Patents by Inventor Jan Camenisch

Jan Camenisch has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20060101507
    Abstract: Methods for obtaining credentials and for verifying credentials are disclosed. In some embodiments, a request may be generated to register a computing device of a user to a registration issuer, and in response a device related credential for the computing device may be obtained, the device related credential being for exclusive use of that computing device and being related to a unique identifier of the user. A request for a credential for an application program may be generated, and in response an application credential for the application program may be obtained, the application credential being related to the unique identifier of the user. A request for access to the application program may be generated, the request comprising the application credential and the device related credential. In response to the request for access, access to the application may be granted if the device related credential and the application credential relate to the same unique user identifier.
    Type: Application
    Filed: November 2, 2005
    Publication date: May 11, 2006
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: Jan Camenisch
  • Publication number: 20060026423
    Abstract: Systems, apparatus and methods for privacy-protecting integrity attestation of a computing platform. An example method for privacy-protecting integrity attestation of a computing platform (P) has a trusted platform module (TPM), and comprises the following steps. First, the computing platform (P) receives configuration values (PCR1 . . . PCRn). Then, by means of the trusted platform module (TPM), a configuration value (PCRp) is determined which depends on the configuration of the computing platform (P). In a further step the configuration value (PCRp) is signed by means of the trusted platform module. Finally, in the event that the configuration value (PCRp) is one of the received configuration values (PCR1 . . . PCRn), the computing platform (P) proves to a verifier (V) that it knows the signature (sign(PCRp)) on one of the received configuration values (PCR1 . . . PCRn).
    Type: Application
    Filed: July 11, 2005
    Publication date: February 2, 2006
    Applicant: International Business Machines Corporation
    Inventors: Endre Bangerter, Matthias Schunter, Michael Waidner, Jan Camenisch
  • Publication number: 20050289340
    Abstract: Method, system, and storage medium for reducing or minimizing access to sensitive information. A method includes identifying processes and data associated with a computer system and classifying each of the data as one of either sensitive information or non-sensitive information. The sensitive information includes at least one of: data that is personal to an individual, confidential data, and data that is legally subject to conditions of restricted use. For each of the processes the method includes selecting a process and a sensitive data item, modifying the sensitive data item, analyzing the behavior of at least the selected process, and preventing access of the sensitive data item by the selected process if, as a result of the analyzing, the sensitive data item is determined not to be needed by the selected process.
    Type: Application
    Filed: June 23, 2004
    Publication date: December 29, 2005
    Applicant: International Business Machines Corporation
    Inventors: Jan Camenisch, Birgit Pfitzmann, Matthias Schunter, Michael Waidner
  • Publication number: 20050268103
    Abstract: Methods and systems for anonymity revocation, enabling a trusted entity to identify a user computer within an anonymous system. A system comprises an attester computer providing attestation value cert from a security module public key and an identifying value.
    Type: Application
    Filed: May 25, 2005
    Publication date: December 1, 2005
    Applicant: International Business Machines Corporation
    Inventor: Jan Camenisch
  • Publication number: 20050018852
    Abstract: The present invention provides systems, apparatus and methods for providing cryptographic keys which are usable in a network of connected computer nodes applying a signature scheme. Further, the present invention provides systems, apparatus and methods for providing a signature value on a message in a network of connected computer nodes, and systems, apparatus and methods for verifying the signature value on the message.
    Type: Application
    Filed: March 25, 2004
    Publication date: January 27, 2005
    Applicant: International Business Machines Corporation
    Inventors: Jan Camenisch, Maciej Koprowski
  • Publication number: 20050010535
    Abstract: The present invention relates to a method for verifying an anonymous payment by a defined party in a communication system providing a public key infrastructure. The method comprising the steps of (a) receiving a validation message from a merchant party, the validation message comprising a proof signature produced by a customer party and an encrypted payment message, the proof signature being derived from a customer secret key, a customer certificate, at least one customer attribute, and the encrypted payment message; (b) verifying the validity of the proof signature based on an issuing public key, a verification public key, and the encrypted payment message; (c) decrypting at least part of the encrypted payment message based on a verification secret key corresponding to the verification public key, thereby obtaining a customer information related to the at least one customer attribute.
    Type: Application
    Filed: May 29, 2003
    Publication date: January 13, 2005
    Inventor: Jan Camenisch
  • Publication number: 20050005170
    Abstract: Provides efficient schemes that allow a user to decide what information an access granting party gets to know. This enables the user to control and minimize information conveyed. It provides methods, apparatus and systems for verifying and enabling access to a service. An example of a method comprises the steps of: receiving a request from a remote computer requesting access to the service computer providing the service desired by a user; sending to the remote computer a response comprising an access policy, the access policy describing at least one possibility to obtain access to the service computer; receiving from the remote computer a reply comprising a description of evidence information to be gathered to fulfill the access policy; receiving evidence information specified by the description; and in the event that the received evidence information is sufficient to fulfill the access policy enabling the access, otherwise denying the access.
    Type: Application
    Filed: June 23, 2004
    Publication date: January 6, 2005
    Applicant: International Business Machines Corporation
    Inventors: Jan Camenisch, Michael Waidner
  • Publication number: 20040225570
    Abstract: The invention provides methods, apparatus and systems for securely processing an originator request of a customer. This originator request can be sent to at least one first entity.
    Type: Application
    Filed: May 5, 2003
    Publication date: November 11, 2004
    Applicant: International Business Machines Corporation
    Inventors: Joy Algesheimer, Christian Cachin, Jan Camenisch, Guenter Karjoth
  • Publication number: 20040172539
    Abstract: There is provided a method for generating an electronic receipt in a communication system providing a public key infrastructure, comprising the steps of receiving by a second party a request message from a first party, the request message comprising a transaction request and a first public key based on a secret owned by the first party and wherein the secret is associated with at least the secret of a further public key of the first party, electronically signing at least part of the request message with a second public key assigned to the second party to issue the electronic receipt, and providing the electronic receipt to the first party. Further, there is provided a method for verifying the ownership of an electronic receipt in a communication system providing a public key infrastructure, the verification arising out of a series of messages being sent and received between a first party and a verifying party.
    Type: Application
    Filed: April 22, 2004
    Publication date: September 2, 2004
    Inventors: Elsie Van Herrewegen, Jan Camenisch
  • Publication number: 20040078475
    Abstract: A method and a system for providing an anonymous access to a service within a network is disclosed. Thereby a user entity sends a user request comprising access-service information and requested service information to an anonymous-access service. The anonymous-access service verifies whether the access-service information are valid. In the event that the access-service information are valid, the anonymous-access service assigns the access-service information to subscription information and connects to the service by sending a verified request comprising the subscription information and the requested service information. The anonymous-access service receives response-service information from the service and forwards it to the user entity. By doing so, the user's instances of access to the services are not linkable to each other nor are they linkable to the user's real identity.
    Type: Application
    Filed: November 17, 2003
    Publication date: April 22, 2004
    Inventors: Jan Camenisch, Michael Waidner, Elsie A. Van Herreweghen
  • Publication number: 20030177352
    Abstract: In accordance with the present invention, there is given methods, systems and apparatus for revoking a derived credential formed from an initial credential and an indication value within a network. An example method comprises the steps of: updating an accumulator value based on a plurality of user credential keys where each user credential key is associated with a user device entitled to the derived credential; providing public information that comprises a public key for verifying the initial credential and the accumulator value; an entity receiving from a user device derived-credential information comprising an initial-credential information and an indication-value information indicating that the user credential key is inherently included in the accumulator value, and request information; and, processing the request information in response to verifying by the entity that the initial-credential information and the indication-value information are valid.
    Type: Application
    Filed: December 19, 2002
    Publication date: September 18, 2003
    Applicant: International Business Machines Corporation
    Inventors: Jan Camenisch, Anna Lysyanskaya
  • Publication number: 20030112969
    Abstract: A method is provided for reducing a known value modulo a shared secret value among network devices exchanging messages in a network. The reduction results in a share of reduced value for each network device of a reduced value. Each network device has its share of known value and its share of shared secret value. It performs an inversion step for deriving from the share of shared secret value a share of the inverse of the shared secret value by using an approximation process, resulting in a share of inverse value; a multiplication step for deriving from the share of inverse value by use of the share of known value a share of multiplied inverse value; a rounding step for rounding the share of multiplied inverse value; and a calculation step for deriving the share of reduced value from the share of known value, the rounded share of multiplied inverse value, and the share of shared secret value.
    Type: Application
    Filed: October 24, 2002
    Publication date: June 19, 2003
    Applicant: International Business Machines Corporation
    Inventors: Joy Algesheimer, Jan Camenisch, Victor Shoup
  • Publication number: 20030014654
    Abstract: The present invention is a system and method for handling personally identifiable information, using a rules model. The invention involves defining a limited number of privacy-related actions regarding personally identifiable information; constructing a rule for each circumstance in which one of said privacy-related actions may be taken or must be taken; allowing for the input of dynamic contextual information to precisely specify the condition for evaluation of a rule; creating a programming object containing at least one of said rules; associating the programming object with personally identifiable information; processing a request; and providing an output. The invention does not merely give a “yes-or-no answer. The invention has the advantage of being able to specify additional actions that must be taken. The invention may use a computer system and network. One aspect of the present invention is a method for handling personally identifiable information.
    Type: Application
    Filed: June 19, 2001
    Publication date: January 16, 2003
    Applicant: International Business Machines Corporation
    Inventors: Steven B. Adler, Endre Felix Bangerter, Nigel Howard Julian Brown, Jan Camenisch, Arthur M. Gilbert, Guenter Karjoth, Dogan Kesdogan, Michael Robert McCullough, Adam Charles Nelson, Charles Campbell Palmer, Martin Joseph Clayton Presler-Marshall, Michael Schnyder, Elsie Van Herreweghen, Michael Waidner
  • Publication number: 20030004734
    Abstract: The present invention involves providing in a computer a first set of object classes representing active entities in an information-handling process, wherein a limited number of privacy-related actions represent operations performed on data, and providing in the computer a second set of object classes representing data and rules in the information-handling process, wherein at least one object class has rules associated with data. The invention also involves using the above-mentioned objects in constructing a model of an information-handling process, and providing output that identifies at least one way in which the information-handling process could be improved. One aspect of the present invention is a method for handling personally identifiable information. Another aspect of the present invention is a system for executing the method of the present invention.
    Type: Application
    Filed: June 19, 2001
    Publication date: January 2, 2003
    Applicant: International Business Machines Corporation
    Inventors: Steven B. Adler, Endre Felix Bangerter, Kathryn Ann Bohrer, Nigel Howard Julian Brown, Jan Camenisch, Arthur M. Gilbert, Dogan Kesdogan, Matthew P. Leonard, Xuan Liu, Michael Robert McCullough, Adam Charles Nelson, Charles Campbell Palmer, Calvin Stacy Powers, Michael Schnyder, Edith Schonberg, Matthias Schunter, Elsie Van Herreweghen, Michael Waidner