摘要:
The disclosure relates to implementing an anonymous reputation system for managing user reviews. In one arrangement, an anonymous reputation system is constructed from a group of group signature schemes run in parallel. Each item of a plurality of items is associated uniquely with one of the group signature schemes. A user is allowed to join the group signature scheme associated with the item when information indicating that the user has performed a predetermined operation associated with the item is received. The user can submit a review of the item when the user has joined the group signature scheme associated with the item (6). The anonymous reputation system is publicly linkable and non-frameable (8a, 8b).
摘要:
Method allowing a user, using a Client Application, to access to an on line target server by means of a secure element, of a pseudonym and of an access token containing attributes, the aforementioned access token having been obtained from a Token Issuer server, which can either be an Attribute Provider or an Identity Provider, characterized by the fact that the Client Application obtaining the access token has no way to grant the benefit of the aforesaid access token to another Client Application, and that the method includes the following steps: - the provision to users of secure elements with specific characteristics by secure elements suppliers, - the creation of an account on a target server by means of a pseudonym, a public key and of such a secure element, - the creation of an account on a Token Issuer server by means of a pseudonym a public key and of such a secure element, - the request of an access token to a Token Issuer server by means of a pseudonym or alternatively a public key and of such a secure element, - the generation of an access token by a Token Issuer server, and the acceptance of the access token by the target server.
摘要:
A method (20) for a first network node (5, 15) of protecting confidentiality of a first identifier associated by the first network node (5, 15) with a subscription used by a mobile entity (6, 16) in a communications network (1, 10) is provided. The communications network (1, 10) comprises a home network (3, 13) of the mobile entity (6, 16) and a serving network (2, 4, 12, 14) serving the mobile entity (6, 16). The method (20) comprises the following steps performed by the first network node (5, 5), which is part of the home network (3, 13): receiving (21), from a second network node (4, 14) which is part of the serving network (2, 12), a first request for authentication information for the mobile entity (6, 16), the first request comprising the first identifier, generating (22) a first pseudonym associated with the first identifier, creating (23) a link between the first pseudonym and the first identifier, and sending (24), to the second network node (4, 14), the first pseudonym in response to the first request for authentication information for use as an identifier for the mobile entity (6, 16) in the serving network (2, 12). A method (70) for a second network node is also provided, and corresponding network nodes, computer programs and computer program products.
摘要:
The invention refers to an online-accessed psychometric system, which realizes the primary data acquisition with an electronic scanning device. The data are processed based on a method for rapid determination of a set of psychological indicators, by means of a server application. The electronic scanning device, according to the invention, comprises a frequency divider (1), a stepped signal generator (2), two access signal blocks (3s and 3d), two sensors grids (4), two analogue/digital converters (5D and 5S) which leads the transformed signals towards inputs (CHI and CH2) of the embedded mini-computer (6) and a user-interface (7). The invention also provides a method for rapid probing of the cerebral functions, by identifying a set of variables able to supply a set of objective psychological indicators, using the device described.
摘要:
Secure messaging system wherein both the content and the metadata are protected from adversary attack. A message for an intended recipient is decrypted using the intended recipient's public key. The message is then sent to the intended recipient as well as to multitude of decoys. The decoys are real devices that are clustered with the intended recipient according to some method, such as logical or geographical method. The decoys are unable to decrypt the message with their private key and will drop it. Only the intended recipient will be able to decrypt and read the message. Since the message is sent to many recipients (intended recipient and decoys), an adversary is unable to determine who is communicating with whom.
摘要:
A. method and system for enabling peer-to-peer (P2P) communication between a first device and a second device is disclosed. According to one embodiment, a P2P communication, system includes a first peer agent serving a first peer, a second peer agent serving a second peer, and a •rendezvous server. Tire rendezvous server update a first IP address for the first peer agent to the second peer agent and a second IP address for the second peer agent to the first peer agent. The first peer agent and the second peer agent communicate with the rendezvous server by dropping and retrieving a plurality of dead-drop packages. A first dead-drop package of the plurality of dead-drop packages comprises a first alias that is known only to the first peer and the second peer. A second dead-drop package of the plurality of dead-drop packages comprises a second alias that is different from the first alias.
摘要:
An apparatus may include an interface to receive a multiplicity of user information samples at a respective multiplicity of instances; a processor circuit, and an entropy multiplexer for execution on the processor circuit to generate a pseudo random number based upon a pseudo random number seed and pseudo random number algorithm for each user information sample of the multiplicity of user information samples. Other embodiments are described and claimed.
摘要:
Verfahren zum Bereitstellen von Pseudonymen Schlüsseln für ein hybrides Verschlüsselungsverfahren und einer Vorrichtung sind angegeben, wobei das Verfahren ein Bereitstellen eines öffentlichen Schlüssels für einen Sender, wobei der öffentliche Schlüssel basierend auf einem privaten Schlüssel und einer senderspezifischen Basis generiert wird, ein Empfangen eines Zwischenschlüssels, wobei der Zwischenschlüssel von dem Sender basierend auf der senderspezifischen Basis und einem Geheimnis des Senders generiert wird, und ein Rekonstruieren eines symmetrischen Schlüssels basierend auf dem Zwischenschlüssel und dem privaten Schlüssel zum Entschlüsseln einer von dem Sender mit dem symmetrischen Schlüssel verschlüsselten Nachricht umfasst, wobei der symmetrische Schlüssel von dem Sender basierend auf dem öffentlichen Schlüssel und dem Geheimnis des Senders generiert wird. Ferner sind ein Verfahren zum Anwenden von Pseudonymen Schlüsseln in einem hybriden Verschlüsselungsverfahren, ein hybrides Verschlüsselungsverfahren, ein Sender und ein System definiert.