WO2001090968A1 - A system and method for establishing a privacy communication path - Google Patents

A system and method for establishing a privacy communication path Download PDF

Info

Publication number
WO2001090968A1
WO2001090968A1 PCT/DK2001/000352 DK0100352W WO0190968A1 WO 2001090968 A1 WO2001090968 A1 WO 2001090968A1 DK 0100352 W DK0100352 W DK 0100352W WO 0190968 A1 WO0190968 A1 WO 0190968A1
Authority
WO
WIPO (PCT)
Prior art keywords
client
legal entity
legal
communication
entity
Prior art date
Application number
PCT/DK2001/000352
Other languages
French (fr)
Inventor
Stephan J. Engberg
Original Assignee
Engberg Stephan J
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Engberg Stephan J filed Critical Engberg Stephan J
Priority to EP01933648A priority Critical patent/EP1290599A1/en
Priority to AU2001260087A priority patent/AU2001260087A1/en
Publication of WO2001090968A1 publication Critical patent/WO2001090968A1/en
Priority to US10/302,738 priority patent/US20030158960A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/02Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/48Message addressing, e.g. address format or anonymous messages, aliases
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles

Definitions

  • P3P - a standard pushed by for instance Microsoft - is basically an automatic profile information pusher. It totally fails to handle the basic issue of releasing identifiable information per definition is leading to total loss of information control.
  • An object of the present invention is therefor to provide a system to solve this problem such that individuals have full Privacy control over persistent and convenience-rich relationships - only restricted by minimum requirements to accountability in case of fraud as defined by law.
  • the invention implements a Privacy Infrastructure Platform that provides a solution for privacy enabling communication and secure trade of both electronic and physical goods and services.
  • a Privacy Infrastructure Platform that provides a solution for privacy enabling communication and secure trade of both electronic and physical goods and services.
  • the invention builds a support for Privacy Enabling the full value chain from the original supplier to the consumer.
  • the invention can support trade across existing standard barriers supporting standard conversion, government reporting and existing and future eCommerce standards such as EDIFACT, OFX, OBI and CBL.
  • the solution is Privacy Enhancing putting the Individual in control.
  • the Individual is free to encrypt content of communication and private data using any encryption technique.
  • the Individual will retain possibility to stop any further contact with specific companies without these companies have identifiable private information to abuse.
  • the trusted party can reveal the identity of the individual after legal proceedings protecting individual rights which can include anonymous legal representation.
  • the invention establishes an infrastructure for communication, trade and marketing services for Personal Relationship Management and Corporate Customer Relationship Management.
  • the invention builds a service platform for Communities, Auctions and Market Makers combined with a service interface for privacy-enabled Customer Agents and Selling Agents where private information can be made available for analysis under individual control.
  • the invention also provides a solution to reverse the increasing sales/marketing communication pressure on the individual to a Suggestion House where the individual is in control.
  • the Suggestion House structures the pre-purchase phase handling inbound suggestions, requested offers, interest list, wish lists with restricted access, shopping lists and full use of the Privacy Platform Trade services for fulfillment of purchases including anonymous delivery.
  • a communication path could be any path adapted for communication between two legal entities such as between two persons or between a person and an electronic agent of a legal entity such as an Internet shop.
  • a regular phone line a mail system, a postal mail delivery, a short-range wireless session involving infrared or other wireless communication protocols, a physical contact in a store, a confirmation request, a payment request, a legal dispute settlement or any internet related communication attempt.
  • a set of communication rules could be a list of logical rules determining whether said communication path should be established, how such a communication path should be established, by whom such a communication path should be established, to whom such a communication path should be established based on access actual information related to any of the legal entities, the actual situation, the history leading to the situation, expert or other advice such as a content scanner, information about the communication path or the communication itself whether based on information freely, required or otherwise collected, accessed or evaluated.
  • a set of communication rules further could include information as to providing second legal entity with authentication or profile information related to said communication path and/or first legal entity.
  • a virtual identifier could be a virtual identifier of a company combined with a company only unique identifier, such as a company tax registration number combined with a random, but unique, customer number or a customer chosen nickname.
  • a virtual identifier could also be related to a specific communication channel such as an email-address or a Public digital signature key related to a company-specific pseudonym.
  • a preferred embodiment involves providing a virtual identifier equaling establishing an authenticated yet anonymous session in any kind of communication path.
  • a first or second legal entity could be a person acting in any role such as a legally identified person acting as a private individual, an employee acting as a purchaser of a company. It could also be an electronic agent acting on behalf of a legal entity.
  • First legal entity is established with means to remain anonymous to second legal entity even with multiple establishments of any communication path across online and offline channels such as telephone conversations, physical appearance in a shop, package deliveries, payments, interactive internet sessions or email.
  • the second legal entity according to the first aspect of the present invention may be provided with means for obtaining a legal identification of the first legal entity based on the virtual identifier. Further, the means for legal identification may be provided by a third legal entity according to a set of rules agreed between the first legal entity and the third legal entity. Additionally, the means for legal identification may be provided by a third legal entity according to a set of rules determined by a fourth legal entity.
  • the method according to the first aspect of the present invention may further comprise a step of providing the second legal entity with means for associating a first virtual identifier of a first legal entity with previous communication path established with that first legal entity. Further, the second legal entity is provided with means for obtaining information about previous communication path for a first virtual identifier of a first legal entity.
  • the method according to first aspect of the present invention may further comprise a step of providing a second virtual identifier of the second legal entity to the first legal entity, the second legal entity remaining anonymous to the first legal entity.
  • the method according to the first aspect of the present invention may further comprise the step of providing legal identification of the first legal entity to the second legal entity upon request from the first legal entity.
  • the method according to the first aspect of the present invention may further comprise the step of establishing a communication path to the first legal entity in response to receiving a request from the second legal entity.
  • the method according to the first aspect of the present invention may further comprise the step of establishing a communication path in accordance with a second set of communication rules specified by the second legal entity.
  • the method according to the first aspect of the present invention may further comprise the step of establishing a communication path to the second legal entity in accordance with the second set of communication rules in response to receiving a request from the first legal entity.
  • the method according to the first aspect of the present invention may further comprise the step of establishing the communication path between the first legal entity and the second legal entity in response to a request from a third legal entity, the communication path is established in accordance with the first set of communication rules and the second set of communication rules.
  • a communication path according to the first aspect of the present invention may be established between the first legal entity and the third legal entity and wherein another communication path is established between the second legal entity and the third legal entity so as to establish communication between the first legal entity and the second legal entity.
  • the communication path between the first legal entity and the third legal entity may be established in accordance with the first set of communication rules. Further, the communication path between the second legal entity and the third legal entity may be established in accordance with the second set of communication rules.
  • the communications path may be categorised and wherein the communication path is established in response to a request, and the request may comprise a communication path category and a virtual identifier of a legal entity.
  • the communication path may be adapted to transfer information between the first and the second legal entity and the information may be evaluated based on a pre-determined criteria determined by the first legal entity. The selected information may be transferred to a first information carrier based on the evaluation and/or the first set of communication rules.
  • the third legal entity according to the first aspect of the present invention may be provided with a profile of the first legal entity and the third legal entity may be invited to transfer selected information from the first information carrier to a second information carrier based on the profile. Further, the third legal entity may be provided with information about communication path established between a first and a second legal entity and wherein the first legal entity remains anonymous to the third legal entity.
  • a commercial transaction according to the first aspect of the present invention may be established based on information comprised in the first and/or the second information carrier.
  • the communication path according to the first aspect of the present invention may be established between a first legal entity and a second legal entity based on information about previous communication path established with the second legal entity.
  • a preference list of the first legal entity may be created from the information about the communication path.
  • the second legal entity according to the first aspect of the present invention may be provided with a profile of the first legal entity. Further, the third legal entity may confirm the profile, the first legal entity remaining anonymous to the second legal entity. Furthermore, the second legal entity may be provided with means for requesting the profile based on rules defined by the first legal entity. Additionally, the second legal entity is provided the profile by the first legal entity.
  • the method according to the first aspect of the present invention may establish a communication path between a first legal entity and a second legal entity based on information about previous communication path established with the second legal entity.
  • the method according to the first aspect of the present invention may enable a "closed loop control" of communication interactions wherein evaluation of previous interaction can be used e.g. to establish trust e.g. towards a company using the communication path to advertise. If company behaves malicious, this information will be available e.g. for potential customers of that company who may have a filter rule which is based on the evaluation as part of their communication rules. Another consequence of malicious behaviour is that customers may as part of their set of communication rules have a threshold evaluation value for accepting authentication.
  • a third legal entity according to a second aspect of the invention may confirm existence of a traceable non-reputable legal commitment of the one of either the first or the second legal entity. Further, the third legal entity may provide prove of existence of the legal commitment.
  • the method according to a second aspect of the invention may further comprise a step of providing the second legal entity with means for associating a first virtual identifier of a first legal entity with previous legal commitments established with that first legal entity. Further, the second legal entity may be provided with means for obtaining information about previous legal commitments for a first virtual identifier of a first legal entity.
  • a legal commitment according to a second aspect of the invention may be established between a first legal entity and a second legal entity based on information about previous legal commitments established with the second legal entity.
  • a third legal entity according to a second aspect of the invention may be provided with information about legal commitments between a first and a second legal entity and the first legal entity may remain anonymous to the third legal entity.
  • the legal commitment according to a second aspect of the invention may comprise performing at least one of the following activities:
  • the first legal entity may remain anonymous to the second legal entity.
  • the second legal entity may remain anonymous to the first legal entity.
  • the first legal entity may transfer a financial instrument to the second legal entity, the first legal entity remaining anonymous to the second legal entity.
  • the first legal entity may transfer a first financial instrument to a third legal entity, upon receipt of said first financial instrument the third legal entity transfer a second financial instrument to the second legal entity, the first legal entity remaining anonymous to the second legal entity.
  • the method according to a second aspect of the invention may further comprise the second legal entity delivering a service to the first legal entity, the second legal entity addressing a virtual identifier of the first legal entity. Further the method may further comprise the steps of: depositing a financial instrument with a third legal entity, the first legal entity ordering a service from the second legal entity, the second legal entity requesting confirmation of payment from the third legal entity, the second legal entity delivering the service addressing the virtual identifier of the first legal entity upon receipt of the confirmation.
  • the addressing the virtual identifier according to a second aspect of the invention may comprise an identifier of the third legal entity, a virtual identifier of the second legal entity, and encrypted: the virtual identifier of the first legal entity, and an identifier of the service.
  • the encrypted identifiers may be decrypted by a key common to the second and third legal entity.
  • the step of delivering according to a second aspect of the invention may comprise the step of: forwarding the service to a fourth legal entity, requesting a physical delivery address from the third entity by means of the fourth legal entity.
  • the method according to the second aspect of the present invention may further comprise the step of the third legal entity providing the physical delivery address to the fourth legal entity according to the first set of communication rules. Further, the step of delivering may further comprise the step of: receiving a receipt acknowledging delivery of the service at the physical address by means of the fourth legal entity. The receipt may comprise a proof of delivery at the physical delivery address. The proof of delivery may be verified by the fourth legal entity.
  • the method according to the second aspect of the present invention may further comprise the step of releasing payment according to a pre-defined set of trade rules.
  • the set of trade rules is agreed between the first and the second legal entity.
  • the step of ordering a service according to the second aspect of the present invention may be performed in a physical or electronic market place, such as an auction, a stock exchange, a community, a trade portal, etc.
  • a third aspect of the invention obtained by a method for commercial transactions between a first legal entity and a second legal entity, wherein a first communication path is established between the first legal entity and a third legal entity and wherein a second communication path is established between the second legal entity and the third legal entity and wherein the first and second communication path is adapted for providing a legal commitment of the first legal entity towards the second legal entity, said legal commitment comprising the steps of:
  • the communication according to the third aspect of the present invention may be between the third and the first legal entity established by a fourth legal entity, the communication path to the first legal entity remaining unknown to the third legal entity. Further, the communication path is established according to the method according to the first aspect of the present invention.
  • the methods according to the first, second or third aspect of the present invention relates to methods for commercial transactions between a first legal entity and a second legal entity, wherein a communication path is established according to previous mentioned method for communication, and wherein the communication path is adapted for providing a legal commitment of one of either the first or the second legal entity, the first legal entity remaining anonymous to the second legal entity.
  • Anonymous legal commitments such as a trade of goods or payment for an item
  • the trusted party could e.g. be provided with means for proving existence of an identifiable legal commitment.
  • This could e.g. be message containing a legal commitment - such a contract - encrypted using a key shared between the parties of the legal commitment but unknown to the trusted party.
  • the trusted party thus receives a signature from the parties of the legal commitment that they agree to the commitment.
  • trusted party can confirm the existents of the signed legal commitment to any other entity by providing the encrypted message e.g. signed by the trusted party on the behalf of a client taking part in the legal commitment.
  • the method according to the first, second or third aspect of the present invention relates to methods for commercial transactions between a first legal entity and a second legal entity, wherein a first communication path is established between the first legal entity and a third legal entity and wherein a second communication path is established between the second legal entity and the third legal entity and wherein the first and second communication path is adapted for providing a legal commitment of the first legal entity towards the second legal entity, said legal commitment comprising the steps of: - the first legal entity providing the second legal entity with an identifier,
  • the identifier provided by the first legal entity to the second legal entity could, as an example, be a credit card.
  • a customer e.g. in an internet store or in a restaurant provides a credit card for paying the bill.
  • the restaurant then contacts a credit card verifier for verification of the credit card payment.
  • the credit card verifier establishes a strong authenticated contact with the customer, before returning a confirmation of the payment to the restaurant.
  • the strong authenticated contact session can be an access controlled mobile phone, through an internet connection or by means of any other direct way of addressing the customer - even by addressing the customer through the restaurant using a previous agreed one-time-only challenge- response sequence.
  • the methods according to the first, second or third aspect of the present invention relates to methods of contacting the customer and may comprise that the communication between the third and the first legal entity is established by a fourth legal entity, the communication path to the first legal entity remaining unknown to the third legal entity.
  • the fourth legal entity may, as an example, be a trusted party providing anonymous legal commitments from the client or customer. According to this embodiment of the Internet store, restaurant or similar credit card payment requester is not provided with information as to identify the customer.
  • the commercial transaction could be established by means of the previously described method of communication.
  • a system for establishing a privacy communication channel between a first client and a second client comprising:
  • an authentication unit for communicating through said privacy communication channel with said first client and for providing a first intermediary between said first client and said second client, said authentication unit enabling said first client establishing a first virtual identity having a first virtual communication channel and establishing a rule based communication routing scheme for said privacy communication channel,
  • a trust unit for communicating with said authentication unit through said virtual communication channel providing a second intermediary between said virtual identity of said first client and said second client and for providing storage of first client profile information, and said first client applying said private encryption key for encrypting said profile information so as to enable anonymous communication from said first client to said second client.
  • the authentication unit may further enable the second client for establishing a second virtual identity having a second virtual communication channel and establishing a rule based communication routing scheme for a privacy communication channel between the authentication unit and the second client.
  • the system may further comprise an integration unit for communicating with said second client and for providing said second client an interface to said first virtual identity of said first client.
  • the mobile processing and memory unit according to the fourth aspect of the present invention may comprise SmartCard enabling Zero-knowledge authentication.
  • the general authentication device may comprise:
  • the system according to the fourth aspect of the present invention may further comprise an ID Unit issuing said mobile processing and memory unit for the general authentication device.
  • the ID unit may store identifiable information encrypted by applying a plurality of encryption keys comprising a public key of a legal institution.
  • the system may provide the client with full privacy control of the first client identity and information related to the first client, however the information is subject to basic accountability principles.
  • the authentication unit may enable the first client signing an agreement and authenticate towards a third-party based on a sign-on identity stored in the mobile processing and memory unit. Further, the authentication unit may enable the first client establishing a plurality of virtual identities each having a set of virtual communication channels.
  • the system according the fourth aspect of the present invention may further comprise a device authentication unit providing a certificate to the general authentication device to authenticate any device and verify the certificate.
  • the trust unit may store relationship information and enable access to the relationship information for the first client and the second client, and may protect the authentication unit from knowledge relating to the virtual identity.
  • the system according to the fourth aspect of the present invention may further comprise a first plurality of general authentication devices, a second plurality of communication channel providers, a third plurality of authentication units, a fourth plurality of trust units, and a fifth plurality of integration units. Further, the system may further comprise a first multiplicity of first clients and a second multiplicity of second clients. Furthermore, the second client may be constituted by a company, a group of companies, a community or any combination thereof.
  • the system according to the fourth aspect of the present invention may enable anonymity of the first client relative to the second client during a bi-directional communication through the authentication unit.
  • the system may enable anonymity of the first client relative to the second client and enable anonymity of the second client relative to the first client during a bi-directional communication through the authentication unit.
  • Full privacy control may be achieved by a principle of establishing continuous relationships only needing a persistent virtual identity, a set of related virtual communication channels and services to manage structured interactions.
  • a number of profile data elements constituting profile information may be attached to any relationships, which number of profile data elements are under the first client's control and may be verifiable by third party and may provide the specific necessary information for relationship convenience for all parties.
  • the system according to the fourth aspect of the present invention wherein the first client enabling access for multiple clients having decryption keys to predefined data elements of the relationship information for the first client. For instance only some of the multiple clients may have access to data elements containing identifying information while others have only access the non-identified profile information.
  • the system might Privacy-enable even Mobile Phones without eliminating the convenience of advanced location-tracking services or preventing police etc. from using same services to investigate crimes.
  • a particular advantage of the system according to the fourth aspect of the present invention is the ability to enter into a two-way anonymous relationship and sign legally binding documents while still eliminating the risk of a man-in-the-middle- attack.
  • a primary object of the present invention is to eliminate linkability without individual consent - except for mentioned minimum access to accountability. This can be translated into possible abuse of persistent identifiers whereas related to client, communication devices or communication channels.
  • a secondary object is to build-in damage control in case of linkability.
  • a third object is to ensure convenience and usability, as this is necessary for real-world value of the invention.
  • the first and/or second client may establish a minimum convenience set-up disabling violation of privacy of the client.
  • the first and/or second client may establish a maximum convenience set-up having identified and non-identified relationships incorporated together with privacy communication channels and/or virtual communication channels so as to provide the first and/or second client with full control of communication and relationships with a minimum of linkability.
  • the authenticating unit and the trust unit may be established based on a Proxy including Mapping routers.
  • the privacy communication channel and or virtual communication channel may be based on a separate mapping units such as an email gateway mapping email addresses to ensure that no linkable identifiers are present.
  • the system according to the fourth aspect of the present invention may incorporate any features as described with reference to the method according to the first, second or third aspect of the present invention.
  • a general authentication device for establishing a privacy communication channel between a client and an authentication unit, and said general authentication device comprising:
  • a unit reader for connecting a mobile processing and memory unit with the general authentication device
  • a memory space for containing persistent identifier of said general authentication device accessible by said mobile processing and memory unit, and/or said mobile processing and memory unit authenticating the privacy communication channel to the authenticating unit on the basis of the persistent identifier in the memory space.
  • the general authentication device may only be accessible under control by the mobile processing and memory unit.
  • the general authentication device according to the fifth aspect of the present invention may incorporate any features as described with reference to the method according to the first, second or third aspect of the present invention and incorporate any features as described with reference to the system according to the fourth aspect of the present invention.
  • Fig 1 "100 Systems Overview" shows the logical layer structure of an embodiment implementation
  • Fig 2 "200 Central Entities” shows a logical connection diagram between some of the central entities in a embodiment implementation
  • Fig 3 "300 Communication Intermediation” shows an overview of the central principles of communication intermediation in an embodiment implementation
  • Fig 4 "310 Encryption and Intermediation" shows the central logical steps in the session management in an embodiment implementation
  • Fig 5 "320 Establish VID” shows the central steps when establishing a new identity in an embodiment implementation
  • Fig 6 "325 Generate Symkey” shows a principle in which a key only shared between first and second legal entity can be established without a Trusted Party sheltering the identity of one of the entities knowing the key in an embodiment implementation
  • Fig 7 "330 Communication Encryption" shows in more detail some of the central session management steps for certain communication paths in an embodiment implementation
  • Fig 8 "340 Inbound Intermediation” shows the main steps in the inbound communication intermediation in an embodiment implementation
  • Fig 9: “345 Outbound Intermediation” shows the main steps of the outbound communication intermediation in an embodiment implementation
  • Fig 10 "350 Privacy Enabling Public Reporting Communication” shows the central steps of public reporting respecting CLIENT anonymity in an embodiment implementation,
  • Fig 11 “360 Private Data Storeage” shows a high-level logical structuring of the Private Data Storage in an embodiment implementation
  • Fig 12 "400 Traceability Route” shows how traceability can be implemented respecting multiple interest protecting each entity from fraud even by the other entities in union in an embodiment implementation
  • Fig 13 "410 Realworid Authentication" shows some of the multiple ways an zero- knowledge authentication can occur in an embodiment implementation even in offline environments such as a store,
  • Fig 14 "420 Anonymous Delivery” shows the central steps in achieving anonymous intermediated delivery of physical goods in an embodiment implementation.
  • Fig 15 "450 Securing standard Credit Card Payment” shows how strong authentication can be added to existing standard Credit Card payments in an embodiment implementation
  • Fig 16 “460 Anonymous Credit Card Payments” shows how anonymous strong authentication can be added to Standard Credit Card payments and intermediated in an embodiment implementation
  • Fig 17 :”470 Realworid Privacy Trade shows how anonymous strong authentication can achieved in a realworid offline situation such as a normal store purchase in an embodiment implementation
  • Fig 18 “500 Privacy Trade Platform” shows the logical structure of a combination of functions in a full-service Privacy Trade Platform in an embodiment implementation
  • Fig 19 "510 Authentication” shows the main steps in the Authenticator in the direct simple authentication procedure in an embodiment implementation
  • Fig 20 "520 Anonymous Signature" shows how a legal commitment can be established anonymously using a Trusted Party in an embodiment implementation
  • Fig 21 “560 Online Privacy Payment Intermediation” shows how the online payment process can be intermediated and privacy enabled in an embodiment implementation
  • Fig 22 “590 Anonymous Secure Trade” shows how secure trade balancing releasing payment and goods or services can be implemented in Privacy respecting manor in an embodiment implementation
  • Fig 23: “600 Community Secure Trade” shows how a secure privacy respecting trade process can be supported even if CLIENT is identified to one entity by intermediation by a Trusted Party in an embodiment implementation
  • Fig 24: “610 Anonymous Auction” shows how an auction marketplace situation can be supported with secure Privacy enabled trade processes using a Trusted Party in an embodiment implementation
  • Fig 25 "660 Privacy Enabling OBI Standard Trade Specifications” shows how a example of how the full value chain can be supported, secured and privacy enabled by a trusted party using open standard interface specifications in an embodiment implementation
  • Fig 26 "700 Personal Services” shows an example of the outline menu available to CLIENT in a wireless device or online in an embodiment implementation
  • Fig 27 “710 Suggestion House” shows the logical information flows when Trusted Party support Privacy enabled product and service information search in an embodiment implementation
  • Fig 28: “750 Business Services” shows the logical structure of services towards COMPANY in an embodiment implementation
  • Fig 29: " 760 Business Services Inbound” shows the logical steps in the improved inbound corporate customer communication process using the trusted party dialog service in an embodiment implementation
  • Fig 30 "770 Business Service Outbound” shows the logical steps in the improved outbound corporate customer communication process using the trusted party dialog service in an embodiment implementation
  • Fig 31 “780 Privacy Care Trust Certificates and Evaluation Service” shows the logical information flows implementing a closed-loop feedback Trust certificate in an embodiment implementation.
  • Fig 32 “80 Total System View” shows the preferred embodiment of the system according to the present invention.
  • Fig 33 shows the preferred embodiment of a general authentication device of the system according to the present invention.
  • the invention is implementing a third route in between the infomediary and the total atomization of Privacy without the use of trusted party by describing a Privacy-Enhancing Trusted Party without the need of knowing Private Data.
  • the individual is in full control of own data unless respect for other trading parties rights require special attention such as traceability in case of fraud. And even in this situation the Trusted Party can reveal identity but not the contents of communication.
  • This patent is a solution implementing a platform of non-identified secure communication and trade.
  • the platform is open for integration with existing websites, communication and real-world transactions. It establish the necessary basis for Individuals to interact non-identified both online and offline transferring detailed personal information over the full customer life-cycle. It creates a platform for intelligent agents analyzing and communicating with CLIENTS without the ability to identify the individual behind the data.
  • This invention is made up of multiple parts. Firstly a central distributed on-line service acting as a Trusted Party implementation. This online service is separate into in principle 5 layers;
  • Authenticator is a client-side devices handling services such as Universal Sign-On, CLIENT anonymization and Identity switching.
  • the Authenticator services depends on the physical device in question.
  • the two primary implementations is Desktop Computer Add-on Software or a mobile wireless device such as an Mobile phone or a PDA.
  • An important task of the Authenticator is to isolate the Authentication identification information from COMPANY. For instance if the device contains a Biometrics reader then this device is completely isolated and only accessible for authentication towards TP.
  • COMPANY Side part to be installed at COMPANY devices providing interface services for COMPANY-CLIENT Relationship Management, trade and agent/communities.
  • This Blacklist is further enhanced if a marking arrangement are in place either under the TP Brand or as a collaboration with others with a revocable online indicator at COMPANY websites, shops etc. because (a critical mass of) individuals only deal with suppliers able to prove compliance to Privacy Standards.
  • the Individual is not restricted from operating since he will be able to re-emerge under a new Virtual Identity that cannot be traced to the Identified individual.
  • the Trusted party itself is the most dangerous part in a catastrophe scenario: a) If the central internal security is broken so that someone can impersonate TP, all present and future Identities are violated. b) If TP turn malicious and systematically abuse trust. c) A Big Brother attempt from a government with both skill, brute force computing power and access to necessary resources. However to minimize these risks central principles and procedures are included and will continuously be updated: a) Internal security is built on the guidelines from the open source experts providing multilevel key generation based on short term often rolled signatures, separation of responsibilities and access to keys and backups, organizational split according to the same guidelines as external and of course technical protection using firewalls etc.
  • the invention is designed to minimize TP knowledge of content in communication and data since CLIENT can encrypt using any method desired. Control of the central Identity-VID combination is isolated and separately monitored. On top of this external inspection mechanisms will be set-up.
  • the Government Big Brother attempt is serious. Measures against this is using the national extemal controlling system access (for instance time-limited key certificates requiring cross-national issuing of certificates) storing of the central Identity-VID combinations combined with a disaster procedure for primitive deletion.
  • COMPANIES will be able to get more accurate and detailed data from CLIENTS making true One to One customization easier. This will increase the value COMPANY can supply to CLIENT and thus increase potential profits. With the built-in loyalty service COMPANY can now get access to link previous discrete transactions into a full anonymous customer profile and use this for Suggestive Selling, Customer Loyalty Programs and improved Business Intelligence.
  • Encryption is central to Privacy. This invention works on top of standard cryptography making use of well-established techniques. The basic principle of all cryptography security being NOT to keep methods secret but only rely on secrecy of keys. This invention make use of tested vendors and open source tools for cryptography.
  • Symmetric encryption is when two parties share a common key used for both encryption and decryption. Fast and generally accepted secure methods are available for symmetric encryption for key size large enough.
  • This invention makes heavy use of symmetric encryption and therefore the below functions are described.
  • Hash functions For multiple purposes One-Way hash functions are used to generate a summary of a data block. Hash-functions are designed so that is computational infeasible to generate a message that produces a specific hash value. I parallel to this Hash- functions are also designed so that it is computational infeasible to find two input that generate the same hash-value [NIST FIPS 180-1].
  • Hash functions are referred to as H (ClearText)
  • Asymmetric encryption cover processes where a key pair is used. What one key encrypts you need the other key to decrypt. This is advantageous because one part of the key can be kept private only accessible to the owner.
  • the other part of the key - the public key - is published in for instance X.500 or X.509 tables together with identifiable or pseudonymous information.
  • This invention makes heavy use of reversible asymmetric encryption and therefore the below functions are defined
  • Dec (Cleartext, key) and Enc (Cleartext, symmetric key) respectively is the reversible asymmetric decryption and encryption algorithm using key to encrypt or decrypt Cleartext.
  • the corresponding one-way Hash value is encrypted by the Private key.
  • the recalculated hash value of the assumed document is compared to the decrypted signature using the public key. If they do not match, then this document was not signed by the private key resulting in the signature forwarded.
  • One special advantage of this procedure is that the integrity of the document is verified simultaneously. If the document has been changed then its hash value will also change and the signature no longer holds.
  • Dec ( Sign( ClearText, Private Key), Public Key) H(ClearText)
  • a digital signature is an attachment to a document and can as such be removed from the document. A digital signature without the original document is not usable.
  • the Master Key is used to sign the public key of a new set of keys.
  • the new set of keys are then used as a temporary signature or encryption keys traceable to the master key.
  • the main advantage being that the temporary keys can be revoked or periodically rolled without having to replace the Master Key. This can be in multiple layers depending on the importance. Large commercial systems works with hourly replaced server keys in with a multi-layer structure with increasing intervals between keys replacement.
  • B prove to A that he is B in a PKI-scenario.
  • B has now proven to A that he is B because he has access to B.Pr (B's secret key) without exchanging any identifiable information.
  • a challenge B with a one-time only challenge number looks up the related one-time only response and reply with this number. B has now proven to A that he is B without exchanging any identifiable information.
  • A has now established authentication of B.
  • Both the encrypted and non-encrypted version can be repeated to establish a two- way zero-knowledge authentication.
  • a list of numbers or number-pairs can be generated at both sides using an shared algorithm and seed values combined with a shared secret value. This can be built- in in SmartCards etc. so they are portable, non-accessible before use and new numbers can be created anonymously and with zero-knowledge communication with TP.
  • An embodiment of this invention uses a combination of asymmetric encryption and Diffie-Hollman to ensure that TP cannot listen in on communication between CLIENT and COMPANY. This works only if one part is identified. Two-way unidentified security without a trusted party are theoretically very difficult if not impossible to established due to the man-in-the-middle attack. Anonymous auction services as the ones implemented are due to this very dependant on Trusted Parties.
  • Attribute Certificates are a special type of anonymous certificates where the holder is able to demonstrate to third-party with zero-knowledge communication that he holds or does not hold a certain credential.
  • Attribute Certificates can be positive in terms of a education degree verified by the education institution or negatively in terms of proving no major criminal offenses have been committed verified by the relevant Public authorities.
  • VIDs Virtual Identities
  • a Virtual Identity is a Pseudonym for an individual created for a specific purpose. Using the Trusted Party (TP) an individual can assume use a VID to communicate, trade etc. anonymously and under full control of the process.
  • TP Trusted Party
  • a VID is covering the range of communication channels and services if appropriate to the type of VID.
  • a key element is that a VID can be eliminated without trace except in the case of fraud or other criminal activity.
  • the core part is thus the principle that any player will either interact with an Identified individual who will only share limited information or interact with a virtual, but anonymous Identity about which detailed information is much easier obtainable since risks are greatly reduced.
  • TP Identification TP - Trusted Party - is generally treated as one entity identified by TP Token
  • TP.Pu public key of TP (TP.Pu) that can be verified in official registers such as X500 or X509.
  • TP is assumed to be multiple both virtually, geographically and perhaps organisationally distributed servers. All implementations of CLIENT, COMPANY or other entities include identification of the TP handling the entity. Also multiple distributed TPs are internally linked virtually, geographically and organisational in order to appear as one entity externally.
  • CLIENT roles are separated into private roles such as a Family member, Friend, Sports Club Leader and business roles such as Board member, Employee, Corporate Purchaser etc.
  • the main reason for using roles is to establish a structure, overview and services for the Individual.
  • VIDs are based on links into other structures such as a COMPANY Customer Database with added security and services. There are identified by a COMPANY Token Id and a COMPANY-only unique identifier. This identifier will avoid linkage because they are only unique in regards to the specific COMPANY. Authentication is strong between COMPANY and TP. COMPANY has adopted Privacy Trade functions such as Privacy Payments and Privacy Delivery.
  • CLIENT can setup all his existing logins as migration VIDs (e.g. user-id, password and e-mail address for a web-site). These are identified. Authentication is weak as user-ids and passwords are as today easily violated by third-party. New anonymous VIDs used to create new registration in existing setups. They resemble the migration VIDs except that they are anonymous and only based on virtual channels intermediated by TP. Authentication is still weak as COMPANY ability to authenticate is the bottleneck. These VIDs can be continued as the primary VID form in case no linkable interaction has been taken place. COMPANY can have adopted Privacy Trade in key areas.
  • migration VIDs e.g. user-id, password and e-mail address for a web-site. These are identified. Authentication is weak as user-ids and passwords are as today easily violated by third-party. New anonymous VIDs used to create new registration in existing setups. They resemble the migration VIDs except that they are anonymous and only
  • Identified VIDs are often used in combinations where some identity information are known and others are not. This could for instance be customer name and address is known, but communication channels are intermediated for update efficiency and in order to minimize linkability.
  • This type of semi-identified VID is particular useful for Personal Relations (Friends), Special Online Communities or suppliers where Identity is to be known. This kind of suppliers can be utilities who by definition have, have to have or CLIENTS wants them to have access to identifiable information such as Postal services, fixed-line telephone, power, house repair, doctors, hairdressers, dentists etc.
  • One-time trade ID for a one-time only Privacy Trade transaction
  • Delivery Only Outside delivery, no communication enabled
  • each combination of channels can have its own subtype.
  • VID can be Anonymous, Semi- or fully identified with no, selective or full access to Private Data.
  • Communication channels open to a VID and Message filtering is customizable to make VIDs a very flexible setup.
  • very Privacy concerned individuals can be very closed without private data available.
  • TP can be used for convenience intermediation alone without any privacy established. More important the individual can selectively decide which relations belongs where in the matrix.
  • RELATIONS such as RELATION (figure 2 reference numeral 100) are a push solution in the sense that CLIENT give access to their data to another target CLIENT and at the same time can request the target CLIENT to accept a two-way relation.
  • Target CLIENT accepts by choosing a VID to use for the RELATION.
  • target CLIENT is previously unknown to TP target CLIENT is able to do initial registration with a detailed registration to follow to accept a two-way RELATION.
  • CLIENT control how much information is revealed to relations using the VID they link from and to. This includes access to Private Data, communication channels set-up in the sense of both intermediation and access in general, filtering etc.
  • a CLINT can have RELATIONS linked to different VIDs.
  • CLIENT can attach multiple symmetric encryption keys to a RELATION for communication encryption. Keys are encrypted using encryption keys not known to TP. Since RELATIONS are identified they can use their digital signatures to establish whatever kind of key exchange and encryption method they want. For CLIENT relationships not encrypting themselves communication encryption TP handle encryption towards third-party as close to CLIENT as possible in the specific channel as part of the normal TP service.
  • RELATIONS are typically used for linking personal relations like family, friends and business associates which are the basic of the Personal Address Book service.
  • a special RELATION is a GUARDIAN which is a parent or other person who are guardians of children.
  • a GUARDIAN RELATION manages, controls, approves and have access to multiple parts of children CLIENT registrations.
  • a CLIENT can create flexible GROUPS.
  • Groups can be nested, (figure 2 reference numeral 140). Groups are multipurpose controlled by CLIENT. They can be used as simple structuring tool, as communication distribution lists or as basis for other services like Personal Event Management, Project Team Management etc.
  • Identifiers Central to Privacy is non-linkability and anonymization.
  • the Identifier for a VID or channel can in itself be the source of linkability when used across companies. Identifiers are therefore non-information carrying.
  • the standard identifier is a combination of ⁇ COMPANY-identifier>, ⁇ COMPANY-unique identifier for CLIENT> since this will by definition not be linkable across COMPANIES.
  • An email-address in the form ⁇ COMPANY id>. ⁇ CLIENT id> is traceable.
  • the contact information can be traced to the COMPANY it relates to without information about CLIENT.
  • Rollover is the action that occurs when an outstanding VID is replaced by a new VID in order to minimize risk of violation. The larger the risk of violation of identity the more often will the VID be rolled.
  • VIDs used for linkable activities like Internet Surfing, old-fashion Credit Card authentication, Cable Set top box or Mobile Phone anonymization etc. will be rolled according to use in order to minimize the risk of linkage based on the Token Identifier itself (linking a COMPANY A customer to a COMPANY B customer because they use the same Credit Card number).
  • This invention is implementing a Trusted Party for CLIENT to construct virtual
  • TP is also trusted party for anyone interacting with a VID they must trust that TP knows CLIENT real identity in case of fraud.
  • the fraud is directed at in the first hand and secondly to protect the individuals whose identity is abused for fraud purposes. Thirdly the trust image of TP needs to be maintained.
  • the individual is far more damaged by the fraud than the COMPANY since the COMPANY mostly risk loosing a smaller amount of money whereas the individual being the innocent victim of identity fraud can spend years trying to unlock the problem perhaps being denied access to credit, jobs etc.
  • This invention is generally working with the basic assumption that initial identification is taken place at least with the level required for creating officially accepted digital signatures or other central papers in the home country of the individual or the country in which the individual does trade or communication.
  • Initial identification is important to be able to establish authentication in daily operation.
  • Several identification methods will be used in parallel in order to make Identity fraud as close to impossible as practical achievable.
  • the more methods of identification, channel verification, RELATION verification, existing identified interactions etc. being used the more difficult it will be for an individual to fraud everything and the higher the chance that the real individual will be informed in case of attempted identity theft.
  • One important aspect of identification is to ensure that in case of fraud a verified picture is obtainable because pictures are usable for investigations of electronic fraud.
  • Non-CLIENT used for CLIENT own registrations of relations in Address Book not confirmed by the individual in question. Not-identified for registered CLIENT not satisfying sufficient criteria to be considered as Identified. When classified as Identified absolute identification with traceability is established. In addition to this a special One-time-Only is used for Community and portal services where TP is acting as temporary trusted party for a non-CLIENT customer trade.
  • Biometrics working with recognition of unique or close to unique bodily characteristics such as fingerprints, iris, DNA etc are expected to grow. Fingerprints as been used for many years. DNA are growing as evidence in courtrooms and for paternity cases.
  • Biometrics are excellent for authentication and especially for the mobile Authenticator. Iris and Fingerprint readers are already available for ordinary desktop computers such as windows. Fingerprint readers are being built into Smart Cards etc. A central task for the TP CLIENT services is to make use of biometrics while at the same time to isolate the Biometrics reading devices from COMPANY.
  • Biometrics are very usable for initial identification. If a case of Identity fraud is discovered only Biometrics are both very likely to free the victim (the real individual) and provide the criminal investigators with material to recognise the offender.
  • a bank transfer from a Customer Account contain detailed information as to the identity of the account owner. Since the account owner has been through a strong authentication to establish the account and again to transfer money a match between registering information and information from the bank account is close to strong authentication.
  • CLIENT to show that he has access to the channel.
  • a simple way to do this is the one-time only key-pair with challenge and response challenge or just a keyword or number to pass when channel authentication is done.
  • This authentication scheme is used to cross authenticate Communication Channels thereby linking them to CLIENT. Depending on national conditions this can be improved by using electronic means for confirming encourageon integrity in for instance phone book etc.
  • Tools for setting up the basic CLIENT-ROLE-VID structure which includes linking physical communication channels to the basic ROLEs and VIDs and creation of a starting Access Control Filter and basic routing controls.
  • TP will establish a symmetric encryption key between TP and COMPANY for message encryption - CompanyKey.
  • Communication Channels verification - Related to the identified COMPANY is the different communication channels such as Physical Address, Telephone, Fax, Email, Internet-address, bank-account etc. These channels are cross- authenticated to establish an initial link to COMPANY.
  • the structure of Communication channels will evolve as purpose and COMPANY Customer responsibilities are built into the structure facilitating the interaction between COMPANY and CLIENT.
  • One important Communication Channel is the payment channel.
  • Default TP will set up an internal account for COMPANY which COMPANY can address and transfer money to where-ever. Payment to this account shall be considered legal payment for CLIENT.
  • a Privacy Payment is always implementable as two separate payment instruction.
  • the Delivery Channel also is central. From the outset this can be done through the virtual address, but in order for the interaction with CLIENT to operate the best COMPANY will need to integrate the Delivery procedure into COMPANY logistics in order to provide CLIENT with relevant information in the delivery process. Before this integration the virtual process-specific delivery address can be constructed by TP in the trade process.
  • the process of integration involves a COMPANY side service to facilitate communication services and integration the Privacy Trade Platform services into CRM and ERP systems.
  • the Communication Channel set-up will be augmented with an eCRM service modelling the internal COMPANY service functions such as Support, Sales,
  • the eCRM services involves an integration with COMPANY Customer
  • a part of this is the online access control where a Privacy Server supply authentication of Virtual Identities at Customers website.
  • the Privacy Server is integrated to maintain part of Corporate Customer Database For inbound and outbound communication and trade the Privacy Server can interact with COMPANY internal communication and trade systems to support the ongoing relationship between CLIENT and COMPANY. This include authentication, establishment of outbound Communication paths based on generic information only (CLIENT internal id, channel type depending on the type of communication and optionally additional information to improve CLIENT inbound access control procedure.
  • VID Virtual Identity
  • COMPANY and CLIENT are in the following assumed known to TP. If COMPANY not known then this procedure will be augmented by a TP customer care support process helping CLIENT to identify and model the COMPANY customer registration and authentication procedures and to provide the needed information for registration.
  • TP is able to prove that VID belongs to CLIENT in case of fraud.
  • CLIENT establish an anonymous identity towards a relation under full CLIENT control.
  • Contents of communication can be private from TP because a symmetric encryption key SYMKEY has been exchanged with COMPANY without revealing this to TP.
  • COMPANY establish a new customer relationship with CLIENT together with trade and communication support according to the wishes of the customer, an Customer specific encryption key SYMKEY and a signature from TP confirming knowledge of customer identity in case of fraud.
  • COMPANY do not receive any identifiable or linkable information.
  • CLIENT indicate COMPANY (or other party) he wish to establish a VID towards.
  • TP creates key pair (Cl.Vir.Pu, Cl.Vir.Pr).
  • the Public Key is forwarded to and signed by CLIENT and the signature is returned to TP.
  • TP then authenticates VID Public key to COMPANY towards the COMPANY created Customer Token Id which will typically be a customer number from the internal COMPANY Customer Relationship Management System. COMPANY is informed of the virtual communication channels open to this VID.
  • This invention works with a secret shared symmetric key SYMKEY to encrypt communication between CLIENT and COMPANY.
  • SYMKEY is treated as if it is reused from session to session, however SYMKEY can just as well be generated as part of establishing a session as a session specific encryption key which is saved together with communication encrypted by the public key of CLIENT (CI.Pu).
  • SYMKEY can be created without revealing this to TP .
  • One embodiment is the straight forward where CLIENT create SYMKEY and encrypts this together with a random challenge text using the Public Key of COMPANY (Co.Pu) and forward this to COMPANY. Since TP cannot read this message TP can not know the SYMKEY. COMPANY verifies by returning the Challenge Text encrypted with SYMKEY. Now CLIENT can verify that the key has been exchange without TP knowing.
  • Another embodiment with the desired outcome that does not include transferring the SYMKEY itself is by using a slightly modified Diffie-Hellman protocol making use of the fact that CLIENT can do a non-TP controlled verification of the Public Key of COMPANY.
  • COMPANY finishes the modified Diffie-Hellman protocol by generating the key SYMKEY and encrypting a message containing the CLIENT part with SYMKEY and returning this to CLIENT together with the unencrypted COMPANY part of the Diffie-Hellman protocol.
  • CLIENT can now calculate SYMKEY. If CLIENT is not able to reproduce the originally forwarded value ((Agreed Generator) ⁇ (CLIENT chosen random) MOD (Agreed large Prime)) when decrypting the message with SYMKEY, CLIENT has calculated, then the protocol has gone wrong indicating a potential attempt to intercept the communication by TP.
  • CLIENT is not able to reproduce the originally forwarded value ((Agreed Generator) ⁇ (CLIENT chosen random) MOD (Agreed large Prime)) when decrypting the message with SYMKEY, CLIENT has calculated, then the protocol has gone wrong indicating a potential attempt to intercept the communication by TP.
  • Each CLIENT can approve another CLIENT as a personal relationship that TP is permitted/requested to maintain.
  • TP creates the link (figure 2) between two CLIENT VIDs to handle this.
  • CLIENT communication channel intermediation is still in place because this is convenient due to channel changes (new phone number, moving etc.) and routing (Receiver controlled).
  • Each relation will have a specification on the type (father, friend, etc ) and group. Note that this is a one-way solution.
  • CLIENT A can approve CLIENT B without CLIENT B approving CLIENT A.
  • To create two-way links two separate relations need to be created.
  • CLIENT can create non-TP Customer RELATION VIDs without link to actual CLIENT B this VID is representing.
  • On behalf of CLIENT can TP contact
  • CLIENT can create Groups of Relations (figure 2 reference numeral 140). Groups can be nested.
  • VIDs and Groups to define interaction options. This include Communication Channels, Access to Private data., Access Control Filtering and Routing.
  • a Business associate is limited to the intermediated business communication channels and Business information but no access to private data, address or communication channels.
  • the VID can have a general SYMKEY for all RELATIONS linked to the specific VID.
  • a RELATION can have a Relation-specific SYMKEY or communication can be based on session-keys created and saved in connection with communication.
  • Establishing SYMKEY works just as well with a CLIENT/CLIENT relationship as a COMPANY/CLIENT relationship where at least one CLIENT or one communication channel is identified.
  • the main issue is to exchange information that TP is not able to access.
  • two anonymous parties - such as two CLIENTS - wants to establish an anonymous relationship the problem of TP as man-in-the-middle is un-resolvable. They can choose to exchange a SYMKEY in unencrypted form or better do a Diffe-Holmann to making it more difficult for TP to handle. But they cannot have any guarantee that TP is not listening in.
  • RELATION CLIENT For each RELATION CLIENT can maintain a special Note Space containing preferences (ex food and people likes and dislikes, event history, notifies (birthday etc.).
  • PRIVATE DATA except to confirm the existence of signed documents and providing a minimum of traceability in case of fraud.
  • TP under this invention has no interest in knowing contents of communication or trade.
  • Private Data is stored in a Privacy Storage attached to the CLIENT, a CLIENT role or a CLIENT Identity default in encrypted format using either a CLIENT generated symmetric KEY or in the form of a anonymous Attribute Certificates [S. A. Brands 1999 PHD thesis later published as "Re-thinking Public Structures and Digital Certificates", MIT Press, 2000, ISBN 0-262-02491-8].
  • Decryption keys are stored either CLIENT side or together with the data in encrypted form using the Public part of the CLIENT Digital Signature.
  • the CLIENT is able to produce additional both symmetric or asymmetric encryption keys for the data storage, change encryption, add, move or remove any attribute Data according to CLIENT Privacy Wishes.
  • the CLIENT can attach specific attributes in a form that can be decrypted by TP in secure mode on request by a COMPANY for customization purposes. Requesting other attributes will by definition require active accept from CLIENT. If CLIENT accepts, attributes can be stored together with the VID in question for documentation or a generally changed privacy profile.
  • Negative Credentials can often be a question from COMPANYs. In order to show anonymously that one has not been to prison etc., attribute certificates are central.
  • CLIENT When CLIENT approves someone to access Private Data, CLIENT create a new Symmetric Key, select the attributes to be stored encrypted with this new key and forwards the key to COMPANY or AGENT who is allowed to Access. CLIENT informs (automatically) TP by linking the attribute to the relevant VID or Role that COMPANY can access attribute and TP can control access without knowing contents.
  • Private Data is stored in the most appropriate Data format with or without an identifier for convenience.
  • the default format is assumed to be XML.
  • Attached to the Private Data are a Meta Data description of what the piece of data contain together with link to data definitions.
  • the INVOICE AGENT is the only agent that can access invoice data.
  • the INVOICE AGENT have no external communication and can only report findings back to the Invoice recommendations part of CLIENT Suggestion House.
  • CLIENT can Give other Agents Access to the Invoice Recommendations part, but not to the Invoice Data themselves.
  • CLIENT will authenticate towards TP and the TP will handle authentication towards specific COMPANY.
  • the base level of security is extended to a given COMPANY building a general security service only limited by COMPANY ability to integrate. Given the security problems with simple login/password solutions COMPANY has a heavy incentive to move to an integrated authentication solution.
  • TP maintain a database of specific VIDs (both anonymous and identified) and information to authenticate the VID towards COMPANY. This include necessary login information, passwords, digital signatures and SPECIFIC COMPANY communication rules.
  • the client-side part of TP will implement a Single Sign-on procedure so that CLIENT first authenticate towards TP and from there choose actions (the sequence can vary depending on channel and situation) without any need to re-authenticate.
  • CLIENT can use the IdentitySwitcher and change VID to another VID/COMPANY.
  • TP use the original authentication and carry out an auto-authentication using the new VID.
  • a central specific embodiment of this is a portal solution, e.g. WAP-based, where the CLIENT menus are dynamically created based on CLIENT registered VIDs with automatic Sign-on/authentication of VID towards COMPANY.
  • the VID can be supplied with information about Profile and wishes from the Private Data Storage controlled by CLIENT.
  • This profile information can include an anonymous proof of credit worthiness, a credential such as a formal educational degree or an anonymous proof of absence of a negative credential such as a criminal record or outstanding debts.
  • One embodiment include a XML format collection of parameters, encrypted according to the structure of roles and VIDs and manageable by TP only on reference but not by access to contents.
  • the central authentication for this invention makes use different forms of authentication.
  • the central tool is an Authenticator in the form of a portable wireless devices such as a WAP mobile phone able to access a SmartCards/Simcards either installed or using a mobile reader.
  • a portable wireless devices such as a WAP mobile phone able to access a SmartCards/Simcards either installed or using a mobile reader.
  • Using infrared or other local communication protocols such as Bluetooth to communicate with computers, in store located communication tools or the built-in access to the wireless network this device cover all general purpose authentication.
  • the basic technology is known and almost a commodity product such as for example the Ericsson mobile phone R320s.
  • the SmartCard is able to carry out simple encryption functions 1 ) Asymmetrically encrypting small pieces of data for zero-knowledge authentication and authorization.
  • Biometrics like a fingerprint reader, pincodes or other method.
  • the Smart Card does not contain the Identified Digital Signature of CLIENT (CLIENT Private Key).
  • CLIENT Prior to use CLIENT has used his digital signature to sign the Public Key of a key pair unique to the SmartCard towards TP. Signatures has to be confirmed by TP to be traceable to CLIENT through a VID. This means that if the SmartCard is stolen or otherwise violated the SmartCard key can be revoked by TP with minimum damage.
  • the authentication procedure sequence towards TP is channel dependent, e.g. some channel will require cross authentication, while others do not need this. This will specifically in connection with the migration services where for instance standard Credit Card Payments are implemented in a strong authentication/verification solution.
  • the Authenication procedure can be complex including Post-verification in a later session of a pervious weak authentication (will locate problems and initiate a fraud investigation).
  • a more interesting complexity in the Authentication procedure is incorporation of general Procura-principle using principles known from workflow systems. This is directly relevant if CLIENT is a COMPANY or for COMPANY integration. But the same principle is also very useful in non-company situations.
  • a parent has to co-authenticate child authentications - this can be done in real-time or prior by a set of rules.
  • Thresholds can be set according to a price maximum over which a spouse or legal guardian has to co-authenticate.
  • a weak channel can require co-authentication in another weak channel and thus be considered strong like a weak web authentication combined with return phone call to a previously agreed telephone number to cross-authenticate by.
  • CLIENT Manually by CLIENT. From the outset this can mean CLIENT entering a one-time- only identity key hinting to his identity.
  • TP responds by a challenge number related to a one-time-only key-pair and in return getting the related response. This procedure does not require any special electronics implemented at either CLIENT nor COMPANY. It only requires CLIENT to have interacted with TP prior to the authentication procedure to receive the one-time-only keys in advance.
  • messages can be signed and sessions/other channels can be cross-authenticated .
  • Actions A10 and A20 are the standard authentication procedure where CLIENT first authenticates towards TP either online or through a mobile authenticator. TP then authenticates CLIENT towards COMPANY.
  • An example of this is when CLIENT is accessing his list of existing VIDs and choosing one related to an online shop. The online shop this way gets an anonymous customer relationship linkable over multiple interactions valuable to build continuity into the service. Measurements, preferences, purchases etc. all can be taken into consideration dealing with CLIENT.
  • Actions B10 and B40 cover the situation where CLIENT has no direct link to TP.
  • CLIENT authenticates zero-knowledge towards TP though a COMPANY link with TP and then TP authenticates the correct related VID towards COMPANY.
  • An example of this is a physical grocery where CLIENT interacts with TP though a mobile device with an infrared communication link to in-store communication points.
  • the authentication procedure can work through an in-store located computer with a standard Internet Browser.
  • CLIENT get a transaction code from COMPANY and enter this number in connection with the authentication procedure.
  • TP can then forward the related VID identifier together with the transaction code through any communication channel such as encrypted email.
  • Actions C10 and C40 cover the situation where COMPANY itself has no direct contact to TP.
  • a fourth party authenticates towards TP in the transaction verification process to get a transaction confirmation.
  • An example of this is Credit Card payments combined with a strong authentication procedure implemented through the card verifier.
  • Action E10 covers the case where an initial authentication is re-used to authenticate towards a new fifth partner. This can be done either by COMPANY or by TP intermediating the relationship between COMPANY and the fifth partner. Examples of this can be an online news-service requiring payment or a new introduction in this invention in the form of a TP intermediated purchase directly from a supplier using B2B trade standards. Privacy Trade Platform
  • the Privacy Trade Platform is a generic collection of services on top of the Virtual
  • the range of service cover a full customer life cycle from communication to onetime-only purchases to signing of agreements, purchasing and delivering electronic and physical goods, returning goods and anonymous dispute arbitration.
  • Figure 18 shows the entire Privacy Trade Platform with interfaces to important services.
  • Reference numerals 10 to 30 cover the Core Virtual Identity Services.
  • Reference numerals 40 to 120 cover the full range of services necessary to trade online and real-world.
  • Reference numeral 130 is the services that enable CLIENT'S to let third party
  • Reference numeral 140 is the special area where all selling suggestions are directed.
  • Reference numerals 150 and 160 cover a full hosted virtual shopping facility where Agent suggestions converted into transactions according to Open Trading standards such as Open Buying on the Internet (such as www.openbuy.org) with the necessary modifications to support Privacy.
  • Open Trading standards such as Open Buying on the Internet (such as www.openbuy.org) with the necessary modifications to support Privacy.
  • Agents are interfacing with one Virtual Identity whereas supplier see another in order to minimize linkage.
  • Reference numeral 170 covers the Privacy-enabled Customer Relationship Management Business Services to support the virtual relationship build-up between Supplier and CLIENT under full CLIENT control.
  • Enabling legally binding commitments in an anonymous trade system is the key.
  • the simplest solution would be based on a Power of Attorney to TP from CLIENT.
  • TP can the sign using the Virtual Identity Signature (Cl.Vir.Pr) on behalf of CLIENT. This would however open up for TP fraud towards CLIENT and for TP to take risks of CLIENT accusing TP of fraud. These problems can be handled by agreement.
  • the central problem of TP needing to know contents of the legally binding commitments is in line with a Privacy priority.
  • CLIENT creates a new set of Signature Keys (Cl.Pr and CI.Pu). CLIENT keeps the private key Cl.Pr, which is not revealed, to anyone else. CLIENT signs the public key CI.Pu with either a nationally implemented Digital Signature (DS.Pr) or by other traditional means. The public key CI.Pu and the Signed public key Sign(CI.Pu, DS.Pr) is forwarded to TP. TP can now prove non-reputable by CLIENT that anything signed by Cl.Pr is signed by and only by CLIENT without anyone else being able to identify CLIENT. This principle is a technically well- known set-up implemented in PKI standards.
  • CLIENT is protected from escrow-systems, where the Certificate authority can create copies of CLIENT Private Signature Key. Even if the national standard is based on escrow systems CLIENT can establish Privacy.
  • the Server handling CLIENT identity anonymisation can be located outside the national borders of CLIENT nationality.
  • As a general principle implementation of CLIENT identity anonymisation is dynamic so that identification information can be moved from one server to another server in another country if the situation so requires. This can for instance be the situation if military coups or other non-democratic developments are expected or feared.
  • TP create a new set of signature keys (Cl.Vir.Pr and Cl.Vir.Pu). TP keeps the private key Cl.Vir.Pr which is not revealed to anyone else.
  • the public key Cl.Vir.Pu is forwarded to CLIENT.
  • CLIENT sign the public key with his private signature key Sign(CI.Vir.Pu, Cl.Pr) and return this to TP.
  • TP Sign the combination of the public key of the virtual identity and the public key of COMPANY Sign(CI.Vir.Pu + Co.Pu, TP.Pr) and forward this together with the public key of the virtual identity and the public key of COMPANY to CLIENT.
  • CLIENT sign the same combination Sign(CI.Vir.Pu + Co.Pu, Cl.Pr) and return this to TP.
  • the signature Sign((CI.Vir.Pu, Cl.Pr) or Sign(CI.Vir.Pu + Co.Pu, Cl.Pr) establish a provable and non-reputable by CLIENT route between the virtual identity and CLIENT.
  • TP is not able to use the same virtual identity towards multiple CLIENTS because the first CLIENT decides the symmetric encryption key SYMKEY and forwards this to COMPANY. If SYMKEY is used for encryption only CLIENT will be able to decrypt messages from COMPANY.
  • CLIENT can sign any message non-reputable with his Signature private key Cl.Pr. TP cannot fraud CLIENT signature because TP does not know Cl.Pr. Only TP can verify this signature using CI.Pu because only TP know the link between Cl.Pr and DS.Pu, TP can provide this proof of link.
  • TP When TP has in possession a message signed by Cl.Pr, TP can sign the same message using the private key of the virtual identity Cl.Vir.Pr. TP will be able to provide the signed message by CLIENT and therefore does not need to know the contents of the message. CLIENT cannot fraud the signature of the virtual Identity because only TP knows the private key of the virtual identity Cl.Vir.Pr.
  • TP cannot create and sign messages on CLIENTS behalf. If messages are not encrypted and TP sign a message to COMPANY without having a CLIENT signature then TP is responsible towards COMPANY. COMPANY will thus have a legal counterpart in any deal even though COMPANY does not know whom unless identity is freely revealed or legal disputes require revealing of identity.
  • TP is able to verify that a signed encrypted agreement exist without knowing the contents and then forward an identical copy signed by the VID to COMPANY. TP is thus verifying that this piece of unknown content is signed unchanged without knowing what the message is about.
  • a key requisite for this is that CLIENT is IDENTIFIED according to internal policies of TP.
  • COMPANY generates an agreement that is encrypted with the symmetric SYMKEY not known by TP.
  • COMPANY signs the encrypted message and forwards the message to TP (figure 20 reference numeral 100).
  • TP verify the COMPANY signature and confirm this by signing the message and forwarding the message to the related CLIENT.
  • TP does not know the encryption key SYMKEY so TP is not able to read the contents (figure 20 reference numeral 110).
  • CLIENT verifies TP signature (confirming COMPANY signature) and after checking the agreement signs the message and returns the signed message to TP (figure 20 reference numeral 120).
  • TP verifies CLIENT signature and the originality of message towards the original forwarded by COMPANY.
  • TP now has an encrypted agreement signed by both COMPANY and CLIENT.
  • the encrypted agreement signed by both parties is stored for safekeeping on behalf of both CLIENT and COMPANY.
  • TP strips the CLIENT signature and sign on behalf of CLIENT using the Private Part of the CLIENT VID and by TP confirming existence of a signed agreement in safe custody.
  • COMPANY (figure 20 reference numeral 130).
  • COMPANY verifies signatures of VID and of TP confirming the existence of an agreement signed by CLIENT.
  • CLIENT signs the Public Key of the CLIENT VID for verification on time of creation.
  • TP therefore has a traceable and non-reputable line of signatures between CLIENT and COMPANY.
  • CLIENT is protected from fraud by TP because TP cannot get CLIENT signature on the agreement.
  • TP will be responsible towards COMPANY if TP sign an agreement on behalf of CLIENT without having CLIENT signature in place.
  • TP is protected from fraud by CLIENT and COMPANY in union because CLIENT does not know the secret key of the CLIENT VID and is not able to generate deliberate fake anonymous signatures which are only signed by the VID.
  • the anonymous Digital Signature shown in figure 20 is implemented in a two-way anonymous version between two CLIENTS by replacing step 110 in parallel with step 130 so that TP replace The New Anonymous CLIENT (Company in figure 20) Signature with VID2 Signature Cl.Vir.Pr.
  • Payment intermediation involves acceptance by the paying CLIENT of an electronic invoice in a secure and anonymous environment. For one-time only purchasing of electronic goods this can be done using an electronic equivalence of cash - non-traceable token value certificates of a trusted party such as a bank etc. But for ongoing relationships including for instance physical delivery or any form of credit from supplier to purchaser additional means are advantageous.
  • the payer can decide on multiple payment channels including a default online account, purpose-restricted currencies, electronic anonymous money, credit card transfers and direct banking account transfers.
  • TP acts as an intermediate between CLIENT and COMPANY with in principle two separate payments. One from CLIENT to TP and one from TP to COMPANY..
  • the standard generic solution is for COMPANY to forward an electronic invoice to CLIENT via TP.
  • the electronic invoice contains COMPANY identification information.
  • TP present this invoice to CLIENT.
  • CLIENT approves this invoice and authorize payment and payment method in a secure channel.
  • TP confirms payment towards COMPANY.
  • Payment can be against a CLIENT or COMPANY account with TP or any other means of payment including electronic cash certificates, account transfers directly against online banking accounts, credit payments, up-front payments, real-time loans etc.
  • TP confirmation of payment towards COMPANY can be optional so that additional services can be included such as payment upon Privacy delivery, payment upon product verification, CLIENT approval or other criteria agreed.
  • the Electronic invoice is in a structured format and stored in the CLIENT Data Space as documentation of the purchase.
  • COMPANY need the ability to pass the address back through the value chain to the actual supplier and the delivery still be traceable to COMPANY.
  • COMPANY need the ability to pass the address back through the value chain to the actual supplier and the delivery still be traceable to COMPANY.
  • an online clothes store need to be able to send a delivery request to a Custom Clothes manufacturer to deliver a customized dress to CLIENT without the customer clothes manufacturer can identify CLIENT or send additional communication to CLIENT.
  • This Invention works with an address identifying a) The Trusted party, b) The Sender (towards Trusted Party) and c) a reference information combining CLIENT Token Identifier and Shipment Information - see figure 14.
  • Co Token Identifier for TP to identify sender for Access Control filtering
  • This default address can be used in standard word processors for any manual mailings such as Direct Marketing etc.
  • a new Address is created because Shipment Info is changed to a transaction or dialog identifier.
  • SHIPPER or other third party has thus no way to construct an address that does not resemble a default manually Time-stamped address. If abused and regularly this address can be renewed leaving no external access for abuse not involving either SHIPPER or third party.
  • COMPANY can actively sell the address plus CompanyKey but in this case COMPANY is punished for any SPAM since mailings will be traceable to COMPANY and thus can be stopped in the filter process.
  • SHIPPER can anonymously and Zero-knowledge Identify Client and Proof Delivery (figure 14 reference numerals 30 to 70) by receiving a) information to challenge CLIENT at point of delivery and b) data to verify by a cryptographic algorithm that the response is valid.
  • this can be accomplished by generating two Random keys R1 and R2.
  • the SHIPPER is informed of the Hash result H(R1), a challenge for CLIENT (Enc(R2,CI.Pu)) and the result of Encs(R1 ,R2) to verify the response.
  • SHIPPER does not know the identity of CLIENT and therefore not know CI.Pu. CI.Pu is not the published actual digital public signature key of CLIENT but as the general principle part of a generated key pair signed by CLIENT private digital signature key.
  • R1 can be a complex message and R2 be chosen according to CLIENT means of authenticating.
  • SHIPPER to Proof that he has not generated a fake R1 , R2 he saves the entire Signed Coded Message by TP (see figure 5 reference numeral 120).
  • CLIENT can on top of the Intermediated Delivery Service add a Mail-drop partner with for instance a nearby friend, a nearby shop or an local community organized drop-point. CLIENT will notify this Mail-drop partner of (Enc(R2,CI.Pu) and R2) when expecting shipments. When Challenged with Encs(R1 ,R2) the Mail-drop Partner can give the solution without knowing the CLIENT Secret Key (Cl.Pr). This will protect against the situation where SHIPPER abuse the trusted relationship and informs COMPANY of CLIENT Identity. However it ads a level of inconvenience since CLIENT will not receive the shipment to his house.
  • CLIENT can provide TP with H(R1 ) and the encrypted parts Enc(R2, CI.Pu) and Encs(R1 ,R2) but not R2 itself, or generate the challenge sequence at time of purchase or dialog. This is built into advanced trade and dialogue solutions.
  • CLIENT can continuously forward combinations of generated keys to TP for this purpose to avoid being a delaying factor in the costly and sensitive physical distribution process from shipment to delivery.
  • An embodiment of the present Invention comprises a Postal Services Move-Database used for fast redirection of Mail and parcels.
  • a further embodiment of the present Invention comprises a SHIPPER delivering directly to the CLIENT residence. Anonymous Internet Letter of Credit
  • a new level of Internet Trade Security is established by combining a Trusted Party and anonymization with the dual control of delivery and payment (See figure 22 combining figure 14 showing Anonymous Delivery and figure 21 showing Anonymous Payment).
  • Towards CLIENT TP ensure Privacy and non-release of Payment until actual delivery and conditions approved.
  • Towards COMPANY TP will ensure release of Payment when delivery is verified and conditional approvals. Condition can be incorporated so that CLIENT has time to control the goods before the release of payment.
  • Conditions are normally based purely on time from delivery proof. If no objection has been raised by CLIENT payment is released. However special conditions can be meet where CLIENT has to approve payment release.
  • CLIENT surfs COMPANY website and determines what to purchase.
  • An order request (according to OBI or other trade standard) or invoice is forwarded to TP for approval.
  • TP gets CLIENT approval and confirmation of payment. Payment is secured until delivery is confirmed.
  • COMPANY ships the purchased goods according to agreement (reference numeral 420).
  • the TP receives the proof of delivery when confirmation from shipper and the conditional terms has been meet payment is released.
  • Additional services can be offered on top of the base service.
  • a simple solution is for the anonymous Letter of Credit to be extended for BUYER to have time to verify quality of goods before release of payment. Terms can be agreed between Buyer and Seller. One embodiment will include a fixed time before release of payment. Unless Buyer object payment is released.
  • Another embodiment include a third party product verifier in the delivery process so that Buyer and Seller have unbiased verification.
  • This invention incorporates Privacy Enabling the full value chain back top the originating supplier with intermediated shipping directly to CLIENT.
  • OBITM Open Buying on the Internet - www.openbuy.org
  • This invention incorporates a Privacy Enabling implementation of open Business to Business specifications.
  • TP will intermediate the transaction including payment, delivery control, warranty and post-delivery service according to the Privacy Trade Platform.
  • TP will act as the Buying Company and CLIENT will be technically be disguised as a employee of the Buying Organization.
  • the Virtual CLIENT Identity can be a one-time-only Identity or a COMPANY known virtual identity according to the purchase background.
  • figure 25 An embodiment according to OBI 2.1 is shown - see figure 25. Please note that figure 25 can have additional suppliers in multi-party Value Chain without changing the basic concept.
  • CLIENT has intention to buy a specific product knowing the product and/or the desired supplier. Acquiring this information can be the result of additional TP services not relevant to the OBI Standard. TP supply CLIENT with the correct VID. CLIENT goes to the selected supplier website and is technically identified by Selling Organization as en employee of TP and presented products and prices according to agreement. CLIENT selects products according to standard shopping methods.
  • TP gets authorization for the order and payment terms from CLIENT and issues a formal order with an Intermediated Delivery Address supplied with the encrypted Shipment Info.
  • COMPANY issues an Electronic Invoice, which is forwarded to TP for payment according to terms and ships the goods.
  • This method can easily be implemented in other parallel B2B trade specifications. Since TP can translate between standards this method also opens for trade across regions with different standard trade specifications so that a European CLIENT can purchase from an American Supplier creating a truly homogenous trade flow for suppliers across segments and standards.
  • CLIENT is identified to the virtual store a one-time-only identity will ensure that collaboration between the store and supplier cannot be linked to other purchases.
  • This invention also incorporates a solution where TP use and supports a third- party broker for locating the cheapest supplier able to supply or the best Product according to Common Business Library Product Catalogue with standard Product Identification and references to suppliers.
  • COMPANY has a right to refuse transfer of ownership, rights and obligation. This is a special case to be handled the parties in between with possible dispute arbitration.
  • COMPANY can issue a special electronic warranty stating clearly what is covered by warranty and how repairs, upgrades etc. should be handled.
  • This electronic document can contain links to the COMPANY web-site for detailed information.
  • CLIENT can at any point show the original electronic invoice regarding the purchase and use this to claim warranty services.
  • CLIENT interacts with supplier using his VID and receives a reference numeral to use for returning the product.
  • CLIENT packages the product and issues the return slip with the reference numeral and ship it using any shipper. In case the shipper have problems or upon reparation returning the product to CLIENT will follow the same procedure as when originally sent (see figure 14 Anonymous Delivery). As his own return address he use the address of the VID with the reference numeral encoded into the address ( ENCS(CLIENT token Identifier + reference numeral, SYMKEY)).
  • a mediation process is enabled for crime investigation enabling legal representation of not identified individuals. Under these circumstances a suspicion by the police is not enough for TP to release the Identity of a CLIENT. A judge will have to be involved and the individual informed of the proceedings.
  • TP can and must as minimum ensure that proper proceedings are in place before releasing identity.
  • CLIENT must be issued a lawyer representation.
  • a special VID of CLIENT is created to Interact with his lawyer so that not even the lawyer knows his identity. If the police fear the crime is of a type that may lead to a possible escape they can ask to have a lawyer representing the CLIENT without CLIENT knowledge of the proceedings. This has to be justified towards the judge and the lawyer will have to contest this violation of CLIENT rights of PRIVACY.
  • TP and the lawyer and the CLIENT (unless he is not informed due to a decision by a judge) can know interact to defend CLIENT right of non-identification.
  • a Privld Card is a tamper-resistant SMARTCARD containing as a minimum the private key of a VID, the public key of TP and an ability to encrypt. Additionally it can have an internal Clock to time-limit the private key.
  • PIC Privld Card
  • the Privacy Server When entering into agreements or purchases requiring identification the Privacy Server will act as a guarantee of identification and/or intermediary in legally binding agreements. Specifically this will also apply when purchasing communication services making new communication channels anonymous by definition.
  • the Shop Internal Identification can either be transferred from the Privacy Server, using wireless communication units (infrared, mobile etc.) or from the PIC itself. See the Authentication procedure.
  • special services can be suggested using a variety of different Interactive Communication Channels. For instance special purchase suggestions (a specific item), special services (information support) or individual discounts (based on the full customer knowledge).
  • the Client can have individual pricing on all goods and services as being prior virtually identified.
  • the Client can accept this for payment through a one-time only verification. This can be using an request-answer protocol or through alternative interactive channels such as a Mobile Communication Unit. The Supermarket will then receive verification from the Privacy Server that Payment is approved.
  • a technically reduced version of the Privld Card is an anonymized Credit Card only featuring an identifier, a end date and a TP Company name not related to CLIENT and information as to the Card issuer.
  • This anonymized Credit Card can be accompanied with a partnership agreement with Credit Card Verifiers to enable Strong Authentication - see Migration Services Payments. In this version no fraud is possible without additional traceability has been established in the form of a strong authenticated authorization.
  • a central solution to this invention is the establishment of a close-loop customer
  • a Privacy Trust Logo Icon can be located at the COMPANY homepage (figure 31 reference numeral 20). When a new prospect customer of COMPANY looks at COMPANY website he can look for the Trust logo. In order to prevent abuse by COMPANY the prospect customer can press the Trust Logo and through a link reach TP website where a Trust Certificate is created verifying that COMPANY is abiding the principles of Privacy both in signature and in actions (figure 31 reference numeral 30).
  • a Trust Certificate require:
  • Non-CLIENTs of TP can from the Trust Certificate register with TP and get immediate anonymous auto-authentication (figure 31 reference numeral 30).
  • TP CLIENTS authenticating with COMPANY will receive warnings if the Trust Certificate is revoked.
  • the communication intermediation process includes a) Catching the communication attempt in a virtual manor, b) Identifying involved actors, c) filtering according to setup rules (inbound communication only), d) routing session according to rules and receiver instructions (inbound communication only) and e) session management to establish and manage the communication. Se figure 3.
  • the process of Virtualization require that communication pass through an active part of TP where communication are re-addressed and re-packed without the possibility of link physically outgoing to the virtually incoming communication.
  • the weak spot of virtualization is the physical address not under control of TP.
  • the Catch Process will in some cases also involve alliances. For instance Delivery, SmartCard, Credit Card etc. all require a Partner active contacting TP in order to attain critical information to establish a session.
  • CLIENT intermediation requires CLIENT participation (active or passive) and this leaves CLIENT in control. This include the possibility to bypass TP whether this is temporarily for web-surfing or dealing with relations or suppliers that CLIENT does not want TP to know about.
  • the CLIENT can always login identified (even with a supplier where CLIENT has a VID-relation), inform relations the physical channel identifier or establish additional communication channels such as web-mailboxes, ISP-dialups etc.
  • a central embodiment will be WAP Push Proxy filtering because the WAP Push service will be misused for SPAM.
  • Privacy enabling Devices such as mobile
  • CLIENT In catching outbound communication attempts it is important to realise, that CLIENT will always be the weak link. It will not be possible for TP to catch all outbound communication attempts, face-to-face communication being the extreme case. CLIENT needs to be mentally aware of the role he chooses, when contacting COMPANY. It will hence always be the responsibility of CLIENT not to reveal information, which will compromise anonymity. TP will provide services that help minimising, these problems.
  • Outbound communication attempts made using TP operated means of communication can be caught in the same way as inbound communication attempts.
  • Communication attempts using non-TP operated means of communications can be supported by providing switching facilities, e.g. a TP dial in service that can be used to establish contact with a given COMPANY.
  • the CLIENT receiver will by nature of definition be easily identified inbound as the
  • Token Identifier of the Communication Channel is uniquely traceable to the CLIENT by TP only.
  • the Token Identifier can be translated into the VID using reference numeral 20 and from there be matched with the related Role or Base Identity.
  • a Channel Partner requires special identification and authentication to verify privacy protection agreements and risk of leakage. This especially includes Delivery where address conversion is requested.
  • Sender will in most cases be Identified using a Token Identifier and authenticated using a PKI Scheme. Using Email, this can be achieved by combining sender with email encryption.
  • a strong channel is a identified and access controlled channel that can be used to communicate control messages that upon used in a weaker channel (or vice versa) verifies the weaker channel to the level of the stronger channel. For some weak channels this can only be a session verification. For instance Credit Cards can be stolen, normal telephone lines have general access and is without standard login procedures.
  • Sender cannot be Identified in every circumstance. For instance a friend calling from a public pay phone. It is then up to the CLIENT Receiver to decide. This decision can be built into the VID so that non-identified communication attempts will only be accepted in special semi-identified VIDs used for personal RELATIONS, i.e. if the SENDER knows the Token Identifier then SENDER is likely ok and RECEIVER accepts the call by default. Whereas for the general surfing VID the CLIENT can decide not to accept non-identified SENDER communication and not even being prompted up-front.
  • caller can authenticate interactively using previous agreed methods if caller is already known to PT.
  • VID and physical communication channel Identification will include establishing a mapping between physical identifiers and
  • VID enabling session management to perform this mapping with an insignificant overhead.
  • mapping provided by session management has to be divided into two separate parts each encrypted with a separate session key to avoid breaking anonymity by monitoring and pairing inbound and outbound communication.
  • Encryption is central to protect against eavesdropping and surveillance of communication. This is multi-layered.
  • Central is the core message encryption using SYMKEY between CLIENT and COMPANY.
  • the purpose is to ensure nobody but CLIENT, COMPANY and anyone trusted by any of these have access to the actual message content.
  • Added to the central message is functions, data and messages to and from TP encrypted with ClientKey or CompanyKey respectively. Messages will thus be decrypted and re-encrypted in the intermediation process.
  • communication packages are continuously re-addressed including changing to and from addresses, stripping identifiable signatures ad replacing them with the appropriate Virtual Identify or Channel specific information.
  • Session management facilitates real-time mapping of physical to virtual information.
  • Inbound Intermediation is a central process with the objective to identify and block
  • TP When TP receive a message bound for a CLIENT it will act as the CLIENT agent deciding if the message is to be denied access, let through, routed to Suggestion House (see Personal Services) or other action taken.
  • Suggestion House see Personal Services
  • One possible further action is a request for additional information from sender/caller.
  • CLIENT can prior to the event set up a set of communication rules. These communication rules is based on the richness of information available to decide.
  • Available information include Sender identity, Channel, Purpose (if available), Importance, Receiver temporary Rules, Receiver Actual Status, Sender History, Dialog Status, Commercial Transactions status, Sender history with other
  • CLIENTS etc. Additionally special references can be set up in agreement between CLIENT and COMPANY.
  • a specific example of this is the delivery channel where COMPANY can incorporate reference information in the encrypted part of the address.
  • sender If sender is previous unknown to receiver and/or TP then sender can be identified and classified afterwards to control future communication attempts.
  • SPAM messages from previous unknown sources is readable by TP due to lack of secret encryption keys. These messages can optionally for CLIENT be subject to filtering using automatic Text Scanning rules and evaluation by other CLIENTS of earlier communication from the same source. Using neural networks combined with CLIENT evaluation of earlier unencrypted messages a quasi-intelligent neural net simulating CLIENT preferences can be trained and available for future communications. If CLIENT do not establish an encryption key not known to TP Symkey, then TP can be asked to Scan messages from known sources also.
  • Sender history makes it possible for an access control filter to condition the rule on CLIENT or other CLIENTS evaluations of COMPANY (see evaluation of quality). This is especially interesting if a COMPANY suddenly starts to abuse emails for SPAM marketing. As soon as the first significant group of CLIENT has characterized COMPANY actions as SPAM COMPANY can be reclassified as a potential spammer leading some Access Control Filters to block further communication. Central here is the link to the Privacy Trust Program because the same problem will be visible to CLIENTS in the authentication process thereby reaching a large subset of COMPANY customers shortly after change of policy putting a heavy pressure on non-accepted behavior.
  • the output from the Access Control Filtering can be either a denial, a routing to the suggestion house for sales/marketing messages, a request for additional input (such as a password or an identification), a individual message requesting or serves as input for the redirection service.
  • Individual blocking can be useful in a general concept to avoid bothersome contacts ranging from press-people to unwanted earlier boyfriends.
  • the Priority parameter can both be used to speed a message and to slow it down. It serves as control for how extensively Receiver shall be searched through all channels. For instance an emergency call from a Child of a receiver can lead to a search through all channels, whereas a low priority message is more likely to end up in the electrical answering service.
  • receiver Role-dependant
  • Receiver Actual Status are parameters to situation-specific rules that can be dynamically altered to the specific situation of CLIENT.
  • CLIENT can be in shopping mode letting through more sales-related messages. These rules are to be seen in close connection with the following routing rules which are almost 100% situation-based. For instance if CLIENT is in shopping mode with a GPS- enabled WAP mobile phone CLIENT can accept receiving Calls for Action based on location. These SPAM calls are normally filtered out.
  • Routing is the central CLIENT Communication Path Control ensuring that
  • Communication is best suited to actual wishes, communication type, security, convenience and cost.
  • CLIENT can contact TP to inform CLIENT mode and presently preferred communication channel. This highly very valuable feature enables the ability to dynamically change status without Sender knowing or having to consider it.
  • High Priority Messages can involve extensive search in all communication channels or notification in mobile or other Channels.
  • a very central example of a high priority message is where a relative under the care of a CLIENT is in need of help. This could be a child, an elderly or a disabled person. These relatives are often troubled by the difficulty in locating CLIENT. Instead a single alarm number can be setup and pre-programmed into telephones or Wireless beepers where a call will automatically trigger a Top-Priority establishment of a Communication Path to CLIENT.
  • routing options could be prioritized in the following order:
  • An example of a situation-specific contact protection is when CLIENT is in an important meeting or otherwise attending something that should not be disturbed. Instead of shutting of for instance a mobile phone CLIENT can go into Meeting mode and increase the threshold of importance before being disturbed. More messages will be routed to the answering service but emergency calls will still be put through. When attending a meeting RELATIONS with relevance to the meeting can temporary get higher priority and thus enable a user controlled relevance criteria.
  • a request for additional information about purpose or importance from sender can be collected in interactive channels using automated interaction such as Voice Response etc.
  • Communication of same type can be routed between physical channels of the same type, e.g. routing email to a Role-based email address to the email address currently most reachable (e.g. home address after office hours). Communication can be redirection between to channels of different type, where content translation is possible (e.g. translating a telephone call to Voice over IP, Voicemail etc.). Calls failing to reach CLIENT can be routed to other Receivers such as a Permanently staffed Emergency Call Centers, a secretary, a Spouse, a backup colleague etc.
  • a PRIVACY CARE rating will be as strong an indicator of good marketing performance as financial ratings and a strong indicator of future financial performance.
  • a drop in rating signifies indicator of drop in financial performance.
  • a special EMBODIMENT include token information used to open for third-party emailing when for instance a customer agent is asked to collect quotes.
  • Establishing a Virtual outbound channel requires TP intermediation.
  • TP intermediated communication channel makes it possible for CLIENT only to specify receiver and channel type (indirectly indicated by choice of device - email, phone, etc.) and optionally purpose, but not channel or actual address.
  • TP looks up the correct receiver address. Establishing communication includes looking up and switching to the relevant VID.
  • the central principle about Browsing is that no trace nor registration about behavior is done. If CLIENT so wish third-party anonymisers can be used when browsing.
  • TP will supply CLIENT-side software that can be used optionally, including services like Cookie handling, Browser anonymization, auto-registering, auto-login and the core One-stop sign-in with the related Identity-Switcher. Additionally special services are available for supporting interaction with registered sites like forms filling, profile/wish presentment.
  • CLIENT-side software can be used optionally, including services like Cookie handling, Browser anonymization, auto-registering, auto-login and the core One-stop sign-in with the related Identity-Switcher. Additionally special services are available for supporting interaction with registered sites like forms filling, profile/wish presentment.
  • An embodiment using current technology must include browser anonymization and IP-number protection.
  • IP-number protection proxy
  • IP-number protection is required to protect against tracing of behavior and linking based on the use of IP-number and other similar traceable information.
  • Cookies The use of session management technologies likes Cookies is limited to a minimum, e.g. by making sure that a cookie can survive only during a session and deleting other cookies after browsing.
  • TP assisted login and logout identity switching
  • all non-relevant cookies are deleted.
  • cookies can be transferred into the VID data archive. These cookies can optionally be restored when entering the site again.
  • the anonymous VID can be supplied with information about Profile and wishes from the Private Data Storage controlled by CLIENT.
  • This profile information can include an anonymous proof of credit worthiness, a credential such as a formal educational degree or an anonymous proof of absence of a negative credential such as a criminal record or outstanding debts.
  • One embodiment include a XML format collection of parameters, encrypted according to the structure of roles and VIDs and manageable by TP only on reference but not by access to contents.
  • a CLIENT-side companion When filling out forms a CLIENT-side companion help fill out these forms and keep a copy of information revealed.
  • auto-login and auto-Identity-Switch can be enabled by the CLIENT-side.
  • TP can auto-register.
  • CLIENT When entering sites where CLIENT has not registered, TP can auto-register.
  • CLIENT When auto-registering CLIENT is asked the type of VID and optionally under which role CLIENT wish to register. Also special requirements as to Channels availability is customizable.
  • TP then creates a new VID and registers this VID with COMPANY.
  • COMPANY site with a Privacy agreement with TP registration is done straight into COMPANY customer database with the Company customer Database ID for Client becoming the common identifier.
  • Email and similar means of communication is characterised by being asynchronous, and hence not having an active session.
  • Standard email anonymization is well known in several types.
  • the standard solution is to have e third-party re-mailer to act as an anonymiser by translating between an anonymous email address and the actual user email address.
  • An email address is a Token Identifier where only uniqueness and a link to a role is key requisite.
  • TP must set up means (both inbound and outbound) that makes it possible for CLIENT to use the physical line without revealing the physical identity. For inbound calls this can be done by routing from a TP operated phone number to the physical phone number.
  • a Telco Alliance Partner will translate on the fly. Basics is that the Calling Party will always reach a line controlled by TP. Information can be obtained from the Calling Party concerning purpose, validating identity etc. before attempts to reach the Receiving Party. The receiving party will have some sort of log-in validation and advance notification of caller and purpose before connection is established.
  • Outbound Telephone number can be ⁇ Local Privacy Number> - ⁇ Token information> or ⁇ Local Privacy Number> - ⁇ Corporate Customer Internal Customer Identifiers
  • a Telco Alliance Partner will translate on the fly.
  • a mobile Telephone however has the advantage over fixed-luine telephones that they are not identifiable by the physical location link to an address.
  • Voice over IP has further the advantage that no permanent identifier are linked to a Voice over IP session.
  • TP host a WAP Gateway that controls access to the mobile device.
  • the basic service is to acquire the device anonymously so that not even the phone company knows the identity of the owner.
  • the additional service is to Intermediate the calls through TP according to the generic specification.
  • Second is upcoming GPS - possibilities. With this the phone company can trace the physical location of a mobile device.
  • This channel will be intermediated primarily using anonymized Registration so that Interactive Service Providers have to listen in order not be blacklisted. Content itself will not be streamed though TP but each atomized program/advert will.
  • the CLIENT-side browser is anonymized with integrated links to online services for ordering etc.
  • a general problem with this solution is that the anonymous Credit Card can be used as link information between COMPANY x and COMPANY y. This will not identify user unless linkage can be established to a COMPANY where Identified purchases using the same Credit Card has been made.
  • Standard Linkable Credit Cards can either be used offline or in online SSL trade in combination with an online Network-based payment authentication or a wireless authentication as shown in Figure 15. This is done in coalition with Credit Card verifiers who will implement a table translating a Credit Card to a contact channel for CLIENT to be used for CLIENT payment authentication outside the reach of COMPANY thus eliminating most Credit Card fraud. CLIENT will then authenticate Payment with Credit Card Verifier outside the reach of COMPANY. Credit Card verifier presents an electronic payment slip to CLIENT either directly or through a Trusted Agent. Upon authentication by CLIENT the Credit Card Verifier can authenticate Payment towards COMPANY according to standard procedures with the Credit Card Issuer. This procedure eliminate the need for Credit Card pin- codes since a stronger Channel authentication is used.
  • the CLIENT payment verification channel will be according to the Channel Trade taking place. Offline in stores etc. the use of Traceable Wireless Devices such as Mobile Phones with separate authentication mechanism will significantly improve security due to fraud requiring theft of both the Credit Card and the authentication device.
  • the Credit Card number is linkable across COMPANIES a special VID for this purpose only is used with Trusted Agent authentication.
  • the Token VID identifier can be the Credit Card Number itself
  • This procedure is extended into an anonymous procedure making. By issuing anonymous Credit Cards COMPANY will not be informed of CLIENTS identity even with existing payment procedures. In addition this is combined with Trusted Agent intermediating payment verification so that the Trusted Agent Authenticate Payment towards Credit Card Verifier and Credit Card Verifier then Authenticates Payment towards COMPANY.
  • Credit Card Information are linkable information and if informed to COMPANY a breach of Privacy.
  • the Payment Mechanism will include intermediation such that Payment is guaranteed by a Trusted Party.
  • a new CLIENT can after registration and identification download a synchronization tool customized for standard Personal Automation tools (such as Palm Pilots, Outlook, Lotus Notes Personal Address Book etc.).
  • standard Personal Automation tools such as Palm Pilots, Outlook, Lotus Notes Personal Address Book etc.
  • Each contact will by definition be an Address Book Only type of VID.
  • CLIENT can reorganize his contacts according to his own Roles and VIDs so that Business Contacts and Personal Contacts, Family, Suppliers etc. are separated. In this process each Contact will be separated into how much information each Contact can access with CLIENT - Wishlists, Preferences, Physical Communication Channels etc.
  • CLIENT When this process is over CLIENT can ask TP to contact all or some of the Contacts and ask whether they will take it upon themselves to keep the address book updated. At the same time CLIENT offers to keep personal address book updated.
  • the individual confirmation ensure that control of access to contact information is retained to the individual (Nobody can force a Celebrity like a movie star to update contact information but a specific Fan Service can be setup under the control of the Celebrity thus getting both Privacy and Convenience.). Two major advantages are introduced above convenience.
  • a CLIENT have his own Relation database and TP know how to contact these relations. CLIENT decides the channel type (email, voice, postal mail) and send it to TP together with the internal reference. TP takes care of delivering the message including locating the best channel to use.
  • the message delivery is according to the Receivers wishes. Not only can the receiver decide the exact level of anonymity related to communication channels available and identifiable information rendered.
  • the sending CLIENT can respect the receiving CLIENT by putting the receiver in control. Since CLIENT can not know the actual state of mind and the situation of the Receiver, CLIENT can be violating Privacy alone, by the choice of channel and the point in time, CLIENT chooses to use it.
  • Receiving CLIENT can through RELATIONS and GROUPS setup priorities in the Inbound Communication filtering and routing to match the exact desired situation across relations, sender and receiver situations and communication channels.
  • a temporary solution for Privacy-enhancing Communication Channels is by to acquire channels anonymously using support from TP.
  • Wireless devices line mobile Phones, PDAs etc. Virtual Channels like email, Internet Gateway, WAP Gateway, SmartCards for Satellite or wireless Interactive TV.
  • a central issue about anonymization of channels without intermediation is the problem of linkage. Since the logical target of an anonymous non-intermediated channel is known to all COMPANY with whom the channels has been in use the Channel Identifier can act as a linkage device between COMPANIES.
  • Rollover will be the best way to minimize damage. Key about Rollover and anoymised Channel Identities is to manage the Rollover in such a way that no residual linkage is possible. This means that both All anonymized Channels has to be rolled simultaneously ensuring that COMPANY loose trace information.
  • TP Service For the individual CLIENT a major advantage of the TP Service is the access to an answering service covering multiple (if not all) communication channels no matter physical location, type or service provider involved.
  • a CLIENTS RELATIONS and members of his Groups are his Address Book, which can be online accessed or exported and stored in any device CLIENT use. This can be an email address book, a Mobile Phone register, a wireless PDA etc.
  • a specific Identity will be created for each personal contact that is member of a CLIENT Personal Address Book without being a registered TP CLIENT. This is necessary for the inbound control and for notification of changes on behalf of CLIENT.
  • CLIENT can set-up different profiles related to roles, VIDs etc. These can be accessed either by CLIENT push (always presented or presented on request by CLIENT) or pull mechanisms (requiring specific request from receiver).
  • the Suggestion House is reversing the Direct Marketing/sales process to create an alternative to SPAM. Instead of CLIENTS being bombarded with sales signals the Suggestion House is the place where Sales messages are going. When - and only when - CLIENT enters this virtual Suggestion House, he is open to suggestions.
  • Source of Suggestion both company or agent
  • CLIENT can setup his Suggestion House as he pleases. It can be divided into separate rooms where different kinds of messages is directed. CLIENT is in control of inbound messages from the filtering function and from the Agent Access Control.
  • TP supports the Privacy Enabled process from Suggestion to delivery. Central is the problem of containing detailed Private Data from Identification. For a specific purchase CLIENT give information that are more detailed than is necessary and desired (by CLIENT) for the continued relationship. Key to handle this problem is the separation of identities.
  • the suggestion process is a natural continuation of the relationship and as such the purchase is done using COMPANY specific VID.
  • an Agent given access to Private Data Analysis and counseling is seeing one Identity.
  • the actual delivery is done under another One-time-Only Identity.
  • the main purpose is to contain Private Data and still ensure Agents interest of fees etc.
  • CLIENT is in control by accepting Agent access to Private Data - optionally on a rental basis.
  • CLIENT can add the suggested item to his Wishlist (with reference to the original suggester to ensure the fee when delivered).
  • TP will establish a Collaborative CRM meaning that evaluation of a COMPANY practices plus the existence of signed principle documents will be used to rank COMPANIES to non-customer CLIENTS.
  • CLIENT can add this to an interest list for later checking and potentially transferal to a Wishlist or a Shoppinglist.
  • CLIENT is looking through Suggestions marking interesting ones for the Interest List. He can ask to receive advice from Advice Agent accessing either CLIENT Private Data or by Permission getting gift suggestions for RELATIONS.
  • CLIENT create Privacy-Enabled personal Wishlist located in the Private Data
  • CLIENT can appoint one or more RELATIONSs as WISHLIST COORDINATOR. Co-ordination of wedding gifts or parent supervising lists for children adding items is two examples of use.
  • a WISHLIST COORDINATOR can use AGENTS to PRIVACY enabled analyze the Private Data of CLIENT to generate new Ideas figure 27 reference numeral 36 or get additional information about the Wish such as sizes, color etc. from the Adaption Agent (figure 27 reference numerals 220, 37 and 39) . Dynamic Shopping Lists
  • a dynamic shopping list is related to a CLIENT, a Group of CLIENTS (a family or an event) and optionally an event. See figure 27 reference numeral 140.
  • Each Client will have relation with multiple SHOPPING LISTS in order to separate purchases depending of purpose and timing.
  • At point of purchase list can be combined into one operational list.
  • a shopping list can be forwarded to a Price Agent (figure 27 reference numeral 20) for getting quotes and suggestions.
  • a shopping list or single items can be forwarded to COMPANY for purchase according to the full Privacy Trade Service (figure 27 reference numeral 50).
  • the arranger CLIENT can have access to personal likes and dislikes of each participant without having to keep updated files or calling everyone. This ranges from being a vegetarian for meal selection to seating assistance based on jobs, interests and even prior events. Meal selection services are linked to recipe libraries and can feed into a dynamic Shopping Lists that can be accessed at point of sales in shops etc.
  • Arranging CLIENT can for each relation maintain personal knowledge of a participating CLIENT regarding likes/dislikes, ideas, etc.
  • Participants can coordinate gift purchase based on the personal Wishlist. Gift decision discussions, money collection, transfer of ownership of gifts and warranties is serviced by TP. Please note that a Special Wishlist co-ordinater can be appointed through the RELATION link (see figure 2 reference numeral 100),
  • Event Dynamic Shopping lists support group shopping. If each shopper has access to the same list through for instance a mobile wireless device they can mark items in real-time and across different shops. Using on e of the well- known mobile devices with built-in bar code readers will greatly enhance this service.
  • Data available for analysis in order to get relevant customized suggestions can include finance, house, style, clothes, literature, hobbies etc.
  • CLIENT will create a Virtual identity towards each Agent in order to control access to data.
  • CLIENT selection of Agents is based on their price requirements and history. TP will ensure Agent receive his fee when purchase is done (using TP services) and maintain an individual and allover CLIENT evaluation of Agent Services.
  • CLIENTS will over time build loyalty with specific Agents that are used repeatedly because of quality of suggestions.
  • Agent access to Private Data can be subject to fee payments from Agent to CLIENT.
  • New Agents do not known to CLIENTS can rent access to Private Data under CLIENT approval.
  • CLIENT can show some basic Profile and TP can verify purchase level for Agents to bid.
  • CLIENT can be paid on basis of time and prifle access richness. Just as CLIENT can say no so can the AGENT by stopping to pay rent.
  • CLIENT decide to build relations to one Advice Agent (figure 27 reference numeral 210) specializing on Suggestions based on Private Data. Advice Agents is separated in rooms in the Suggestion House according to specialization. Only Agents adhering to the Privacy Principles will be allowed to register for access to CLIENT Data.
  • Adaptation Agent (figure 27 reference numeral 220) which is used for discussing customization of the Item to purchase with the suppler.
  • Each agent is important to separate issues and data access.
  • This invention works implements a rich list of online and off-line community services.
  • the VID has to be one-time-only if CLIENT is identified by the COMMUNITY because of risks of linking CLIENT identity to the VID related to the partner.
  • the one-time-only VID are generated on the fly and is standard prepared for safe trade involving anonymous sametime payment and delivery intermediation.
  • Communication channels such as email, telephone or chat with supplier can be available depending on the wishes of the COMMUNITY. Guarantee or other post- transaction services likewise.
  • One-time-only VIDs will require setup of encryption keys between TP and the Supplier to handle Delivery Address exchange and intermediation and payment agreements. These keys do not have to be one-time-only as they are specific for the supplier and not containing or use to protect identifying information about CLIENT.
  • This service will be able to take care of all aspects of the trade including a final transfer of a fee to the COMMUNITY account.
  • This fee is an agreement between COMMUNITY and supplier for the COMMUINITY to setup a sales channel for supplier.
  • TP can offer a service where suppliers registered with TP can be offered to the COMMUNITY or even managed by TP.
  • CLIENTS Anonymization of CLIENTS will open for much easier trade relations where COMMUNITIES can concentrate of their core business without risking suppliers starting to contact CLIENTS without paying the fees to the COMMUNITY. CLIENT does not necessarily need to know the supplier further protecting the interests of the COMMUNITY.
  • FIG 24 shows, a generic privacy auction service for Online communities, portals, societies etc. combine Delivery Control, Payment, Communication intermediation, two-way anonymous signature and Trusted Party Service.
  • the Auction Community can setup the rules for with kind of interaction between Buyer and Seller is available according to the trade process. Also the Auction Community can setup a default Agreement that both Buyer and Seller has to accept anonymously in order to continue the trade process.
  • CLIENTS can be previously unknown to TP to which TP will need to create One-Time-Only VIDs to establish Privacy. Both BUYER and SELLER can prior have registered with TP and already be using a VID for the specific Community. Depending on the type of service the VIDs can be identified or non-identified according to the wishes of CLIENT. Seller or Buyer does never need to know each-others identity. TP can in this setup be the only party knowing the identities of the players thus adding trust to the Auction Community.
  • Which communication channels are open can be customized by Auction Service. In one end is a fully open market place only focussing on matching supply and demand for anything. In the other end the actual trade is fully intermediated without free communication between CLIENTS. In the case of full Intermediation only specified messages can be transferred between CLIENTS without them being able to communicate.
  • An Auction Trade can take place without the two CLIENTS ever revealing their identity towards the other or the Auction site. This can be because the Auction site require this as part of their business case (for instance a job matching service) or because either CLIENT wants it so due to the nature of the item in question (tipping the police etc.).
  • TP acts as the Trusted Party in the Deal on behalf of the Auction site.
  • TP Privacy Communication Services can be used to negotiate anonymously and use Privacy Agreement to create a formal agreement. For most Auctions the agreement will be in the form of an invoice (figure 24 reference numeral 10).
  • BUYER CLIENT then deposits payment and TP confirms this towards Seller and ACUTION COMPANY (figure 24 reference numerals 10 to 40). In some Auction models a BUYER CLIENT will have to deposit Payment with TP when bidding.
  • TP can enable Dispute Arbitration - a third identified party to act as independent arbitrageur. If this does not solve problems then legal proceedings can start. This can be totally anonymous but at any point CLIENTS themselves can decide to reveal identities or ask TP to do it simultaneously.
  • the fee for the Auction Site and for TP can be added to the Payment from Buyer or reduced from the payment forwarded to Seller. Additionally there is an optionally Fee Deposit from Seller upon registration item in question at the Auction Site. This fee can be released to AUCTION COMPANY simultaneously with release of Payment to SELLER.
  • the COMMUNITY can outsource most basic COMMUNITY functionality to TP.
  • the heavy membership management part including membership payments (recurring payments), security (identification and authentication) and information management is simple add-ons to the basic TP services.
  • the COMMUNITY receive a list of one-time-only Membership Tokens. Whenever a new member to the COMMUNITY through any means has been approved to become a member the CLIENT can supply the Membership Token. When CLIENT has been accepted for membership an automatic registration as Member of the COMMUNITY is initiated together with membership fee payments added to the list of recurring payments after confirmation by CLIENT.
  • COMMUNITY costly setup and management of communication channels and membership payment collection is significantly reduced. Since TP is taking care of identification and authentication procedures the COMMUNITY IT complexity is greatly reduced because they can use a limited strong authentication access channel directly with TP instead of a more exposed weak authentication only recurring simple passwords etc. Since TP already has an authentication service in place the full TP services are available to COMMUNITY members.
  • This invention opens up for a new type of long-term anonymous customer relationships where customers are in control. If COMPANY make active use of this they are likely to get better customer relationships because they can now focus on servicing customers the best way with customers being much less afraid that COMPANY can abuse information.
  • COMPANY can outsource these procedures to TP at considerable cost savings as compared to how they can do it on their own accord. More importantly since COMPANY cannot do the Identification themselves anonymously, they need a trusted party to establish a secure identification and authentication path when dealing with anonymous virtual identities.
  • Identified and anonymous virtual identities TP can offer to handle the identification and authentication of the full COMPANY customer portfolio.
  • COMPANY (figure 17 reference numeral 10) Generates a Transaction Id and sign this with the COMPANY Private Key.
  • This message is transferred to a TP issued SmartCard able of doing
  • CLIENT Sign the message with a Token Client Identifier (an Identifier of the Specific SmartCard) and encrypts the message using a random symmetric sessionkey. This message together with the Sessionkey encrypted with TP.Pu is then transferred back to COMPANY.
  • COMPANY can use the TP Public Key TP.Pu to locate TP using a standard X.509 library and send the message over a communications networks such as the Internet to TP (figure 17 reference numeral 30).
  • TP receives the message and decrypts the encrypted sessionkey with TP.Pr (figure 17 reference numeral 40).
  • TP extracts the symmetric sessionkey and decrypts the message to get the Transaction Id, the Company Signature and the Token CLIENT Identifer.
  • TP acquire (or generate a new if none valid) the VID related to (Company, CLIENT).
  • the Pair VID, TransactionKey is sent as a Coded Message to COMPANY and Virtual Identification Link is established.
  • CLIENT locate the goods or services wanted. COMPANY can look up the VID and offer customized service accordingly.
  • CLIENT can use the SmartCard to link to the Transaction Id (figure 17 reference numeral 50).
  • the procedure reference numerals 10 to 50 can be done at checkout but then COMPANY has no information to customize service.
  • CLIENT When the electronic invoice and related warranties is ready CLIENT receive in his SmartCard payment request.
  • CLIENT Signs the Payment Data Part end encrypt the signature with TP.Pu (figure 17 reference numeral 60).
  • COMPANY sends the Electronic Invoice together with the encrypted payment authorization to TP (figure 17 reference numeral 70).
  • TP (figure 17 reference numeral 80) decrypts the payment framework and verifies the electronic invoice contains the related warranties.
  • TP Reply with a Payment Transaction Code Payment is carried out according to agreements between TP/CLIENT and TP/COMPANY respectively.
  • TP incorporates both accountability and privacy dedicated secured spaces can be setup where TP provides the gatekeeper access based on credentials. This can for instance be an online playground for children where only identified children an enter with parental accept. Here the child can be presented to a learning program that is both secured from un-identified access by for isntance pedophiles, customized to the childs age and special needs, under parental control and privacy-enabled.
  • Secured Spaces can be used for a multily of purposes setting up access criterias based any credential.
  • Partner - based loyalty programs with multiple COMPANYs involved are increasingly used to build loyalty towards a broader range of products. This is a direct threat to Privacy because these programs are based on cross-company linkability and collection of profile information.
  • Major incentives can be involved to get CLIENT to accept participating in such a program.
  • TP is offering a service where multiple COMPANIES can add loyalty points to a joint program.
  • TP can offer a simple anonymisation service.
  • COMPANY provides TP with a list of VIDs that should participate in the vote and send a message to CLIENTS through TP.
  • TP set-up a one-time-only authorisation scheme which each CLIENT can use only once access a questionnaire form located outside TP control with either COMPANY or a questionnaire analysis outsourcing service.
  • TP guarantees that each CLIENT has accessed the questionnaire only once but does not have access to information rendered.
  • TP can ask CLIENTS that have not voted to vote.
  • Customs, VAT and other reporting Handling of Customs and VAT payment issues across borders etc. depend on the countries of both Buyer and Seller. TP intermediation is necessary in order to calculate these values.
  • Public reporting is a service that TP do on-the-fly as part of the Privacy Payment Service. All necessary information is available in electronic format.
  • TP can offer a full-service Public Reporting thus heavily decreasing barriers to New startups or just outsourcing administration.
  • TP can act as the central core in a Total Business Service. Since Privacy require
  • this intermediation can include a total service concept related to the subset of COMPANY customers which are TP CLIENTS.
  • COMPANY Products can be made available for Agent Services as part of the Trade Server integration thus facilitating availability in the marketplaces.
  • Government services has a general tendency to increase in scope and depth of services and information required in the name of public good.
  • the cost is a significant threat to Privacy for the Individual.
  • An anonymising service like TP will open up for new types of digital voting services. Central conditions is that TP cannot tamper with voting procedures. That CLIENT remain anonymous and sure that no-one can link their vote with their identity even when TP act in combination with a governmental operation.
  • a CLIENT can collect a vote token only once and get anonymous access to the voting booth delivering this token.
  • the principle is based on division of control functions.
  • TP ensure that each CLIENT vote only once by authenticating anonymously and zero-knowledge towards a Public Token control service.
  • This Token CLIENT can go to the vote booth outside TP control and provide the One-time-Only certificate and give both physical and virtual votes.
  • TP can supply government with a list of which CLIENTS have voted which can be verified against the total number of votes.
  • TP can prove that each of these CLIENTS have voted by having them sign a statement confirming that they have voted.
  • Anonymisation services are very useful in public context for services concerning sensitive questions that is related to fear, disgrace, shame. This can be sexual related, reporting criminal incidents anonymous etc.
  • CLIENT is free to use alternative informational-theoretical anonymisers for these purposes.
  • a DNA sample is numbered and linked with an anonymous identification. This can be done using the same functionality as for Realworid Loyalty Programs.
  • the government function create a sample identifier and asks to get this sample linked to the CLIENT.
  • CLIENT authenticates zero-knowledge towards TP and TP confirms with a signed statement that traceable identification is created.
  • the combination of the sample number and a special VID is stored with TP.
  • the unidentified numbered sample is stored and can be used for analysis purposes.
  • Car Registration should be anonymous but traceable in the same way. Simple offences like parking tickets etc. does not necessarily lead to identification but fines can be paid anonymously.
  • the system according to the preferred embodiment of the present invention for establishing a privacy communication path is shown in figure 32 and is designated in its entirety by reference numeral 80.
  • the system comprises one of more General Authentication Devices (shown in figure 33) to provide the CLIENT with control over Private Keys located in a SmartCard (shown in figure 33 as reference numeral 100) and ability to do Zero-knowledge Authentication.
  • the system comprises one or more Communication Channel Providers (shown in figure 32 as reference numerals 40, 50, 60, and 140) to establish Privacy Communication Channels or a virtual identifier intermediating a Physical Communication Channel as a Privacy Communication Channel toward one or more Authentication Units (figure 32 reference numeral 70) acting as an intermediary to provide CLIENT with the ability to set up a rule based communication routing scheme across communication channels and multiple Virtual Identities each with a set of Virtual Communication Channels and the ability to Sign Legally binding agreements and authenticate towards any third-party based on a single sign-on identity.
  • Communication Channel Providers shown in figure 32 as reference numerals 40, 50, 60, and 140
  • Authentication Units shown in figure 32 as reference numeral 70
  • the single sign-on identity is provided by one or more ID Units (figure 32 reference numeral 80) issuing SmartCards (figure 33 reference numeral 100) for the General Authentication Device (figure 33 reference numeral 80) and storing Identifiable information according to Basic Accountability Principles.
  • the system according to the preferred embodiment of the present invention further comprises one or more Device Authentication Units (figure 32 reference numeral 170) with the ability to provide a certificate to a General Authentication Device (figure 33 reference numeral 50) to authenticate online or offline towards any device and verify said certificates to protect against theft or fraud.
  • the system comprises one or more Trust Units (figure 32 reference numeral 90) intermediating two or more Virtual Identities of different CLIENT or Company into Relationships providing storage, profile information encrypted under the control of CLIENT or Company, access to relationship information, relationship services and protecting Authentication Units from knowledge related to virtual Identities.
  • Trust Units figure 32 reference numeral 90
  • system according to the preferred embodiment of the present invention comprises one or more Integration Units (figure 32 reference numeral 100) to provide companies with a single interface to Company Relationships with CLIENTS or other Companies
  • the system provides CLIENT with full Privacy Control of CLIENT Identity and information related to CLIENT only subject to basic Accountability principles.
  • a CLIENT can chose a minimum set-up where no Units even in collaboration can violate CLIENT Privacy except for the basic Accountability Principles.
  • a CLIENT can chose a maximum convenience set-up in which both identified and non- identified relationships can be incorporated together with all relevant communication channels to provide CLIENT with full control of communication and relationships with minimum but not zero linkability.
  • both an Authenticating and a Trust Unit are build around an IP-Proxy combined with IP- Mapping routers.
  • Each Communication channel is based on a separate mapping unit such as an email gateway mapping email addresses to ensure that no linkable identifiers are present.
  • Minimum accountability is achieved by ensuring isolation of Identity and related information under CLIENT control combined with a un-broken provable route to identification stored at an ID Unit requiring minimum an algorithmic operation by a public institution according to law and a subsequent algorithmic operation by an agent of CLIENT.
  • the ID Unit has no knowledge as to the activities of CLIENT except for holding a number of multiple encrypted pieces of identifying information using different asymmetric encryption keys of which at least one is a public key of an encryption pair related to either an appropriate legal Institution such as a court or the Individual.
  • the encrypted pieces of identifying information should in addition to an external encryption key be encrypted prior by at least one encryption key related to an agent of CLIENT to verify individual fundamental rights is not violated.
  • CLIENT can thus perform a traceable voluntary identification whereas a not- voluntary identification will require a proper legal procedure protecting individual rights.
  • This procedure of an Agent of CLIENT is to ensure a last Privacy defence in a worst-case scenario where for instance control of courts is not under democratic control and transferring out of physical reach or preferably actual deletion of identifiable information can not be carried out prior to a worst case scenario taking place.
  • Embodiment CLIENT generates a ID key pair and provides the ID Unit with proof of Identity for instance by signing the Public Key (Id.Pu) using a digital Signature key (Cl. DS.Pr).
  • CLIENT then generates an asymmetric key pair for each Authentication Unit and forwards the public key CI.Pu to the ID Unit together with a message linking the Public Key of each Key Pair with the ID key pair.
  • the SmartCard shown in figure 33 designated by reference numeral 100 is accessed through the General Authentication Unit where the Private Key part of any Identity related to CLIENT is accessed.
  • CLIENT can create a new Virtual Identity in any of the Authentication Units and use this to Create a new Relationship through the Trust Unit.
  • CLIENT signs a link between the Public key of a virtual Identity with the key specific to the Authentication Unit (Cl.Pr) to ensure the un-broken traceability link back to the identifying information in the ID Unit.
  • CLIENT receives a verified proof of ownership from the Authentication Unit
  • a Virtual Identity as presented by an Authentication Unit to a Trust Unit can consist of a set of signing, authentication and encryption keys (CI.Vir.DS.Pu, CI.Vir.Auth.Pu, CI.Vir.Enc.Pu).
  • the Private part of the Signature and Authentication keys (CI.Vir.DS.Pr and CI.Vir.Auth.Pr) are only known to the Authentication Unit whereas the private part of the Encryption key (CL.Vir.Enc.Pr) is known only by CLIENT through the General Authentication Device.
  • CLIENT The encryption key known only by CLIENT is providing the core protection from a Man-ln-The-Middle attack in a two-way anonymous Relationship. CLIENT can always have any third-part verify that the correct Public key is made available to the Relationship Party at point of Relationship initialisation.
  • This principle implements a no-mans land between an Authentication Unit and a Trust Unit.
  • the Authentication Unit protects the Trust Unit from information linking a relationship to the CLIENT part meaning that the Trust Unit knows CLIENT as a number of non-linkable Relationships not differentiable from Relationships related to other CLIENTS.
  • the Trust Unit prevents the Authentication Unit from knowledge about the Relationship contents.
  • Private Keys (not the private SmartCard Key) can be transferred between Smart Cards and stored safely in a backup locating provided they are encrypted with a public key decryptable by a Private Key accessible through the SmartCard. No Private key is in clear text outside the SmartCard.
  • a General Authentication Device (shown in figure 33 as reference numeral 50)
  • a privacy communication path is constructed around a General Authentication Device (shown in figure 33) incorporating a user interface (shown in figure 33 as reference numeral 180) and operation able to communicate through a reader (shown in figure 33 as reference numeral 110) for a tamper-proof SmartCard (shown in figure 33 as reference numeral 100) able to communicate with the Device and as a minimum store a set of data elements and perform standard operations and cryptographic algorithms such as generate keys, random numbers, zero-knowledge authentication.
  • the General Authentication Device is characterised such that any persistent identifiers are physically separated from any external communication channel and only accessible under control by the SmartCard.
  • Such device can be achieved by incorporating an isolated area (shown in figure 33 as reference numerals 120 and 130)) able to store persistent identifiers and optionally the ability to perform cryptographic algorithms.
  • Such a device can for instance be in the form of a PDA, Mobile Phone, satellite set-top box, a workstation, a combination such as of a mobile unit and a workstation, a lap-top computer or other device able to establish wireless (shown in figure 33 as reference numeral 170) or cable based communication channels (shown in figure 33 as reference numeral 160).
  • the General Authentication Device is able to establish a communication path through a Communication Channel Provider to an Authentication Unit and perform a Zero- Knowledge Authentication procedure with the Authentication Unit. The Authentication Unit subsequently authenticates the communication path towards the Communications Channel Provider without providing any persistent device of CLIENT identifiers.
  • the Authenticating Unit can require the General Authenticating Unit to authenticate Zero-knowledge towards an ID Unit to check for revocation of the SmartCard or other fraud protection.
  • the Communication path can be based on a large variety of network protocols such as Wireless in the form of Bluetooth, Infared, GSM, WAP, GPRS, Wireless IP and direct cable-based over ADSL, ISDN, serial cable links etc. Any protocol able to carry IP-traffic is well suited for such solution.
  • the General Authentication Device is provided with means to generate or access random or other non-persistent device or CLIENT identifiers. This, for instance is the case in the most used network protocol where an IP- address can be dynamically assigned to a session using a DHCP.
  • the non- optional MAC address is not from a technical viewpoint required to be globally unique except within the local surroundings of the network.
  • the MAC address can be randomly generated or provided in any session from the Authenticating Unit for subsequent use in the next session.
  • the real MAC address to protect against theft etc. is located in the isolated space (figure 33 reference numeral 120) isolated and only presented to a Device Authentication Unit without providing any knowledge or persistent identifier regarding CLIENT.
  • Other ways to circumvent is reuse of an address pointing at the Authentication Unit as a gateway.
  • the future Mobile IP standard is incorporating the necessary principles for integrating the above modifications. This also covers even an always-on Mobile Phone as long as a session-switch is applied regularly.
  • the telecom provider will know where a Mobile Device is, but by incorporating these principles the communication is Privacy- enabled because the telecom provider only has a session identifier authenticated by an Authentication Unit.
  • the Telecom Provider does not know persistent identifiers of neither CLIENT nor Device and yet still have both a loyal customer, protection against theft and is able to provide advanced location based services simultaneously.
  • this principle of delayed authentication works across location - Home, Mobile, Work, Foreign Workstations, In Store and even through locations CLIENT has never before had any contact with because an Authentication Unit can instantly intermediate and establish a trusted connection, access to payment channels and a route to accountability.
  • a General Authentication Device will have a mechanism for CLIENT to Authenticate towards the SmartCard using biometrics, passwords, pin-code or any other authentication mechanism.
  • the authenticated SmartCard can then verify internal integrity of General Authentication Device including a device authentication towards the physically isolated space.
  • a General Authentication Device is able to store Device Certificates in the SmartCard for offline or online authentication of any device or system including the General Authentication Device itself.
  • the SmartCard can specifically get external verification that the Authenticator Device is not reported stolen or otherwise inappropriate to deal with.
  • a device certificate can be in many forms ranging from a shared secret to an advanced Zero-knowledge Authentication Protocol depending on the type of device and the sensitivity and timing constraints in revoking a certificate.
  • a SmartCard specific authentication key can be created as a Start/End date or limited show certificate to reduce offline damage in case of theft.
  • the Authenticator - SmartCard combination can after basic authentication create specific authentication with any other external unit made able to authenticate electronically such as access doors, computers, home control systems, cars, specific systems using wireless or cable communication.
  • the SmartCard can store algorithms and one or more identified or pseudonymous Digital Signatures related to the user that can be verified through a publicly available register such as an X.509 or any other PKI compliant protocol whereby a General Authentication Device can replace most known designs for smart-card based Identifying Devices.
  • the General Authentication Device can be incorporated as a software-based solution even without physical changes as to the MAC-address. This is more vulnerable to abuse and requires more trust to the Trusted Party because the combination of a Communication Channel Provider and an Authentication Unit will know a persistent identifier even though it is not available to the Trust Unit nor any Relationship counterparts. Unless CLIENT is very careful the telecom provider can easily identify CLIENT using location analyses if say for instance the Mobile Phone is used around the CLIENT Home. Zero-knowledge Authentication.
  • Zero-knowledge authentication mechanism is such that a message transferred is free of any persistent identifier that could be used to identify CLIENT. This means that even a third-part able to decrypt communications cannot extract any identifiable information from the communication.
  • Trust Unit A knows the public key of the Client B to authenticate because he is provided with an identifer B1. Trust Unit can verifiythat Authentication Unit does not impersonate CLIENT by carrying out a Zero-knowledge authentication based on the CLIENT encryption key of the Virtual Identity (CI.Vir.Enc.Pu/Pr).
  • A generates a random message M.
  • a Sends to B - Challenge Enc(M,B.Pu).
  • B sends to A - Responds Enc(H( Dec(Challenge),B.Pr), A.Pu).
  • A can now verify that H(M) equals Dec(Respons,A.Pr) and that B is able to decrypt the message and has in his possession the Private key part of B.Pu.
  • B returns the Hash of M and NOT the clear text of M because A would be able to make B decrypt any text including something B wants kept secret. This procedure can be repeated so that A can authenticate towards B and these procedures can also be combined in more efficient protocols.
  • Zero-Knowledge Authentication can take place, making use of pre-arranged one-time-only identifiers. This is the case when a CLIENT carries out a Single Sign-on Authenticates towards an Authenticating Unit.
  • the preferred solution is based on a series of Hash values.
  • this message is not entirely Zero-knowledge because CI.Pu is included even though it is encrypted. By signing Hashkey(20) protection against anyone else initiating a fake authentication sequence is prevented. Further protection can be incorporating by a multi-step protocol where CLIENT after having forwarded CI.Pu then Authenticates Zero- before forwarding Hashkey(20) encrypted.
  • CLIENT wants to authenticate towards an Authenticating Unit.
  • CLIENT forward Enc(Enc(HashKey(t-1 ),CI.Pr),HashKey(t)),TP.Pu) using the General Authentication Device.
  • the Authenticating Unit can now decrypt the message and retrieve the One-Time-Only key Hashkey(20) previously agreed.
  • the Authenticaing Unit save Hashkey(M) for the next authentication operation and authenticate CLIENT towards any third-party such as an Communication Channel Provider.
  • a mobile Telecommunications provider servicing an always-on mobile device with location-tracking knowledge only knows a persistent session identifier and a way to ensure payment
  • a Bank handling deposits only knows a communication channel to the holder of the deposit and a way to ensure authentication of a persistent virtual identifier of the deposit
  • a Credit provider only knows information such as to evaluate credit worthiness and a way to ensure accountability in case the credit agreement is not abided to by the borrower.
  • a Shipper providing physical transportation of goods only knows information as to a Drop point and a way to receive proof of delivery not containing any persistent identifier of the individual.
  • a Communication Channel Provider provides a virtual interface specific to the Authentication Unit only to a communication channel where the Communication Channel Provider knows a persistent identifier of CLIENT and/or the channel itself.
  • the Authentication Unit can remain unknown to identifying information and thus reduce the risk of privacy violations even when CLIENT wants maximum convenience.
  • a bank (figure 32 reference numeral 60) can forward payment with a pre-agreed one-time-only identifier without revealing the actual identity of the paying entity.
  • a shipping drop point (figure 32 reference numeral 150) can provide the physical intermediation.
  • An ISP can provide multiple aliases to the same email-account.
  • the most difficult task is in a privacy and accountability enabled supported way to enter into a legally binding contract in a two-way anonymous relationship.
  • AUI .Pr Authentication Unit 1 Private Key
  • TU.Pu Trust Unit Public Key
  • ⁇ a,b ⁇ means a and b concatenated
  • A2 and B2 represents the fully Privacy enabled virtual identities.
  • A2 is a relative address of A specific to the relationship
  • A3 is a relative address of A specific to B.
  • a key feature of the preferred embodiment of the present invention is that B3(@Auth1.com) as the TO-address in for example an email can be used irrespectively of the sending address A because the Authentication Unit maps A to A1 and ONLY from A1 does B3 provide the correct identifier to the correct relationship A1(@Auth1.com)->B2(@TUx.com).
  • B3 can be any non-unique number or code in a range small enough to ensure a crowd-effect based on existences and use in different CLIENTS Address books and as identifier in communication to and from the Authentication Unit.
  • Addresses A and B are assumed either a POP-email Account with the Authentication Unit over a fully privacy-enabled communication path or any Authentication Unit specific email alias provided by a email service provider.
  • B3 represents the virtual address of B in the Address Book of A.
  • A1 (@Auth1.Com) represents the address of the virtual identity of A in the no-mans land between the Authentication Unit and the Trust Unit.
  • A1 may only be unique to Authentication Unit 1 but not Across Authentication Units.
  • B can respond with a signature parallel to A and this can without difficulty be extended to a multi-party agreement.
  • multiple CLIENTsor COMPANIES can have keys to any data part of the relationship under full control of the CLIENT A.
  • CLIENTS or COMPANIESs can have access to data parts containing identifying information while others have only access the non-identified profile information.
  • This feature makes the invention highly suitable for e.g. Public Citizen records or electronic health care files where the CLIENT patient can give his doctor and the hospital access to identifying information whereas any third- parties such as a healthcare product supplier, a statistics project or medical research group can be granted access to specific parts of the healthcare file only.
  • the Authentication Unit and Trust Unit can in combination do translation of the asymmetric encryption key standard without either the Authentication Unit or the Trust Unit individually being able to read contents of communication.
  • the private key encryption key B2.Enc.Pu is known to the Authentication Unit only.
  • the Trust Unit knows an additional asymmetric encryption key and request Auth. Unit 2 to decrypt b2k and return the real b2k encryption with the correct encryption key.
  • Auth. Unit 2 never has the encrypted message and thus cannot read the message.
  • the Trust Unit never has an unencrypted key.
  • B can be a non-customer and thus not able to understand mka.sign and mka. hash as these are non-standard to normal email-protocols. But in this case A will know Bs standard and create mka.sign and mka. hash according to B's e-mail protocol.
  • CLIENT can automatically be aided to create a Backup entry to the same relationship through a second Authentication Unit and store proof of ownership including an encrypted copy of the private encryption key in a generally accessible storage. If the first Authentication is closed down for any reason or CLIENT so prefers he can switch to the second Authentication Unit and continue the Relationship unidentified.
  • the General Authentication Device preferably is closely shielded to prevent leakage of identifier or other information.
  • This shield is in a preferred embodiment based on a Session Manager in close connection with the Device Firewall controlling all device communication channels.
  • the Firewall On initiation the Firewall is totally closed.
  • the Firewall opens for authentication traffic towards the Authentication Unit for authentication only.
  • the General Authenticator receive a session identifier from a Communication Channel provider or generates a session identifier and forward said session identifier through a Communication Channel Provider to perform a Single Sign-On to the Authentication Unit using a Zero- knowledge authentication algorithm.
  • the Authentication Unit When receiving a request the Authentication Unit check if a Session Manager is running. If not the Authentication Unit responds with a Sessions Manager - it is either downloaded or initiated from a local storage area. CLIENT SmartCard verifies integrity of the Session Manager before activating. The Session Manager which will from then on control the dynamic firewall and provide CLIENT with Access to Virtual Identities and related storage and services.
  • a Session Manager is as such providing CLIENT with an interface able to simultaneously manage multiple sessions authenticated each as different virtual identities through the respective Authentication Unit.
  • Special services can be opened by the Session Manager according to pre- specified rules or CLIENT interaction. This can included a Peer-to-Peer connection with friends or a workgroup, a connection to another Authentication Unit, a virtual Storage unit, a VPN Connection to a trusted Network (can also be done through Authentication Unit) etc.
  • Inbound traffic to a previous verified session is accepted.
  • Outgoing traffic can be filtered and re-routed by the firewall through the Proxy where for instance IP- addresses are re-mapped unless specifically opened as a special service.
  • a filter function under CLIENT Control can be set up to strip identifying information such as footers in emails from the communication streams.
  • the Privacy Profiler works with a CLIENT-controlled storage containing a number of privacy attributes that can be either Credentials signed by any third-party such as Exams, citizenship, Letter of credit etc. or self-signed profile attributes stating preferences, demographics etc.
  • CLIENT Only CLIENT can access these data. They can be stored on a encrypted virtual storage and accessed as a natural extension of the Session Manager and Address Book .
  • Privacy Credentials can be in the form of
  • Credential Encs("Anonymous Credential", CredKey), Enc(CredKey,Third.Party.Pr), - Verifying that Credential is issued by Third-
  • CLIENT can verify that Credential is anonymous and correct by decrypting the Credential using the public key of third-party Decs(Credential,Dec(Enc(CredKey,Third. Party.Pr), Third. Party.Pu).
  • the Privacy Attribute is re-encrypted accordingly by the Privacy Profiler and transferred to the Relationship Storage.
  • Self-signed profile attributes are straightforward decrypted and re-encrypted with a random generated symmetric key.
  • the symmetric key is attached in two encrypted versions - One with the CLIENT Relationship Encryption Key and One with the public key of the other Relationship Party CO.Pu.
  • An attribute can have a time-dependant certificate that limit validity attached.
  • CLIENT When forwarding a credential to a relationship, CLIENT requires TP to verify the third-party or CLIENT signature linking the Credential to CLIENT Virtual Identity. CLIENT forwards the Linking Signature only
  • First Trust Unit converts the Credential link from Client Digital Signature to Client Authentication key towards an Authentication Unit and then the Authentication Unit can Convert the Credential link from Client Authentication key to the CLIENT Virtual Identity
  • Send-Message Enc(Enc(Message, CI.Vir.Enc.Pr), Trust Unit.Pu)
  • a Form Filler can access the stored Relationship attributes and automatically fill out web forms etc. with attributes and the corresponding decryotion keys already known to the relationship. Dynamic Out-Out and Trust filtering
  • Trust requires Privacy and Security, but Trust substance is basically to be made on history.
  • this invention incorporates two key Trust concepts for a relationship between a CLIENT or COMPANY A and a CLIENT or COMPANY B a) Trust History: Establishing a communication path based on previous interactions in the same relationship. b) Trust Network: Establishing a communication path from A to B based on previous interactions in other relationships with B. According to this a CLIENT can set up relationship rules that operate on statistical summations on previous evaluations.
  • the set of Relationship Rules thus works dynamically together with evaluations to provide a user-controlled Dynamic Opt-Out and filtering of Privacy Enabled Communications. Evaluations are directly controlling threshold filters of both inbound and outbound communication.
  • CLIENT can set up or change the type of inbound messages acceptable based on previous agreed standards and continuous feedback of evaluations.
  • CLIENT is authenticating towards Company and Company Evaluations show a negative development below a threshold then CLIENT can be informed BEFORE authentication.
  • CLIENT access to relationships is based on an address book implemented as part of a Session Manager.
  • the Address Book accesses a table of bookmarked entries.
  • This table can be stored within the SmartCard, encrypted at the workstation, encrypted as an attachment of the main identity with the Authentication Unit, at a virtual storage location accessible as a relationship or other. If the table is stored outside the SmartCard it is encrypted so that only the SmartCard can decrypt the table refusing to do so unless a certified Session Manager is initiated.
  • CLIENT can now choose any entry in the Address book.
  • the Session Manager then Establish access to the target and present the next dynamical level.
  • addressing can be entirely relative to the viewpoint without any unique identifier. Any point can be reached as a series of steps from where it starts. Without knowledge of the starting point a Logical Locater is not dangerous because any starting point can give a reasonable answer. In the email example the Logical Locator is represented by A3 respectively B3.
  • Company Customer Relationship Management According to the preferred embodiment of the present invention Company will have access to the full profile of a Virtual CLIENT through the Integration Unit providing one Interface to Customer across Contact Points and Communication Channels.
  • CLIENT set up a Privacy Profile of the Virtual CLIENT Identity attached to the Relationship in the Trust Unit as a collection of Profile information with keys encrypted with the Public key of Company Co.Pu. Information is thus always available and up-to-date whenever CLIENT interacts with Company.
  • the same storage can contain the dialog history, the trade history etc.
  • a Form Filler can automatically fill out COMPANY forms with attribute information already known to the relationship and thereby eliminate redundant requests for CLIENT information.
  • Company specifically gets the advantage of being able to address any item from any starting point.
  • An item can for instance be a specific attribute of a CLIENT Customer such as Age, an invoice, a Communication Channel Identifier or a Process Initiator. Customer management will thus become Privacy enabled and made transparent across systems and organisations at the same time.
  • TP Trusted Party - the entity that implements the Privacy Services. Major parts of the services can be outsourced to sub-suppliers. TP is covering both the Trusted party and Sub-suppliers.
  • TP is split up into multiple units - AU - Authentication Unit, ID - ID Unit, TU - Trust Unit, Device Authentication Unit according to Figure 32.
  • VID - Virtual Identity An identified or non-identified pseudonym linked to a CLIENT Role and related to a number of COMPANY or RELATION.
  • VID TYPE - VIDs are divided into specific types with possibility to determine default access. For instance a identified VID will only offer limited access to Private Data.
  • PRIVACY SERVER A server in a distributed network offering the full range of services.
  • different physical or logical services will be servicing different types of task in order to balance load and ensure response times.
  • INVOICE SERVER A specially isolated server handling the collection of invoices.
  • CLIENT - Software functionality operating on CLIENT device can be a simple manually previously agreed information such as a challenge-response pair.
  • CLIENT Individual Person that is Privacy Enabled.
  • a CLIENT can be using a Work role and acting on behalf of a COMPANY as a purchaser.
  • the term CLIENT focus on the individual.
  • ROLE - A CLIENT context This can be Private, Family, Employment, Public Function, Member of a Board etc.
  • RELATION - A link between CLIENTS representing a personal relationship (a friend, family, business connection etc.). RELATIONS are one-way and controlled by the information disclosing entity. A two-way relationship thus requires two RELATION entries.
  • COMPANY An organizational entity. This can be any selling or service organization including a shop, an online Community a basic supplier etc.
  • the term COMMUNITY is used to focus on the online COMPANY interacting with multiple CLIENTS. Often CLIENTS are provided with means to interact directly using tools such as online chat or discussion databases.
  • BUYER An entity interested in acquiring a service or good. If not otherwise stated a BUYER is a CLIENT.
  • SELLER An entity interesting in selling a service or good. If not otherwise stated a SELLER is a COMPANY. For different services involving two-way anonymity such as an Auction service a SELLER is CLIENT different from the BUYER.
  • AGENT A service that analyze CLIENT or COMPANY data in order to provide services for either CLIENT or COMPANY. AGENT comes in different versions.
  • a SHIPPER is a business offering transportation services of letters or parcels. If not otherwise stated the service involved is parcel transportation.
  • Co is a general abbreviation of COMPANY
  • TP is a general abbreviation of Trusted Party
  • AU is a general abbreviation of Authentication Unit
  • Sh is a general abbreviation of a SHIPPER Cl is a general abbreviation of a CLIENT Cl.
  • Vir ia a general abbreviation of a virtual identity VID of CLIENT Co.Pu, TP.Pu, AU.Pu, TU.Pu, Sh.Pu, CI.Pu, Cl.Vir.Pu - The Public Key of a Private/Public encryption key pairs Co, TP, AU, TU, Sh, Cl, Cl.Vir.Vir - The Public Key of a Private/Public encryption key pairs Co, TP, AU, TU, Sh, Cl, Cl.Vir.Vir - The Public Key of a Private/Public encryption key pairs Co, TP, AU, TU, Sh, Cl, Cl.Vir

Abstract

The invention relates to a Privacy Infrastructure Platform that provides a solution for privacy enabling communication and secures trade of both electronic and physical goods and services. Through user-controlled Communication Rules including an Access Control Filter and a Dynamic Routing service the individual is in control of communication and enables a universal user-controlled Opt-In filter for SPAM protection. The invention builds a support for Privacy Enabling the full value chain from the original supplier to the consumer. In addition the invention can support trade across existing standard barriers supporting standard conversion, government reporting and existing and future eCommerce standards such as EDIFACT, OFX, OBI and CBL. Privacy is established using a principle of multiple non-linkable pseudonyms or Virtual Identities (VID) combined with intermediation of on- and offline communication channels.

Description

A SYSTEM AND METHOD FOR ESTABLISHING A PRIVACY COMMUNICATION PATH
A Chief Council for NSA, Baker, remarked once: "The biggest threats to privacy in a digital world come not from what we keep secret but from what we reveal willingly".
Since identified individuals have to transfer personal information if they want to have customized products, services, advice etc. they are at the same time loose the rights of privacy. In a electronically connected world the threats to Privacy are multiplied due to the ease of collecting and sharing information about individuals across multiple points of contact. Threats to Privacy are real which are supported by multiple examples of hidden data collection and the fast growing industry of consumer profiling.
The central problem about Privacy is that an individual when identified looses control over private information rendered. From this point the individual is exposed to all kinds of problems including errors, fraud, outdated information, identity theft, discrimination etc. Legislative initiatives or self-regulating mechanisms are not enough to remove this problem [S. A. Brands 1999 PHD thesis later published as "Re-thinking Public Structures and Digital Certificates", MIT Press, 2000, ISBN 0- 262-02491-8].
Only by non-identification can an individual retain his Privacy while at the same time get the desired customized services. However, the problems of staying non- identified are massive.
Basically two approaches partially delivering non-identified trade are used until know. One is total atomization of privacy without the use of a Trusted Party (for instance [S. A. Brands 1999 PHD thesis later published as "Re-thinking Public Structures and Digital Certificates", MIT Press, 2000, ISBN 0-262-02491-8] focussing on a theoretical best case scenario in this direction). Another is use of a Trusted Party knowing the detailed profile of an individual and acting as a Customer Agent (for a worst-case scenario in the form of an infomediary see "Net Gain: Expanding Markets Through Virtual Communities" by John Hagell III & Arthur G. Armstrong, March 1997, Harvard Business School Press, ISBN 0- 5 87584-759-5 and "Net Worth: Shaping Markets When Customers Make The Rules" by John Hagell III and Marc Singer, January 1999, Harvard Business School Press, ISBN 0-87584-889-3).
Due to the value of Customer Profile Data for marketing purposes the Trusted0 Agent approach are very attractive and a lot of variations of this approach are implemented or under implementation. The main problem with this approach is the danger of abuse. Instead of obtaining privacy the individual are giving someone total profile information. A trusted party selling individual profile information directly or indirectly without the control of the individual is a devil in disguise. The Big5 Brother scenario of a totalitarian government taking control of the database is a worst-case scenario but alone leaving such detailed profile information to someone with a financial focus is troublesome due to natural incentives for abusing information. 0 Theoretically one should therefore favor the atomization of privacy without the use of a trusted party. Some solutions exist for online anonymous browsing, emailing, digital cash etc. with the Canadian Company Zero-Knowledge as the probable leading and most beautiful implementation. However no solutions have proven able to handle the full range of aspects to cover these issues as well as telephone5 service, financial credit, delivery and real-world transactions in a manor that is viable to implement. It is of no help that some actions or information is anonymous when delivery is to an identifiable address.
One central problem with these theoretical optimal Privacy solutions is that they do0 not protect the rights of the non-anonymized parties from different forms of fraud. Without any form of traceability the anonymized party is free to do or say anything without the risk of being brought to justice. Credit - for one - is risky business dangerous if not impossible.
More importantly humans wants to have relations with other humans and suppliers. Values and history has big impact on loyalty of customers. If anonymity were more important than relations were then Branding and loyalty would not have such a focus.
The basic demand for a Privacy solution is that it has to cover the full Customer Life Cycle including interactions around needs and suggestions over the actual trade process to post-trade service, repeat sales etc. More importantly this has to be non-restrictive on communication and include real-world trade also. Solutions only covering the online interactions and purchase of electronic goods such as knowledge or online services will not start to cover the full range of Privacy issues.
Existing standards around Privacy are totally inadequate to provide anonymity. P3P - a standard pushed by for instance Microsoft - is basically an automatic profile information pusher. It totally fails to handle the basic issue of releasing identifiable information per definition is leading to total loss of information control.
State of the art security methods for private information delivery and filtering in public networks such as described in US patent no. US 5,245,656, which American patent hereby is incorporated in the below specification by reference, generally fail to disclose information regarding bi-directional requests of communication paths. The American patent describes a method for an end-user of a network, which end-user maintains anonymous to a service provider during a request for information from the service provider to the end-user. This disables the service provider's tracing of the end-user and consequently the communication path is terminated. Partners in commercial and other relationships want convenience and Trust in continuous interactions. Society as a whole is based on a principle of responsibility or accountability to law.
An individual wants Privacy Control which is presently a full trade-off with the goals of Convenience and Accountability because Privacy Control Require non- traceability of information to individual Identity or more precisely non-linkability across actions, knowledge or other type of information without individual consent.
Society is increasingly witnessing a process where Privacy is reduced due to Absolute Identification. Linkable information about individuals is accumulating in multiple databases outside Individual Control and available for any type of abuse. This problem is a fundamental threat to freedom as the very basis of a democratic society and for the social and economic well being of society because of reduced quantity and quality of relationships as individuals refuse to accept giving up Privacy.
An object of the present invention is therefor to provide a system to solve this problem such that individuals have full Privacy control over persistent and convenience-rich relationships - only restricted by minimum requirements to accountability in case of fraud as defined by law.
Summary of the Invention
The invention implements a Privacy Infrastructure Platform that provides a solution for privacy enabling communication and secure trade of both electronic and physical goods and services. Through user-controlled Communication Rules including an Access Control Filter and a Dynamic Routing service the individual is in control of communication and enables an universal user-controlled Opt-In filter for SPAM protection.
The invention builds a support for Privacy Enabling the full value chain from the original supplier to the consumer. In addition the invention can support trade across existing standard barriers supporting standard conversion, government reporting and existing and future eCommerce standards such as EDIFACT, OFX, OBI and CBL.
Privacy is established using a principle of multiple non-linkable pseudonyms or Virtual Identities (VID) combined with intermediation of on- and offline communication channels. The solution is Privacy Enhancing putting the Individual in control. The Individual is free to encrypt content of communication and private data using any encryption technique. The Individual will retain possibility to stop any further contact with specific companies without these companies have identifiable private information to abuse. In case of criminal activity the trusted party can reveal the identity of the individual after legal proceedings protecting individual rights which can include anonymous legal representation.
The invention establishes an infrastructure for communication, trade and marketing services for Personal Relationship Management and Corporate Customer Relationship Management. The invention builds a service platform for Communities, Auctions and Market Makers combined with a service interface for privacy-enabled Customer Agents and Selling Agents where private information can be made available for analysis under individual control.
The invention also provides a solution to reverse the increasing sales/marketing communication pressure on the individual to a Suggestion House where the individual is in control. The Suggestion House structures the pre-purchase phase handling inbound suggestions, requested offers, interest list, wish lists with restricted access, shopping lists and full use of the Privacy Platform Trade services for fulfillment of purchases including anonymous delivery.
Businesses restricted by law from using customer data will be able to fully utilize customer information for improving customer offerings and service because all Private individual data are anonymous and public reporting intermediation service available. Disclosure of the invention
The above described objects, advantages and features together with numerous other objects, advantages and features of the present invention which will be evident from below description of preferred embodiments of the present invention are according to a first aspect of the invention obtained by a method of establishing a communication path between a first and a second legal entity, comprising the steps of:
providing a first virtual identifier of the first legal entity to the second legal entity,
and establishing a communication path in accordance with a set of communication rules specified by the first legal entity between the first and the second legal entity, the first legal entity remaining anonymous to the second legal entity.
A communication path could be any path adapted for communication between two legal entities such as between two persons or between a person and an electronic agent of a legal entity such as an Internet shop. As an example a regular phone line, a mail system, a postal mail delivery, a short-range wireless session involving infrared or other wireless communication protocols, a physical contact in a store, a confirmation request, a payment request, a legal dispute settlement or any internet related communication attempt.
A set of communication rules could be a list of logical rules determining whether said communication path should be established, how such a communication path should be established, by whom such a communication path should be established, to whom such a communication path should be established based on access actual information related to any of the legal entities, the actual situation, the history leading to the situation, expert or other advice such as a content scanner, information about the communication path or the communication itself whether based on information freely, required or otherwise collected, accessed or evaluated. A set of communication rules further could include information as to providing second legal entity with authentication or profile information related to said communication path and/or first legal entity.
A virtual identifier could be a virtual identifier of a company combined with a company only unique identifier, such as a company tax registration number combined with a random, but unique, customer number or a customer chosen nickname. A virtual identifier could also be related to a specific communication channel such as an email-address or a Public digital signature key related to a company-specific pseudonym. A preferred embodiment involves providing a virtual identifier equaling establishing an authenticated yet anonymous session in any kind of communication path.
A first or second legal entity could be a person acting in any role such as a legally identified person acting as a private individual, an employee acting as a purchaser of a company. It could also be an electronic agent acting on behalf of a legal entity.
First legal entity is established with means to remain anonymous to second legal entity even with multiple establishments of any communication path across online and offline channels such as telephone conversations, physical appearance in a shop, package deliveries, payments, interactive internet sessions or email.
The second legal entity according to the first aspect of the present invention may be provided with means for obtaining a legal identification of the first legal entity based on the virtual identifier. Further, the means for legal identification may be provided by a third legal entity according to a set of rules agreed between the first legal entity and the third legal entity. Additionally, the means for legal identification may be provided by a third legal entity according to a set of rules determined by a fourth legal entity.
The method according to the first aspect of the present invention may further comprise a step of providing the second legal entity with means for associating a first virtual identifier of a first legal entity with previous communication path established with that first legal entity. Further, the second legal entity is provided with means for obtaining information about previous communication path for a first virtual identifier of a first legal entity.
The method according to first aspect of the present invention may further comprise a step of providing a second virtual identifier of the second legal entity to the first legal entity, the second legal entity remaining anonymous to the first legal entity.
The method according to the first aspect of the present invention may further comprise the step of providing legal identification of the first legal entity to the second legal entity upon request from the first legal entity.
The method according to the first aspect of the present invention may further comprise the step of establishing a communication path to the first legal entity in response to receiving a request from the second legal entity.
The method according to the first aspect of the present invention may further comprise the step of establishing a communication path in accordance with a second set of communication rules specified by the second legal entity.
The method according to the first aspect of the present invention may further comprise the step of establishing a communication path to the second legal entity in accordance with the second set of communication rules in response to receiving a request from the first legal entity.
The method according to the first aspect of the present invention may further comprise the step of establishing the communication path between the first legal entity and the second legal entity in response to a request from a third legal entity, the communication path is established in accordance with the first set of communication rules and the second set of communication rules. A communication path according to the first aspect of the present invention may be established between the first legal entity and the third legal entity and wherein another communication path is established between the second legal entity and the third legal entity so as to establish communication between the first legal entity and the second legal entity. The communication path between the first legal entity and the third legal entity may be established in accordance with the first set of communication rules. Further, the communication path between the second legal entity and the third legal entity may be established in accordance with the second set of communication rules. Furthermore, the communications path may be categorised and wherein the communication path is established in response to a request, and the request may comprise a communication path category and a virtual identifier of a legal entity. Additionally, the communication path may be adapted to transfer information between the first and the second legal entity and the information may be evaluated based on a pre-determined criteria determined by the first legal entity. The selected information may be transferred to a first information carrier based on the evaluation and/or the first set of communication rules.
The third legal entity according to the first aspect of the present invention may be provided with a profile of the first legal entity and the third legal entity may be invited to transfer selected information from the first information carrier to a second information carrier based on the profile. Further, the third legal entity may be provided with information about communication path established between a first and a second legal entity and wherein the first legal entity remains anonymous to the third legal entity.
A commercial transaction according to the first aspect of the present invention may be established based on information comprised in the first and/or the second information carrier.
The communication path according to the first aspect of the present invention may be established between a first legal entity and a second legal entity based on information about previous communication path established with the second legal entity. A preference list of the first legal entity may be created from the information about the communication path.
The second legal entity according to the first aspect of the present invention may be provided with a profile of the first legal entity. Further, the third legal entity may confirm the profile, the first legal entity remaining anonymous to the second legal entity. Furthermore, the second legal entity may be provided with means for requesting the profile based on rules defined by the first legal entity. Additionally, the second legal entity is provided the profile by the first legal entity.
The method according to the first aspect of the present invention may establish a communication path between a first legal entity and a second legal entity based on information about previous communication path established with the second legal entity.
The method according to the first aspect of the present invention may enable a "closed loop control" of communication interactions wherein evaluation of previous interaction can be used e.g. to establish trust e.g. towards a company using the communication path to advertise. If company behaves malicious, this information will be available e.g. for potential customers of that company who may have a filter rule which is based on the evaluation as part of their communication rules. Another consequence of malicious behaviour is that customers may as part of their set of communication rules have a threshold evaluation value for accepting authentication.
The above described objects and advantage together with numerous other objects, advantages and features of the present invention which will be evident from below description of preferred embodiments of the present invention are according to a second aspect of the invention obtained by a method for commercial transactions between a first legal entity and a second legal entity, wherein a communication path may be established according to the method according to the first aspect of the present invention, and wherein the communication path may be adapted for providing a legal commitment of one of either the first or the second legal entity, the first legal entity remaining anonymous to the second legal entity.
A third legal entity according to a second aspect of the invention may confirm existence of a traceable non-reputable legal commitment of the one of either the first or the second legal entity. Further, the third legal entity may provide prove of existence of the legal commitment.
The method according to a second aspect of the invention may further comprise a step of providing the second legal entity with means for associating a first virtual identifier of a first legal entity with previous legal commitments established with that first legal entity. Further, the second legal entity may be provided with means for obtaining information about previous legal commitments for a first virtual identifier of a first legal entity.
A legal commitment according to a second aspect of the invention may be established between a first legal entity and a second legal entity based on information about previous legal commitments established with the second legal entity.
A third legal entity according to a second aspect of the invention may be provided with information about legal commitments between a first and a second legal entity and the first legal entity may remain anonymous to the third legal entity.
The legal commitment according to a second aspect of the invention may comprise performing at least one of the following activities:
- transferring legal rights between a first and a second legal entity, - transferring goods or services between a first and a second legal entity,
- arbitrating an dispute between a first and a second legal entity, The first legal entity according to a second aspect of the invention may remain anonymous to the second legal entity. The second legal entity may remain anonymous to the first legal entity.
The first legal entity according to a second aspect of the invention may transfer a financial instrument to the second legal entity, the first legal entity remaining anonymous to the second legal entity. The first legal entity may transfer a first financial instrument to a third legal entity, upon receipt of said first financial instrument the third legal entity transfer a second financial instrument to the second legal entity, the first legal entity remaining anonymous to the second legal entity.
The method according to a second aspect of the invention may further comprise the second legal entity delivering a service to the first legal entity, the second legal entity addressing a virtual identifier of the first legal entity. Further the method may further comprise the steps of: depositing a financial instrument with a third legal entity, the first legal entity ordering a service from the second legal entity, the second legal entity requesting confirmation of payment from the third legal entity, the second legal entity delivering the service addressing the virtual identifier of the first legal entity upon receipt of the confirmation.
The addressing the virtual identifier according to a second aspect of the invention may comprise an identifier of the third legal entity, a virtual identifier of the second legal entity, and encrypted: the virtual identifier of the first legal entity, and an identifier of the service. The encrypted identifiers may be decrypted by a key common to the second and third legal entity.
The step of delivering according to a second aspect of the invention may comprise the step of: forwarding the service to a fourth legal entity, requesting a physical delivery address from the third entity by means of the fourth legal entity.
The method according to the second aspect of the present invention may further comprise the step of the third legal entity providing the physical delivery address to the fourth legal entity according to the first set of communication rules. Further, the step of delivering may further comprise the step of: receiving a receipt acknowledging delivery of the service at the physical address by means of the fourth legal entity. The receipt may comprise a proof of delivery at the physical delivery address. The proof of delivery may be verified by the fourth legal entity.
The method according to the second aspect of the present invention may further comprise the step of releasing payment according to a pre-defined set of trade rules. The set of trade rules is agreed between the first and the second legal entity.
The step of ordering a service according to the second aspect of the present invention may be performed in a physical or electronic market place, such as an auction, a stock exchange, a community, a trade portal, etc.
The above described objects and advantage together with numerous other objects, advantages and features of the present invention which will be evident from below description of preferred embodiments of the present invention are according to a third aspect of the invention obtained by a method for commercial transactions between a first legal entity and a second legal entity, wherein a first communication path is established between the first legal entity and a third legal entity and wherein a second communication path is established between the second legal entity and the third legal entity and wherein the first and second communication path is adapted for providing a legal commitment of the first legal entity towards the second legal entity, said legal commitment comprising the steps of:
- the first legal entity providing the second legal entity with an identifier, - the second legal entity requesting the third legal entity a first legal commitment provided the identifier,
- the third legal entity requesting the first legal entity a second legal commitment,
- the third legal entity accepting the request from the second legal entity upon receipt of the second legal commitment.
The communication according to the third aspect of the present invention may be between the third and the first legal entity established by a fourth legal entity, the communication path to the first legal entity remaining unknown to the third legal entity. Further, the communication path is established according to the method according to the first aspect of the present invention.
The methods according to the first, second or third aspect of the present invention relates to methods for commercial transactions between a first legal entity and a second legal entity, wherein a communication path is established according to previous mentioned method for communication, and wherein the communication path is adapted for providing a legal commitment of one of either the first or the second legal entity, the first legal entity remaining anonymous to the second legal entity.
Anonymous legal commitments, such as a trade of goods or payment for an item, can be established using a trusted party acting on behalf of an entity who wants remain anonymous. The trusted party could e.g. be provided with means for proving existence of an identifiable legal commitment. This could e.g. be message containing a legal commitment - such a contract - encrypted using a key shared between the parties of the legal commitment but unknown to the trusted party. The trusted party thus receives a signature from the parties of the legal commitment that they agree to the commitment. Upon receiving an identified or traceable identifiable signature by an entity trusted party can confirm the existents of the signed legal commitment to any other entity by providing the encrypted message e.g. signed by the trusted party on the behalf of a client taking part in the legal commitment. The method according to the first, second or third aspect of the present invention relates to methods for commercial transactions between a first legal entity and a second legal entity, wherein a first communication path is established between the first legal entity and a third legal entity and wherein a second communication path is established between the second legal entity and the third legal entity and wherein the first and second communication path is adapted for providing a legal commitment of the first legal entity towards the second legal entity, said legal commitment comprising the steps of: - the first legal entity providing the second legal entity with an identifier,
- the second legal entity requesting the third legal entity a first legal commitment provided the identifier,
- the third legal entity requesting the first legal entity a second legal commitment,
- the third legal entity accepting the request from the second legal entity upon receipt of the second legal commitment.
The identifier provided by the first legal entity to the second legal entity could, as an example, be a credit card. A customer, e.g. in an internet store or in a restaurant provides a credit card for paying the bill. The restaurant then contacts a credit card verifier for verification of the credit card payment. Before providing the restaurant with verification, the credit card verifier establishes a strong authenticated contact with the customer, before returning a confirmation of the payment to the restaurant. The strong authenticated contact session can be an access controlled mobile phone, through an internet connection or by means of any other direct way of addressing the customer - even by addressing the customer through the restaurant using a previous agreed one-time-only challenge- response sequence.
The methods according to the first, second or third aspect of the present invention relates to methods of contacting the customer and may comprise that the communication between the third and the first legal entity is established by a fourth legal entity, the communication path to the first legal entity remaining unknown to the third legal entity. The fourth legal entity may, as an example, be a trusted party providing anonymous legal commitments from the client or customer. According to this embodiment of the Internet store, restaurant or similar credit card payment requester is not provided with information as to identify the customer.
The commercial transaction could be established by means of the previously described method of communication.
The above described objects and advantage together with numerous other objects, advantages and features of the present invention which will be evident from below description of preferred embodiments of the present invention are according to a fourth aspect of the invention obtained by a system for establishing a privacy communication channel between a first client and a second client and said system comprising:
(a) a general authentication device for providing said first client control of a private encryption key stored in a mobile processing and memory unit,
(b) a communication channel provider for communicating with said first client and for establishing a privacy communication channel for said first client,
(c) an authentication unit for communicating through said privacy communication channel with said first client and for providing a first intermediary between said first client and said second client, said authentication unit enabling said first client establishing a first virtual identity having a first virtual communication channel and establishing a rule based communication routing scheme for said privacy communication channel,
(d) a trust unit for communicating with said authentication unit through said virtual communication channel providing a second intermediary between said virtual identity of said first client and said second client and for providing storage of first client profile information, and said first client applying said private encryption key for encrypting said profile information so as to enable anonymous communication from said first client to said second client. The authentication unit according to the fourth aspect of the present invention may further enable the second client for establishing a second virtual identity having a second virtual communication channel and establishing a rule based communication routing scheme for a privacy communication channel between the authentication unit and the second client. Alternatively, the system may further comprise an integration unit for communicating with said second client and for providing said second client an interface to said first virtual identity of said first client.
The mobile processing and memory unit according to the fourth aspect of the present invention may comprise SmartCard enabling Zero-knowledge authentication.
The general authentication device according to the fourth aspect of the present invention may comprise:
(a) a main processing unit for establishing and controlling communication with a communication channel provider interconnecting said general authentication device and said authentication unit,
(b) a unit reader for connecting a mobile processing and memory unit with the general authentication device,
(c) a memory space for containing persistent identifier of said general authentication device accessible by said mobile processing and memory unit, and/or said mobile processing and memory unit authenticating the privacy communication channel to the authenticating unit on the basis of the persistent identifier in the memory space.
The system according to the fourth aspect of the present invention may further comprise an ID Unit issuing said mobile processing and memory unit for the general authentication device. The ID unit may store identifiable information encrypted by applying a plurality of encryption keys comprising a public key of a legal institution. Thus the system may provide the client with full privacy control of the first client identity and information related to the first client, however the information is subject to basic accountability principles.
The authentication unit according to the fourth aspect of the present invention may enable the first client signing an agreement and authenticate towards a third-party based on a sign-on identity stored in the mobile processing and memory unit. Further, the authentication unit may enable the first client establishing a plurality of virtual identities each having a set of virtual communication channels.
The system according the fourth aspect of the present invention may further comprise a device authentication unit providing a certificate to the general authentication device to authenticate any device and verify the certificate.
The trust unit according to the fourth aspect of the present invention may store relationship information and enable access to the relationship information for the first client and the second client, and may protect the authentication unit from knowledge relating to the virtual identity.
The system according to the fourth aspect of the present invention may further comprise a first plurality of general authentication devices, a second plurality of communication channel providers, a third plurality of authentication units, a fourth plurality of trust units, and a fifth plurality of integration units. Further, the system may further comprise a first multiplicity of first clients and a second multiplicity of second clients. Furthermore, the second client may be constituted by a company, a group of companies, a community or any combination thereof.
The system according to the fourth aspect of the present invention may enable anonymity of the first client relative to the second client during a bi-directional communication through the authentication unit. Alternatively, the system may enable anonymity of the first client relative to the second client and enable anonymity of the second client relative to the first client during a bi-directional communication through the authentication unit. Full privacy control may be achieved by a principle of establishing continuous relationships only needing a persistent virtual identity, a set of related virtual communication channels and services to manage structured interactions.
A number of profile data elements constituting profile information may be attached to any relationships, which number of profile data elements are under the first client's control and may be verifiable by third party and may provide the specific necessary information for relationship convenience for all parties.
The system according to the fourth aspect of the present invention wherein the first client enabling access for multiple clients having decryption keys to predefined data elements of the relationship information for the first client. For instance only some of the multiple clients may have access to data elements containing identifying information while others have only access the non-identified profile information.
It should be noted that the system might Privacy-enable even Mobile Phones without eliminating the convenience of advanced location-tracking services or preventing police etc. from using same services to investigate crimes.
A particular advantage of the system according to the fourth aspect of the present invention is the ability to enter into a two-way anonymous relationship and sign legally binding documents while still eliminating the risk of a man-in-the-middle- attack.
A primary object of the present invention is to eliminate linkability without individual consent - except for mentioned minimum access to accountability. This can be translated into possible abuse of persistent identifiers whereas related to client, communication devices or communication channels. A secondary object is to build-in damage control in case of linkability. A third object is to ensure convenience and usability, as this is necessary for real-world value of the invention.
According to the fourth aspect of the present invention the first and/or second client may establish a minimum convenience set-up disabling violation of privacy of the client. Alternatively, the first and/or second client may establish a maximum convenience set-up having identified and non-identified relationships incorporated together with privacy communication channels and/or virtual communication channels so as to provide the first and/or second client with full control of communication and relationships with a minimum of linkability.
According to the fourth aspect of the present invention the authenticating unit and the trust unit may be established based on a Proxy including Mapping routers. The privacy communication channel and or virtual communication channel may be based on a separate mapping units such as an email gateway mapping email addresses to ensure that no linkable identifiers are present.
The system according to the fourth aspect of the present invention may incorporate any features as described with reference to the method according to the first, second or third aspect of the present invention.
The above described objects and advantage together with numerous other objects, advantages and features of the present invention which will be evident from below description of preferred embodiments of the present invention are according to a fifth aspect of the invention obtained by a general authentication device for establishing a privacy communication channel between a client and an authentication unit, and said general authentication device comprising:
(a) a main processing unit for establishing and controlling communication with a communication channel provider interconnecting said general authentication device and said authentication unit,
(b) a unit reader for connecting a mobile processing and memory unit with the general authentication device, (c) a memory space for containing persistent identifier of said general authentication device accessible by said mobile processing and memory unit, and/or said mobile processing and memory unit authenticating the privacy communication channel to the authenticating unit on the basis of the persistent identifier in the memory space.
The general authentication device according to the fifth aspect of the present invention may only be accessible under control by the mobile processing and memory unit.
The general authentication device according to the fifth aspect of the present invention may incorporate any features as described with reference to the method according to the first, second or third aspect of the present invention and incorporate any features as described with reference to the system according to the fourth aspect of the present invention.
Brief description of the drawing
In the following the invention will be described by means of example with reference to a drawing in which:
Fig 1 : "100 Systems Overview" shows the logical layer structure of an embodiment implementation,
Fig 2: "200 Central Entities" shows a logical connection diagram between some of the central entities in a embodiment implementation, Fig 3: "300 Communication Intermediation" shows an overview of the central principles of communication intermediation in an embodiment implementation,
Fig 4: "310 Encryption and Intermediation" shows the central logical steps in the session management in an embodiment implementation,
Fig 5: "320 Establish VID" shows the central steps when establishing a new identity in an embodiment implementation,
Fig 6: "325 Generate Symkey" shows a principle in which a key only shared between first and second legal entity can be established without a Trusted Party sheltering the identity of one of the entities knowing the key in an embodiment implementation,
Fig 7: "330 Communication Encryption" shows in more detail some of the central session management steps for certain communication paths in an embodiment implementation,
Fig 8: "340 Inbound Intermediation" shows the main steps in the inbound communication intermediation in an embodiment implementation,, Fig 9: "345 Outbound Intermediation" shows the main steps of the outbound communication intermediation in an embodiment implementation, Fig 10: "350 Privacy Enabling Public Reporting Communication" shows the central steps of public reporting respecting CLIENT anonymity in an embodiment implementation,,
Fig 11 : "360 Private Data Storeage" shows a high-level logical structuring of the Private Data Storage in an embodiment implementation, Fig 12 "400 Traceability Route" shows how traceability can be implemented respecting multiple interest protecting each entity from fraud even by the other entities in union in an embodiment implementation,
Fig 13: "410 Realworid Authentication" shows some of the multiple ways an zero- knowledge authentication can occur in an embodiment implementation even in offline environments such as a store,
Fig 14: "420 Anonymous Delivery" shows the central steps in achieving anonymous intermediated delivery of physical goods in an embodiment implementation.
Fig 15: "450 Securing standard Credit Card Payment" shows how strong authentication can be added to existing standard Credit Card payments in an embodiment implementation,
Fig 16 "460 Anonymous Credit Card Payments" shows how anonymous strong authentication can be added to Standard Credit Card payments and intermediated in an embodiment implementation, Fig 17 :"470 Realworid Privacy Trade" shows how anonymous strong authentication can achieved in a realworid offline situation such as a normal store purchase in an embodiment implementation, Fig 18 "500 Privacy Trade Platform" shows the logical structure of a combination of functions in a full-service Privacy Trade Platform in an embodiment implementation,
Fig 19: "510 Authentication" shows the main steps in the Authenticator in the direct simple authentication procedure in an embodiment implementation,
Fig 20: "520 Anonymous Signature" shows how a legal commitment can be established anonymously using a Trusted Party in an embodiment implementation,
Fig 21 : "560 Online Privacy Payment Intermediation" shows how the online payment process can be intermediated and privacy enabled in an embodiment implementation,
Fig 22: "590 Anonymous Secure Trade" shows how secure trade balancing releasing payment and goods or services can be implemented in Privacy respecting manor in an embodiment implementation, Fig 23: "600 Community Secure Trade" shows how a secure privacy respecting trade process can be supported even if CLIENT is identified to one entity by intermediation by a Trusted Party in an embodiment implementation, Fig 24: "610 Anonymous Auction" shows how an auction marketplace situation can be supported with secure Privacy enabled trade processes using a Trusted Party in an embodiment implementation,
Fig 25: "660 Privacy Enabling OBI Standard Trade Specifications" shows how a example of how the full value chain can be supported, secured and privacy enabled by a trusted party using open standard interface specifications in an embodiment implementation, Fig 26: "700 Personal Services" shows an example of the outline menu available to CLIENT in a wireless device or online in an embodiment implementation, Fig 27: "710 Suggestion House" shows the logical information flows when Trusted Party support Privacy enabled product and service information search in an embodiment implementation, Fig 28: "750 Business Services" shows the logical structure of services towards COMPANY in an embodiment implementation, Fig 29: " 760 Business Services Inbound" shows the logical steps in the improved inbound corporate customer communication process using the trusted party dialog service in an embodiment implementation,
Fig 30: "770 Business Service Outbound" shows the logical steps in the improved outbound corporate customer communication process using the trusted party dialog service in an embodiment implementation,
Fig 31 "780 Privacy Care Trust Certificates and Evaluation Service" shows the logical information flows implementing a closed-loop feedback Trust certificate in an embodiment implementation. Fig 32 "80 Total System View" shows the preferred embodiment of the system according to the present invention.
Fig 33 "50 General Authentication Device" shows the preferred embodiment of a general authentication device of the system according to the present invention.
Detailed description of the invention
The invention is implementing a third route in between the infomediary and the total atomization of Privacy without the use of trusted party by describing a Privacy-Enhancing Trusted Party without the need of knowing Private Data. The individual is in full control of own data unless respect for other trading parties rights require special attention such as traceability in case of fraud. And even in this situation the Trusted Party can reveal identity but not the contents of communication.
In order to provide secure Trade the solution has to ensure same-time release of payment and delivery for both parties. For remote sales this require at least one Trusted Party.
This patent is a solution implementing a platform of non-identified secure communication and trade. The platform is open for integration with existing websites, communication and real-world transactions. It establish the necessary basis for Individuals to interact non-identified both online and offline transferring detailed personal information over the full customer life-cycle. It creates a platform for intelligent agents analyzing and communicating with CLIENTS without the ability to identify the individual behind the data.
The full range of Customer Life Cycle from first customer contact over suggestive selling and interaction to order fulfillment, distribution and payment with post- service, warranty handling and dispute arbitration is supported both online and offline.
Parts overview
This invention is made up of multiple parts. Firstly a central distributed on-line service acting as a Trusted Party implementation. This online service is separate into in principle 5 layers;
1) National standardization layer for translating national payment, telephone, distribution standards into universal or internal standards.
2) Physical layer working with services for identified communication channels and identities.
3) Privacy Core communication layer taking care of the critical and sensitive and basic handling of virtual identities and translations between physical and virtual communication channels and entities.
4) Generic Trade and communication services building on the virtual part 5) Advanced service layer using generic services to create advanced targeted solutions like total eCRM outsourcing etc.
Secondly a CLIENT part called an Authenticator which is a client-side devices handling services such as Universal Sign-On, CLIENT anonymization and Identity switching. The Authenticator services depends on the physical device in question. The two primary implementations is Desktop Computer Add-on Software or a mobile wireless device such as an Mobile phone or a PDA. An important task of the Authenticator is to isolate the Authentication identification information from COMPANY. For instance if the device contains a Biometrics reader then this device is completely isolated and only accessible for authentication towards TP. Thirdly a COMPANY Side part to be installed at COMPANY devices providing interface services for COMPANY-CLIENT Relationship Management, trade and agent/communities.
In addition the national channel solutions will require additional parts.
What happens if Anonymity is violated.
For all practical concerns total Privacy in not achievable. Even if the perfectly security protected system could be achieved the weakest link is the CLIENT himself. A slip of the tongue or lack of attentiveness when filling out a form and Anonymity is broken and Privacy is by definition violated. If a supplier of physical goods really wants to trace the CLIENT in the practical world one cannot prevent implementing traceable objects in electronic goods or in all circumstances to avoid breaking the security around the required fraud-protecting traceability.
Security cannot be better than the encryption tools employed and procedures around this. Since theoretically perfect privacy is not practicable possible the second best is close-to-total Privacy combined with procedures in case Privacy is violated. This includes a) to contain the Privacy violation by enforcing a principle of non-linkability across relations b) the ability for CLIENT to go into hiding after violation and reappear non-linkable c) to minimize damage from violation with a catastrophe scenario breaking the central internal security.
Even though the CLIENT identity is violated and someone has been able to obtain private and identifiable information about CLIENT - it will be of limited use. The individual will change virtual identity and will not later be traceable to the identified VID. Company will know personal details but cannot interact in a practical context if email, telephone, etc. are shielded. For all practical purposes a CLIENT is able to change identity with a minimum of effort even though valuable relations can be lost. When CLIENT buying power are accumulated in (perhaps multiple) TPs the force for deletion of data for violated identities can strong because COMPANY if refusing or being unwilling to allow control can be put on a blacklist shutting of other non-identified customers without COMPANY have ways to prevent this. This blacklist can be interchanged between TPs thus accumulating Individual power to match even multinational corporations with poor ethics.
This Blacklist is further enhanced if a marking arrangement are in place either under the TP Brand or as a collaboration with others with a revocable online indicator at COMPANY websites, shops etc. because (a critical mass of) individuals only deal with suppliers able to prove compliance to Privacy Standards.
Simultaneously the Individual is not restricted from operating since he will be able to re-emerge under a new Virtual Identity that cannot be traced to the Identified individual.
When ensuring that each COMPANY has unique non-linkable CLIENT IDs a violation can be contained to a minimum and only the violated identities eliminated. The rest of CLIENT relationships can be preserved.
However in the digital world personal data gathered must be assumed to be stored indefinitely. Once acquired data can be copied and stored remote before violation is even discovered. No individual can be assured that total Privacy is achievable.
The Trusted party itself is the most dangerous part in a catastrophe scenario: a) If the central internal security is broken so that someone can impersonate TP, all present and future Identities are violated. b) If TP turn malicious and systematically abuse trust. c) A Big Brother attempt from a government with both skill, brute force computing power and access to necessary resources. However to minimize these risks central principles and procedures are included and will continuously be updated: a) Internal security is built on the guidelines from the open source experts providing multilevel key generation based on short term often rolled signatures, separation of responsibilities and access to keys and backups, organizational split according to the same guidelines as external and of course technical protection using firewalls etc. b) The invention is designed to minimize TP knowledge of content in communication and data since CLIENT can encrypt using any method desired. Control of the central Identity-VID combination is isolated and separately monitored. On top of this external inspection mechanisms will be set-up. c) The Government Big Brother attempt is serious. Measures against this is using the national extemal controlling system access (for instance time-limited key certificates requiring cross-national issuing of certificates) storing of the central Identity-VID combinations combined with a disaster procedure for primitive deletion.
Central lie the basic fact that loss of Trust will damage business and therefore it is in the interest of TP to work for anything necessary to maintain trust. This is combined with openness in procedures.
Note that Infomediary selling individual customer profiles has interest in knowing contents and two-sided interests towards the Privacy questions.
Better relations and solutions for all
Even though some COMPANIES will short-sighted object to such a transfer of control to the Individual, this invention will increase benefits for all parties.
Because of the shift to anonymous relations, COMPANIES will be able to get more accurate and detailed data from CLIENTS making true One to One customization easier. This will increase the value COMPANY can supply to CLIENT and thus increase potential profits. With the built-in loyalty service COMPANY can now get access to link previous discrete transactions into a full anonymous customer profile and use this for Suggestive Selling, Customer Loyalty Programs and improved Business Intelligence.
When COMPANY only have anonymous data Industries formerly restricted by law to analyze private customer data such as finance, retail etc. (depending on nationality).
Cryptography
Encryption is central to Privacy. This invention works on top of standard cryptography making use of well-established techniques. The basic principle of all cryptography security being NOT to keep methods secret but only rely on secrecy of keys. This invention make use of tested vendors and open source tools for cryptography.
No perfect encryption mechanism exist so the encryption part will have to be continuously updated as methods are developed and computing power increases.
In the following a short definition of techniques used.
Symmetric encryption
Symmetric encryption is when two parties share a common key used for both encryption and decryption. Fast and generally accepted secure methods are available for symmetric encryption for key size large enough.
This invention makes heavy use of symmetric encryption and therefore the below functions are described.
Decs (Cleartext, symmetric key) and Encs (Cleartext, symmetric key) respectively is the symmetric decryption and encryption algorithm using the Symmetric Key to encrypt or decrypt Cleartext then Decs( Encs ( Cleartext, Symmetric Encryption Key), Symmetric Encryption Key) == Cleartext
Hash functions For multiple purposes One-Way hash functions are used to generate a summary of a data block. Hash-functions are designed so that is computational infeasible to generate a message that produces a specific hash value. I parallel to this Hash- functions are also designed so that it is computational infeasible to find two input that generate the same hash-value [NIST FIPS 180-1].
Hash functions are referred to as H (ClearText)
Asymmetric encryption
Asymmetric encryption cover processes where a key pair is used. What one key encrypts you need the other key to decrypt. This is advantageous because one part of the key can be kept private only accessible to the owner. The other part of the key - the public key - is published in for instance X.500 or X.509 tables together with identifiable or pseudonymous information. These set-ups are under implemented as National law all over the world
Reversible asymmetric encryption
This invention makes heavy use of reversible asymmetric encryption and therefore the below functions are defined
Dec (Cleartext, key) and Enc (Cleartext, symmetric key) respectively is the reversible asymmetric decryption and encryption algorithm using key to encrypt or decrypt Cleartext.
Keys will be referred to as <party identified. <key type identifier^ Where party identifier can be Cl for CLIENT identified, Cl.Vir for Virtual Client Id, Co for COMPANY, TP for Trusted Party and Sh for shipper. Key type identifier is Pr for Private key and Pu for Public key. Cl.Vir.Pr is thus the Private key of a key pair related to a CLIENT VID. Cleartext == Dec( Enc(Cleartext, Private Key)), Public Key) == Dec( Enc(Cleartext, Public Key), Private Key), but Cleartext ≠ Dec( Enc(Cleartext, Private Key), Private Key) and Cleartext ≠ Dec( Enc(Cleartext, Public Key), Public Key)
Since asymmetric encryption has more constraints to it asymmetric encryption method has to use longer keys to give the same brute force attack security as compared to a symmetric method.
Since asymmetric encryption is performance slow it is often used and accepted to generate a symmetric encryption key and use this for symmetric encryption while only the symmetric key is encrypted and enclosed by the asymmetric key.
Non-reversible asymmetric signature-only
In order to sign a document or agreement a non-reversible asymmetric encryption is used. The special part about these methods are that any part is able to use the public key to verify a signature made by the private key without knowing the private key.
To produce a digital signature the corresponding one-way Hash value is encrypted by the Private key. When verifying a signature the recalculated hash value of the assumed document is compared to the decrypted signature using the public key. If they do not match, then this document was not signed by the private key resulting in the signature forwarded. One special advantage of this procedure is that the integrity of the document is verified simultaneously. If the document has been changed then its hash value will also change and the signature no longer holds.
Sign ( X, Private Key ) == Enc ( H(X), Private Key) Proof of signature
Dec ( Sign( ClearText, Private Key), Public Key) = H(ClearText) A digital signature is an attachment to a document and can as such be removed from the document. A digital signature without the original document is not usable.
Establishing new keys
To avoid violation of the Master key it is a normal practice to use set-ups where the Master Key is used to sign the public key of a new set of keys. The new set of keys are then used as a temporary signature or encryption keys traceable to the master key. The main advantage being that the temporary keys can be revoked or periodically rolled without having to replace the Master Key. This can be in multiple layers depending on the importance. Large commercial systems works with hourly replaced server keys in with a multi-layer structure with increasing intervals between keys replacement.
This principle is generally used for CLIENT keys also because the temporary keys can be anonymised but still be provable traceable to an individual. All keys throughout this Patent are thus to be considered as temporary keys signed by the corresponding master key.
Zero-knowledge authentication
Central to this invention is use of Zero-knowledge authentication without exchanging identifiable or linkable information. The most used basic principle is to demonstrate the ability to present the correct response to a challenge information.
B prove to A that he is B in a PKI-scenario. A sends to B: Enc((A's Random chosen number), B.Pu). B get Random Chosen number: Dec( Enc((A's Random chosen number), B.Pu), B.Pr)
B responds to A: Enc( A's Random Chosen Number, A.Pu)
B has now proven to A that he is B because he has access to B.Pr (B's secret key) without exchanging any identifiable information.
This can also be done unencrypted but that require a prior agreed one-time only key-pair. A challenge B with a one-time only challenge number. B looks up the related one-time only response and reply with this number. B has now proven to A that he is B without exchanging any identifiable information.
A has now established authentication of B.
Both the encrypted and non-encrypted version can be repeated to establish a two- way zero-knowledge authentication.
Zero-knowledge generation of One-time Only keys or key-pairs. A very simple but useful technique is to generate prior agreed keys or key-pairs
(challenge plus related response). When a number or a pair has been used it cannot be used again. Attempt to reuse a number is indication of attempted fraud by third-party.
A list of numbers or number-pairs can be generated at both sides using an shared algorithm and seed values combined with a shared secret value. This can be built- in in SmartCards etc. so they are portable, non-accessible before use and new numbers can be created anonymously and with zero-knowledge communication with TP.
Zero-knowledge generation of symmetric encryption Key
Several zero-knowledge protocols exists to generate keys across an non-secure line. The most generally used is Diffie-Hellman which is based on Discrete Log. The general principle being that two parties share separate parts of information based on randomly chosen numbers and some openly shared numbers. Based on their own secret and randomly generated number and the information from the other part both are able to calculate the key but it is very difficult to calculate the key based alone on the information exchanged.
An embodiment of this invention uses a combination of asymmetric encryption and Diffie-Hollman to ensure that TP cannot listen in on communication between CLIENT and COMPANY. This works only if one part is identified. Two-way unidentified security without a trusted party are theoretically very difficult if not impossible to established due to the man-in-the-middle attack. Anonymous auction services as the ones implemented are due to this very dependant on Trusted Parties.
Limited show keys
Limited show keys are a special type of certificates that if used more times than built-in then a third-party, typically the Certificate authority, can prove abuse.
In the obvious case of virtual cash attempts to use digital anonymous cash more than ones is attempted fraud. If the certificates contain a signed confession and the account number from which the money was drawn fraud is proven and the guilty identified in the same operation [S. A. Brands 1999 PHD thesis later published as "Re-thinking Public Structures and Digital Certificates", MIT Press, 2000, ISBN 0-262-02491-8].
Attribute Certificates
Attribute Certificates are a special type of anonymous certificates where the holder is able to demonstrate to third-party with zero-knowledge communication that he holds or does not hold a certain credential.
Attribute Certificates can be positive in terms of a education degree verified by the education institution or negatively in terms of proving no major criminal offenses have been committed verified by the relevant Public authorities.
This can be done anonymously and without the certificate authorizer is informed about the information to be stored in the certificate [S. A. Brands 1999 PHD thesis later published as "Re-thinking Public Structures and Digital Certificates", MIT Press, 2000, ISBN 0-262-02491-8]. Virtual Identity
Separating personal information from identity
In order to establish Privacy and at the same time enable customization of products and services private data concerning an individual is separated from the Identity of the Individual. This is done using Virtual Identities (termed VIDs).
A Virtual Identity is a Pseudonym for an individual created for a specific purpose. Using the Trusted Party (TP) an individual can assume use a VID to communicate, trade etc. anonymously and under full control of the process. A VID is covering the range of communication channels and services if appropriate to the type of VID. A key element is that a VID can be eliminated without trace except in the case of fraud or other criminal activity.
When assuming a virtual and anonymous identity individuals can share even detailed private information without fear of the same information being abused outside of their control.
The core part is thus the principle that any player will either interact with an Identified individual who will only share limited information or interact with a virtual, but anonymous Identity about which detailed information is much easier obtainable since risks are greatly reduced.
The basic structure behind Virtual Identities is exemplified in figure 2.
TP Identification TP - Trusted Party - is generally treated as one entity identified by TP Token
Identifier or the public key of TP (TP.Pu) that can be verified in official registers such as X500 or X509.
However the physical implementation TP is assumed to be multiple both virtually, geographically and perhaps organisationally distributed servers. All implementations of CLIENT, COMPANY or other entities include identification of the TP handling the entity. Also multiple distributed TPs are internally linked virtually, geographically and organisational in order to appear as one entity externally.
Role Based. The basic structure of virtual Identities take into consideration that a person have multiple roles to handle. Each role can have a number of virtual identities and each role will have a specific set of primary communication channels.
CLIENT roles are separated into private roles such as a Family member, Friend, Sports Club Leader and business roles such as Board member, Employee, Corporate Purchaser etc. The main reason for using roles is to establish a structure, overview and services for the Individual.
Privacy issues are different for Private and Corporate roles since a Corporate Role is representing something else whereas a Private role is representing the individual. For individuals Privacy is a fundamental right threatened whereas to the business role anonymity is primarily useful because it change the power structure, enables confidentiality of source, eliminates biases etc..
VIDs To each role belong a number of Virtual Identities. In principle one VID is created for each contact. Three basic forms of VIDs are implemented.
Firstly the key VIDs are based on links into other structures such as a COMPANY Customer Database with added security and services. There are identified by a COMPANY Token Id and a COMPANY-only unique identifier. This identifier will avoid linkage because they are only unique in regards to the specific COMPANY. Authentication is strong between COMPANY and TP. COMPANY has adopted Privacy Trade functions such as Privacy Payments and Privacy Delivery.
Secondly CLIENT can setup all his existing logins as migration VIDs (e.g. user-id, password and e-mail address for a web-site). These are identified. Authentication is weak as user-ids and passwords are as today easily violated by third-party. New anonymous VIDs used to create new registration in existing setups. They resemble the migration VIDs except that they are anonymous and only based on virtual channels intermediated by TP. Authentication is still weak as COMPANY ability to authenticate is the bottleneck. These VIDs can be continued as the primary VID form in case no linkable interaction has been taken place. COMPANY can have adopted Privacy Trade in key areas.
Privacy is violated if a non-identified VID are mixed with an identified VID. This includes situations where the Individual personally reveals identifiable information while using a non-identified VID.
Identified VIDs are often used in combinations where some identity information are known and others are not. This could for instance be customer name and address is known, but communication channels are intermediated for update efficiency and in order to minimize linkability. This type of semi-identified VID is particular useful for Personal Relations (Friends), Special Online Communities or suppliers where Identity is to be known. This kind of suppliers can be utilities who by definition have, have to have or CLIENTS wants them to have access to identifiable information such as Postal services, fixed-line telephone, power, house repair, doctors, hairdressers, dentists etc.
Level of identification. Firstname only or .. Communication Channels virtualization and access Access to Private Data
Identity Types include
Login (existing login) Login outside (Unique create by TP)
Login Business Service Integrated (only mail plus voice answering) Semi-identified (for personal use) Identified Integrated (fully enabled) Mailings (only inbound, Specific Opt-in list)
Address Book only (For non-TP customers to be entered into a TP CLIENT Personal Address Book) Suggestion House (No communication Channels, access to some private data)
One-time trade ID (for a one-time only Privacy Trade transaction) Delivery Only (Outside delivery, no communication enabled)
Internal Identified (TP Customer Service - no access to private data)
Internal Anonymous (TP Customer Service - no access to identifiable data)
Identified Credit Card Anonymous Credit Card Mobile Phone
Web Surfing (frequently rolled, No communication channels)
In addition to this each combination of channels can have its own subtype.
The outcome is a multidimensional matrix where a VID can be Anonymous, Semi- or fully identified with no, selective or full access to Private Data. In addition Communication channels open to a VID and Message filtering is customizable to make VIDs a very flexible setup.
In one end very Privacy concerned individuals can be very closed without private data available. In the other end TP can be used for convenience intermediation alone without any privacy established. More important the individual can selectively decide which relations belongs where in the matrix.
Relations CLIENT can create a RELATION (figure 2 reference numeral 100) with other
CLIENTS (Se figure 2) for multiple purposes. RELATIONS such as RELATION (figure 2 reference numeral 100) are a push solution in the sense that CLIENT give access to their data to another target CLIENT and at the same time can request the target CLIENT to accept a two-way relation. Target CLIENT accepts by choosing a VID to use for the RELATION.
In case target CLIENT is previously unknown to TP target CLIENT is able to do initial registration with a detailed registration to follow to accept a two-way RELATION.
CLIENT control how much information is revealed to relations using the VID they link from and to. This includes access to Private Data, communication channels set-up in the sense of both intermediation and access in general, filtering etc. A CLINT can have RELATIONS linked to different VIDs.
CLIENT can attach multiple symmetric encryption keys to a RELATION for communication encryption. Keys are encrypted using encryption keys not known to TP. Since RELATIONS are identified they can use their digital signatures to establish whatever kind of key exchange and encryption method they want. For CLIENT relationships not encrypting themselves communication encryption TP handle encryption towards third-party as close to CLIENT as possible in the specific channel as part of the normal TP service.
RELATIONS are typically used for linking personal relations like family, friends and business associates which are the basic of the Personal Address Book service. A special RELATION is a GUARDIAN which is a parent or other person who are guardians of children. A GUARDIAN RELATION manages, controls, approves and have access to multiple parts of children CLIENT registrations.
Groups
Except for the natural grouping from the role structure and VIDs, a CLIENT can create flexible GROUPS. Groups can be nested, (figure 2 reference numeral 140). Groups are multipurpose controlled by CLIENT. They can be used as simple structuring tool, as communication distribution lists or as basis for other services like Personal Event Management, Project Team Management etc.
Identifiers Central to Privacy is non-linkability and anonymization. The Identifier for a VID or channel can in itself be the source of linkability when used across companies. Identifiers are therefore non-information carrying. The standard identifier is a combination of <COMPANY-identifier>, <COMPANY-unique identifier for CLIENT> since this will by definition not be linkable across COMPANIES.
An email-address in the form <COMPANY id>.<CLIENT id> is traceable. In case a COMPANY sell contact information to information resellers etc. the contact information can be traced to the COMPANY it relates to without information about CLIENT.
Rollover
Rollover is the action that occurs when an outstanding VID is replaced by a new VID in order to minimize risk of violation. The larger the risk of violation of identity the more often will the VID be rolled.
A Rollover will for external parties look as a total new identity without anyway to link the new identity with the old identity.
VIDs used for linkable activities like Internet Surfing, old-fashion Credit Card authentication, Cable Set top box or Mobile Phone anonymization etc. will be rolled according to use in order to minimize the risk of linkage based on the Token Identifier itself (linking a COMPANY A customer to a COMPANY B customer because they use the same Credit Card number).
In addition to this it give a strong incentive for COMPANY to establish an agreement since CLIENT will not be reachable when the VID is rolled. Initial Identification
This invention is implementing a Trusted Party for CLIENT to construct virtual
Identities. Since TP is also trusted party for anyone interacting with a VID they must trust that TP knows CLIENT real identity in case of fraud.
The risk of Identity Fraud - identity theft where someone is trying to impersonate another or create a totally false identity - and then build VIDs on top of a false identity is serious.
Firstly to protect the COMPANY the fraud is directed at in the first hand and secondly to protect the individuals whose identity is abused for fraud purposes. Thirdly the trust image of TP needs to be maintained.
The individual is far more damaged by the fraud than the COMPANY since the COMPANY mostly risk loosing a smaller amount of money whereas the individual being the innocent victim of identity fraud can spend years trying to unlock the problem perhaps being denied access to credit, jobs etc.
It is not practically possible as of today for anyone to guarantee 100% identification as Identity fraud is very well established and any system will have flaws.
This invention is generally working with the basic assumption that initial identification is taken place at least with the level required for creating officially accepted digital signatures or other central papers in the home country of the individual or the country in which the individual does trade or communication.
Initial identification is important to be able to establish authentication in daily operation. Several identification methods will be used in parallel in order to make Identity fraud as close to impossible as practical achievable. The more methods of identification, channel verification, RELATION verification, existing identified interactions etc. being used the more difficult it will be for an individual to fraud everything and the higher the chance that the real individual will be informed in case of attempted identity theft.
One important aspect of identification is to ensure that in case of fraud a verified picture is obtainable because pictures are usable for investigations of electronic fraud.
Four levels of CLIENT identification is used. Non-CLIENT used for CLIENT own registrations of relations in Address Book not confirmed by the individual in question. Not-identified for registered CLIENT not satisfying sufficient criteria to be considered as Identified. When classified as Identified absolute identification with traceability is established. In addition to this a special One-time-Only is used for Community and portal services where TP is acting as temporary trusted party for a non-CLIENT customer trade.
Functionality for a Non-Identified CLIENT will be limited - signing an agreement is not possible with an unidentified CLIENT.
Requirements to a Non-Identified CLIENT to be classified as Identified is a matter of Policy. 100% identification is only done when Biometrics are surely introduced and only then if Biometrics are securely linked to Identity.
A combination of a Bank transfer from a named bank account, a copy of a public identification paper such as a pass port, a biometric, several communication channels (including a telephone and a delivery address) cross-verified and a number of RELATIONS is together an identification that requires skill to fraud.
Some of the methods used are listed in the following.
Identification Certificates
This can be in the form of an X509 or X.500 Identification certificate but for practical matters this calls for a strong identification procedure at least to the level of the strongest requirements in the countries and the participants covered by the service. It is possible to buy weakly checked Identification Certificates.
However when a Certification Authority formally certifies identity then Identification is generally considered strong.
Biometrics
Biometrics working with recognition of unique or close to unique bodily characteristics such as fingerprints, iris, DNA etc are expected to grow. Fingerprints as been used for many years. DNA are growing as evidence in courtrooms and for paternity cases.
Biometrics are excellent for authentication and especially for the mobile Authenticator. Iris and Fingerprint readers are already available for ordinary desktop computers such as windows. Fingerprint readers are being built into Smart Cards etc. A central task for the TP CLIENT services is to make use of biometrics while at the same time to isolate the Biometrics reading devices from COMPANY.
The final reasons why biometrics are very usable for initial identification is investigations of Identity Fraud. If a case of Identity fraud is discovered only Biometrics are both very likely to free the victim (the real individual) and provide the criminal investigators with material to recognise the offender.
Identification papers with picture Official identity documentation with picture has double purpose. Firstly they provide a fairly strong level of identification and secondly they require updated pictures in order not to be discovered as false.
A copy of an official document with personal interaction is therefore fairly strong identification. Bank account transfers
Banks in most countries have a strong procedures for identifying customers.
Primarily because they are trusted to take care of customers money and not to let anybody else access customer accounts. Secondly because they take credit risks that needs to be traceable to the individual and thirdly because of public requirements as to tax reporting etc.
A bank transfer from a Customer Account contain detailed information as to the identity of the account owner. Since the account owner has been through a strong authentication to establish the account and again to transfer money a match between registering information and information from the bank account is close to strong authentication.
In addition to this most banks today are video surveyed and produce identification Id's with pictures. The likelihood of pictures obtainable in case of fraud is strong.
Existing logins
CLIENT online access to utility companies, insurance, banking etc. all require some sort of identification and later authentication to be put in operation.
If CLIENT establish and demonstrate access to such logins then these levels of identification has been done.
External Channel verification
All communication channels registered has to be cross-verified. This imply for
CLIENT to show that he has access to the channel. A simple way to do this is the one-time only key-pair with challenge and response challenge or just a keyword or number to pass when channel authentication is done.
Theft of mobile phones has lead to strong identification procedures around establishing and use of mobile phones. Existence of a not pre-paid mobile phone is normally indication of a certain level of identification has taken place. In addition to CLIENT cross-verification this can be done using public accessible records such as online phone catalogues, address registers etc.
If documentation for long-term relations can be established the likelihood of Identity fraud is small.
Relations confirmation
The more relations confirming a CLIENT and interacting the less the chance of someone succeeding in identity theft.
Establish Relation CLIENT The process of establishing a relation with CLIENT is central. The key problem is that TP will eventually start authentication on behalf of CLIENT. The registration process involves a basic minimum registration combined with a series of steps that take place over time as the relationship and trust is building. According to TP internal policies certain requirements has to be meet in order for CLIENT to get status of IDENTIFIED and thereby TP accepting to confirm knowledge of CLIENT identity in case of fraud.
The basic relationship set-up involves the following steps:
- Basic transfer of basic identification information and communication channels such as name, email, address, telephone, mobile telephone etc.
- Establishing a basic authentication scheme in accordance with CLIENT abilities.
This authentication scheme is used to cross authenticate Communication Channels thereby linking them to CLIENT. Depending on national conditions this can be improved by using electronic means for confirming informatiion integrity in for instance phone book etc.
Creation of a set of new TP and CLIENT specific Digital Signature keys. Existing Digital Signature keys are used for signing these keys if existing. Let CLIENT authorise. Establish a CLIENTKey which is a general symmetric encryption key between TP and CLIENT.
Payments from known bank account to establish an internal account and for identification purposes.
Tools for setting up the basic CLIENT-ROLE-VID structure which includes linking physical communication channels to the basic ROLEs and VIDs and creation of a starting Access Control Filter and basic routing controls.
Tools for facilitating the personal Address Book services which include the linking of RELATIONS to the CLIENT-ROLE-VID structure.
Providing CLIENT with a CLIENT side part to ensure anonymisation of browser etc.
Providing CLIENT with an digital AUTHENTICATOR to enter into more complex processes with COMPANY.
Providing CLIENT with an anonymised Credit Card with partner agreements on the Credit Card verifier side as to ensure strong real-time authentication for payments.
Setting up the Delivery Channel and a default delivery path in partnership with national or international Shippers.
Setting up the Electronic Bill Presentment service and starting to move recurring payments.
Establish Relation COMPANY The basic process of establishing a connection to a COMPANY is separated into a basis creation of an internal reference with very basic information and a series of steps to develop the relation. The basic creation of an TP internal reference will most likely be done by a CLIENT creating a VID mirroring an existing login in order for TP to establish connection.
It is central to note the this basic creating of a COMPANY combined with an anonymised (and real-time cross-authenticated) credit card payment procedure in partnership with credit card verifiers and virtual delivery addresses in partnership with shippers can be established outside COMPANY without changing anything in COMPANY infrastructure. Secure anonymised ecommerce can be thus established with existing infrastructure without the consent of COMPANY.
Creating a Relation involves the following logical steps:
Identification - The company has to be legally Identified. A digital Signature key (Public key Co.Pu) exchange is considered as a natural way to do this. If COMPANY does not have a digital Signature then alternative identification will involve the creation of a Digital Signature.
In addition to securing identification and a set of digital signature keys then TP will establish a symmetric encryption key between TP and COMPANY for message encryption - CompanyKey.
Communication Channels verification - Related to the identified COMPANY is the different communication channels such as Physical Address, Telephone, Fax, Email, Internet-address, bank-account etc. These channels are cross- authenticated to establish an initial link to COMPANY. The structure of Communication channels will evolve as purpose and COMPANY Customer responsibilities are built into the structure facilitating the interaction between COMPANY and CLIENT. One important Communication Channel is the payment channel. Default TP will set up an internal account for COMPANY which COMPANY can address and transfer money to where-ever. Payment to this account shall be considered legal payment for CLIENT. However in principle a Privacy Payment is always implementable as two separate payment instruction.
If COMPANY is supplying physical goods then the Delivery Channel also is central. From the outset this can be done through the virtual address, but in order for the interaction with CLIENT to operate the best COMPANY will need to integrate the Delivery procedure into COMPANY logistics in order to provide CLIENT with relevant information in the delivery process. Before this integration the virtual process-specific delivery address can be constructed by TP in the trade process.
The process of integration involves a COMPANY side service to facilitate communication services and integration the Privacy Trade Platform services into CRM and ERP systems.
The Communication Channel set-up will be augmented with an eCRM service modelling the internal COMPANY service functions such as Support, Sales,
Delivery, Finance etc. Integration of the Privacy Trade Platform is done through an open interface that COMPANY can address defining the set of services and a Business Component .infrastructure to exchange messages according to open standards.
Corporate customer registration
The eCRM services involves an integration with COMPANY Customer
Relationship Management Systems through an Open Interface.
A part of this is the online access control where a Privacy Server supply authentication of Virtual Identities at Customers website. The Privacy Server is integrated to maintain part of Corporate Customer Database For inbound and outbound communication and trade the Privacy Server can interact with COMPANY internal communication and trade systems to support the ongoing relationship between CLIENT and COMPANY. This include authentication, establishment of outbound Communication paths based on generic information only (CLIENT internal id, channel type depending on the type of communication and optionally additional information to improve CLIENT inbound access control procedure.
Establish VID (CLIENT/COMPANY)
The purpose of this procedure is to establish a new VID (Virtual Identity) for a CLIENT towards a specific COMPANY without transferring linkable or identifiable information zero-knowledge communication except for the encrypted published Public Key of the new VID (See figure 5).
COMPANY and CLIENT are in the following assumed known to TP. If COMPANY not known then this procedure will be augmented by a TP customer care support process helping CLIENT to identify and model the COMPANY customer registration and authentication procedures and to provide the needed information for registration.
TP is able to prove that VID belongs to CLIENT in case of fraud.
CLIENT establish an anonymous identity towards a relation under full CLIENT control. Contents of communication can be private from TP because a symmetric encryption key SYMKEY has been exchanged with COMPANY without revealing this to TP.
COMPANY establish a new customer relationship with CLIENT together with trade and communication support according to the wishes of the customer, an Customer specific encryption key SYMKEY and a signature from TP confirming knowledge of customer identity in case of fraud.
COMPANY do not receive any identifiable or linkable information. CLIENT indicate COMPANY (or other party) he wish to establish a VID towards.
TP Create a VID and link this to COMPANY.
TP creates key pair (Cl.Vir.Pu, Cl.Vir.Pr). The Public Key is forwarded to and signed by CLIENT and the signature is returned to TP.
Secret key of VID (Cl.Vir.Pr) is known only to TP as TP is backing authenticity of VID to CLIENT.
TP then authenticates VID Public key to COMPANY towards the COMPANY created Customer Token Id which will typically be a customer number from the internal COMPANY Customer Relationship Management System. COMPANY is informed of the virtual communication channels open to this VID.
TP verifies COMPANY Public key towards CLIENT.
This invention works with a secret shared symmetric key SYMKEY to encrypt communication between CLIENT and COMPANY. In the following the SYMKEY is treated as if it is reused from session to session, however SYMKEY can just as well be generated as part of establishing a session as a session specific encryption key which is saved together with communication encrypted by the public key of CLIENT (CI.Pu).
SYMKEY can be created without revealing this to TP .
One embodiment is the straight forward where CLIENT create SYMKEY and encrypts this together with a random challenge text using the Public Key of COMPANY (Co.Pu) and forward this to COMPANY. Since TP cannot read this message TP can not know the SYMKEY. COMPANY verifies by returning the Challenge Text encrypted with SYMKEY. Now CLIENT can verify that the key has been exchange without TP knowing. Another embodiment with the desired outcome that does not include transferring the SYMKEY itself is by using a slightly modified Diffie-Hellman protocol making use of the fact that CLIENT can do a non-TP controlled verification of the Public Key of COMPANY.
CLIENT forward the CLIENT part of the Diffie-Hellman asymmetrically encrypted by the Public Key of COMPANY ((Agreed Generator, Agreed Large Prime, Enc((Agreed Generator)Λ(CLIENT chosen random) MOD (Agreed large Prime))), Co.Pu)).
COMPANY finishes the modified Diffie-Hellman protocol by generating the key SYMKEY and encrypting a message containing the CLIENT part with SYMKEY and returning this to CLIENT together with the unencrypted COMPANY part of the Diffie-Hellman protocol.
CLIENT can now calculate SYMKEY. If CLIENT is not able to reproduce the originally forwarded value ((Agreed Generator)Λ(CLIENT chosen random) MOD (Agreed large Prime)) when decrypting the message with SYMKEY, CLIENT has calculated, then the protocol has gone wrong indicating a potential attempt to intercept the communication by TP.
See figure 5.
Establish Relation (CLIENT/COMPANY) CLIENT have private, semi-private and business relationships with other
CLIENTS. These relationships are specifically supported over lifetime. Each CLIENT can approve another CLIENT as a personal relationship that TP is permitted/requested to maintain.
TP creates the link (figure 2) between two CLIENT VIDs to handle this. CLIENT communication channel intermediation is still in place because this is convenient due to channel changes (new phone number, moving etc.) and routing (Receiver controlled). Each relation will have a specification on the type (father, friend, etc ) and group. Note that this is a one-way solution. CLIENT A can approve CLIENT B without CLIENT B approving CLIENT A. To create two-way links two separate relations need to be created.
CLIENT can create non-TP Customer RELATION VIDs without link to actual CLIENT B this VID is representing. On behalf of CLIENT can TP contact
CLIENT can create Groups of Relations (figure 2 reference numeral 140). Groups can be nested.
CLIENT use VIDs and Groups to define interaction options. This include Communication Channels, Access to Private data., Access Control Filtering and Routing.
For instance family RELATIONS can see most Private Data and lists, all communication channels are open but re-routing is enabled so that channels are intermediated and VID is identified with full name etc.. A Business associate is limited to the intermediated business communication channels and Business information but no access to private data, address or communication channels.
CLINT determine how encryption is to be maintained. The VID can have a general SYMKEY for all RELATIONS linked to the specific VID. A RELATION can have a Relation-specific SYMKEY or communication can be based on session-keys created and saved in connection with communication.
Establishing SYMKEY works just as well with a CLIENT/CLIENT relationship as a COMPANY/CLIENT relationship where at least one CLIENT or one communication channel is identified. The main issue is to exchange information that TP is not able to access. When two anonymous parties - such as two CLIENTS - wants to establish an anonymous relationship the problem of TP as man-in-the-middle is un-resolvable. They can choose to exchange a SYMKEY in unencrypted form or better do a Diffe-Holmann to making it more difficult for TP to handle. But they cannot have any guarantee that TP is not listening in.
For each RELATION CLIENT can maintain a special Note Space containing preferences (ex food and people likes and dislikes, event history, notifies (birthday etc.).
Private Data
Central to the invention is that TP has no built-in interest in accessing CLIENT
PRIVATE DATA except to confirm the existence of signed documents and providing a minimum of traceability in case of fraud. TP under this invention has no interest in knowing contents of communication or trade.
In case TP services is provided on PRIVATE DATA this can be done under full anonymous conditions equal to that of an outsider. However this can in nature give reason for distrust by CLIENT.
Private Data is stored in a Privacy Storage attached to the CLIENT, a CLIENT role or a CLIENT Identity default in encrypted format using either a CLIENT generated symmetric KEY or in the form of a anonymous Attribute Certificates [S. A. Brands 1999 PHD thesis later published as "Re-thinking Public Structures and Digital Certificates", MIT Press, 2000, ISBN 0-262-02491-8]. Decryption keys are stored either CLIENT side or together with the data in encrypted form using the Public part of the CLIENT Digital Signature.
The CLIENT is able to produce additional both symmetric or asymmetric encryption keys for the data storage, change encryption, add, move or remove any attribute Data according to CLIENT Privacy Wishes. For each combination of VID, COMPANY the CLIENT can attach specific attributes in a form that can be decrypted by TP in secure mode on request by a COMPANY for customization purposes. Requesting other attributes will by definition require active accept from CLIENT. If CLIENT accepts, attributes can be stored together with the VID in question for documentation or a generally changed privacy profile.
Negative Credentials can often be a question from COMPANYs. In order to show anonymously that one has not been to prison etc., attribute certificates are central.
When CLIENT approves someone to access Private Data, CLIENT create a new Symmetric Key, select the attributes to be stored encrypted with this new key and forwards the key to COMPANY or AGENT who is allowed to Access. CLIENT informs (automatically) TP by linking the attribute to the relevant VID or Role that COMPANY can access attribute and TP can control access without knowing contents.
Private Data is stored in the most appropriate Data format with or without an identifier for convenience. The default format is assumed to be XML. Attached to the Private Data are a Meta Data description of what the piece of data contain together with link to data definitions.
If CLIENT allow the TP INVOICE AGENT to handle Invoices then the invoice is stored separately and Product Codes are stored in the collaborative filtering
Server together with reference to a special Analysis VID. The INVOICE AGENT is the only agent that can access invoice data.
The INVOICE AGENT have no external communication and can only report findings back to the Invoice recommendations part of CLIENT Suggestion House. CLIENT can Give other Agents Access to the Invoice Recommendations part, but not to the Invoice Data themselves.
See Figure 11 <Privacy Data Storage>
Login
In the general solution CLIENT will authenticate towards TP and the TP will handle authentication towards specific COMPANY. The base level of security is extended to a given COMPANY building a general security service only limited by COMPANY ability to integrate. Given the security problems with simple login/password solutions COMPANY has a heavy incentive to move to an integrated authentication solution.
Key to this is a central database (see figure 2 the CLIENT Virtual ID 30 plus related entities) that cover all COMPANIES where CLIENT has registered both offline and online. TP maintain a database of specific VIDs (both anonymous and identified) and information to authenticate the VID towards COMPANY. This include necessary login information, passwords, digital signatures and SPECIFIC COMPANY communication rules.
In the general case the client-side part of TP will implement a Single Sign-on procedure so that CLIENT first authenticate towards TP and from there choose actions (the sequence can vary depending on channel and situation) without any need to re-authenticate.
Choose a role (Work, Private etc) to indicate the context CLIENT wish to act. Choose a VID/COMPANY to interact with. When CLIENT choose (or switch to) a specific VID TP issue an implicit auto-authentication with COMPANY. Chose action
CLIENT can use the IdentitySwitcher and change VID to another VID/COMPANY. TP use the original authentication and carry out an auto-authentication using the new VID. A central specific embodiment of this is a portal solution, e.g. WAP-based, where the CLIENT menus are dynamically created based on CLIENT registered VIDs with automatic Sign-on/authentication of VID towards COMPANY.
The VID can be supplied with information about Profile and wishes from the Private Data Storage controlled by CLIENT. This profile information can include an anonymous proof of credit worthiness, a credential such as a formal educational degree or an anonymous proof of absence of a negative credential such as a criminal record or outstanding debts. One embodiment include a XML format collection of parameters, encrypted according to the structure of roles and VIDs and manageable by TP only on reference but not by access to contents.
Authentication
For secure transactions authentication has to be strong. Software-only sign-on is not 100% secure - even the strongest PC-based encryption solution is vulnerably to a virus attached to a keyboard driver in combination with a remote control mechanism.
Basically two forms of authentication can be considered strong. Either simple single-use challenge-response solutions or tamper-safe SmartCards with a encryption authentication mechanism that can be either standard signature or a more complex zero-knowledge authentication procedure. Se for instance [S. A. Brands 1999 PHD thesis later published as "Re-thinking Public Structures and Digital Certificates", MIT Press, 2000, ISBN 0-262-02491-8].
The central authentication for this invention makes use different forms of authentication. The central tool is an Authenticator in the form of a portable wireless devices such as a WAP mobile phone able to access a SmartCards/Simcards either installed or using a mobile reader. Using infrared or other local communication protocols such as Bluetooth to communicate with computers, in store located communication tools or the built-in access to the wireless network this device cover all general purpose authentication. The basic technology is known and almost a commodity product such as for example the Ericsson mobile phone R320s.
The SmartCard is able to carry out simple encryption functions 1 ) Asymmetrically encrypting small pieces of data for zero-knowledge authentication and authorization.
2) Symmetrically decrypting and encrypting messages to and from TP.
3) Ability to receive a random seed-factor to generate of one-time-only challenge / response key-pairs based on a shared secret key and an agreed algorithm. 4) Maintain a list of not-used key-pairs.
5) A local authentication access mechanism using Biometrics like a fingerprint reader, pincodes or other method.
The Smart Card does not contain the Identified Digital Signature of CLIENT (CLIENT Private Key). Prior to use CLIENT has used his digital signature to sign the Public Key of a key pair unique to the SmartCard towards TP. Signatures has to be confirmed by TP to be traceable to CLIENT through a VID. This means that if the SmartCard is stolen or otherwise violated the SmartCard key can be revoked by TP with minimum damage.
The authentication procedure sequence towards TP is channel dependent, e.g. some channel will require cross authentication, while others do not need this. This will specifically in connection with the migration services where for instance standard Credit Card Payments are implemented in a strong authentication/verification solution.
The Authenication procedure can be complex including Post-verification in a later session of a pervious weak authentication (will locate problems and initiate a fraud investigation).
A more interesting complexity in the Authentication procedure is incorporation of general Procura-principle using principles known from workflow systems. This is directly relevant if CLIENT is a COMPANY or for COMPANY integration. But the same principle is also very useful in non-company situations. In some cases a parent has to co-authenticate child authentications - this can be done in real-time or prior by a set of rules. Thresholds can be set according to a price maximum over which a spouse or legal guardian has to co-authenticate. A weak channel can require co-authentication in another weak channel and thus be considered strong like a weak web authentication combined with return phone call to a previously agreed telephone number to cross-authenticate by.
Three basic ways technical authentication protocols are in place and used depending on CLIENT and COMPANY technical implementation:
Manually by CLIENT. From the outset this can mean CLIENT entering a one-time- only identity key hinting to his identity. TP responds by a challenge number related to a one-time-only key-pair and in return getting the related response. This procedure does not require any special electronics implemented at either CLIENT nor COMPANY. It only requires CLIENT to have interacted with TP prior to the authentication procedure to receive the one-time-only keys in advance.
Directly using the mobile wireless interface to interact directly with TP, messages can be signed and sessions/other channels can be cross-authenticated .
Indirectly using the mobile device off-line as a SmartCard reader with infrared, Bluetooth or other local communication protocols to access the electronic SmartCard authentication. As this is zero-knowledge this can be done through COMPANY communication channels without linkability.
Different authentication procedures are implemented in parallel (see figure 13).
Actions A10 and A20 are the standard authentication procedure where CLIENT first authenticates towards TP either online or through a mobile authenticator. TP then authenticates CLIENT towards COMPANY. An example of this is when CLIENT is accessing his list of existing VIDs and choosing one related to an online shop. The online shop this way gets an anonymous customer relationship linkable over multiple interactions valuable to build continuity into the service. Measurements, preferences, purchases etc. all can be taken into consideration dealing with CLIENT.
Actions B10 and B40 cover the situation where CLIENT has no direct link to TP. CLIENT authenticates zero-knowledge towards TP though a COMPANY link with TP and then TP authenticates the correct related VID towards COMPANY. An example of this is a physical grocery where CLIENT interacts with TP though a mobile device with an infrared communication link to in-store communication points. Alternatively the authentication procedure can work through an in-store located computer with a standard Internet Browser. CLIENT get a transaction code from COMPANY and enter this number in connection with the authentication procedure. TP can then forward the related VID identifier together with the transaction code through any communication channel such as encrypted email.
Actions C10 and C40 cover the situation where COMPANY itself has no direct contact to TP. A fourth party authenticates towards TP in the transaction verification process to get a transaction confirmation. An example of this is Credit Card payments combined with a strong authentication procedure implemented through the card verifier.
Action E10 covers the case where an initial authentication is re-used to authenticate towards a new fifth partner. This can be done either by COMPANY or by TP intermediating the relationship between COMPANY and the fifth partner. Examples of this can be an online news-service requiring payment or a new introduction in this invention in the form of a TP intermediated purchase directly from a supplier using B2B trade standards. Privacy Trade Platform
The Privacy Trade Platform is a generic collection of services on top of the Virtual
Identity Platform that together makes long-term commercial customer relationships possible on an anonymous basis.
The range of service cover a full customer life cycle from communication to onetime-only purchases to signing of agreements, purchasing and delivering electronic and physical goods, returning goods and anonymous dispute arbitration.
Figure 18 shows the entire Privacy Trade Platform with interfaces to important services.
Reference numerals 10 to 30 cover the Core Virtual Identity Services. Reference numerals 40 to 120 cover the full range of services necessary to trade online and real-world.
Reference numeral 130 is the services that enable CLIENT'S to let third party
Customer Agents and Selling Agents 180 to work with Private Data under CLIENT control.
Reference numeral 140 is the special area where all selling suggestions are directed.
Reference numerals 150 and 160 cover a full hosted virtual shopping facility where Agent suggestions converted into transactions according to Open Trading standards such as Open Buying on the Internet (such as www.openbuy.org) with the necessary modifications to support Privacy. A central note here is that Agents are interfacing with one Virtual Identity whereas supplier see another in order to minimize linkage.
Reference numeral 170 covers the Privacy-enabled Customer Relationship Management Business Services to support the virtual relationship build-up between Supplier and CLIENT under full CLIENT control.
Traceability Route
The central part of all Trade is the ability to enter into legally binding commitments.
Enabling legally binding commitments in an anonymous trade system is the key. The simplest solution would be based on a Power of Attorney to TP from CLIENT. TP can the sign using the Virtual Identity Signature (Cl.Vir.Pr) on behalf of CLIENT. This would however open up for TP fraud towards CLIENT and for TP to take risks of CLIENT accusing TP of fraud. These problems can be handled by agreement. However the central problem of TP needing to know contents of the legally binding commitments is in line with a Privacy priority.
A better solution involves a double signature system implementing protection to all parts in the process - See figure 12 for an overview.
CLIENT creates a new set of Signature Keys (Cl.Pr and CI.Pu). CLIENT keeps the private key Cl.Pr, which is not revealed, to anyone else. CLIENT signs the public key CI.Pu with either a nationally implemented Digital Signature (DS.Pr) or by other traditional means. The public key CI.Pu and the Signed public key Sign(CI.Pu, DS.Pr) is forwarded to TP. TP can now prove non-reputable by CLIENT that anything signed by Cl.Pr is signed by and only by CLIENT without anyone else being able to identify CLIENT. This principle is a technically well- known set-up implemented in PKI standards.
However a central advantage is that CLIENT is protected from escrow-systems, where the Certificate authority can create copies of CLIENT Private Signature Key. Even if the national standard is based on escrow systems CLIENT can establish Privacy. The Server handling CLIENT identity anonymisation can be located outside the national borders of CLIENT nationality. As a general principle implementation of CLIENT identity anonymisation is dynamic so that identification information can be moved from one server to another server in another country if the situation so requires. This can for instance be the situation if military coups or other non-democratic developments are expected or feared. When creating a virtual identity on behalf of CLIENT TP create a new set of signature keys (Cl.Vir.Pr and Cl.Vir.Pu). TP keeps the private key Cl.Vir.Pr which is not revealed to anyone else.
If the virtual identity is a general purpose identity the public key Cl.Vir.Pu is forwarded to CLIENT. CLIENT sign the public key with his private signature key Sign(CI.Vir.Pu, Cl.Pr) and return this to TP.
If the virtual identity is for a specific company then TP Sign the combination of the public key of the virtual identity and the public key of COMPANY Sign(CI.Vir.Pu + Co.Pu, TP.Pr) and forward this together with the public key of the virtual identity and the public key of COMPANY to CLIENT. CLIENT sign the same combination Sign(CI.Vir.Pu + Co.Pu, Cl.Pr) and return this to TP.
The signature Sign((CI.Vir.Pu, Cl.Pr) or Sign(CI.Vir.Pu + Co.Pu, Cl.Pr) establish a provable and non-reputable by CLIENT route between the virtual identity and CLIENT.
TP is not able to use the same virtual identity towards multiple CLIENTS because the first CLIENT decides the symmetric encryption key SYMKEY and forwards this to COMPANY. If SYMKEY is used for encryption only CLIENT will be able to decrypt messages from COMPANY.
CLIENT can sign any message non-reputable with his Signature private key Cl.Pr. TP cannot fraud CLIENT signature because TP does not know Cl.Pr. Only TP can verify this signature using CI.Pu because only TP know the link between Cl.Pr and DS.Pu, TP can provide this proof of link.
When TP has in possession a message signed by Cl.Pr, TP can sign the same message using the private key of the virtual identity Cl.Vir.Pr. TP will be able to provide the signed message by CLIENT and therefore does not need to know the contents of the message. CLIENT cannot fraud the signature of the virtual Identity because only TP knows the private key of the virtual identity Cl.Vir.Pr.
If TP sign an agreement using the private key of the virtual identity without having a signature from CLIENT of an identical message, CLIENT is not legally committed.
If messages from COMPANY is encrypted by SYMKEY only known to CLIENT and COMPANY, then TP cannot create and sign messages on CLIENTS behalf. If messages are not encrypted and TP sign a message to COMPANY without having a CLIENT signature then TP is responsible towards COMPANY. COMPANY will thus have a legal counterpart in any deal even though COMPANY does not know whom unless identity is freely revealed or legal disputes require revealing of identity.
This is an general implementation of how CLIENT can enter into legally binding commitments anonymously without anyone but the deal parties needing to now content of the commitment.
Anonymous Signature For CLIENTS to be able to enter into committing agreements while retaining
Privacy a process is set up for signing agreements electronically.
Using this invention TP is able to verify that a signed encrypted agreement exist without knowing the contents and then forward an identical copy signed by the VID to COMPANY. TP is thus verifying that this piece of unknown content is signed unchanged without knowing what the message is about. A key requisite for this is that CLIENT is IDENTIFIED according to internal policies of TP.
COMPANY generates an agreement that is encrypted with the symmetric SYMKEY not known by TP. COMPANY signs the encrypted message and forwards the message to TP (figure 20 reference numeral 100). TP verify the COMPANY signature and confirm this by signing the message and forwarding the message to the related CLIENT. TP does not know the encryption key SYMKEY so TP is not able to read the contents (figure 20 reference numeral 110). CLIENT verifies TP signature (confirming COMPANY signature) and after checking the agreement signs the message and returns the signed message to TP (figure 20 reference numeral 120).
TP verifies CLIENT signature and the originality of message towards the original forwarded by COMPANY. TP now has an encrypted agreement signed by both COMPANY and CLIENT. The encrypted agreement signed by both parties is stored for safekeeping on behalf of both CLIENT and COMPANY. TP strips the CLIENT signature and sign on behalf of CLIENT using the Private Part of the CLIENT VID and by TP confirming existence of a signed agreement in safe custody.
This message is forwarded to COMPANY (figure 20 reference numeral 130). COMPANY verifies signatures of VID and of TP confirming the existence of an agreement signed by CLIENT.
It is important to note that CLIENT signs the Public Key of the CLIENT VID for verification on time of creation. TP therefore has a traceable and non-reputable line of signatures between CLIENT and COMPANY. CLIENT is protected from fraud by TP because TP cannot get CLIENT signature on the agreement. TP will be responsible towards COMPANY if TP sign an agreement on behalf of CLIENT without having CLIENT signature in place. TP is protected from fraud by CLIENT and COMPANY in union because CLIENT does not know the secret key of the CLIENT VID and is not able to generate deliberate fake anonymous signatures which are only signed by the VID.
Anonymous Two-way Digital Signature The anonymous Digital Signature shown in figure 20 is implemented in a two-way anonymous version between two CLIENTS by replacing step 110 in parallel with step 130 so that TP replace The New Anonymous CLIENT (Company in figure 20) Signature with VID2 Signature Cl.Vir.Pr.
Privacy-enabled payments Payment intermediation involves acceptance by the paying CLIENT of an electronic invoice in a secure and anonymous environment. For one-time only purchasing of electronic goods this can be done using an electronic equivalence of cash - non-traceable token value certificates of a trusted party such as a bank etc. But for ongoing relationships including for instance physical delivery or any form of credit from supplier to purchaser additional means are advantageous.
The payment process itself is intermediated by TP acting as payer on behalf of CLIENT without COMPANY knowing who CLIENT identity unless CLIENT VID is identified. The principle for payments for an identified and an unidentified VID are fully parallel.
This principle works for credit transactions for both ordinary purchases and recurring purchases such a phone bills, TV-signals, rentals etc. in cases where COMPANY accepts the credit risk provided that TP reveals identity in situations where CLIENT can be proved to attempt fraud. If credit relationships are to be established this will probably be accompanied by an anonymous agreement.
The payer can decide on multiple payment channels including a default online account, purpose-restricted currencies, electronic anonymous money, credit card transfers and direct banking account transfers.
Since the bill is the property of the buyer, an electronic invoice is required. The invoice is stored in the protected customer files. Upon approval by the buyer, payment is confirmed according to conditions depending on payment channel and the trade transaction involved. Real-world payments include anonymized credit cards (with pin-code or order electronic authentication), Cash Cards, SmartCards and direct access to Privacy Server. But not normal credit cards with signatures because these will be identifiable.
Secure Non-cash Payments is implemented in several novel types.
Electronic Bill presentment with payment intermediation,
TP acts as an intermediate between CLIENT and COMPANY with in principle two separate payments. One from CLIENT to TP and one from TP to COMPANY..
The standard generic solution is for COMPANY to forward an electronic invoice to CLIENT via TP. The electronic invoice contains COMPANY identification information. TP present this invoice to CLIENT. CLIENT approves this invoice and authorize payment and payment method in a secure channel. TP confirms payment towards COMPANY.
Payment can be against a CLIENT or COMPANY account with TP or any other means of payment including electronic cash certificates, account transfers directly against online banking accounts, credit payments, up-front payments, real-time loans etc.
TP confirmation of payment towards COMPANY can be optional so that additional services can be included such as payment upon Privacy delivery, payment upon product verification, CLIENT approval or other criteria agreed.
The Electronic invoice is in a structured format and stored in the CLIENT Data Space as documentation of the purchase.
Delivery One of the big problems involved with establishing Privacy is the delivery because the actual buyer address needs to be forwarded the shipper. The classic solution is a mail-drop with a re-shipping involving two in principle separate shipments with a physically trusted party intermediating. This is a solution to the basic anonymization problem. US Patent no. 6,006,200 resembles such a solution, which American patent hereby is incorporated in this specification by reference.
However this solution will not fulfil solve the Sender and Context filtering and redirection needs. For instance when delivery address is copied by (or sold to) external parties or CLIENT has multiple delivery addresses (Work, Home, Summer Cottage, Kindergarten, Friend, Family etc.).
In a networked economy COMPANY need the ability to pass the address back through the value chain to the actual supplier and the delivery still be traceable to COMPANY. For instance an online clothes store need to be able to send a delivery request to a Custom Clothes manufacturer to deliver a customized dress to CLIENT without the customer clothes manufacturer can identify CLIENT or send additional communication to CLIENT.
This Invention works with an address identifying a) The Trusted party, b) The Sender (towards Trusted Party) and c) a reference information combining CLIENT Token Identifier and Shipment Information - see figure 14.
In the COMPANY Customer Database the default address for CLIENT (Cl.Vir.Pu) is TP Token Identifier (for lookup in an official registry like a X.509),
Co Token Identifier (for TP to identify sender for Access Control filtering), [Encs(CLIENT Token Identifier + Timestamp, CompanyKey)].
This default address can be used in standard word processors for any manual mailings such as Direct Marketing etc. For package deliveries and special mailings a new Address is created because Shipment Info is changed to a transaction or dialog identifier. SHIPPER or other third party has thus no way to construct an address that does not resemble a default manually Time-stamped address. If abused and regularly this address can be renewed leaving no external access for abuse not involving either SHIPPER or third party. COMPANY can actively sell the address plus CompanyKey but in this case COMPANY is punished for any SPAM since mailings will be traceable to COMPANY and thus can be stopped in the filter process.
COMPANY can make an agreement with CLIENT about Special Shipment
Information that can be used to differentiate manual mailings by type. These rules can CLIENT then build into the Access Filter. SHIPPER can anonymously and Zero-knowledge Identify Client and Proof Delivery (figure 14 reference numerals 30 to 70) by receiving a) information to challenge CLIENT at point of delivery and b) data to verify by a cryptographic algorithm that the response is valid.
In one embodiment this can be accomplished by generating two Random keys R1 and R2. The SHIPPER is informed of the Hash result H(R1), a challenge for CLIENT (Enc(R2,CI.Pu)) and the result of Encs(R1 ,R2) to verify the response. When challenging CLIENT with Enc(R2, CI.Pu) SHIPPER will receive the answer R2 that resolve H(R1 )=H(Decs(Encs(R1 ,R2))). Since only CLIENT can bring this missing piece to the puzzle R1=Decs(R1 ,X) answering R2 this both Identify CLIENT to SHIPPER and CLIENT cannot deny Proof of delivery towards TP.
Note that SHIPPER does not know the identity of CLIENT and therefore not know CI.Pu. CI.Pu is not the published actual digital public signature key of CLIENT but as the general principle part of a generated key pair signed by CLIENT private digital signature key. R1 can be a complex message and R2 be chosen according to CLIENT means of authenticating. For SHIPPER to Proof that he has not generated a fake R1 , R2 he saves the entire Signed Coded Message by TP (see figure 5 reference numeral 120).
The special case where a pickup service is arranged does comply to the same principles just in a different sequence order of activities.
CLIENT can on top of the Intermediated Delivery Service add a Mail-drop partner with for instance a nearby friend, a nearby shop or an local community organized drop-point. CLIENT will notify this Mail-drop partner of (Enc(R2,CI.Pu) and R2) when expecting shipments. When Challenged with Encs(R1 ,R2) the Mail-drop Partner can give the solution without knowing the CLIENT Secret Key (Cl.Pr). This will protect against the situation where SHIPPER abuse the trusted relationship and informs COMPANY of CLIENT Identity. However it ads a level of inconvenience since CLIENT will not receive the shipment to his house.
For the CLIENT to protect himself against abuse by TP in liaison with SHIPPER, CLIENT can provide TP with H(R1 ) and the encrypted parts Enc(R2, CI.Pu) and Encs(R1 ,R2) but not R2 itself, or generate the challenge sequence at time of purchase or dialog. This is built into advanced trade and dialogue solutions. Optionally CLIENT can continuously forward combinations of generated keys to TP for this purpose to avoid being a delaying factor in the costly and sensitive physical distribution process from shipment to delivery.
Most SHIPPERS have standard Track/Trace Services to build COMPANY and CLIENT Services upon which will be used in different parts of this Invention.
This process supports both a cross-border package delivery, a local grocery delivery and ordinary mail. Local adaptations of the general principle can be necessary. An embodiment of the present Invention comprises a Postal Services Move-Database used for fast redirection of Mail and parcels. A further embodiment of the present Invention comprises a SHIPPER delivering directly to the CLIENT residence. Anonymous Internet Letter of Credit
A new level of Internet Trade Security is established by combining a Trusted Party and anonymization with the dual control of delivery and payment (See figure 22 combining figure 14 showing Anonymous Delivery and figure 21 showing Anonymous Payment).
Towards CLIENT TP ensure Privacy and non-release of Payment until actual delivery and conditions approved. Towards COMPANY TP will ensure release of Payment when delivery is verified and conditional approvals. Condition can be incorporated so that CLIENT has time to control the goods before the release of payment.
Conditions are normally based purely on time from delivery proof. If no objection has been raised by CLIENT payment is released. However special conditions can be meet where CLIENT has to approve payment release.
CLIENT surfs COMPANY website and determines what to purchase. An order request (according to OBI or other trade standard) or invoice is forwarded to TP for approval.
TP gets CLIENT approval and confirmation of payment. Payment is secured until delivery is confirmed.
TP confirm conditional payment authorization towards COMPANY.
COMPANY ships the purchased goods according to agreement (reference numeral 420). The TP receives the proof of delivery when confirmation from shipper and the conditional terms has been meet payment is released.
A fully parallel solution exists for Interactive TV purchases, Telephone purchase and other channels. The same secure principle works for semi- or fully identified VIDs without Privacy. Product responsibility
In the standard Anonymous Letter of Credit Buyer has no guarantee that the goods delivered are the right goods or that the goods have sufficient quality.
Additional services can be offered on top of the base service.
A simple solution is for the anonymous Letter of Credit to be extended for BUYER to have time to verify quality of goods before release of payment. Terms can be agreed between Buyer and Seller. One embodiment will include a fixed time before release of payment. Unless Buyer object payment is released.
Another embodiment include a third party product verifier in the delivery process so that Buyer and Seller have unbiased verification.
In situations of dispute a legal arbitration can be initiated.
Privacy-Enabling Trade Standards along the full value chain
This invention incorporates Privacy Enabling the full value chain back top the originating supplier with intermediated shipping directly to CLIENT.
Through Trusted Party a CLIENT is able to trade using Open Trading
Specifications such as OBI™ (Open Buying on the Internet - www.openbuy.org) and other standards. This invention incorporates a Privacy Enabling implementation of open Business to Business specifications.
TP will intermediate the transaction including payment, delivery control, warranty and post-delivery service according to the Privacy Trade Platform. In the generic technical solution TP will act as the Buying Company and CLIENT will be technically be disguised as a employee of the Buying Organization.
By default COMPANY will be informed by agreement that the real purchaser is a CLIENT not employed by TP. The Virtual CLIENT Identity can be a one-time-only Identity or a COMPANY known virtual identity according to the purchase background.
If it is a one-time-only identity then the customer type (private, corporate role) will be part of the initial profile presentation. - important to ensure CLIENT rights according to law - warranty etc.
An embodiment according to OBI 2.1 is shown - see figure 25. Please note that figure 25 can have additional suppliers in multi-party Value Chain without changing the basic concept.
CLIENT has intention to buy a specific product knowing the product and/or the desired supplier. Acquiring this information can be the result of additional TP services not relevant to the OBI Standard. TP supply CLIENT with the correct VID. CLIENT goes to the selected supplier website and is technically identified by Selling Organization as en employee of TP and presented products and prices according to agreement. CLIENT selects products according to standard shopping methods.
When CLIENT has selected products to buy a Order Request is forwarded to TP as buying organization. TP gets authorization for the order and payment terms from CLIENT and issues a formal order with an Intermediated Delivery Address supplied with the encrypted Shipment Info. COMPANY issues an Electronic Invoice, which is forwarded to TP for payment according to terms and ships the goods.
When SHIPPER document delivery the payment transaction is released exclusive fees according to agreement.
This method can easily be implemented in other parallel B2B trade specifications. Since TP can translate between standards this method also opens for trade across regions with different standard trade specifications so that a European CLIENT can purchase from an American Supplier creating a truly homogenous trade flow for suppliers across segments and standards.
If the product/supplier selection originates from a virtual online store, these principles fully support and intermediates the trade solution between a virtual stockless online store and suppliers. The virtual store can concentrate on the communication with CLIENT and receive the agreed fee for any resulting transaction. TP protect the virtual store/CLIENT customer relationship from the supplier, as the supplier is not aware of CLIENT identity.
If CLIENT is identified to the virtual store a one-time-only identity will ensure that collaboration between the store and supplier cannot be linked to other purchases.
This invention also incorporates a solution where TP use and supports a third- party broker for locating the cheapest supplier able to supply or the best Product according to Common Business Library Product Catalogue with standard Product Identification and references to suppliers.
Note this is not distinguishable from figure 25 if the third-party broker is not using TP services for supplier transactions since shipping information is transferable down the value chain without changes.
If CLIENT is acting as a Corporate Purchase this solution also incorporates a fully anonymized Business to Business trade service.
Anonymous Transfer of Ownership
In parallel to the Anonymous Signature CLIENT can wish to transfer ownership including rights and obligations to a third-party. This can be in situations of gifts bought for someone else transferring warranties or a simple trading of purchased goods between CLIENTS. New requirements to this service is the ability for the Buying CLIENT to accept obligations anonymously, for the Selling CLIENT to accept transferring rights and for COMPANY to verify transfer of rights.
For some products or services COMPANY has a right to refuse transfer of ownership, rights and obligation. This is a special case to be handled the parties in between with possible dispute arbitration.
Implementation is parallel to Anonymous Signature except that additional parallel steps are involved. Please note that CLIENT, COMPANY and CLIENT 2 even though they do not share a common encryption key they can still verify the originality of Agreement by providing a Hash value of the unencrypted message.
Anonymous Post-sales service
Warranty Upon purchase warranties are separately registered in order to facilitate support and to issue reminders to CLIENT that just before warranty runs out to check if any repairs are necessary.
COMPANY can issue a special electronic warranty stating clearly what is covered by warranty and how repairs, upgrades etc. should be handled. This electronic document can contain links to the COMPANY web-site for detailed information.
CLIENT can at any point show the original electronic invoice regarding the purchase and use this to claim warranty services.
Anonymous Repairing
For products with warranty or just defects returning products to the supplier needs co-ordination. CLIENT interacts with supplier using his VID and receives a reference numeral to use for returning the product.
CLIENT packages the product and issues the return slip with the reference numeral and ship it using any shipper. In case the shipper have problems or upon reparation returning the product to CLIENT will follow the same procedure as when originally sent (see figure 14 Anonymous Delivery). As his own return address he use the address of the VID with the reference numeral encoded into the address ( ENCS(CLIENT token Identifier + reference numeral, SYMKEY)).
Anonymous Legal Representation
A mediation process is enabled for crime investigation enabling legal representation of not identified individuals. Under these circumstances a suspicion by the police is not enough for TP to release the Identity of a CLIENT. A judge will have to be involved and the individual informed of the proceedings.
The rights and procedures will be depending on national and international law and will be subject to change. The base principle is to ensure that no privacy violation is possible without legal representation. In this it is assumed that CLIENT have a fundamental right of remaining non-identified until just cause is proven.
A full legal proceeding handling commercial disputes can be carried out with lawyer representation without CLIENT identity is disclosed. Unless criminal activities are involved CLIENT right of non-identification is defended by TP.
In case of investigation of a possible criminal offense the police or other authority wish to contact CLIENT. If it is only for information they can interact with a VID not knowing the real identity of CLIENT unless CLIENT decide to be identified. Assuming the police want to identify CLIENT they will have to have a reason for this. In order to justify a reason they need to have judge grant identification.
TP can and must as minimum ensure that proper proceedings are in place before releasing identity. For this CLIENT must be issued a lawyer representation. A special VID of CLIENT is created to Interact with his lawyer so that not even the lawyer knows his identity. If the police fear the crime is of a type that may lead to a possible escape they can ask to have a lawyer representing the CLIENT without CLIENT knowledge of the proceedings. This has to be justified towards the judge and the lawyer will have to contest this violation of CLIENT rights of PRIVACY.
TP and the lawyer and the CLIENT (unless he is not informed due to a decision by a judge) can know interact to defend CLIENT right of non-identification.
Privld Card
A Privld Card (PIC) is a tamper-resistant SMARTCARD containing as a minimum the private key of a VID, the public key of TP and an ability to encrypt. Additionally it can have an internal Clock to time-limit the private key. Asymmetric, Symmetric encryption, Sign, hash, Random, One-time-only key pairs.
When entering into agreements or purchases requiring identification the Privacy Server will act as a guarantee of identification and/or intermediary in legally binding agreements. Specifically this will also apply when purchasing communication services making new communication channels anonymous by definition.
When entering a shop a CLIENT can virtually identify himself after which the shop can offer specialized services based on his prior purchases and private information given. A login procedure is taking place in order to protect against theft or abuse of PIC's.
The Shop Internal Identification can either be transferred from the Privacy Server, using wireless communication units (infrared, mobile etc.) or from the PIC itself. See the Authentication procedure.
If member of a Customer Club special services can be suggested using a variety of different Interactive Communication Channels. For instance special purchase suggestions (a specific item), special services (information support) or individual discounts (based on the full customer knowledge). The Client can have individual pricing on all goods and services as being prior virtually identified.
When paying the supermarket will forward an electronic invoice to the Privacy Server, the Client can accept this for payment through a one-time only verification. This can be using an request-answer protocol or through alternative interactive channels such as a Mobile Communication Unit. The Supermarket will then receive verification from the Privacy Server that Payment is approved.
A technically reduced version of the Privld Card is an anonymized Credit Card only featuring an identifier, a end date and a TP Company name not related to CLIENT and information as to the Card issuer. This anonymized Credit Card can be accompanied with a partnership agreement with Credit Card Verifiers to enable Strong Authentication - see Migration Services Payments. In this version no fraud is possible without additional traceability has been established in the form of a strong authenticated authorization.
This version of the Privld Card will enabled anonymous payments in existing COMPANY infrastructure without changes. However one weakness will remain. The identifier itself (Card number) will be usable for cross-COMPANY linkability.
Privacy Trust Program
A central solution to this invention is the establishment of a close-loop customer
Privacy trust certificates for companies (see figure 31 ).
A Privacy Trust Logo Icon can be located at the COMPANY homepage (figure 31 reference numeral 20). When a new prospect customer of COMPANY looks at COMPANY website he can look for the Trust logo. In order to prevent abuse by COMPANY the prospect customer can press the Trust Logo and through a link reach TP website where a Trust Certificate is created verifying that COMPANY is abiding the principles of Privacy both in signature and in actions (figure 31 reference numeral 30). A Trust Certificate require:
Firstly COMPANY has agreed to establish Privacy Policies. These policies are subject to change but include basic acceptance of customer rights to remain anonymous, how to handle Privacy violations etc.
Secondly a continuos closed-loop feedback system is established in order for other CLIENTS of COMPANY to continuously evaluate COMPANY communication and practices based on Privacy Trade Interaction (figure 31 reference numerals 4 and 50). COMPANY violation of critical privacy issues can instantaneously lead to a revocation of the Privacy Trust Certificate. Bring a strong incentive upon COMPANY to handle complaints respectfully and fast.
Non-CLIENTs of TP can from the Trust Certificate register with TP and get immediate anonymous auto-authentication (figure 31 reference numeral 30). TP CLIENTS authenticating with COMPANY will receive warnings if the Trust Certificate is revoked.
Communication Intermediation
The communication intermediation process includes a) Catching the communication attempt in a virtual manor, b) Identifying involved actors, c) filtering according to setup rules (inbound communication only), d) routing session according to rules and receiver instructions (inbound communication only) and e) session management to establish and manage the communication. Se figure 3.
Intermediation of all channels Central to establishing Privacy is intermediation of communication channels for anonymization, blocking, filtering and rerouting purposes. On top of Privacy - however - significantly added value out of convenience and flexibility is achieved.
This is done by different methods depending on the channel. The general methods are as follows: Mail-drop
The strongest level of intermediation where the Channel has no direct physical outgoing channel.
This includes for instance web-browsing using strong cloaking services, online email accounts, physical partner-intermediated package delivery, filtering to Suggestion House, Payment intermediation etc.
Virtualization
The strong level of intermediation where the Channel has different appearance towards COMPANY than physically.
The process of Virtualization require that communication pass through an active part of TP where communication are re-addressed and re-packed without the possibility of link physically outgoing to the virtually incoming communication. The weak spot of virtualization is the physical address not under control of TP.
This include email re-routing, fixed line and mobile telephone, strongly encrypted wireless and intermediated communication such as mobile phones passing through TP, letters with rerouting.
Strong Anonymization
Intermediation where the Channel is acquired using an anonymous VID and used for another VID.
Strong anonymization is linkable by the id of the Communication channel itself. The id must be subject to frequent rollover.
This include - Anonymous Credit Cards, Mobile Phones without intermediation, Satellite Interactive TV.
Weak Anonymization Intermediation where anonymity depends on an external partner such as Postal, fixed telephone line with direct connection without an active TP component. Blocking
If Intermediation cannot be established the Communication Channel cannot be used in connection with a non-identified VID.
Catching the Communication attempt
All virtually defined channels will by definition go through TP in order to be linked to the appropriate physical channel. The Catch process default involves defining the Inbound Access point integrated with the Token Channel Identifier. Emails reach a TP-controlled mail-server, inbound telephone numbers are TP-controlled numbers with imbedded CLIENT token information (e.g. as an extension) etc.
The Catch Process will in some cases also involve alliances. For instance Delivery, SmartCard, Credit Card etc. all require a Partner active contacting TP in order to attain critical information to establish a session.
Central is that intermediation requires CLIENT participation (active or passive) and this leaves CLIENT in control. This include the possibility to bypass TP whether this is temporarily for web-surfing or dealing with relations or suppliers that CLIENT does not want TP to know about. The CLIENT can always login identified (even with a supplier where CLIENT has a VID-relation), inform relations the physical channel identifier or establish additional communication channels such as web-mailboxes, ISP-dialups etc.
A central embodiment will be WAP Push Proxy filtering because the WAP Push service will be misused for SPAM. Privacy enabling Devices such as mobile
Phones, Interactive television is key to SPAM protection. Anonymization is the first step to this.
In catching outbound communication attempts it is important to realise, that CLIENT will always be the weak link. It will not be possible for TP to catch all outbound communication attempts, face-to-face communication being the extreme case. CLIENT needs to be mentally aware of the role he chooses, when contacting COMPANY. It will hence always be the responsibility of CLIENT not to reveal information, which will compromise anonymity. TP will provide services that help minimising, these problems.
Outbound communication attempts made using TP operated means of communication can be caught in the same way as inbound communication attempts. Communication attempts using non-TP operated means of communications can be supported by providing switching facilities, e.g. a TP dial in service that can be used to establish contact with a given COMPANY.
Identification of sender/receiver
The CLIENT receiver will by nature of definition be easily identified inbound as the
Token Identifier of the Communication Channel is uniquely traceable to the CLIENT by TP only. When entering through reference numeral 10 in figure 2 the Token Identifier can be translated into the VID using reference numeral 20 and from there be matched with the related Role or Base Identity.
A Channel Partner requires special identification and authentication to verify privacy protection agreements and risk of leakage. This especially includes Delivery where address conversion is requested.
Sender will in most cases be Identified using a Token Identifier and authenticated using a PKI Scheme. Using Email, this can be achieved by combining sender with email encryption.
See figure 4.
Authentication
Using stronger or verified channels to verify weak security channels. A strong channel is a identified and access controlled channel that can be used to communicate control messages that upon used in a weaker channel (or vice versa) verifies the weaker channel to the level of the stronger channel. For some weak channels this can only be a session verification. For instance Credit Cards can be stolen, normal telephone lines have general access and is without standard login procedures.
Special Case to patent: Using Mobile Phone to verify Credit Card Payments. The Digital Signature verifies the online email and the browser interface. Using this, channel telephone, physical address, mobile etc. can be verified.
Identified/non-identified sessions
Sender cannot be Identified in every circumstance. For instance a friend calling from a public pay phone. It is then up to the CLIENT Receiver to decide. This decision can be built into the VID so that non-identified communication attempts will only be accepted in special semi-identified VIDs used for personal RELATIONS, i.e. if the SENDER knows the Token Identifier then SENDER is likely ok and RECEIVER accepts the call by default. Whereas for the general surfing VID the CLIENT can decide not to accept non-identified SENDER communication and not even being prompted up-front.
If identification is a requirement, caller can authenticate interactively using previous agreed methods if caller is already known to PT.
Mapping between VID and physical communication channel Identification will include establishing a mapping between physical identifiers and
VID enabling session management to perform this mapping with an insignificant overhead.
Session management
The mapping provided by session management has to be divided into two separate parts each encrypted with a separate session key to avoid breaking anonymity by monitoring and pairing inbound and outbound communication.
See figure 4 describing the basic set-up.
Basically two separate processes parts are involved. Encryption is central to protect against eavesdropping and surveillance of communication. This is multi-layered.
Central is the core message encryption using SYMKEY between CLIENT and COMPANY. The purpose is to ensure nobody but CLIENT, COMPANY and anyone trusted by any of these have access to the actual message content.
Added to the central message is functions, data and messages to and from TP encrypted with ClientKey or CompanyKey respectively. Messages will thus be decrypted and re-encrypted in the intermediation process.
Basic communication encryption is established in addition to this using session- specific encryption keys, Sessionkey.CI and Sessionkey.Co in for instance SSL or Virtual Private Network solutions dependant on national implementations and CLIENT/COMPANY technical abilities..
In addition to the encryption process, communication packages are continuously re-addressed including changing to and from addresses, stripping identifiable signatures ad replacing them with the appropriate Virtual Identify or Channel specific information.
Session management facilitates real-time mapping of physical to virtual information.
See figure 7.
Inbound Channel Intermediation
Inbound Intermediation is a central process with the objective to identify and block
SPAM at the same time as letting through all relevant interactions in a way where the CLIENT-receiver is not identifiable beyond existing knowledge by the COMPANY-Sender. Access Control Filtering, redirection and quality evaluation are step unique to inbound channel intermediation. See figure 8.
Access Control Filtering
When TP receive a message bound for a CLIENT it will act as the CLIENT agent deciding if the message is to be denied access, let through, routed to Suggestion House (see Personal Services) or other action taken. One possible further action is a request for additional information from sender/caller.
CLIENT can prior to the event set up a set of communication rules. These communication rules is based on the richness of information available to decide.
Available information include Sender identity, Channel, Purpose (if available), Importance, Receiver temporary Rules, Receiver Actual Status, Sender History, Dialog Status, Commercial Transactions status, Sender history with other
CLIENTS etc. Additionally special references can be set up in agreement between CLIENT and COMPANY. A specific example of this is the delivery channel where COMPANY can incorporate reference information in the encrypted part of the address.
If sender is previous unknown to receiver and/or TP then sender can be identified and classified afterwards to control future communication attempts.
Example of rule: Comment If ldentity_Type=MAILLINGS Special VID used email NEWSLISTS and Channel in (EMAIL, MAIL) Using a channel relevant to the VID and Sender in Optjn List Sender accepted by CLIENT prior?
If not SPAM risk high and SENDER_HISTORY = NON_SPAMMER (Global Opt-Out blacklist) then Return (Action-'Forward", Priority=2, Message-'News") Rules can be increasingly intelligent. SPAM messages from previous unknown sources is readable by TP due to lack of secret encryption keys. These messages can optionally for CLIENT be subject to filtering using automatic Text Scanning rules and evaluation by other CLIENTS of earlier communication from the same source. Using neural networks combined with CLIENT evaluation of earlier unencrypted messages a quasi-intelligent neural net simulating CLIENT preferences can be trained and available for future communications. If CLIENT do not establish an encryption key not known to TP Symkey, then TP can be asked to Scan messages from known sources also.
Sender history makes it possible for an access control filter to condition the rule on CLIENT or other CLIENTS evaluations of COMPANY (see evaluation of quality). This is especially interesting if a COMPANY suddenly starts to abuse emails for SPAM marketing. As soon as the first significant group of CLIENT has characterized COMPANY actions as SPAM COMPANY can be reclassified as a potential spammer leading some Access Control Filters to block further communication. Central here is the link to the Privacy Trust Program because the same problem will be visible to CLIENTS in the authentication process thereby reaching a large subset of COMPANY customers shortly after change of policy putting a heavy pressure on non-accepted behavior.
The output from the Access Control Filtering can be either a denial, a routing to the suggestion house for sales/marketing messages, a request for additional input (such as a password or an identification), a individual message requesting or serves as input for the redirection service.
Individual blocking can be useful in a general concept to avoid bothersome contacts ranging from press-people to unwanted earlier boyfriends.
The Priority parameter can both be used to speed a message and to slow it down. It serves as control for how extensively Receiver shall be searched through all channels. For instance an emergency call from a Child of a receiver can lead to a search through all channels, whereas a low priority message is more likely to end up in the electrical answering service.
The function of receiver (Role-dependant) is very important because an email to work for instance most likely is to be routed to a colleague rather than to a private communication channel.
Receiver Actual Status are parameters to situation-specific rules that can be dynamically altered to the specific situation of CLIENT. CLIENT can be in shopping mode letting through more sales-related messages. These rules are to be seen in close connection with the following routing rules which are almost 100% situation-based. For instance if CLIENT is in shopping mode with a GPS- enabled WAP mobile phone CLIENT can accept receiving Calls for Action based on location. These SPAM calls are normally filtered out.
Routing
Routing is the central CLIENT Communication Path Control ensuring that
Communication is best suited to actual wishes, communication type, security, convenience and cost.
CLIENT can contact TP to inform CLIENT mode and presently preferred communication channel. This highly very valuable feature enables the ability to dynamically change status without Sender knowing or having to consider it.
Similar temporary communication channels like a phone number at a friend or hotel room or a temporary replacement of a broken mobile phone is easily included on equal terms as other communication channels again without Sender knowing or having to care.
Low Priority Messages not relevant for the actual situation can be routed to the universal answering service.
High Priority Messages can involve extensive search in all communication channels or notification in mobile or other Channels. A very central example of a high priority message is where a relative under the care of a CLIENT is in need of help. This could be a child, an elderly or a disabled person. These relatives are often troubled by the difficulty in locating CLIENT. Instead a single alarm number can be setup and pre-programmed into telephones or Wireless beepers where a call will automatically trigger a Top-Priority establishment of a Communication Path to CLIENT.
Another example of a high priority message is an online real-time Payment authentication where User is purchasing using Credit Card. In this case routing options could be prioritized in the following order:
a) link to an active User Session b) authenticate though wireless means of communicators c) verify against previously approved list.
An example of a situation-specific contact protection is when CLIENT is in an important meeting or otherwise attending something that should not be disturbed. Instead of shutting of for instance a mobile phone CLIENT can go into Meeting mode and increase the threshold of importance before being disturbed. More messages will be routed to the answering service but emergency calls will still be put through. When attending a meeting RELATIONS with relevance to the meeting can temporary get higher priority and thus enable a user controlled relevance criteria.
During the Routing phase a request for additional information about purpose or importance from sender can be collected in interactive channels using automated interaction such as Voice Response etc.
Communication of same type can be routed between physical channels of the same type, e.g. routing email to a Role-based email address to the email address currently most reachable (e.g. home address after office hours). Communication can be redirection between to channels of different type, where content translation is possible (e.g. translating a telephone call to Voice over IP, Voicemail etc.). Calls failing to reach CLIENT can be routed to other Receivers such as a Permanently staffed Emergency Call Centers, a secretary, a Spouse, a backup colleague etc.
Evaluation of quality
CLIENT evaluation of COMPANY communication will be a solid indicator of
SPAM. If a COMPANY across customers are evaluated to add little in terms of relevant information or suggestions this information will in itself indicate likelihood of SPAM thus lowering the priority of a new Communication not identifiable responding to a CLIENT request.
Potential SPAM communication will not be rejected but instead routed into special Suggestion House where marketing messages are directed. A low priority will severely limit the likelihood that a CLIENT ever seeing this message.
A PRIVACY CARE rating will be as strong an indicator of good marketing performance as financial ratings and a strong indicator of future financial performance. A drop in rating signifies indicator of drop in financial performance.
Special rules allowing based on advanced conditions such as product categories, supplier categories etc. A special EMBODIMENT include token information used to open for third-party emailing when for instance a customer agent is asked to collect quotes.
Outbound Channel Intermediation
Element of outbound channel intermediation When CLIENT contact a COMPANY or CLIENT, is illustrated in figure 9.
Establishing a Virtual outbound channel requires TP intermediation. By providing a TP intermediated communication channel makes it possible for CLIENT only to specify receiver and channel type (indirectly indicated by choice of device - email, phone, etc.) and optionally purpose, but not channel or actual address. TP looks up the correct receiver address. Establishing communication includes looking up and switching to the relevant VID.
This is a general convenience concept implemented for both CLIENT-CLIENT, CLIENT-COMPANY and COMPANY-CLIENT outbound communication. Working with virtual channels the communication initiator
Browsing
The central principle about Browsing is that no trace nor registration about behavior is done. If CLIENT so wish third-party anonymisers can be used when browsing.
TP will supply CLIENT-side software that can be used optionally, including services like Cookie handling, Browser anonymization, auto-registering, auto-login and the core One-stop sign-in with the related Identity-Switcher. Additionally special services are available for supporting interaction with registered sites like forms filling, profile/wish presentment.
When implementing services like Identity-Switcher special attention has to be paid to the possibility of a linking different VID to one identity. The means that the VID can not be switched within one session without introducing the possibility of linking the VID being used.
A lot of issues are related to anonymous browsing with increasing number of service available. These will continuously need to be developed at browsing technology evolves.
An embodiment using current technology must include browser anonymization and IP-number protection.
Browser anonymization is required to ensure that the browser does not reveal identifiable or linkable information. IP-number protection (proxy) is required to protect against tracing of behavior and linking based on the use of IP-number and other similar traceable information.
The use of session management technologies likes Cookies is limited to a minimum, e.g. by making sure that a cookie can survive only during a session and deleting other cookies after browsing. When TP assisted login and logout (identity switching) from registered sites take place all non-relevant cookies are deleted. When leaving a registered site cookies can be transferred into the VID data archive. These cookies can optionally be restored when entering the site again.
When browsing CLIENT can assume different VIDs depending on purpose.
The anonymous VID can be supplied with information about Profile and wishes from the Private Data Storage controlled by CLIENT. This profile information can include an anonymous proof of credit worthiness, a credential such as a formal educational degree or an anonymous proof of absence of a negative credential such as a criminal record or outstanding debts. One embodiment include a XML format collection of parameters, encrypted according to the structure of roles and VIDs and manageable by TP only on reference but not by access to contents.
When filling out forms a CLIENT-side companion help fill out these forms and keep a copy of information revealed.
When entering sites where CLIENT has created one or more VIDs, auto-login and auto-Identity-Switch can be enabled by the CLIENT-side.
When entering sites where CLIENT has not registered, TP can auto-register. When auto-registering CLIENT is asked the type of VID and optionally under which role CLIENT wish to register. Also special requirements as to Channels availability is customizable. TP then creates a new VID and registers this VID with COMPANY. When auto-registering to a COMPANY site with a Privacy agreement with TP registration is done straight into COMPANY customer database with the Company customer Database ID for Client becoming the common identifier.
Communication channels
Email
Email and similar means of communication is characterised by being asynchronous, and hence not having an active session.
Standard email anonymization is well known in several types. The standard solution is to have e third-party re-mailer to act as an anonymiser by translating between an anonymous email address and the actual user email address.
In the multi- and rolling identity scenario a new anonymization concept is created. Firstly because email addresses becomes obsolete over time. Secondly because email-addresses is created for specific purposes. In Business Services Corporate Customers can have the option to use an email address in the format <Corporate Customer Identifiers <Corporate Customer Internal Customer ldentifier>@<Privacy>.com.
An email address is a Token Identifier where only uniqueness and a link to a role is key requisite.
Telephone etc.
When communication involves physical information such as a fixed line telephone, delivery of water, gas etc. the general principle will be to separate the provider of the physical connection from the content provider whenever possible.
This means that TP must set up means (both inbound and outbound) that makes it possible for CLIENT to use the physical line without revealing the physical identity. For inbound calls this can be done by routing from a TP operated phone number to the physical phone number. In the advanced integrated solution, a Telco Alliance Partner will translate on the fly. Basics is that the Calling Party will always reach a line controlled by TP. Information can be obtained from the Calling Party concerning purpose, validating identity etc. before attempts to reach the Receiving Party. The receiving party will have some sort of log-in validation and advance notification of caller and purpose before connection is established.
Outbound Telephone number can be <Local Privacy Number> - <Token information> or <Local Privacy Number> - <Corporate Customer Internal Customer Identifiers In the advanced integrated solution, a Telco Alliance Partner will translate on the fly.
Please note that the difference between Voice over IP and fixed or mobile Telephone is primarily technical. The message type is very interchangeable between these channels.
A mobile Telephone however has the advantage over fixed-luine telephones that they are not identifiable by the physical location link to an address.
Voice over IP has further the advantage that no permanent identifier are linked to a Voice over IP session. Using an anonymolsed internet connection combined with a virtualization of the Voice over IP receiver a strong Privacy Communication channel is established. Key is to ensure that none of the underlying service providers can get access to identifiable or linkable information.
Mobile
• Bluetooth
• IR
Mobile Phones or wireless communication devices are central to control. TP host a WAP Gateway that controls access to the mobile device. The basic service is to acquire the device anonymously so that not even the phone company knows the identity of the owner. The additional service is to Intermediate the calls through TP according to the generic specification.
Security around Mobile Phones are already better than for Internet sessions. With WAP 1.2 authentication are linked to built-in Simcards/Smartcards. This authentication is Intermediated using two different steps.
Two new WAP-services is controlled specifically. First is the WAP Push ability where TP will act as a Gateway and filter Push messages.
Second is upcoming GPS - possibilities. With this the phone company can trace the physical location of a mobile device.
Payment
Payment is an independent channel that can be fully intermediated. See Electronic
Bill Presentment and Migration Services.
Delivery
Intermediation of delivery of physical goods are described in the Privacy Trade Platform.
Cable Set top boxes
A key channel to Intermediate is the future Interactive Television integrating with
Internet and other communication services.
Especially enabling parents to control advertising towards children but in general to put a block to the increasing marketing stream leaving the Individual defenseless.
This channel will be intermediated primarily using anonymized Registration so that Interactive Service Providers have to listen in order not be blacklisted. Content itself will not be streamed though TP but each atomized program/advert will. In addition the CLIENT-side browser is anonymized with integrated links to online services for ordering etc.
Two-way anonymous communication
Privacy Trade Services are available in a two-way anonymous CLIENT/CLIENT version where COMPANY is exchanged by a another CLINT VID. It is thus possible to email, talk, sign etc. without knowing the identity of the opposite party.
In the CLIENT/COMPANY version COMPANY is known to CLIENT In the CLIENT/CLIENT version any combination of Identified and anonymous is possible. This is useful in a number of marketplace or problem negotiation situations where two-way anonymity is required either by the parties ir by the marketplace owner.
The only real difference to the CLIENT/COMPANY version is the fact that in the CLIENT/CLIENT version it is difficult - if not practically impossible - to exchange encryption keys to keep communication private to TP. The main problem being that a CLIENT cannot know if TP is acting as the other CLIENT,
Migration Services
Anonymous payment such as Credit Cards without name and Channel cross authentication with TP. Anonymized VID Identities in the form of a CLIENT login Identifiers and information
Payments
Securing existing Credit Card payment solutions
A large proportion of payments online or in shops is today done using standard magnetic Credit Cards without any encryption authentication mechanism. These payments are today subject to massive fraud due to stolen credit cards (Customer fraud) or false payments using credit card numbers without an agreement transaction or delivery (supplier fraud).
Using an online channel or a wireless device like a Mobile Phone to contact Credit Card holder the Credit Card Verifier can get strong authentication in real-time using a before credit card payment is authorized (see figure 15). The present SSL and real-world shop pin-code based payment solutions can this way be cross- authenticated by a channel with higher security (figure 15 reference numeral 40). This authentication does not require an encryption process to raise security significantly. Just by adding a standard Voice Response service using a mobile Phone as authorization channel the significantly higher Mobile Phone Theft protection with Unique Identifiers, pincode and real-time closing of stolen phones combined with the very basic fact that a criminal needs to have both the Credit Card information AND the physical Mobile Phone.
It is central to observe that this solution can be implemented without changes in all the existing outlet payment systems (figure 15 reference numerals 10 and 20). Only the central Credit Card Verifiers needs to add a step in their authorization procedure where they lookup Credit Card Holder contact information and establish a real-time authorization session (figure 15 reference numeral 30).
Anonymising secure Credit Card Payments
Based on the Secure Credit Card Payment solution method a Trusted Party can issue anonymous Credit Card
A general problem with this solution is that the anonymous Credit Card can be used as link information between COMPANY x and COMPANY y. This will not identify user unless linkage can be established to a COMPANY where Identified purchases using the same Credit Card has been made.
Strong Channel Authentication of Standard Credit Card. Most existing payments are done using ordinary Credit Cards using Pincode or signature. Extensive and escalating fraud is a consequence of poor security for both CLIENT and SHIPPER. CLINT is not protected against multiple drawings for the same or additional COMPANY based on Credit Card Information acquired. SHIPPER is not sufficiently protected against abuse of stolen Credit Cards.
<CLAIM> A central advantage to this approach is that this procedure does not require changes in COMPANY procedures and only require an additional step in Credit Card Verifier setup to provide significant increase in the known payment security including Credit Cards already issued. Verification of telephone only purchases by Credit Card can be authenticated to the same level of security. In addition the Credit Card Verifier can authenticate the COMPANY requesting information thus increasing the protection of CLIENT against abuse.
Standard Linkable Credit Cards can either be used offline or in online SSL trade in combination with an online Network-based payment authentication or a wireless authentication as shown in Figure 15. This is done in coalition with Credit Card verifiers who will implement a table translating a Credit Card to a contact channel for CLIENT to be used for CLIENT payment authentication outside the reach of COMPANY thus eliminating most Credit Card fraud. CLIENT will then authenticate Payment with Credit Card Verifier outside the reach of COMPANY. Credit Card verifier presents an electronic payment slip to CLIENT either directly or through a Trusted Agent. Upon authentication by CLIENT the Credit Card Verifier can authenticate Payment towards COMPANY according to standard procedures with the Credit Card Issuer. This procedure eliminate the need for Credit Card pin- codes since a stronger Channel authentication is used.
The CLIENT payment verification channel will be according to the Channel Trade taking place. Offline in stores etc. the use of Traceable Wireless Devices such as Mobile Phones with separate authentication mechanism will significantly improve security due to fraud requiring theft of both the Credit Card and the authentication device.
Since the Credit Card number is linkable across COMPANIES a special VID for this purpose only is used with Trusted Agent authentication. By default the Token VID identifier can be the Credit Card Number itself
This procedure is extended into an anonymous procedure making. By issuing anonymous Credit Cards COMPANY will not be informed of CLIENTS identity even with existing payment procedures. In addition this is combined with Trusted Agent intermediating payment verification so that the Trusted Agent Authenticate Payment towards Credit Card Verifier and Credit Card Verifier then Authenticates Payment towards COMPANY.
Credit Card Information are linkable information and if informed to COMPANY a breach of Privacy. By default the Payment Mechanism will include intermediation such that Payment is guaranteed by a Trusted Party.
Address Book transforming.
A new CLIENT can after registration and identification download a synchronization tool customized for standard Personal Automation tools (such as Palm Pilots, Outlook, Lotus Notes Personal Address Book etc.).
When setting this tool up there is an administration service that will create a replicable copy of the original address book and help build the TP address book of CLIENT.
Each contact will by definition be an Address Book Only type of VID.
CLIENT can reorganize his contacts according to his own Roles and VIDs so that Business Contacts and Personal Contacts, Family, Suppliers etc. are separated. In this process each Contact will be separated into how much information each Contact can access with CLIENT - Wishlists, Preferences, Physical Communication Channels etc.
When this process is over CLIENT can ask TP to contact all or some of the Contacts and ask whether they will take it upon themselves to keep the address book updated. At the same time CLIENT offers to keep personal address book updated. The individual confirmation ensure that control of access to contact information is retained to the individual (Nobody can force a Celebrity like a movie star to update contact information but a specific Fan Service can be setup under the control of the Celebrity thus getting both Privacy and Convenience.). Two major advantages are introduced above convenience.
Firstly you do not know or need to know contact information for your relations. A CLIENT have his own Relation database and TP know how to contact these relations. CLIENT decides the channel type (email, voice, postal mail) and send it to TP together with the internal reference. TP takes care of delivering the message including locating the best channel to use.
Secondly the message delivery is according to the Receivers wishes. Not only can the receiver decide the exact level of anonymity related to communication channels available and identifiable information rendered. Using TP services the sending CLIENT can respect the receiving CLIENT by putting the receiver in control. Since CLIENT can not know the actual state of mind and the situation of the Receiver, CLIENT can be violating Privacy alone, by the choice of channel and the point in time, CLIENT chooses to use it.
Receiving CLIENT can through RELATIONS and GROUPS setup priorities in the Inbound Communication filtering and routing to match the exact desired situation across relations, sender and receiver situations and communication channels.
Anonymising Channel Identity
A temporary solution for Privacy-enhancing Communication Channels is by to acquire channels anonymously using support from TP. Wireless devices line mobile Phones, PDAs etc. Virtual Channels like email, Internet Gateway, WAP Gateway, SmartCards for Satellite or wireless Interactive TV.
A central issue about anonymization of channels without intermediation is the problem of linkage. Since the logical target of an anonymous non-intermediated channel is known to all COMPANY with whom the channels has been in use the Channel Identifier can act as a linkage device between COMPANIES.
Rollover will be the best way to minimize damage. Key about Rollover and anoymised Channel Identities is to manage the Rollover in such a way that no residual linkage is possible. This means that both All anonymized Channels has to be rolled simultaneously ensuring that COMPANY loose trace information.
For instance if CLIENT has a login a website where he uses an anonymized Channel. Even if the anonymized Channel is Rolled the basic login will establish link between the former Channel Identifier and the new one. This information can be sold and linkage established the consequence being canceling out the effect of rollover.
Personal Services
Multichannel Answering Service
For the individual CLIENT a major advantage of the TP Service is the access to an answering service covering multiple (if not all) communication channels no matter physical location, type or service provider involved.
Personal Address Book A CLIENTS RELATIONS and members of his Groups are his Address Book, which can be online accessed or exported and stored in any device CLIENT use. This can be an email address book, a Mobile Phone register, a wireless PDA etc.
The main advantage for any CLIENT is that this Phone Book is Receiver Maintained. If a CLIENT changes contact information al other approved CLIENTS will receive automatic updates to their personal address books without any effort. A personal address book is always updated.
Even for friends there are strong incentives for virtualization of communication channels. Primarily for redirection purposes. When combining Access Control Filtering with redirection CLIENT can have a one virtual phone number with one answering services face towards RELATIONS and have multiple physical phone numbers and alternative voice paths behind. This is an implementation of an individual permanent telephone numbernumber. Especially when moving, changing jobs etc. this is very advantageous. First time it can be advantageous to start uploading the existing Address Book.
A specific Identity will be created for each personal contact that is member of a CLIENT Personal Address Book without being a registered TP CLIENT. This is necessary for the inbound control and for notification of changes on behalf of CLIENT.
Private Data Access Control
CLIENT can set-up different profiles related to roles, VIDs etc. These can be accessed either by CLIENT push (always presented or presented on request by CLIENT) or pull mechanisms (requiring specific request from receiver).
Suggestion House
The Suggestion House is reversing the Direct Marketing/sales process to create an alternative to SPAM. Instead of CLIENTS being bombarded with sales signals the Suggestion House is the place where Sales messages are going. When - and only when - CLIENT enters this virtual Suggestion House, he is open to suggestions.
Central is that Suggestions are qualified and separated clearly for CLIENT by TP based on the Source on all the available information.
Source of Suggestion (both company or agent) the relationship between CLIENT and SENDER the SENDER Spam history
Quality of SENDERS suggestions
CLIENT specific Suggestion Evaluations
SENDER Suggestion Evaluation index (all CLIENTS)
CLIENT ACTUAL wishes Is the suggestion a response to a specific CLIENT request for offers ?
Is the suggestion based on access to PRIVATE Data Have the CLIENT indicated any special interest when entering Suggestion House
CLIENT can setup his Suggestion House as he pleases. It can be divided into separate rooms where different kinds of messages is directed. CLIENT is in control of inbound messages from the filtering function and from the Agent Access Control.
By default there is a number of standard rooms related to important aspects of Individual life. These include Education, Job, Finance, Vacation, House Decoration and maintenance, Children, Hobby, etc. These rooms are pre- configured with access to information sources, agents to help analyze needs, Product Catalogues etc.
On top of this is a Customizer to build the setup according to CLIENT wishes and a Help service that is individualized so that it is sensitive to the user technical level and preferred workings. When the help function suggest to help the CLIENT setup or refine the Suggestion House CLIENT will for instance be able to respond either "Yes", "Later", "Tell me more", "III take care of it myself., and "Too Complicated".
See figure 27.
TP supports the Privacy Enabled process from Suggestion to delivery. Central is the problem of containing detailed Private Data from Identification. For a specific purchase CLIENT give information that are more detailed than is necessary and desired (by CLIENT) for the continued relationship. Key to handle this problem is the separation of identities.
If the suggestion originates from a existing COMPANY/CLIENT Relationship then the suggestion process is a natural continuation of the relationship and as such the purchase is done using COMPANY specific VID. In the other end an Agent given access to Private Data Analysis and counseling is seeing one Identity. The actual delivery is done under another One-time-Only Identity. The main purpose is to contain Private Data and still ensure Agents interest of fees etc.
One key advantage is that so-called Selling Agents representing suppliers can participate on equal terms with Customer Agents having no supplier status. CLIENT is in control by accepting Agent access to Private Data - optionally on a rental basis.
A suggestion does not have to be purchased to deliver value. CLIENT can add the suggested item to his Wishlist (with reference to the original suggester to ensure the fee when delivered).
Promote registered sites to Clients TP mediates CLIENT ratings of COMPANY to other and new CLIENTS.
TP will act as an independent party in the market placed but CLIENT ratings will have a strong impact on COMPANY success.
TP will establish a Collaborative CRM meaning that evaluation of a COMPANY practices plus the existence of signed principle documents will be used to rank COMPANIES to non-customer CLIENTS.
Especially in WAP or other small bandwidth devices getting and maintaining a high rating will be a strong criteria for success for COMPANY because this will increase likelihood CLIENT choosing COMPANY as supplier.
Interest Lists
When ever CLIENT see an interesting suggestion CLIENT can add this to an interest list for later checking and potentially transferal to a Wishlist or a Shoppinglist.
See figure 27 reference numeral 110. CLIENT is looking through Suggestions marking interesting ones for the Interest List. He can ask to receive advice from Advice Agent accessing either CLIENT Private Data or by Permission getting gift suggestions for RELATIONS.
Wish list
CLIENT create Privacy-Enabled personal Wishlist located in the Private Data
Storage. Access is controlled based on the Personal Address Book. See figure 27 reference numeral 130.
Main input will come from the Suggestion House through the Interest Lists where CLIENT picks up wishes as he goes (figure 27 reference numerals 20 and 30).
Reserved wishes are copied to a shopping list (figure 27 reference numerals 50).
A main use of Wish Lists in connection with Events (figure 27 reference numerals 160). RELATIONS relevant for the EVENT is invited to use the Wish list as a coordination tool to get ideas, for several CLIENT to group for at purchase and for co-ordination of which wishes has been reserved.
For each Item a link to the origin of the suggestion and link to another RELATION as reservation for purchase is maintained.
CLIENT can appoint one or more RELATIONSs as WISHLIST COORDINATOR. Co-ordination of wedding gifts or parent supervising lists for children adding items is two examples of use.
A WISHLIST COORDINATOR can use AGENTS to PRIVACY enabled analyze the Private Data of CLIENT to generate new Ideas figure 27 reference numeral 36 or get additional information about the Wish such as sizes, color etc. from the Adaption Agent (figure 27 reference numerals 220, 37 and 39) . Dynamic Shopping Lists
A dynamic shopping list is related to a CLIENT, a Group of CLIENTS (a family or an event) and optionally an event. See figure 27 reference numeral 140.
Each Client will have relation with multiple SHOPPING LISTS in order to separate purchases depending of purpose and timing. At point of purchase list can be combined into one operational list. A shopping list can be forwarded to a Price Agent (figure 27 reference numeral 20) for getting quotes and suggestions. A shopping list or single items can be forwarded to COMPANY for purchase according to the full Privacy Trade Service (figure 27 reference numeral 50).
Using a mobile device shopping lists is available across different shops.
Event Management
Based on Personal Address Books and Wishlists a special event management service is created. The arranging CLIENT creates an event and creates links to all participants. See figure 27.
Now very advanced personal services can be created:
a) Invitations, news co-ordination, participation confirmation etc. is easily distributed and controlled. This can be directly linked with CLIENT calendars across different calendar formats since TP can act as format converter.
b) The arranger CLIENT can have access to personal likes and dislikes of each participant without having to keep updated files or calling everyone. This ranges from being a vegetarian for meal selection to seating assistance based on jobs, interests and even prior events. Meal selection services are linked to recipe libraries and can feed into a dynamic Shopping Lists that can be accessed at point of sales in shops etc.
c) Arranging CLIENT can for each relation maintain personal knowledge of a participating CLIENT regarding likes/dislikes, ideas, etc. d) Participants can coordinate gift purchase based on the personal Wishlist. Gift decision discussions, money collection, transfer of ownership of gifts and warranties is serviced by TP. Please note that a Special Wishlist co-ordinater can be appointed through the RELATION link (see figure 2 reference numeral 100),
e) Event Dynamic Shopping lists support group shopping. If each shopper has access to the same list through for instance a mobile wireless device they can mark items in real-time and across different shops. Using on e of the well- known mobile devices with built-in bar code readers will greatly enhance this service.
Agent Services
Private Data Analysis As figure 27 shows, in some situations customers want to make some Private
Data available for analysis in order to get relevant customized suggestions. This can include finance, house, style, clothes, literature, hobbies etc.
CLIENT will create a Virtual identity towards each Agent in order to control access to data.
CLIENT selection of Agents is based on their price requirements and history. TP will ensure Agent receive his fee when purchase is done (using TP services) and maintain an individual and allover CLIENT evaluation of Agent Services.
CLIENTS will over time build loyalty with specific Agents that are used repeatedly because of quality of suggestions.
Customer Profile rent
Agent access to Private Data can be subject to fee payments from Agent to CLIENT. New Agents do not known to CLIENTS can rent access to Private Data under CLIENT approval. CLIENT can show some basic Profile and TP can verify purchase level for Agents to bid.
CLIENT can be paid on basis of time and prifle access richness. Just as CLIENT can say no so can the AGENT by stopping to pay rent.
Reverse marketing - Agent marketing
Multiple Agents can be involved. See figure 27.
CLIENT decide to build relations to one Advice Agent (figure 27 reference numeral 210) specializing on Suggestions based on Private Data. Advice Agents is separated in rooms in the Suggestion House according to specialization. Only Agents adhering to the Privacy Principles will be allowed to register for access to CLIENT Data.
Another PRICE Agent (figure 27 reference numeral 145) is then used to track the best offer for a specific Suggestion. This Agent only knows which Item to get bids for.
Finally a third type of Agent is the Adaptation Agent (figure 27 reference numeral 220) which is used for discussing customization of the Item to purchase with the suppler.
Each agent is important to separate issues and data access.
Community Services
This invention works implements a rich list of online and off-line community services.
Basic Trade services
The full list of Privacy Trade services are available for interaction between the Community and CLIENT. This includes the use of purchases down Value-Chain for anonymous CLIENT VIDs. One-time only Id for Identified Community Trade
Communities are building on close relationships and therefore can involve semi- of fully identified VIDs. To protect CLIENT Privacy and COMMUNITY Customer contact a One-time-only VID combined with an intermediation service is implemented for transactions and interactions involving partners to the COMMUNITY.
The VID has to be one-time-only if CLIENT is identified by the COMMUNITY because of risks of linking CLIENT identity to the VID related to the partner.
The one-time-only VID are generated on the fly and is standard prepared for safe trade involving anonymous sametime payment and delivery intermediation. Communication channels such as email, telephone or chat with supplier can be available depending on the wishes of the COMMUNITY. Guarantee or other post- transaction services likewise.
One-time-only VIDs will require setup of encryption keys between TP and the Supplier to handle Delivery Address exchange and intermediation and payment agreements. These keys do not have to be one-time-only as they are specific for the supplier and not containing or use to protect identifying information about CLIENT.
This service will be able to take care of all aspects of the trade including a final transfer of a fee to the COMMUNITY account. This fee is an agreement between COMMUNITY and supplier for the COMMUINITY to setup a sales channel for supplier.
TP can offer a service where suppliers registered with TP can be offered to the COMMUNITY or even managed by TP.
Anonymization of CLIENTS will open for much easier trade relations where COMMUNITIES can concentrate of their core business without risking suppliers starting to contact CLIENTS without paying the fees to the COMMUNITY. CLIENT does not necessarily need to know the supplier further protecting the interests of the COMMUNITY.
Auction Service As figure 24 shows, a generic privacy auction service for Online Communities, portals, societies etc. combine Delivery Control, Payment, Communication intermediation, two-way anonymous signature and Trusted Party Service.
It is based on the same principles as the Community Secure Trade (figure 23), but in addition to this is added the complexity of a two-way anonymous process.
In addition to this the Auction Community can setup the rules for with kind of interaction between Buyer and Seller is available according to the trade process. Also the Auction Community can setup a default Agreement that both Buyer and Seller has to accept anonymously in order to continue the trade process.
Transactions initiation will be dependant on the Auction model. CLIENTS can be previously unknown to TP to which TP will need to create One-Time-Only VIDs to establish Privacy. Both BUYER and SELLER can prior have registered with TP and already be using a VID for the specific Community. Depending on the type of service the VIDs can be identified or non-identified according to the wishes of CLIENT. Seller or Buyer does never need to know each-others identity. TP can in this setup be the only party knowing the identities of the players thus adding trust to the Auction Community.
Which communication channels are open can be customized by Auction Service. In one end is a fully open market place only focussing on matching supply and demand for anything. In the other end the actual trade is fully intermediated without free communication between CLIENTS. In the case of full Intermediation only specified messages can be transferred between CLIENTS without them being able to communicate. With Privacy Payment, Two-way Privacy Signature and Privacy Delivery an Auction Trade can take place without the two CLIENTS ever revealing their identity towards the other or the Auction site. This can be because the Auction site require this as part of their business case (for instance a job matching service) or because either CLIENT wants it so due to the nature of the item in question (tipping the police etc.).
Central is the advantage that the Auction site itself does not necessarily know either CLIENT but only acts as the Branded market place getting a commission on deals. CLIENT is in control.
TP acts as the Trusted Party in the Deal on behalf of the Auction site.
In the communication phase TP Privacy Communication Services can be used to negotiate anonymously and use Privacy Agreement to create a formal agreement. For most Auctions the agreement will be in the form of an invoice (figure 24 reference numeral 10).
BUYER CLIENT then deposits payment and TP confirms this towards Seller and ACUTION COMPANY (figure 24 reference numerals 10 to 40). In some Auction models a BUYER CLIENT will have to deposit Payment with TP when bidding.
This deposit can be cancelled/returned to BUYER CLIENT by AUCTION
COMPANY if for instance another BUYER has bid higher (figure 24 reference numeral 15).
Seller then ships the goods or deliver electronically using Privacy Delivery (figure
24 reference numerals 50 and 60).
When Shipper prove delivery the right to the payment transfers to a deposit in Seller name (figure 24 reference numeral 70). Depending on the type of Service Buyer has a right to verify the goods delivered before Payment is released. This can either be upon delivery or within a fixed time period after delivery unless Buyer object due to problems (passive acceptance) or on specific accept from Buyer within certain timeframes (active acceptance) (figure 24 reference numeral 80).
In case of disagreement, TP can enable Dispute Arbitration - a third identified party to act as independent arbitrageur. If this does not solve problems then legal proceedings can start. This can be totally anonymous but at any point CLIENTS themselves can decide to reveal identities or ask TP to do it simultaneously.
The fee for the Auction Site and for TP can be added to the Payment from Buyer or reduced from the payment forwarded to Seller. Additionally there is an optionally Fee Deposit from Seller upon registration item in question at the Auction Site. This fee can be released to AUCTION COMPANY simultaneously with release of Payment to SELLER.
Membership and COMMUNITY services
The COMMUNITY can outsource most basic COMMUNITY functionality to TP.
Especially the heavy membership management part including membership payments (recurring payments), security (identification and authentication) and information management is simple add-ons to the basic TP services.
As an example the COMMUNITY receive a list of one-time-only Membership Tokens. Whenever a new member to the COMMUNITY through any means has been approved to become a member the CLIENT can supply the Membership Token. When CLIENT has been accepted for membership an automatic registration as Member of the COMMUNITY is initiated together with membership fee payments added to the list of recurring payments after confirmation by CLIENT. COMMUNITY costly setup and management of communication channels and membership payment collection is significantly reduced. Since TP is taking care of identification and authentication procedures the COMMUNITY IT complexity is greatly reduced because they can use a limited strong authentication access channel directly with TP instead of a more exposed weak authentication only recurring simple passwords etc. Since TP already has an authentication service in place the full TP services are available to COMMUNITY members.
Business Services
This invention opens up for a new type of long-term anonymous customer relationships where customers are in control. If COMPANY make active use of this they are likely to get better customer relationships because they can now focus on servicing customers the best way with customers being much less afraid that COMPANY can abuse information.
In addition to this a new form of very advanced services are made available to COMPANY. Due to history and legacy many companies have big problems coordinating a single view of a customer across all interactions. But since all interactions for TP CLIENTS pass through a single filter outside COMPANY legacy systems a full history of interactions can be made available for the mutual benefit of both COMPANY and CLIENT. A central issue is still that TP does only know interactions has taken place in a certain channel at a certain time but COMPANY and CLIENT can encrypt communication so that TP does not know contents.
Also since all trade and payment transactions go through the same filter COMPANY and CLIENT administration can be outsourced to TP or a TP partner as an integrated part of the relationship.
Customer Relationship Management Services
Security and authentication
Because TP work with strong Identification and authentication procedures COMPANY can outsource these procedures to TP at considerable cost savings as compared to how they can do it on their own accord. More importantly since COMPANY cannot do the Identification themselves anonymously, they need a trusted party to establish a secure identification and authentication path when dealing with anonymous virtual identities.
Using a combination of Identified and anonymous virtual identities TP can offer to handle the identification and authentication of the full COMPANY customer portfolio.
Privacy Loyalty Relationship Management
When handling realworid anonymous shopping normal cash unidentified payments are the simple solution. However this solution does not support development of relationships and customized services.
This procedure enables anonymous linkage with a COMPANY Customer Account for realworid in-shop trade focussing on supporting high-value Customer Loyalty Programs. While CLIENTS achieve Privacy Protection and total control both COMPANY and CLIENT gains from the higher value delivery in the virtual relationship. CLIENTS will have much lover threshold to give detailed Private Data when they know that they are in control and can pull out again.
An even bigger advantage are enabled for COMPANIES under legislative restrictions for analyzing customer data. Because former sensitive data are now anonymized they gain access to analyze customer transaction data and use this to create customers services and suggestions. With national differences these industries can be found in financial business, insurance, retail etc.
The problem of identifying the correct virtual CLIENT Account with COMPANY can be solved in many ways. CLIENT must identify himself towards TP though COMPANY communication channels without COMPANY receiving anything but the VID and the necessary payment confirmation. Critical is that no identifiable information or data that can be used for cross-COMPANY linkage can be exchanged. Even an encrypted string that does not change can world as linkage agent and violate privacy. A general embodiment works as described in figure 17. Reference numerals 10 to 50 in figure 17 involve the identification part for COMPANY to offer customized service. Reference numerals 60 to 80 in figure 17 cover the purchase verification and payment procedure.
When CLIENT enters the store, COMPANY (figure 17 reference numeral 10) Generates a Transaction Id and sign this with the COMPANY Private Key.
This message is transferred to a TP issued SmartCard able of doing
Cryptographic calculations using standard mechanisms like a SmartCard Reader or a wireless communications device such as a WAP Mobile Phone, A device able to communicate infrared or other standards (like Bluetooth) (figure 17 reference numeral 20). CLIENT Sign the message with a Token Client Identifier (an Identifier of the Specific SmartCard) and encrypts the message using a random symmetric sessionkey. This message together with the Sessionkey encrypted with TP.Pu is then transferred back to COMPANY.
COMPANY can use the TP Public Key TP.Pu to locate TP using a standard X.509 library and send the message over a communications networks such as the Internet to TP (figure 17 reference numeral 30). TP receives the message and decrypts the encrypted sessionkey with TP.Pr (figure 17 reference numeral 40). TP extracts the symmetric sessionkey and decrypts the message to get the Transaction Id, the Company Signature and the Token CLIENT Identifer. TP Verifies COMPANY and identify CLIENT using the Token CLIENT Identifier. TP then acquire (or generate a new if none valid) the VID related to (Company, CLIENT). The Pair VID, TransactionKey is sent as a Coded Message to COMPANY and Virtual Identification Link is established.
CLIENT locate the goods or services wanted. COMPANY can look up the VID and offer customized service accordingly. When CLIENT is ready to checkout, CLIENT can use the SmartCard to link to the Transaction Id (figure 17 reference numeral 50). The procedure reference numerals 10 to 50 can be done at checkout but then COMPANY has no information to customize service.
When the electronic invoice and related warranties is ready CLIENT receive in his SmartCard payment request. CLIENT Signs the Payment Data Part end encrypt the signature with TP.Pu (figure 17 reference numeral 60). COMPANY sends the Electronic Invoice together with the encrypted payment authorization to TP (figure 17 reference numeral 70). TP (figure 17 reference numeral 80) decrypts the payment autorisation and verifies the electronic invoice contains the related warranties. TP Reply with a Payment Transaction Code. Payment is carried out according to agreements between TP/CLIENT and TP/COMPANY respectively.
Secured Privacy Spaces
Because TP incorporates both accountability and privacy dedicated secured spaces can be setup where TP provides the gatekeeper access based on credentials. This can for instance be an online playground for children where only identified children an enter with parental accept. Here the child can be presented to a learning program that is both secured from un-identified access by for isntance pedophiles, customized to the childs age and special needs, under parental control and privacy-enabled.
Secured Spaces can be used for a multily of purposes setting up access criterias based any credential.
Multiple COMPANY loyalty Programs
Partner - based loyalty programs with multiple COMPANYs involved are increasingly used to build loyalty towards a broader range of products. This is a direct threat to Privacy because these programs are based on cross-company linkability and collection of profile information. Major incentives can be involved to get CLIENT to accept participating in such a program. In order to facilitate such solutions without violating privacy TP is offering a service where multiple COMPANIES can add loyalty points to a joint program.
This is handled internally with TP on behalf of participating COMPANYs using an additional CLIENT bonus account.
Maintaining customer data/profile information
Corporate customer Internal Identifier is a token information used in the Corporate
Customer Databases which serves as the unique anonymous identification for customers.
When requesting CLIENT attributes not allowed for this COMPANY setup a list of ATTRIBUTES
Attribute Already stored at Action
Age Profile Allow / Deny ?
Haircolour Not stored Deny, Answer for this COMPANY only?,
Answer and encrypt for Identity/Profile/Base Privacy Storage?
Anonymous Questionnaires / votes access control
For less sensitive questionnaires etc. TP can offer a simple anonymisation service.
COMPANY provides TP with a list of VIDs that should participate in the vote and send a message to CLIENTS through TP. TP set-up a one-time-only authorisation scheme which each CLIENT can use only once access a questionnaire form located outside TP control with either COMPANY or a questionnaire analysis outsourcing service. TP guarantees that each CLIENT has accessed the questionnaire only once but does not have access to information rendered. TP can ask CLIENTS that have not voted to vote.
Customs, VAT and other reporting Handling of Customs and VAT payment issues across borders etc. depend on the countries of both Buyer and Seller. TP intermediation is necessary in order to calculate these values.
Public reporting is a service that TP do on-the-fly as part of the Privacy Payment Service. All necessary information is available in electronic format.
All sorts of statistical reporting regarding trade and exports can be done on behalf of COMPANY since TP has most of the information. If CLIENT is acting on behalf of a Company Role this service is also relevant to the Buyer side for Import reporting etc.
If all Company or CLIENT (in a Company Role) Trade is done through or reported to TP, then TP can offer a full-service Public Reporting thus heavily decreasing barriers to New startups or just outsourcing administration.
Total Business Service
TP can act as the central core in a Total Business Service. Since Privacy require
TP to intermediate all processes between a CLIENT and a COMPANY, this intermediation can include a total service concept related to the subset of COMPANY customers which are TP CLIENTS.
Since a CLIENT can choose to be identified towards COMPANY and authentication of these customer can take place at the TP module installed at COMPANY side this service can cover the full range of customer making TP a one-stop service. Companies consist of Individuals with different roles. As such a COMPANY is just another virtual Group of CLIENT Roles. All Customer, Partner and Supplier relationships are different virtual groups entangled in the COMPANY Group.
When employees register as CLIENTS the basics of a full workforce automation solution is possible.
Firstly basic Office Automation intra-company and across Company partnership boundaries using Personal and WorkGroup Automation service. This include communication, trade, project planning and support etc.
In collaboration with providers of eCommerce Trade Servers implementing OBI or other Commercial Trade Standards a total eCommerce infrastructure including security and B2B and B2C integration can be offered.
In collaboration with CRM system providers a total CRM handling package can be offered.
When adding collaboration ERP vendors a full administrative package is available.
In collaboration with Shippers outsourced Supply Chain Management can be achieved.
Product Catalogue Presentment
COMPANY Products can be made available for Agent Services as part of the Trade Server integration thus facilitating availability in the marketplaces.
Government Services
Government services has a general tendency to increase in scope and depth of services and information required in the name of public good. The cost is a significant threat to Privacy for the Individual.
Just as for commercial relations this invention makes it possible to get the best of best worlds - both Privacy and detailed service. The major requirement is that Government and Public services acknowledge that Privacy is a basic right even from public services.
The general principles of identity atomization, non-. linkability and individual knowledge control applies just as well for most public services as they do for Private services. For some even more.
Some special public services require strong identification such as criminal records and health care.
But anonymous proof of credentials or proof of non-existence of negative credentials such as criminal records is sufficient to most cases.
For many uses anonymous interactions are even to be preferred. Voting and building DNA registers for criminal and disease purposes are strong examples.
Reporting and VAT/Customs collection
When TP is intermediating trade processes sheltering CLIENT identity from
COMPANY, problems related with public reporting requirements is introduced. TP introduce - depending - on national requirement introduce Public reporting and tax payment services related to the trade processes.
Key to this reporting is to boundle payments accross multiple CLIENTS and potentially multiple COMPANYs. The main requirement being access to control verification of reported totals.
Voting
An anonymising service like TP will open up for new types of digital voting services. Central conditions is that TP cannot tamper with voting procedures. That CLIENT remain anonymous and sure that no-one can link their vote with their identity even when TP act in combination with a governmental operation.
Using non-traceable One-time-only certificates a CLIENT can collect a vote token only once and get anonymous access to the voting booth delivering this token. The principle is based on division of control functions. TP ensure that each CLIENT vote only once by authenticating anonymously and zero-knowledge towards a Public Token control service. Using this Token CLIENT can go to the vote booth outside TP control and provide the One-time-Only certificate and give both physical and virtual votes. TP can supply government with a list of which CLIENTS have voted which can be verified against the total number of votes. TP can prove that each of these CLIENTS have voted by having them sign a statement confirming that they have voted.
Sensitive questions - HIV etc
Anonymisation services are very useful in public context for services concerning sensitive questions that is related to fear, disgrace, shame. This can be sexual related, reporting criminal incidents anonymous etc.
Please note that CLIENT is free to use alternative informational-theoretical anonymisers for these purposes.
Anonymization of Public information collection
DNA register
There is regularly strong debates on the subject of collecting information on individuals for proactive crime protection, disease control etc. This is naturally a heavy invasion of Privacy and as such unacceptable due to obvious abuse possibilities..
When this cannot be avoided last solution is to anonymize the Identity behind a DNA profile so that only the ones who can be proven to be in connection with a crime will be identified.
In principle this is simple.
A DNA sample is numbered and linked with an anonymous identification. This can be done using the same functionality as for Realworid Loyalty Programs. The government function create a sample identifier and asks to get this sample linked to the CLIENT. CLIENT authenticates zero-knowledge towards TP and TP confirms with a signed statement that traceable identification is created.
The combination of the sample number and a special VID is stored with TP. The unidentified numbered sample is stored and can be used for analysis purposes.
When a crime is committed evidence on the crime scene can be matched against the anonymous DNA samples. The procedure when match is established can involve anonymous legal presentation before identity is revealed.
Scientist can get access to analyze DNA without being able to trace the DNA back to the originator behind the DNA. Special rules can be set up regarding release of identity under different circumstances.
Car registrations
Since a car number plate is linkable information in a world respecting privacy the
Car Registration should be anonymous but traceable in the same way. Simple offences like parking tickets etc. does not necessarily lead to identification but fines can be paid anonymously.
In order to provide repeat offence control some sort of linkability across cars can be established without violating Privacy.
Separation of Public Authorities Governmental services are expanding in reach to a point where government can build a total profile of all citizens. This is a situation worrying many. One alternative that this invention can supply is to dis-integrate individual registrations into multiple non-linkable identities. This way one public employee does only have limited access to information about the individual.
In cases where public authorities needs information across offices this can in many cases be handled through anonymous attribute certificates. System for Establishing a Privacy Communication Path
The system according to the preferred embodiment of the present invention for establishing a privacy communication path is shown in figure 32 and is designated in its entirety by reference numeral 80. The system comprises one of more General Authentication Devices (shown in figure 33) to provide the CLIENT with control over Private Keys located in a SmartCard (shown in figure 33 as reference numeral 100) and ability to do Zero-knowledge Authentication. Further, the system comprises one or more Communication Channel Providers (shown in figure 32 as reference numerals 40, 50, 60, and 140) to establish Privacy Communication Channels or a virtual identifier intermediating a Physical Communication Channel as a Privacy Communication Channel toward one or more Authentication Units (figure 32 reference numeral 70) acting as an intermediary to provide CLIENT with the ability to set up a rule based communication routing scheme across communication channels and multiple Virtual Identities each with a set of Virtual Communication Channels and the ability to Sign Legally binding agreements and authenticate towards any third-party based on a single sign-on identity.
The single sign-on identity is provided by one or more ID Units (figure 32 reference numeral 80) issuing SmartCards (figure 33 reference numeral 100) for the General Authentication Device (figure 33 reference numeral 80) and storing Identifiable information according to Basic Accountability Principles. The system according to the preferred embodiment of the present invention further comprises one or more Device Authentication Units (figure 32 reference numeral 170) with the ability to provide a certificate to a General Authentication Device (figure 33 reference numeral 50) to authenticate online or offline towards any device and verify said certificates to protect against theft or fraud. Furthermore, the system comprises one or more Trust Units (figure 32 reference numeral 90) intermediating two or more Virtual Identities of different CLIENT or Company into Relationships providing storage, profile information encrypted under the control of CLIENT or Company, access to relationship information, relationship services and protecting Authentication Units from knowledge related to virtual Identities.
And finally, the system according to the preferred embodiment of the present invention comprises one or more Integration Units (figure 32 reference numeral 100) to provide companies with a single interface to Company Relationships with CLIENTS or other Companies
The system provides CLIENT with full Privacy Control of CLIENT Identity and information related to CLIENT only subject to basic Accountability principles.
A CLIENT can chose a minimum set-up where no Units even in collaboration can violate CLIENT Privacy except for the basic Accountability Principles. A CLIENT can chose a maximum convenience set-up in which both identified and non- identified relationships can be incorporated together with all relevant communication channels to provide CLIENT with full control of communication and relationships with minimum but not zero linkability.
According to the preferred embodiment of the present invention both an Authenticating and a Trust Unit are build around an IP-Proxy combined with IP- Mapping routers. Each Communication channel is based on a separate mapping unit such as an email gateway mapping email addresses to ensure that no linkable identifiers are present.
Basic Accountability Principles The critical step concerning accountability is when status of a CLIENT is changed from non-identified to identified.
Minimum accountability is achieved by ensuring isolation of Identity and related information under CLIENT control combined with a un-broken provable route to identification stored at an ID Unit requiring minimum an algorithmic operation by a public institution according to law and a subsequent algorithmic operation by an agent of CLIENT. The ID Unit has no knowledge as to the activities of CLIENT except for holding a number of multiple encrypted pieces of identifying information using different asymmetric encryption keys of which at least one is a public key of an encryption pair related to either an appropriate legal Institution such as a court or the Individual.
The encrypted pieces of identifying information should in addition to an external encryption key be encrypted prior by at least one encryption key related to an agent of CLIENT to verify individual fundamental rights is not violated.
CLIENT can thus perform a traceable voluntary identification whereas a not- voluntary identification will require a proper legal procedure protecting individual rights.
This procedure of an Agent of CLIENT is to ensure a last Privacy defence in a worst-case scenario where for instance control of courts is not under democratic control and transferring out of physical reach or preferably actual deletion of identifiable information can not be carried out prior to a worst case scenario taking place.
Basic Key Structure
According to the preferred Embodiment CLIENT generates a ID key pair and provides the ID Unit with proof of Identity for instance by signing the Public Key (Id.Pu) using a digital Signature key (Cl. DS.Pr).
CLIENT then generates an asymmetric key pair for each Authentication Unit and forwards the public key CI.Pu to the ID Unit together with a message linking the Public Key of each Key Pair with the ID key pair.
According to the preferred embodiment of the present invention the SmartCard shown in figure 33 designated by reference numeral 100 is accessed through the General Authentication Unit where the Private Key part of any Identity related to CLIENT is accessed.
CLIENT can create a new Virtual Identity in any of the Authentication Units and use this to Create a new Relationship through the Trust Unit. CLIENT signs a link between the Public key of a virtual Identity with the key specific to the Authentication Unit (Cl.Pr) to ensure the un-broken traceability link back to the identifying information in the ID Unit.
CLIENT receives a verified proof of ownership from the Authentication Unit
(Sign({CI.Vir.Pu,CI.Pu},Au.Pr) in order to be able to prove ownership towards third- party.
According to the preferred embodiment of the present invention a Virtual Identity as presented by an Authentication Unit to a Trust Unit can consist of a set of signing, authentication and encryption keys (CI.Vir.DS.Pu, CI.Vir.Auth.Pu, CI.Vir.Enc.Pu). The Private part of the Signature and Authentication keys (CI.Vir.DS.Pr and CI.Vir.Auth.Pr) are only known to the Authentication Unit whereas the private part of the Encryption key (CL.Vir.Enc.Pr) is known only by CLIENT through the General Authentication Device.
The encryption key known only by CLIENT is providing the core protection from a Man-ln-The-Middle attack in a two-way anonymous Relationship. CLIENT can always have any third-part verify that the correct Public key is made available to the Relationship Party at point of Relationship initialisation.
This principle implements a no-mans land between an Authentication Unit and a Trust Unit. The Authentication Unit protects the Trust Unit from information linking a relationship to the CLIENT part meaning that the Trust Unit knows CLIENT as a number of non-linkable Relationships not differentiable from Relationships related to other CLIENTS. The Trust Unit prevents the Authentication Unit from knowledge about the Relationship contents. According to an alternative embodiment of the present invention Private Keys (not the private SmartCard Key) can be transferred between Smart Cards and stored safely in a backup locating provided they are encrypted with a public key decryptable by a Private Key accessible through the SmartCard. No Private key is in clear text outside the SmartCard.
A General Authentication Device (shown in figure 33 as reference numeral 50) According to a preferred embodiment of the present invention a privacy communication path is constructed around a General Authentication Device (shown in figure 33) incorporating a user interface (shown in figure 33 as reference numeral 180) and operation able to communicate through a reader (shown in figure 33 as reference numeral 110) for a tamper-proof SmartCard (shown in figure 33 as reference numeral 100) able to communicate with the Device and as a minimum store a set of data elements and perform standard operations and cryptographic algorithms such as generate keys, random numbers, zero-knowledge authentication.
According to a preferred embodiment the General Authentication Device is characterised such that any persistent identifiers are physically separated from any external communication channel and only accessible under control by the SmartCard. Such device can be achieved by incorporating an isolated area (shown in figure 33 as reference numerals 120 and 130)) able to store persistent identifiers and optionally the ability to perform cryptographic algorithms.
Such a device can for instance be in the form of a PDA, Mobile Phone, satellite set-top box, a workstation, a combination such as of a mobile unit and a workstation, a lap-top computer or other device able to establish wireless (shown in figure 33 as reference numeral 170) or cable based communication channels (shown in figure 33 as reference numeral 160). According to the preferred embodiment of the present invention the General Authentication Device is able to establish a communication path through a Communication Channel Provider to an Authentication Unit and perform a Zero- Knowledge Authentication procedure with the Authentication Unit. The Authentication Unit subsequently authenticates the communication path towards the Communications Channel Provider without providing any persistent device of CLIENT identifiers.
According to the preferred embodiment of the present invention the Authenticating Unit can require the General Authenticating Unit to authenticate Zero-knowledge towards an ID Unit to check for revocation of the SmartCard or other fraud protection.
The Communication path can be based on a large variety of network protocols such as Wireless in the form of Bluetooth, Infared, GSM, WAP, GPRS, Wireless IP and direct cable-based over ADSL, ISDN, serial cable links etc. Any protocol able to carry IP-traffic is well suited for such solution.
According to the preferred embodiment of the present invention network protocols incorporating an identifier but not technical dependant on the identifier to be persistent identifier the General Authentication Device is provided with means to generate or access random or other non-persistent device or CLIENT identifiers. This, for instance is the case in the most used network protocol where an IP- address can be dynamically assigned to a session using a DHCP. The non- optional MAC address is not from a technical viewpoint required to be globally unique except within the local surroundings of the network. The MAC address can be randomly generated or provided in any session from the Authenticating Unit for subsequent use in the next session.
According to the preferred embodiment of the present invention the real MAC address to protect against theft etc. is located in the isolated space (figure 33 reference numeral 120) isolated and only presented to a Device Authentication Unit without providing any knowledge or persistent identifier regarding CLIENT. Other ways to circumvent is reuse of an address pointing at the Authentication Unit as a gateway.
According to the preferred embodiment of the present invention the future Mobile IP standard is incorporating the necessary principles for integrating the above modifications. This also covers even an always-on Mobile Phone as long as a session-switch is applied regularly. The telecom provider will know where a Mobile Device is, but by incorporating these principles the communication is Privacy- enabled because the telecom provider only has a session identifier authenticated by an Authentication Unit. The Telecom Provider does not know persistent identifiers of neither CLIENT nor Device and yet still have both a loyal customer, protection against theft and is able to provide advanced location based services simultaneously.
In case of a crime carried out near to a Mobile Phone there is a route for the police to both establish contact to the relevant CLIENT and a route to accountability (identification) according to the Basic Accountability Principles.
According to the preferred embodiment this principle of delayed authentication works across location - Home, Mobile, Work, Foreign Workstations, In Store and even through locations CLIENT has never before had any contact with because an Authentication Unit can instantly intermediate and establish a trusted connection, access to payment channels and a route to accountability.
According to preferred embodiment a General Authentication Device will have a mechanism for CLIENT to Authenticate towards the SmartCard using biometrics, passwords, pin-code or any other authentication mechanism. The authenticated SmartCard can then verify internal integrity of General Authentication Device including a device authentication towards the physically isolated space. According to a preferred embodiment a General Authentication Device is able to store Device Certificates in the SmartCard for offline or online authentication of any device or system including the General Authentication Device itself. The SmartCard can specifically get external verification that the Authenticator Device is not reported stolen or otherwise inappropriate to deal with.
A device certificate can be in many forms ranging from a shared secret to an advanced Zero-knowledge Authentication Protocol depending on the type of device and the sensitivity and timing constraints in revoking a certificate. A SmartCard specific authentication key can be created as a Start/End date or limited show certificate to reduce offline damage in case of theft. The Authenticator - SmartCard combination can after basic authentication create specific authentication with any other external unit made able to authenticate electronically such as access doors, computers, home control systems, cars, specific systems using wireless or cable communication.
The SmartCard can store algorithms and one or more identified or pseudonymous Digital Signatures related to the user that can be verified through a publicly available register such as an X.509 or any other PKI compliant protocol whereby a General Authentication Device can replace most known designs for smart-card based Identifying Devices.
According to the preferred embodiment of the present invention the General Authentication Device can be incorporated as a software-based solution even without physical changes as to the MAC-address. This is more vulnerable to abuse and requires more trust to the Trusted Party because the combination of a Communication Channel Provider and an Authentication Unit will know a persistent identifier even though it is not available to the Trust Unit nor any Relationship counterparts. Unless CLIENT is very careful the telecom provider can easily identify CLIENT using location analyses if say for instance the Mobile Phone is used around the CLIENT Home. Zero-knowledge Authentication.
According to the preferred embodiment of the present invention Zero-knowledge authentication mechanism is such that a message transferred is free of any persistent identifier that could be used to identify CLIENT. This means that even a third-part able to decrypt communications cannot extract any identifiable information from the communication.
A Trust Unit A knows the public key of the Client B to authenticate because he is provided with an identifer B1. Trust Unit can verifiythat Authentication Unit does not impersonate CLIENT by carrying out a Zero-knowledge authentication based on the CLIENT encryption key of the Virtual Identity (CI.Vir.Enc.Pu/Pr).
A generates a random message M. A Sends to B - Challenge = Enc(M,B.Pu). B sends to A - Responds = Enc(H( Dec(Challenge),B.Pr), A.Pu). A can now verify that H(M) equals Dec(Respons,A.Pr) and that B is able to decrypt the message and has in his possession the Private key part of B.Pu. Note that B returns the Hash of M and NOT the clear text of M because A would be able to make B decrypt any text including something B wants kept secret. This procedure can be repeated so that A can authenticate towards B and these procedures can also be combined in more efficient protocols.
When the verifying part is not able to make a good guess of the identity of the Authenticating party then Zero-Knowledge Authentication can take place, making use of pre-arranged one-time-only identifiers. This is the case when a CLIENT carries out a Single Sign-on Authenticates towards an Authenticating Unit. The preferred solution is based on a series of Hash values.
The protocol can be initiated and re-established later by a procedure where CLIENT use the General Authentication Device to Generate Hashkey(O) and Hashkey(20) such that Hashkey(t)=H(Hashkey(t-1)). Hashkey(O) and an indicator of status is saved related to the key pair that is authenticated. CLIENT forward Enc(CI.Pu+Enc(Hashkey(20),CI.Pr),TP.Pu). The Authenticating Unit saves CI.Pu, Hashkey(20) and responds with Enc(H(HashKey(20)),TP.Pr) to prove ability to decrypt the first message and thereby authenticate itself towards CLIENT.
Note that this message is not entirely Zero-knowledge because CI.Pu is included even though it is encrypted. By signing Hashkey(20) protection against anyone else initiating a fake authentication sequence is prevented. Further protection can be incorporating by a multi-step protocol where CLIENT after having forwarded CI.Pu then Authenticates Zero- before forwarding Hashkey(20) encrypted.
Whenever CLIENT wants to authenticate towards an Authenticating Unit. CLIENT forward Enc(Enc(HashKey(t-1 ),CI.Pr),HashKey(t)),TP.Pu) using the General Authentication Device. The Authenticating Unit can now decrypt the message and retrieve the One-Time-Only key Hashkey(20) previously agreed. The Authenticating Unit can then lookup CLIENT and extract the next One-time- only key Hashkey(t-1)=Dec(Enc(HashKey(t-1),CI.Pr),CI.Pu)). The Authenticating Unit can verify authentication by verifying that (H(Hashkey(t-1 )) = Hashkey(t). The Authenticaing Unit then save Hashkey(M) for the next authentication operation and authenticate CLIENT towards any third-party such as an Communication Channel Provider.
Non-linkability of Communication Channels
According to the preferred embodiment of the present invention control over Communication channels is be transferred to CLIENT such that a Communication channel provider only knows what is absolutely necessary to perform its service
A mobile Telecommunications provider servicing an always-on mobile device with location-tracking knowledge only knows a persistent session identifier and a way to ensure payment
A Bank handling deposits only knows a communication channel to the holder of the deposit and a way to ensure authentication of a persistent virtual identifier of the deposit A Credit provider only knows information such as to evaluate credit worthiness and a way to ensure accountability in case the credit agreement is not abided to by the borrower.
A Shipper providing physical transportation of goods only knows information as to a Drop point and a way to receive proof of delivery not containing any persistent identifier of the individual.
According to the preferred embodiment of the present a Communication Channel Provider provides a virtual interface specific to the Authentication Unit only to a communication channel where the Communication Channel Provider knows a persistent identifier of CLIENT and/or the channel itself. Hereby the Authentication Unit can remain unknown to identifying information and thus reduce the risk of privacy violations even when CLIENT wants maximum convenience.
For instance a bank (figure 32 reference numeral 60) can forward payment with a pre-agreed one-time-only identifier without revealing the actual identity of the paying entity. A shipping drop point (figure 32 reference numeral 150) can provide the physical intermediation. An ISP can provide multiple aliases to the same email-account.
A two-way anonymous communication path
The most difficult task is in a privacy and accountability enabled supported way to enter into a legally binding contract in a two-way anonymous relationship.
Figure imgf000132_0001
Figure imgf000133_0001
Table 1. AUI .Pr = Authentication Unit 1 Private Key, TU.Pu = Trust Unit Public Key; {a,b} means a and b concatenated
As table 1 shows, multiple address mappings and encryption operations takes place. Many of the encryption operation are a semantic description of a normal secured channel such as a Virtual Private Network or an SSL-connection. But the above messages can with proper protection against timing analyses across the units be carried out over any long-distance IP-network.
A2 and B2 represents the fully Privacy enabled virtual identities. A2 is a relative address of A specific to the relationship, A3 is a relative address of A specific to B. A key feature of the preferred embodiment of the present invention is that B3(@Auth1.com) as the TO-address in for example an email can be used irrespectively of the sending address A because the Authentication Unit maps A to A1 and ONLY from A1 does B3 provide the correct identifier to the correct relationship A1(@Auth1.com)->B2(@TUx.com). B3 can be any non-unique number or code in a range small enough to ensure a crowd-effect based on existences and use in different CLIENTS Address books and as identifier in communication to and from the Authentication Unit.
Addresses A and B are assumed either a POP-email Account with the Authentication Unit over a fully privacy-enabled communication path or any Authentication Unit specific email alias provided by a email service provider.
B3 represents the virtual address of B in the Address Book of A. A1 (@Auth1.Com) represents the address of the virtual identity of A in the no-mans land between the Authentication Unit and the Trust Unit. A1 may only be unique to Authentication Unit 1 but not Across Authentication Units.
In this example of implementation of the present invention B can respond with a signature parallel to A and this can without difficulty be extended to a multi-party agreement.
According to the preferred embodiment of the invention multiple CLIENTsor COMPANIES can have keys to any data part of the relationship under full control of the CLIENT A.
For instance only some CLIENTS or COMPANIESs can have access to data parts containing identifying information while others have only access the non-identified profile information. This feature makes the invention highly suitable for e.g. Public Citizen records or electronic health care files where the CLIENT patient can give his doctor and the hospital access to identifying information whereas any third- parties such as a healthcare product supplier, a statistics project or medical research group can be granted access to specific parts of the healthcare file only.
According to a particular embodiment of the present invention the Authentication Unit and Trust Unit can in combination do translation of the asymmetric encryption key standard without either the Authentication Unit or the Trust Unit individually being able to read contents of communication.
In this case the private key encryption key B2.Enc.Pu is known to the Authentication Unit only. The Trust Unit knows an additional asymmetric encryption key and request Auth. Unit 2 to decrypt b2k and return the real b2k encryption with the correct encryption key. Auth. Unit 2 never has the encrypted message and thus cannot read the message. The Trust Unit never has an unencrypted key.
According to another particular embodiment of the present invention B can be a non-customer and thus not able to understand mka.sign and mka. hash as these are non-standard to normal email-protocols. But in this case A will know Bs standard and create mka.sign and mka. hash according to B's e-mail protocol.
According to a different embodiment of the present invention CLIENT can automatically be aided to create a Backup entry to the same relationship through a second Authentication Unit and store proof of ownership including an encrypted copy of the private encryption key in a generally accessible storage. If the first Authentication is closed down for any reason or CLIENT so prefers he can switch to the second Authentication Unit and continue the Relationship unidentified.
Session Manager and Dynamic Firewall
According to the preferred embodiment of the present invention the General Authentication Device preferably is closely shielded to prevent leakage of identifier or other information. This shield is in a preferred embodiment based on a Session Manager in close connection with the Device Firewall controlling all device communication channels. On initiation the Firewall is totally closed. After Offline authentication using the General Authenticator, the Firewall opens for authentication traffic towards the Authentication Unit for authentication only. The General Authenticator receive a session identifier from a Communication Channel provider or generates a session identifier and forward said session identifier through a Communication Channel Provider to perform a Single Sign-On to the Authentication Unit using a Zero- knowledge authentication algorithm.
When receiving a request the Authentication Unit check if a Session Manager is running. If not the Authentication Unit responds with a Sessions Manager - it is either downloaded or initiated from a local storage area. CLIENT SmartCard verifies integrity of the Session Manager before activating. The Session Manager which will from then on control the dynamic firewall and provide CLIENT with Access to Virtual Identities and related storage and services.
A Session Manager is as such providing CLIENT with an interface able to simultaneously manage multiple sessions authenticated each as different virtual identities through the respective Authentication Unit.
All normal traffic can now leave and enter the workstation according to pre- specified rules without CLIENT un-voluntarily revealing any traceable information.
Special services can be opened by the Session Manager according to pre- specified rules or CLIENT interaction. This can included a Peer-to-Peer connection with friends or a workgroup, a connection to another Authentication Unit, a virtual Storage unit, a VPN Connection to a trusted Network (can also be done through Authentication Unit) etc.
Inbound traffic to a previous verified session is accepted. Outgoing traffic can be filtered and re-routed by the firewall through the Proxy where for instance IP- addresses are re-mapped unless specifically opened as a special service. A filter function under CLIENT Control can be set up to strip identifying information such as footers in emails from the communication streams.
Privacy Profiler - Privacy Attributes
The Privacy Profiler works with a CLIENT-controlled storage containing a number of privacy attributes that can be either Credentials signed by any third-party such as Exams, Citizenship, Letter of credit etc. or self-signed profile attributes stating preferences, demographics etc.
Only CLIENT can access these data. They can be stored on a encrypted virtual storage and accessed as a natural extension of the Session Manager and Address Book .
Privacy Credentials can be in the form of
Credential=Encs("Anonymous Credential", CredKey), Enc(CredKey,Third.Party.Pr), - Verifying that Credential is issued by Third-
Party
Enc(H(Credential)+Clent Digital Signature. Pu,Third.Party.Pr) - Verifying that Credential is Related to CI.Pu or Enc(H(Credential)+Client Digital Signature. Pu, Fourth. Party.Pr) - Fourth Party verifying that they have signature by Third-Party to link Credential to
CLIENT.
CLIENT can verify that Credential is anonymous and correct by decrypting the Credential using the public key of third-party Decs(Credential,Dec(Enc(CredKey,Third. Party.Pr), Third. Party.Pu).
When CLIENT wishes to share a Privacy attribute as part of a Relationship, the Privacy Attribute is re-encrypted accordingly by the Privacy Profiler and transferred to the Relationship Storage. Self-signed profile attributes are straightforward decrypted and re-encrypted with a random generated symmetric key. The symmetric key is attached in two encrypted versions - One with the CLIENT Relationship Encryption Key and One with the public key of the other Relationship Party CO.Pu.
An attribute can have a time-dependant certificate that limit validity attached.
When forwarding a credential to a relationship, CLIENT requires TP to verify the third-party or CLIENT signature linking the Credential to CLIENT Virtual Identity. CLIENT forwards the Linking Signature only
Enc(H(Credential)+CI.Pu,Third. Party.Pr or Fourth. Party.Pr))
and receive
Enc(H(Credential)+CI.Vir.Pu,Tp.Pr)
stating that TP knows of a signature linking Credential with the real Identity of CLIENT, note that in the preferred embodiment this is a two-step operation. First Trust Unit converts the Credential link from Client Digital Signature to Client Authentication key towards an Authentication Unit and then the Authentication Unit can Convert the Credential link from Client Authentication key to the CLIENT Virtual Identity
The attribute is forwarded to the Relationship storage in such a way that TP cannot read contents. Send-Message = Enc(Enc(Message, CI.Vir.Enc.Pr), Trust Unit.Pu)
Note that TP never have access to Credential itself and therefore may be unaware of any Profile Information related to CLIENT.
A Form Filler can access the stored Relationship attributes and automatically fill out web forms etc. with attributes and the corresponding decryotion keys already known to the relationship. Dynamic Out-Out and Trust filtering
Trust requires Privacy and Security, but Trust substance is basically to be made on history. According to another aspect of the preferred embodiment this invention incorporates two key Trust concepts for a relationship between a CLIENT or COMPANY A and a CLIENT or COMPANY B a) Trust History: Establishing a communication path based on previous interactions in the same relationship. b) Trust Network: Establishing a communication path from A to B based on previous interactions in other relationships with B. According to this a CLIENT can set up relationship rules that operate on statistical summations on previous evaluations.
The set of Relationship Rules thus works dynamically together with evaluations to provide a user-controlled Dynamic Opt-Out and filtering of Privacy Enabled Communications. Evaluations are directly controlling threshold filters of both inbound and outbound communication.
CLIENT can set up or change the type of inbound messages acceptable based on previous agreed standards and continuous feedback of evaluations.
If CLIENT is authenticating towards Company and Company Evaluations show a negative development below a threshold then CLIENT can be informed BEFORE authentication.
Personal Relationship Management - The extended Address Book According to an aspect of the preferred embodiment CLIENT access to relationships is based on an address book implemented as part of a Session Manager.
Part of the Session Manager is an Address Book providing an object approach to relationships. The Address Book accesses a table of bookmarked entries. This table can be stored within the SmartCard, encrypted at the workstation, encrypted as an attachment of the main identity with the Authentication Unit, at a virtual storage location accessible as a relationship or other. If the table is stored outside the SmartCard it is encrypted so that only the SmartCard can decrypt the table refusing to do so unless a certified Session Manager is initiated.
CLIENT can now choose any entry in the Address book. The Session Manager then Establish access to the target and present the next dynamical level.
For a standard Relationship this contain among other things a set of relationship history, ongoing activities, a local bookmark list providing handles to relationships, data elements or actions etc.
Table Entry = Personal Ressource Locator | Encryption Key | Type Personal Ressource Locator = Text Identifier | Logical Locator Logical Locater = Authenticator.ldentity.Nested Relationship Nested Relationship = Relationship. {Object| Action | Nested Relationship}
According to the preferred embodiment of the present invention addressing can be entirely relative to the viewpoint without any unique identifier. Any point can be reached as a series of steps from where it starts. Without knowledge of the starting point a Logical Locater is not dangerous because any starting point can give a reasonable answer. In the email example the Logical Locator is represented by A3 respectively B3.
Any unique identifier should be treated as an attribute of a relationship. Thus even strongly identified relationships can be anonymous and appear relative to any Unit in the set-up and to anyone listening in.
Company Customer Relationship Management According to the preferred embodiment of the present invention Company will have access to the full profile of a Virtual CLIENT through the Integration Unit providing one Interface to Customer across Contact Points and Communication Channels.
Through the Privacy Profile Manage as part of the Session Manager and Address Book, CLIENT set up a Privacy Profile of the Virtual CLIENT Identity attached to the Relationship in the Trust Unit as a collection of Profile information with keys encrypted with the Public key of Company Co.Pu. Information is thus always available and up-to-date whenever CLIENT interacts with Company. The same storage can contain the dialog history, the trade history etc.
A Form Filler can automatically fill out COMPANY forms with attribute information already known to the relationship and thereby eliminate redundant requests for CLIENT information.
As the Relative Addressing Principle is reachable from any system, employee or partner of Company with security clearance to act on behalf of Company, Company specifically gets the advantage of being able to address any item from any starting point. An item can for instance be a specific attribute of a CLIENT Customer such as Age, an invoice, a Communication Channel Identifier or a Process Initiator. Customer management will thus become Privacy enabled and made transparent across systems and organisations at the same time.
Explanation of terms
TP - Trusted Party - the entity that implements the Privacy Services. Major parts of the services can be outsourced to sub-suppliers. TP is covering both the Trusted party and Sub-suppliers.
In the preferred embodiment TP is split up into multiple units - AU - Authentication Unit, ID - ID Unit, TU - Trust Unit, Device Authentication Unit according to Figure 32. VID - Virtual Identity - An identified or non-identified pseudonym linked to a CLIENT Role and related to a number of COMPANY or RELATION.
VID TYPE - VIDs are divided into specific types with possibility to determine default access. For instance a identified VID will only offer limited access to Private Data.
PRIVACY SERVER - A server in a distributed network offering the full range of services. In implementation different physical or logical services will be servicing different types of task in order to balance load and ensure response times.
INVOICE SERVER - A specially isolated server handling the collection of invoices.
PRIVACY CLIENT - Software functionality operating on CLIENT device. Can be a simple manually previously agreed information such as a challenge-response pair.
CLIENT - Individual Person that is Privacy Enabled. A CLIENT can be using a Work role and acting on behalf of a COMPANY as a purchaser. The term CLIENT focus on the individual.
ROLE - A CLIENT context. This can be Private, Family, Employment, Public Function, Member of a Board etc.
RELATION - A link between CLIENTS representing a personal relationship (a friend, family, business connection etc.). RELATIONS are one-way and controlled by the information disclosing entity. A two-way relationship thus requires two RELATION entries.
COMPANY - An organizational entity. This can be any selling or service organization including a shop, an online Community a basic supplier etc. The term COMMUNITY is used to focus on the online COMPANY interacting with multiple CLIENTS. Often CLIENTS are provided with means to interact directly using tools such as online chat or discussion databases.
BUYER - An entity interested in acquiring a service or good. If not otherwise stated a BUYER is a CLIENT.
SELLER - An entity interesting in selling a service or good. If not otherwise stated a SELLER is a COMPANY. For different services involving two-way anonymity such as an Auction service a SELLER is CLIENT different from the BUYER.
AGENT - A service that analyze CLIENT or COMPANY data in order to provide services for either CLIENT or COMPANY. AGENT comes in different versions.
A SHIPPER is a business offering transportation services of letters or parcels. If not otherwise stated the service involved is parcel transportation.
Encryption:
Encs(x,y) - The result of symmetrically Encrypting the String X with symmetric key Y.
Decs(x,y) - The result of symmetrically Decrypting the encrypted string X with the symmetric key Y.
Enc(x,y) - The result of asymmetrically Encrypting the String X with asymmetric key Y.
Dec(x,y) - The result of asymmetrically Decrypting the encrypted string X with the asymmetric key Y.
Co is a general abbreviation of COMPANY TP is a general abbreviation of Trusted Party TU is a general abbreviation of Trust Unit AU is a general abbreviation of Authentication Unit Sh is a general abbreviation of a SHIPPER Cl is a general abbreviation of a CLIENT Cl.Vir ia a general abbreviation of a virtual identity VID of CLIENT Co.Pu, TP.Pu, AU.Pu, TU.Pu, Sh.Pu, CI.Pu, Cl.Vir.Pu - The Public Key of a Private/Public encryption key pairs Co, TP, AU, TU, Sh, Cl, Cl.Vir
Co.Pr, TP.Pr, AU.PR, TU.Pr, Sh.Pr, Cl.Pr, CI.Vir.Pr - The Private Key of a Private/Public encryption key pairs Co, TP, AU, TU, Sh, Cl, Cl.Vir

Claims

1. A method of establishing a communication path between a first and a second legal entity, comprising the steps of:
providing a first virtual identifier of the first legal entity to the second legal entity,
establishing a communication path in accordance with a set of communication rules specified by the first legal entity between the first and the second legal entity, the first legal entity remaining anonymous to the second legal entity,
and wherein the second legal entity is provided with means for obtaining a legal identification of the first legal entity based on the virtual identifier, which means for legal identification is provided by a third legal entity according to a set of rules agreed between the first legal entity and the third legal entity,
and wherein the means for legal identification is provided by a third legal entity according to a set of rules determined by a fourth legal entity,
and wherein the second legal entity is provided with means for obtaining information about previous communication path for a first virtual identifier of a first legal entity.
2. A method according to claim 1 , wherein said method further comprising providing a second virtual identifier of the second legal entity to the first legal entity, the second legal entity remaining anonymous to the first legal entity and further comprising establishing a communication path in accordance with a second set of communication rules specified by the second legal entity.
3. A method according to claim 1 or 2, wherein a communication path is established between the first legal entity and a third legal entity in accordance with a first set of communication rules specified by the first legal entity and wherein another communication path is established between the second legal entity and the third legal entity in accordance with the second set of communication rules specified by the second legal entity
so as to establish communication between the first legal entity and the second legal entity.
4. A method according to any of claims 1 to 3, wherein selected information is transferred to a first information carrier based on the evaluation and/or the first set of communication rules, and/or wherein a third legal entity is provided with a profile of the first legal entity and wherein the third legal entity is invited to transfer selected information from the first information carrier to a second information carrier based on the profile, and/or wherein a commercial transaction is established based on information comprised in the first and/or the second information carrier.
5. A method according to any of claims 1 to 4, wherein a communication path is established between a first legal entity and a second legal entity based on information about previous communication path established with the second legal entity.
6. A method according to any of claims 1 to 5, wherein the second legal entity is provided with a profile of the first legal entity and wherein a third legal entity can confirm the profile, the first legal entity remaining anonymous to the second legal entity.
7. A method for commercial transactions between a first legal entity and a second legal entity, wherein a communication path is established according to the method of claims 1-6, and wherein the communication path is adapted for providing a legal commitment of one of either the first or the second legal entity, the first legal entity remaining anonymous to the second legal entity, and/or wherein a third legal entity can confirm existence of a traceable non-reputable legal commitment of the one of either the first or the second legal entity, and/or wherein the third legal entity can provide prove of existence of the legal commitment.
8. A method according to claim 7, further comprising providing the second legal entity with means for associating a first virtual identifier of a first legal entity with previous legal commitments established with that first legal entity, and/or wherein the second legal entity is provided with means for obtaining about previous legal commitments for a first virtual identifier of a first legal entity, and/or wherein a legal commitment is established between a first legal entity and a second legal entity based on information about previous legal commitments established with the second legal entity, and/or wherein a third legal entity is provided with information about legal commitments between a first and a second legal entity and wherein the first legal entity remains anonymous to the third legal entity., and/or wherein the legal commitment comprises performing at least one of the following activities:
- transferring legal rights between a first and a second legal entity,
- transferring goods or services between a first and a second legal entity,
- arbitrating an dispute between a first and a second legal entity,
and/or wherein the first legal entity remains anonymous to the second legal entity,
and/or wherein the second legal entity remains anonymous to the first legal entity,
and/or wherein the first legal entity transfer a financial instrument to the second legal entity, the first legal entity remaining anonymous to the second legal entity.
9. A method according to any of claims 7 to 8, further comprising the steps of:
depositing a financial instrument with a third legal entity,
the first legal entity ordering a service from the second legal entity, the second legal entity requesting confirmation of payment from the third legal entity,
the second legal entity delivering the service addressing the virtual identifier of the first legal entity upon receipt of the confirmation,
further comprising the step of releasing payment according to a pre-defined set of trade rules.
10. A Method according to any of claims 7 to 9 wherein the addressing the virtual identifier comprises an identifier of the third legal entity, a virtual identifier of the second legal entity, and encrypted: the virtual identifier of the first legal entity, and an identifier of the service, and/or the encrypted identifiers are decrypted by a key common to the second and third legal entity,
and wherein the step of delivering comprises the step of:
forwarding the service to a fourth legal entity,
the fourth legal entity requesting a physical delivery address from the third entity.
the third legal entity providing the physical delivery address to the fourth legal entity according to the first set of communication rules,
and wherein the step of delivering further comprises the step of: the fourth legal entity receiving a receipt proof of delivery acknowledging delivery of the service at the physical address and wherein the proof of delivery can be verified by the fourth legal entity.
and/or wherein the step of ordering a service is performed in a physical or electronic market place, such as an auction, a stock exchange, a community, a trade portal, etc.
11. A method for commercial transactions between a first legal entity and a second legal entity, wherein a first communication path is established between the first legal entity and a third legal entity and wherein a second communication path is established between the second legal entity and the third legal entity and wherein the first and second communication path is adapted for providing a legal commitment of the first legal entity towards the second legal entity, said legal commitment comprising the steps of:
- the first legal entity providing the second legal entity with an identifier,
- the second legal entity requesting the third legal entity a first legal commitment provided the identifier,
- the third legal entity requesting the first legal entity a second legal commitment,
- the third legal entity accepting the request from the second legal entity upon receipt of the second legal commitment,
and wherein the communication between the third and the first legal entity is established by a fourth legal entity, the communication path to the first legal entity remaining unknown to the third legal entity, and wherein the communication path is established according to the method of claims 1 to 6.
12. A system for establishing a privacy communication channel between a first client and a second client and said system comprising:
(a) a general authentication device for providing said first client control of a private encryption key stored in a mobile processing and memory unit,
(b) a communication channel provider for communicating with said first client and for establishing a privacy communication channel for said first client, (c) an authentication unit for communicating through said privacy communication channel with said first client and for providing a first intermediary between said first client and said second client, said authentication unit enabling said first client establishing a first virtual identity having a first virtual communication channel and establishing a rule based communication routing scheme for said privacy communication channel, 5 (d) a trust unit for communicating with said authentication unit through said virtual communication channel providing a second intermediary between said first virtual identity and said second client and for providing storage of first client profile information and providing communication filtering on the basis of said profile information, and 10 said first client applying said private encryption key for encrypting said profile information so as to enable anonymous communication from said first client to said second client.
13. A system according to claim 12, wherein said authentication unit further 15 enabling said second client for establishing a second virtual identity having a second virtual communication channel and establishing a rule based communication routing scheme for a privacy communication channel between said authentication unit and said second client.
20 14. A system according to claim 12, further comprising an integration unit for communicating with said second client and for providing said second client an interface to said first virtual identity of said first client.
15. A system according to any of claims 12 to 14, wherein said system
25 incorporating any features as described with reference to the method according to claims 1 to 10 an to the method according to claim 11.
16. A general authentication device for establishing a privacy communication channel between a anonymous client and an authentication unit, and said general
30 authentication device comprising: (a) a main processing unit for establishing and controlling communication with a communication channel provider interconnecting said general authentication device and said authentication unit,
(b) a unit reader for connecting a mobile processing and memory unit with the general authentication device,
(c) a memory space for containing persistent identifier of said general authentication device accessible by said mobile processing and memory unit, and/or said mobile processing and memory unit authenticating the privacy communication channel to the authenticating unit on the basis of the persistent identifier in the memory space.
17. A general authentication device according to claim 16, wherein said general authentication device incorporating any features as described with reference to the method according to claims 1 to 10, to the method according to claim 11 , and to the system according to claims 12 to 15.
PCT/DK2001/000352 2000-05-22 2001-05-22 A system and method for establishing a privacy communication path WO2001090968A1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
EP01933648A EP1290599A1 (en) 2000-05-22 2001-05-22 A system and method for establishing a privacy communication path
AU2001260087A AU2001260087A1 (en) 2000-05-22 2001-05-22 A system and method for establishing a privacy communication path
US10/302,738 US20030158960A1 (en) 2000-05-22 2002-11-22 System and method for establishing a privacy communication path

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
DKPA200000814 2000-05-22
DKPA200000814 2000-05-22
US20656500P 2000-05-23 2000-05-23
US60/206,565 2000-05-23

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US10/302,738 Continuation-In-Part US20030158960A1 (en) 2000-05-22 2002-11-22 System and method for establishing a privacy communication path

Publications (1)

Publication Number Publication Date
WO2001090968A1 true WO2001090968A1 (en) 2001-11-29

Family

ID=26068826

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/DK2001/000352 WO2001090968A1 (en) 2000-05-22 2001-05-22 A system and method for establishing a privacy communication path

Country Status (3)

Country Link
EP (1) EP1290599A1 (en)
AU (1) AU2001260087A1 (en)
WO (1) WO2001090968A1 (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2826536A1 (en) * 2001-06-20 2002-12-27 Gemplus Card Int SECURE RADIO FREQUENCY COMMUNICATION METHOD
EP1627319A1 (en) * 2003-05-01 2006-02-22 Samsung Electronics Co., Ltd. Authenticating method and apparatus
US8788679B2 (en) 2008-12-22 2014-07-22 Koninklijke Philips N.V. Method for exchanging data
WO2014122008A1 (en) * 2013-02-06 2014-08-14 Gemalto Sa System and method for providing privacy in smart meter deployment
EP2639998A4 (en) * 2010-11-12 2017-10-04 China Iwncomm Co., Ltd Method and device for anonymous entity identification
US9987199B2 (en) 2012-07-10 2018-06-05 Tokuyama Dental Corporation Dental adhesive composition, dental adhesive primer, dental adhesive bonding material, dental adhesivecomposite resin, and dental adhesive resin cement
EP3389296A1 (en) * 2017-04-13 2018-10-17 Vodafone GmbH Managing and/or handling usage of services respectively service applications
EP3369062A4 (en) * 2015-10-30 2018-10-17 ID Loop AB Method for payment with a cash card
US10291614B2 (en) 2012-03-12 2019-05-14 China Iwncomm Co., Ltd. Method, device, and system for identity authentication
CN113283869A (en) * 2021-05-31 2021-08-20 长春工程学院 Anonymous strategy-based assessment method and system
IT202100027632A1 (en) * 2021-10-28 2023-04-28 Foolfarm S P A METHOD AND ELECTRONIC SYSTEM TO ENABLE A REMOTE OPERATION BY MEANS OF A POINT-TO-POINT CONNECTION
CN116664171A (en) * 2023-08-01 2023-08-29 中国信息通信研究院 Block chain-based commodity anti-counterfeiting and controllable anonymous distribution method and device

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11594146B2 (en) 2019-05-09 2023-02-28 Microsoft Technology Licensing, Llc Agent for online training in an offline environment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4914698A (en) * 1988-03-16 1990-04-03 David Chaum One-show blind signature systems
US5245656A (en) * 1992-09-09 1993-09-14 Bell Communications Research, Inc. Security method for private information delivery and filtering in public networks
WO2000001108A2 (en) * 1998-06-30 2000-01-06 Privada, Inc. Bi-directional, anonymous electronic transactions

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4914698A (en) * 1988-03-16 1990-04-03 David Chaum One-show blind signature systems
US5245656A (en) * 1992-09-09 1993-09-14 Bell Communications Research, Inc. Security method for private information delivery and filtering in public networks
WO2000001108A2 (en) * 1998-06-30 2000-01-06 Privada, Inc. Bi-directional, anonymous electronic transactions

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003003655A1 (en) * 2001-06-20 2003-01-09 Gemplus Method for secure radio-frequency communication
FR2826536A1 (en) * 2001-06-20 2002-12-27 Gemplus Card Int SECURE RADIO FREQUENCY COMMUNICATION METHOD
EP1627319A1 (en) * 2003-05-01 2006-02-22 Samsung Electronics Co., Ltd. Authenticating method and apparatus
JP2006525592A (en) * 2003-05-01 2006-11-09 サムスン エレクトロニクス カンパニー リミテッド Authentication method and apparatus
EP1627319A4 (en) * 2003-05-01 2009-11-11 Samsung Electronics Co Ltd Authenticating method and apparatus
US8788679B2 (en) 2008-12-22 2014-07-22 Koninklijke Philips N.V. Method for exchanging data
EP2639998A4 (en) * 2010-11-12 2017-10-04 China Iwncomm Co., Ltd Method and device for anonymous entity identification
US10291614B2 (en) 2012-03-12 2019-05-14 China Iwncomm Co., Ltd. Method, device, and system for identity authentication
US9987199B2 (en) 2012-07-10 2018-06-05 Tokuyama Dental Corporation Dental adhesive composition, dental adhesive primer, dental adhesive bonding material, dental adhesivecomposite resin, and dental adhesive resin cement
AU2014214234B2 (en) * 2013-02-06 2017-11-23 Gemalto Sa System and method for providing privacy in smart meter deployment
US8893227B2 (en) 2013-02-06 2014-11-18 Gemalto Sa System and method for providing privacy in smart meter deployment
WO2014122008A1 (en) * 2013-02-06 2014-08-14 Gemalto Sa System and method for providing privacy in smart meter deployment
EP3369062A4 (en) * 2015-10-30 2018-10-17 ID Loop AB Method for payment with a cash card
US11461758B2 (en) 2015-10-30 2022-10-04 Id Loop Ab Method for payment with cash card
EP3389296A1 (en) * 2017-04-13 2018-10-17 Vodafone GmbH Managing and/or handling usage of services respectively service applications
CN113283869A (en) * 2021-05-31 2021-08-20 长春工程学院 Anonymous strategy-based assessment method and system
CN113283869B (en) * 2021-05-31 2023-06-30 长春工程学院 Examination method and system based on anonymous strategy
IT202100027632A1 (en) * 2021-10-28 2023-04-28 Foolfarm S P A METHOD AND ELECTRONIC SYSTEM TO ENABLE A REMOTE OPERATION BY MEANS OF A POINT-TO-POINT CONNECTION
WO2023073542A1 (en) * 2021-10-28 2023-05-04 Foolfarm S.P.A. Method and electronic system to enable a remote operation by means of a point-to-point connection
CN116664171A (en) * 2023-08-01 2023-08-29 中国信息通信研究院 Block chain-based commodity anti-counterfeiting and controllable anonymous distribution method and device
CN116664171B (en) * 2023-08-01 2023-10-20 中国信息通信研究院 Block chain-based commodity anti-counterfeiting and controllable anonymous distribution method and device

Also Published As

Publication number Publication date
AU2001260087A1 (en) 2001-12-03
EP1290599A1 (en) 2003-03-12

Similar Documents

Publication Publication Date Title
US20030158960A1 (en) System and method for establishing a privacy communication path
TWI396112B (en) A system, method, service method, and program product for managing entitlement with identity and privacy applications for electronic commerce
US7814025B2 (en) Methods and apparatus for title protocol, authentication, and sharing
Niranjanamurthy et al. The study of e-commerce security issues and solutions
US20070106892A1 (en) Method and system for establishing a communication using privacy enhancing techniques
US20050234860A1 (en) User agent for facilitating transactions in networks
US20050038707A1 (en) Methods and apparatus for enabling transactions in networks
US20070088713A1 (en) Method of secure online targeted marketing
US20050038724A1 (en) Methods and apparatus for enabling transaction relating to digital assets
US20060036447A1 (en) Methods of facilitating contact management using a computerized system including a set of titles
US20050273805A1 (en) Methods and apparatus for a title transaction network
US20060174350A1 (en) Methods and apparatus for optimizing identity management
US20030028782A1 (en) System and method for facilitating initiation and disposition of proceedings online within an access controlled environment
US20120278876A1 (en) System, method and business model for an identity/credential service provider
EP2936332A1 (en) E-commerce networking with depth and security factors
Lacoste et al. SEMPER-secure electronic marketplace for Europe
EP1647932A1 (en) Method and system to automatically evaluate a participant in a trust management infrastructure
WO2003098398A2 (en) Methods and apparatus for a title transaction network
EP1290599A1 (en) A system and method for establishing a privacy communication path
Hussain The Design and Applications of a Privacy-Preserving Identity and Trust-Management System
Jailani et al. Secure and auditable agent-based e-marketplace framework for mobile users
Botha Managing e-commerce
Leenes et al. PRIME white paper
Mehta et al. Security in e-services and applications
Leenes et al. PRIME white paper (V3)

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ CZ DE DE DK DK DM DZ EE EE ES FI FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 2001933648

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 10302738

Country of ref document: US

WWP Wipo information: published in national office

Ref document number: 2001933648

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: JP