Patent application number | Description | Published |
20100325441 | PRIVACY-PRESERVING FLEXIBLE ANONYMOUS-PSEUDONYMOUS ACCESS - Systems and methods are disclosed for privacy-preserving flexible user-selected anonymous and pseudonymous access at a relying party (RP), mediated by an identity provider (IdP). Anonymous access is unlinkable to any previous or future accesses of the user at the RP. Pseudonymous access allows the user to associate the access to a pseudonym previously registered at the RP. A pseudonym system is disclosed. The pseudonym system allows a large number of different and unlinkable pseudonyms to be generated using only a small number of secrets held by the user. The pseudonym system can generate tokens capable of including rich semantics in both a fixed format and a free format. The tokens can be used in obtaining from the IdP, confirmation of access privilege and/or of selective partial disclosure of user characteristics required for access at the RPs. The pseudonym system and associated protocols also support user-enabled linkability between pseudonyms. | 12-23-2010 |
20110071947 | AUCTION VERIFICATION - An auction verification subsystem provides verification, without revealing actual bid values, that bid values remained sealed prior to a closing time for the auction and that an announced winning bidder for the auction provided a highest bid. The verification subsystem receives encrypted bids from bidders and generates commitment data based on the bids and provides the commitment data to each of the bidders. In response to receiving the commitment data, the bidders provide decryption keys for the encrypted bids. In turn, the bids are decrypted and an auction is performed using the decrypted bids. The results of the auction can be verified based on bid representations that do not reveal the actual values of bids, thereby maintaining the secrecy of bids. Providing access to an exchange between bidders and the verification subsystem facilitates verification that the auction is performed as a sealed bid auction. | 03-24-2011 |
20110071948 | AUCTION VERIFICATION - An auction verification subsystem provides verification, without revealing actual bid values, that bid values remained sealed prior to a closing time for the auction and that an announced winning bidder for the auction provided a highest bid. The verification subsystem receives encrypted bids from bidders and generates commitment data based on the bids and provides the commitment data to each of the bidders. In response to receiving the commitment data, the bidders provide decryption keys for the encrypted bids. In turn, the bids are decrypted and an auction is performed using the decrypted bids. The results of the auction can be verified based on bid representations that do not reveal the actual values of bids, thereby maintaining the secrecy of bids. Providing access to an exchange between bidders and the verification subsystem facilitates verification that the auction is performed as a sealed bid auction. | 03-24-2011 |
20120059732 | Online Marketplace - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for facilitating aggregated market transactions. In one aspect, a method includes receiving inventory data from sellers, where the inventory data specifies an ask price for a particular product and a discount function associated with the product. User input is received from users, where the user input requests information about a particular product. In response to the user input, data are provided that cause presentation of a product request user interface. Bids for the particular product are received from multiple users, and a final price is selected using ask prices, discount function, and bids. In turn, the particular product is allocated to a set of users that specified a bid that meets the final price. | 03-08-2012 |
20120078721 | Product Interest Targeting - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for facilitating aggregated product requests. In one aspect, a method includes receiving product request data from a plurality of users and determining that an offer request condition has occurred, where the offer request condition specifies a condition under which offers are requested from advertisers. In response to occurrence of the offer request condition, offer request data are provided to advertisers. The offer request data specify a quantity of users from which product request data were received. Offer data are received from advertisers. The offer data specify an offer associated with the particular product and an amount that an advertiser will pay for distribution of the offer. An offer is selected to be provided to the users and presentation data that cause presentation of the selected offer are provided. | 03-29-2012 |
20120265997 | PRIVACY-PRESERVING FLEXIBLE ANONYMOUS-PSEUDONYMOUS ACCESS - Systems and methods are disclosed for privacy-preserving flexible user-selected anonymous and pseudonymous access at a relying party (RP), mediated by an identity provider (IdP). Anonymous access is unlinkable to any previous or future accesses of the user at the RP. Pseudonymous access allows the user to associate the access to a pseudonym previously registered at the RP. A pseudonym system is disclosed. The pseudonym system allows a large number of different and unlinkable pseudonyms to be generated using only a small number of secrets held by the user. The pseudonym system can generate tokens capable of including rich semantics in both a fixed format and a free format. The tokens can be used in obtaining from the IdP, confirmation of access privilege and/or of selective partial disclosure of user characteristics required for access at the RPs. The pseudonym system and associated protocols also support user-enabled linkability between pseudonyms. | 10-18-2012 |
Patent application number | Description | Published |
20080221914 | Computer-based method and system for aiding transactions - A method for providing a warranty relating to a transaction between two parties, each party having a data communications device, in a system which includes an infrastructure composed of a plurality of locations each associated with a respective institution which provides services to clients, each location having a computer system, a database coupled to the computer system and storing information about each client of the institution and a data communications device coupled to the computer system for communication with the data communications device of any one party, each party being a client of at least one of the institutions, the method containing the steps of: | 09-11-2008 |
20110167490 | SYSTEM AND METHOD FOR SECURE DISTRIBUTED EXECUTION - This invention discloses a method and system for processing logic modules, each having a separate functionality, into a unique functionality that is to be executed in an interlocked mode as a unique functionality. The method is based on taking logic modules (programs and data) with known functionality and transforming them into a hidden program by integrating modules to execute together into a logic which is partially obfuscated and/or encrypted and/or physically hidden. The hidden program is being updated dynamically to strengthen it against reverse engineering efforts. The program includes the functionality for generating security signals, which are unpredictable by observers, such as a pseudo random sequence of security signals. Only elements that share the means for producing the security signals can check their validity. The modules include operational tasks and performance parameters for this operation. The operation can be transmission of data packets with given parameters of performance that the hidden program contains. The generated security signals thus assure that the correct operation was taken place and can be used to signal various cryptographic parameters as well. | 07-07-2011 |
20120143723 | COMPUTER-BASED METHOD AND SYSTEM FOR AIDING TRANSACTIONS - A method for providing a warranty relating to a transaction between two parties, each party being a client of at least one respective institution which provides services to the respective party, the method including:
| 06-07-2012 |
20130173471 | COMPUTER-BASED METHOD AND SYSTEM FOR AIDING TRANSACTIONS - A method for providing a warranty relating to a transaction between two parties in a system which includes an infrastructure composed of a plurality of locations each associated with a respective institution which provides services to clients, each party being a client of at least one of the institutions, the method comprising: transmitting a request for a warranty from one party to the transaction which is a client of the respective institution to a respective location associated with the respective institution, which request includes information identifying the other party to the transaction and information about the nature of the transaction; conducting an exchange of information between the respective location and a location associated with a institution of which the other party is a client; and transmitting a response to the request from the respective location to the one party. | 07-04-2013 |