Every one of us, who has been using Internet know that we have a particularly identity, call it as password or user name in proclaiming that it is a known person who is trying to use the website.
Texas University IT has devised a wholly revolutionary network, which enables its users to authenticate themselves without falling back on conventional unique identities.
Conventional networking systems have some problem areas. Can we have a network which doesn’t ask for user identity; how does one identify himself in such a network. These questions are answered by the new IT innovation. This program has brought out a system, which is developed on an addressing method, related to a user-selected, unlimited pseudonym-based, completely circumventing the possibility of exposing to identity threat. It is only the server of the network which recognized you, apart from yourself, identifying which address belongs to which pseudonym.
The question of communicating anonymously has engaged the research bodies’ attention, and even as far back as 1981 research has tackled this issue. Over the last decade encrypted emails with layered-connection, known as Onion routing are in use but these methods have their own problems, especially limiting the number of users at any given time, and secondly such networks require a huge investment in servers if more users are to be accommodated in a given part of time, so that the traffic can be carried.
The Texas network, however, doesn’t have any user-specific identity. Users are required to search and use their pseudonyms, which is subjected to change continuously. It is the user himself who authenticates, and there is no outside authority to certify whether he is the same person. Since there is no identity, naturally there can be no theft of identify.