Showcase - Example Application
The example application realizes pseudonymous shopping with the aid of a trustee.
The purchase is related to electronic goods (i.e. e-Books) which can be transferred via an already established TCP-IP connection.
The trustee must be able to verify the completeness and correctness of the delivery.
Requirements and Constraints
In the presented scenario there are three types of participants, further called roles.
These are the customer, the trader and the trustee.
Thenames Alice, Bob and Charlie are used for easier referral.
Types of pseudonyms for the customer (Alice):
- transaction pseudonym
- person, role, rolerelation and role relation pseudonym (won't mean any advantage)
Types of pseudonyms for the trader (Bob):
- certified person or role pseudonym
- transaction pseudonym (less trustworthy)
Types of pseudonyms for the trustee (Charlie):
- certified person or role pseudonym
- no transaction pseudonym, because his correct behavior won't be provable
Architecture
Every participant has its own, small application, which uses the identity manager to establish connections, choose pseudonyms and sign documents.
Dataflow between participants
Prototype
Realizes:
- usage of the identity manager
- provision of the catalog
- order and shipment
Uses:
- IDMAN - for connection establishment, authentication, logging
Recent Version
System Requirements
Developers
Thanks to:
- Sven Döring, Torsten Keil, Andreas Kowarz for design and prototype.
- Thomas Kriegelstein for integration of identity management functionality into the
prototype
|