)

Families Citing this family (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7457948B1 (en) * 2000-09-29 2008-11-25 Lucent Technologies Inc. Automated authentication handling system
FR2847401A1 (en) * 2002-11-14 2004-05-21 France Telecom Access to a network service with rapid, revokable anonymous authentication and session creation and maintenance for online auctions, uses anonymous certificate of authority to produce anonymous signature which can be checked if needed
US8321946B2 (en) * 2003-12-05 2012-11-27 Hewlett-Packard Development Company, L.P. Method and system for preventing identity theft in electronic communications
US8146141B1 (en) * 2003-12-16 2012-03-27 Citibank Development Center, Inc. Method and system for secure authentication of a user by a host system
US7640594B2 (en) * 2004-01-21 2009-12-29 Sap Ag Secure storage in a file system
WO2009113444A1 (en) * 2008-03-10 2009-09-17 三菱電機株式会社 Confidential information management device, information processing device, and confidential information management system
US9425960B2 (en) * 2008-10-17 2016-08-23 Sap Se Searchable encryption for outsourcing data analytics
WO2010071843A1 (en) * 2008-12-19 2010-06-24 Privatetree, Llc. Systems and methods for facilitating relationship management
US20100262836A1 (en) * 2009-04-13 2010-10-14 Eric Peukert Privacy and confidentiality preserving mapping repository for mapping reuse
US20100313009A1 (en) * 2009-06-09 2010-12-09 Jacques Combet System and method to enable tracking of consumer behavior and activity
US9621584B1 (en) * 2009-09-30 2017-04-11 Amazon Technologies, Inc. Standards compliance for computing data
US8799022B1 (en) * 2011-05-04 2014-08-05 Strat ID GIC, Inc. Method and network for secure transactions
KR101575282B1 (en) * 2011-11-28 2015-12-09 한국전자통신연구원 Agent device and method for sharing security information based on anonymous identifier between security management domains
US8793805B1 (en) * 2012-07-30 2014-07-29 Amazon Technologies, Inc. Automatic application dependent anonymization
US8955075B2 (en) * 2012-12-23 2015-02-10 Mcafee Inc Hardware-based device authentication
US8850543B2 (en) * 2012-12-23 2014-09-30 Mcafee, Inc. Hardware-based device authentication
US9419953B2 (en) 2012-12-23 2016-08-16 Mcafee, Inc. Trusted container
US10489861B1 (en) 2013-12-23 2019-11-26 Massachusetts Mutual Life Insurance Company Methods and systems for improving the underwriting process
US11403711B1 (en) 2013-12-23 2022-08-02 Massachusetts Mutual Life Insurance Company Method of evaluating heuristics outcome in the underwriting process
US9633209B1 (en) 2014-02-21 2017-04-25 Amazon Technologies, Inc. Chaining of use case-specific entity identifiers
US9344409B2 (en) * 2014-07-18 2016-05-17 Bank Of America Corporation Method and apparatus for masking non-public data elements in uniform resource indentifiers (“URI”)
US10320574B2 (en) 2017-05-05 2019-06-11 International Business Machines Corporation Blockchain for open scientific research
JP7287096B2 (en) * 2019-05-09 2023-06-06 大日本印刷株式会社 Information processing device, control method and program

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3962539A (en) * 1975-02-24 1976-06-08 International Business Machines Corporation Product block cipher system for data security
US4405829A (en) * 1977-12-14 1983-09-20 Massachusetts Institute Of Technology Cryptographic communications system and method
US5825890A (en) * 1995-08-25 1998-10-20 Netscape Communications Corporation Secure socket layer application program apparatus and method
EP0899918A2 (en) * 1997-08-28 1999-03-03 Lucent Technologies Inc. System and method for providing anonymous remailing and filtering of electronic mail
US5907677A (en) * 1996-08-23 1999-05-25 Ecall Inc. Method for establishing anonymous communication links
US5923842A (en) * 1997-03-06 1999-07-13 Citrix Systems, Inc. Method and apparatus for simultaneously providing anonymous user login for multiple users
US6023510A (en) * 1997-12-24 2000-02-08 Philips Electronics North America Corporation Method of secure anonymous query by electronic messages transported via a public network and method of response

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5638445A (en) * 1995-09-19 1997-06-10 Microsoft Corporation Blind encryption
CA2264912C (en) * 1996-09-06 2002-11-19 Walker Asset Management Limited Partnership Method and system for establishing and maintaining user-controlled anonymous communications
US5903652A (en) * 1996-11-25 1999-05-11 Microsoft Corporation System and apparatus for monitoring secure information in a computer network
US5961593A (en) * 1997-01-22 1999-10-05 Lucent Technologies, Inc. System and method for providing anonymous personalized browsing by a proxy system in a network
US7143438B1 (en) * 1997-09-12 2006-11-28 Lucent Technologies Inc. Methods and apparatus for a computer network firewall with multiple domain support
US6081793A (en) * 1997-12-30 2000-06-27 International Business Machines Corporation Method and system for secure computer moderated voting
US6151631A (en) * 1998-10-15 2000-11-21 Liquid Audio Inc. Territorial determination of remote computer location in a wide area network for conditional delivery of digitized products
DE19914631A1 (en) * 1999-03-31 2000-10-12 Bosch Gmbh Robert Input procedure in a driver information system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3962539A (en) * 1975-02-24 1976-06-08 International Business Machines Corporation Product block cipher system for data security
US4405829A (en) * 1977-12-14 1983-09-20 Massachusetts Institute Of Technology Cryptographic communications system and method
US5825890A (en) * 1995-08-25 1998-10-20 Netscape Communications Corporation Secure socket layer application program apparatus and method
US5907677A (en) * 1996-08-23 1999-05-25 Ecall Inc. Method for establishing anonymous communication links
US5923842A (en) * 1997-03-06 1999-07-13 Citrix Systems, Inc. Method and apparatus for simultaneously providing anonymous user login for multiple users
EP0899918A2 (en) * 1997-08-28 1999-03-03 Lucent Technologies Inc. System and method for providing anonymous remailing and filtering of electronic mail
US6023510A (en) * 1997-12-24 2000-02-08 Philips Electronics North America Corporation Method of secure anonymous query by electronic messages transported via a public network and method of response

Also Published As

Publication number Publication date
MXPA02008919A (en) 2003-02-12
IS2078B (en) 2006-02-15
US20010027519A1 (en) 2001-10-04
CA2403488C (en) 2011-10-18
CA2403488A1 (en) 2001-09-20
WO2001069839A2 (en) 2001-09-20
GB2375697B (en) 2004-03-24
DE10195924T1 (en) 2003-04-24
US7404079B2 (en) 2008-07-22
GB2375697A (en) 2002-11-20
SE520078C2 (en) 2003-05-20
IS6547A (en) 2002-09-13
AU2001244426B2 (en) 2006-06-08
SE0202712L (en) 2002-10-29
AU4442601A (en) 2001-09-24
JP2003527035A (en) 2003-09-09
GB0221138D0 (en) 2002-10-23
SE0202712D0 (en) 2002-09-13

Similar Documents

Publication Publication Date Title
WO2001069839A3 (en) Automatic identity protection system with remote third party monitoring
WO2004057444A3 (en) Using trusted communication channel to combat user name/password theft
WO2010011731A3 (en) Methods and systems for secure key entry via communication networks
WO2004081719A3 (en) Methods and systems for digital rights management of protected content
WO2009031112A3 (en) Node for a network and method for establishing a distributed security architecture for a network
WO2004046849A3 (en) Cryptographic methods and apparatus for secure authentication
WO2007149977A3 (en) Location-based security, privacy, access control and monitoring system
WO1998045981A3 (en) Cryptographic system and protocol for establishing secure authenticated remote access
WO2003010942A3 (en) System and method for improved security in a handset reprovisioning and reprogramming
WO2004075094A3 (en) Federated management of content repositories
WO2006002926A3 (en) Method for detecting and reacting against possible attack to security enforcing operation performed by a cryptographic token or card
WO2007103906A3 (en) Secure data transmission using undiscoverable or black data
WO2004049620A8 (en) System and method for securely installing a cryptographic system on a secure device
WO2005059717A3 (en) Certificate based digital rights management
BR0315078A (en) Tamper-resistant security device, user terminal, and network server
WO2002017594A3 (en) Systems and methods for distributed network protection
WO2010144815A3 (en) System and method for providing security aboard a moving platform
WO2006041517A3 (en) Partition and recovery of a verifiable digital secret
CA2576622A1 (en) System and method for controlling data communications between a server and a client device
UA66921C2 (en) Method for protecting data in transmission mode (variants); data transmission unit (variants), data protection unit (variants), and data transmission system for implementing the method
WO2007005919A3 (en) System and method for security in global computer transactions that enable reverse-authentication of a server by a client
WO2007096871A3 (en) Device, system and method of accessing a security token
WO2006091396A3 (en) Payload layer security for file transfer
WO2007084863A3 (en) Privacy protection in communication systems
WO2008038242A3 (en) A secure non-volatile memory device and a method of protecting data therein

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
AK Designated states

Kind code of ref document: A3

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

WWE Wipo information: entry into national phase

Ref document number: 2001244426

Country of ref document: AU

ENP Entry into the national phase

Ref document number: 200221138

Country of ref document: GB

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: PA/a/2002/008919

Country of ref document: MX

WWE Wipo information: entry into national phase

Ref document number: 02027126

Country of ref document: SE

WWE Wipo information: entry into national phase

Ref document number: 2403488

Country of ref document: CA

ENP Entry into the national phase

Ref document number: 2001 567171

Country of ref document: JP

Kind code of ref document: A

WWP Wipo information: published in national office

Ref document number: 02027126

Country of ref document: SE

RET De translation (de og part 6b)

Ref document number: 10195924

Country of ref document: DE

Date of ref document: 20030424

Kind code of ref document: P

WWE Wipo information: entry into national phase

Ref document number: 10195924

Country of ref document: DE