Claims
- 1. A method for ensuring that electronic transactions are processed anonymously, comprising:
initially registering a requestor with a distributor; delivering a unique set of device keys to said requestor; sending an anonymous transaction request from said requester to said distributor; transmitting an encrypted response from said distributor; and processing said response by said requester.
- 2. The method of claim 1 wherein said distributor is a content server.
- 3. The method of claim 1 wherein said distributor is an intermediary between said requestor and a content server.
- 4. The method of claim 1 wherein said request relates to at least one of: an auction, a financial transaction, a research transaction, a real estate transaction, and access to a database.
- 5. The method of claim 1 wherein anonymizing networks perform said sending.
- 6. The method of claim 1 wherein anonymizing networks perform said transmitting.
- 7. The method of claim 1 wherein said request triggers a plurality of said responses.
- 8. The method of claim 1 wherein said response is broadcast and only registered requesters can decrypt said response with a session key computed using said device keys.
- 9. The method of claim 1 wherein said processing includes selecting particular responses from a plurality of transmissions.
- 10. The method of claim 1 wherein said processing includes decrypting said responses.
- 11. The method of claim 1 wherein said requestor determines that requestor anonymity is threatened by detecting revocations resulting from tracing attempts said distributor makes.
- 12. The method of claim 1 wherein payments to said distributor by said requestor are not dependent on the transactions processed.
- 13. The method of claim 1 wherein payments to said distributor by said requestor are dependent on the transactions processed.
- 14. The method of claim 13 wherein tamper-resistant software certified by a mutually trusted third party tracks transaction data.
- 15. The method of claim 13 wherein a trusted third party administrator performs at least one of: providing said device keys to said requestors, tracking requestor registration information, and periodically providing a session key block to said distributor reflecting a current set of registered requesters.
- 16. The method of claim 1 wherein said requestor and said distributor communicate via a point-to-point connection that does not identify said requester.
- 17. The method of claim 1 wherein said response includes content protected with a unique content key that is encrypted by a current session key and included in encrypted form in said response.
- 18. A system for ensuring that electronic transactions are processed anonymously, comprising:
a processor that initially registers a requester with a distributor; a second processor that delivers a unique set of device keys to said requestor; a request sender that sends an anonymous transaction request from said requestor to said distributor; a response transmitter that transmits an encrypted response from said distributor; and a receiver that processes said response for said requester.
- 19. A system for ensuring that electronic transactions are processed anonymously, comprising:
means for initially registering a requestor with a distributor; means for delivering a unique set of device keys to said requester; means for sending an anonymous transaction request from said requestor to said distributor; means for said distributor to transmit an encrypted response; and means for said requester to process said response.
- 20. A computer program product method comprising a machine-readable medium having machine-executable instructions thereon including code means for ensuring that electronic transactions are processed anonymously, comprising:
a first code for initially registering a requestor with a distributor; a second code for delivering a unique set of device keys to said requestor; a third code for sending an anonymous transaction request from said requestor to said distributor; a fourth code for transmitting an encrypted response from said distributor; and a fifth code for processing said response for said requestor.
- 21. A business method for conducting electronic commerce while ensuring that electronic transactions are processed anonymously, comprising:
initially registering a requester with a distributor; delivering a unique set of device keys to said requester; sending an anonymous transaction request from said requester to said distributor; transmitting an encrypted response from said distributor; and processing said response by said requestor, wherein said requestor pays extra for anonymity.
CROSS-REFERENCE TO RELATED APPLICATIONS
[0001] This invention is related to nine commonly-owned pending U.S. patent applications, each of which is hereby incorporated by reference, including:
[0002] U.S. Ser. No. 09/770,877, filed Jan. 26, 2001, entitled “Method for Broadcast Encryption and Key Revocation of Stateless Receivers”.
[0003] U.S. Ser. No. 09/771,239, filed Jan. 26, 2001, entitled “Method for Tracing Traitor Receivers in a Broadcast Encryption System”.
[0004] U.S. Ser. No. 09/777,506, filed Feb. 5, 2001, entitled “Method for Assigning Encryption Keys”.
[0005] U.S. Ser. No. 09/789,451, filed Feb. 20, 2001, entitled “Method for Assigning Encryption Keys”.
[0006] U.S. Ser. No. 10/042,652, filed Jan. 8, 2002, entitled “Method for Ensuring Content Protection and Subscription Compliance”.
[0007] U.S. Ser. No. 09/358,162, filed Jul. 20, 1999, entitled “Content Guard System for Copy Protection of Recordable Media”.
[0008] U.S. Ser. No. 09/575,740, filed May 22, 2000, entitled “Coincidence-Free Media Key Block for Content Protection for Recordable Media”.
[0009] U.S. Ser. No. 09/597,600, filed Apr. 24, 1998, entitled “System for Encrypting Broadcast Programs in the Presence of Compromised Receiver Devices”.
[0010] U.S. Ser. No. 09/564,658, filed May 3, 2000, entitled “Forensic Media Key Blocks for Identifying Compromised Keys”.