| http://www.w3.org/ns/prov#value | - The method includes establishing an identity with a third party, obtaining an anonymous certificate having a selected attribute from the third party, and presenting the anonymous certificate to the second party to establish the anonymous communication. [0011] Another embodiment of the present invention is a method of providing a secure anonymous certificate to a first party by a third party.
|