WO2010054351A3 - Methods and apparatus related to transmission of confidential information to a relying entity - Google Patents
Methods and apparatus related to transmission of confidential information to a relying entity Download PDFInfo
- Publication number
- WO2010054351A3 WO2010054351A3 PCT/US2009/063801 US2009063801W WO2010054351A3 WO 2010054351 A3 WO2010054351 A3 WO 2010054351A3 US 2009063801 W US2009063801 W US 2009063801W WO 2010054351 A3 WO2010054351 A3 WO 2010054351A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- confidential information
- transmission
- methods
- relying entity
- apparatus related
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/40—User authentication by quorum, i.e. whereby two or more security principals are required
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
Abstract
In one embodiment, a method includes defining a request for confidential information from a domain of confidential information based on an input from a relying entity. The domain of confidential information can be associated with a subject entity. A response to the request can be defined at an information provider. The method can also include sending the response to the relying entity when the response has been approved by the subject entity.
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/268,069 US8549589B2 (en) | 2008-11-10 | 2008-11-10 | Methods and apparatus for transacting with multiple domains based on a credential |
US12/268,069 | 2008-11-10 | ||
US12/268,065 US8464313B2 (en) | 2008-11-10 | 2008-11-10 | Methods and apparatus related to transmission of confidential information to a relying entity |
US12/268,065 | 2008-11-10 |
Publications (3)
Publication Number | Publication Date |
---|---|
WO2010054351A2 WO2010054351A2 (en) | 2010-05-14 |
WO2010054351A8 WO2010054351A8 (en) | 2010-06-24 |
WO2010054351A3 true WO2010054351A3 (en) | 2010-09-30 |
Family
ID=42153636
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2009/063801 WO2010054351A2 (en) | 2008-11-10 | 2009-11-10 | Methods and apparatus related to transmission of confidential information to a relying entity |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2010054351A2 (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6073106A (en) * | 1998-10-30 | 2000-06-06 | Nehdc, Inc. | Method of managing and controlling access to personal information |
US6581059B1 (en) * | 2000-01-24 | 2003-06-17 | International Business Machines Corporation | Digital persona for providing access to personal information |
US20040111622A1 (en) * | 2002-12-10 | 2004-06-10 | Roy Schoenberg | Method of and system for controlling access to personal information records |
US6928428B1 (en) * | 2000-11-27 | 2005-08-09 | Microsoft Corporation | Distributed confidential contextual querying |
US20070101400A1 (en) * | 2005-10-31 | 2007-05-03 | Overcow Corporation | Method of providing secure access to computer resources |
-
2009
- 2009-11-10 WO PCT/US2009/063801 patent/WO2010054351A2/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6073106A (en) * | 1998-10-30 | 2000-06-06 | Nehdc, Inc. | Method of managing and controlling access to personal information |
US6581059B1 (en) * | 2000-01-24 | 2003-06-17 | International Business Machines Corporation | Digital persona for providing access to personal information |
US6928428B1 (en) * | 2000-11-27 | 2005-08-09 | Microsoft Corporation | Distributed confidential contextual querying |
US20040111622A1 (en) * | 2002-12-10 | 2004-06-10 | Roy Schoenberg | Method of and system for controlling access to personal information records |
US20070101400A1 (en) * | 2005-10-31 | 2007-05-03 | Overcow Corporation | Method of providing secure access to computer resources |
Also Published As
Publication number | Publication date |
---|---|
WO2010054351A8 (en) | 2010-06-24 |
WO2010054351A2 (en) | 2010-05-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2011059275A3 (en) | Method and apparatus for managing data | |
WO2010055197A8 (en) | Method and apparatus for managing advertising-enabled applications | |
WO2012174427A3 (en) | Method and system for determining authentication levels in transactions | |
WO2010078076A3 (en) | Systems, methods, and computer program products for adaptively adjusting a registration interval of an endpoint | |
WO2009026189A3 (en) | Methods and apparatus for providing location data with variable validity and quality | |
WO2011025207A3 (en) | Method and apparatus for sharing functions between devices via a network | |
WO2009128671A3 (en) | Method and device for displaying individualized user interface | |
WO2008122031A3 (en) | Location-based responses to telephone requests | |
WO2010048274A3 (en) | Method and apparatus for generating a web-based user interface | |
WO2010101869A3 (en) | System and method for account level blocking | |
WO2011008020A3 (en) | Method and apparatus for client capable of accessing broadcasting network and internet network to receive application | |
WO2008042871A3 (en) | Methods and apparatus for securely signing on to a website via a security website | |
WO2008155188A3 (en) | Firewall control using remote system information | |
WO2010006095A3 (en) | Service discovery methods | |
WO2011059291A3 (en) | Method and apparatus for transmitting and receiving data | |
WO2009134790A3 (en) | Authorization system with split messaging | |
WO2010056607A3 (en) | Systems and methods for providing presence information in communication | |
WO2008082683A3 (en) | Methods and apparatus for implementing a pluggable policy module within a session over internet protocol network | |
WO2012083290A3 (en) | Methods and systems for managing device specific content | |
WO2008127436A3 (en) | Messaging security device | |
WO2014035896A3 (en) | Device and method for adaptive rate multimedia communications on a wireless network | |
WO2010053551A3 (en) | System, method, and software application for displaying data from a web service in a visual map | |
WO2010021701A3 (en) | User managed profile and selective transmission thereof | |
WO2013042968A3 (en) | Method for providing a compensation service for characteristics of an audio device using a smart device | |
WO2014137984A3 (en) | Reliable content recommendations |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 09795593 Country of ref document: EP Kind code of ref document: A2 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 09795593 Country of ref document: EP Kind code of ref document: A2 |