Intel Patents Anonymity Server
John Young
jya at pipeline.com
Tue Sep 10 11:16:51 PDT 2002
http://cryptome.org/intel-anon.htm
[Excerpt. There are 15 images in the patent.]
Anonymity Server, May 14, 2002
Description
BACKGROUND
1. Field
The present invention relates to the field of communications.
More particularly, the present invention relates to a system and
method for maintaining anonymous and traffic analysis resistant
communications over a communication link.
2. Related Art
Over the last few years, personal and commercial usage of the
Internet has increased dramatically. As a result, companies are
beginning to monitor such usage for a number of reasons. For
example, marketing companies can analyze Internet traffic in
order to develop consumer profiles of various users or to obtain
information about ongoing projects by a competitive company.
In an attempt to thwart data collection through traffic analysis
and provide message anonymity over public communication
links like the Internet, anonymous remailers are now being
provided. An "anonymous remailer" is a computer that
receives an electronic message over a communication link
from a sender and redirects that electronic message to an
intended recipient. By encrypting audible and/or viewable
data of the electronic message, the integrity and confidentiality
of that data would be protected against unauthorized access
by the operator of the anonymous remailer or an interloper.
It is evident that the above-described conventional communication
scheme would substantially ensure the preservation of the
integrity and confidentiality of data within an electronic message.
However, this conventional communication scheme fails to protect
the integrity or confidentiality of data transmitted back to the
original sender in the form of a response from the intended
recipient.
In certain situations, anonymous remailers have been configured
to assign a unique tag to each original sender of an electronic
message before the electronic message is redirected to the
intended recipient. This tag is used as a secret key by the intended
recipient to encrypt data contained in a response to the electronic
message. However, to support this communication scheme, the
anonymous remailer would have to decrypt the response with the
tag and re-encrypt the response with the public key of the original
sender because the intended recipient would have no knowledge
of the original sender, namely a public key of the original sender.
Since the operator responsible for the anonymous remailer would
have access to the return path of the response, reliance on the
integrity of that operator is required. Clearly, this substantially
reduces the level of *security* of this communication scheme.
Therefore, it would be desirable to create an electronic system
and a corresponding method for maintaining anonymous and
traffic analysis resistant communications over a communication
link without dependence on the integrity of the system operator.
-----
More information about the cypherpunks-legacy
mailing list