Identity Management Service Using A Blockchain Providing Certifying Transactions Between Devices
First Claim
1. A method, comprising operations of:
- receiving, on a first remote device, a first transaction number and personal data transmitted from a second remote device, wherein the first transaction number was received from a distributed public database in response to a transmission, from the second remote device, of a signed hash value and a first public key associated with a first private key on the second remote device, wherein the signed hash value was created by signing a hash value with the first private key, and wherein the hash value was generated by hashing the personal data with a hashing algorithm on the second remote device;
using the first transaction number to retrieve the signed hash value and the first public key from the distributed public database,hashing the personal data using the hashing algorithm to create a generated hash value;
verifying that the hash value in the retrieved signed hash value is the same as the generated hash value;
verifying that the retrieved signed hash value was signed with the first private key; and
creating a certification.
8 Assignments
0 Petitions
Accused Products
Abstract
Logic on a first remote device receives a first transaction number and personal data transmitted from a second remote device. The first transaction number was received from a distributed public database in response to a transmission, from the second remote device, of a signed hash value and a first public key associated with a first private key on the second remote device. The signed hash value was created by signing a hash value with the first private key and the hash value was generated by hashing the personal data with a hashing algorithm on the second remote device. The logic uses the first transaction number to retrieve the signed hash value and the first public key from the distributed public database. The logic hashes the personal data using the hashing algorithm to create a generated hash value and verifies the signed hash value against the generated hash value.
420 Citations
20 Claims
-
1. A method, comprising operations of:
-
receiving, on a first remote device, a first transaction number and personal data transmitted from a second remote device, wherein the first transaction number was received from a distributed public database in response to a transmission, from the second remote device, of a signed hash value and a first public key associated with a first private key on the second remote device, wherein the signed hash value was created by signing a hash value with the first private key, and wherein the hash value was generated by hashing the personal data with a hashing algorithm on the second remote device; using the first transaction number to retrieve the signed hash value and the first public key from the distributed public database, hashing the personal data using the hashing algorithm to create a generated hash value; verifying that the hash value in the retrieved signed hash value is the same as the generated hash value; verifying that the retrieved signed hash value was signed with the first private key; and creating a certification. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method, comprising operations of:
-
receiving, on a first smartphone, a first transaction number and personal data transmitted from a second smartphone, wherein the first transaction number was received from a block chain in response to a transmission, from the second smartphone, of a signed hash value and a first public key associated with a first private key on the second smartphone, wherein the signed hash value was created by signing a hash value with the first private key, and wherein the hash value was generated by hashing the personal data with a hashing algorithm on the second remote device; using the first transaction number to retrieve the signed hash value and the first public key from the block chain, hashing the personal data using the hashing algorithm to create a generated hash value; verifying that the hash value in the retrieved signed hash value is the same as the generated hash value; verifying that the retrieved signed hash value was signed with the first private key; and creating a certification. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. A method, comprising operations of:
-
receiving, on a first smartphone, a first transaction number and personal data transmitted from a second smartphone, wherein the receiving involves scanning a barcode or QR code, wherein the first transaction number was received from a block chain in response to a transmission, from the second smartphone, of a signed hash value and a first public key associated with a first private key on the second smartphone, wherein the signed hash value was created by signing a hash value with the first private key, and wherein the hash value was generated by hashing the personal data with a hashing algorithm on the second remote device; using the first transaction number to retrieve the signed hash value and the first public key from the block chain, hashing the personal data using the hashing algorithm to create a generated hash value; verifying that the hash value in the retrieved signed hash value is the same as the generated hash value; verifying that the retrieved signed hash value was signed with the first private key; and creating a certification. - View Dependent Claims (19, 20)
-
Specification