NETWORK NODE AUTHENTICATION
First Claim
Patent Images
1. A method, comprising:
- receiving, by a microprocessor and from a computing device, a set of credentials to be validated and an electronic address;
providing, by the microprocessor to the computing device, a challenge token;
receiving, by the microprocessor from the computing device, a signed version of the challenge token, the signed version being signed by a private key associated with a user of the computing device;
successfully validating, by the microprocessor, that the signature of the signed version of the challenge token is associated with the user;
in response to the successful validation of the signature, generating, by the microprocessor, an obfuscated unique identity associated with the user or the user device made up or derived from the set of credentials and/or user device characteristics; and
causing, by the microprocessor, a digital distributed secure ledger to be updated to include the obfuscated unique identity.
2 Assignments
0 Petitions
Accused Products
Abstract
An authentication technique is disclosed that uses a distributed secure listing of transactions that includes encrypted data that can be used to authenticate a principal to a verifier.
185 Citations
20 Claims
-
1. A method, comprising:
-
receiving, by a microprocessor and from a computing device, a set of credentials to be validated and an electronic address; providing, by the microprocessor to the computing device, a challenge token; receiving, by the microprocessor from the computing device, a signed version of the challenge token, the signed version being signed by a private key associated with a user of the computing device; successfully validating, by the microprocessor, that the signature of the signed version of the challenge token is associated with the user; in response to the successful validation of the signature, generating, by the microprocessor, an obfuscated unique identity associated with the user or the user device made up or derived from the set of credentials and/or user device characteristics; and causing, by the microprocessor, a digital distributed secure ledger to be updated to include the obfuscated unique identity. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method, comprising:
-
receiving, by a computing device of a verifier, a signed version of a token, a public electronic address of a computing device of a principal, and a crypto-variable; successfully validating, by the verifier computing device, that a key of the principal was used to sign the signed version of the token; in response to the successful validation that the key of the principal was used to sign the signed version of the token, determining, by the verifier computing device, a non-expired transaction in a digital distributed secure ledger corresponds to selected first and second electronic addresses, non-expired transaction in the digital distributed secure ledger comprising an obfuscated attribute; and verifying, by the verifier computing device, that the obfuscated attribute was derived from the crypto-variable. - View Dependent Claims (7, 8, 9)
-
-
10. A verification system, comprising:
-
an arithmetic/logic unit (“
ALU”
) to perform one or more mathematical operations and compare selected variables;a register to hold a value from a comparison of selected variables performed by the ALU; an instruction decoder to provide read and write commands to memory; an address bus to provide a location address to memory for a read or write operation; and a data bus to provide or access data for a write or read operation to or from memory, wherein; as a part of a transaction, the ALU continuously and automatically; receives, from a computing device, a set of credentials to be validated and an electronic address; provides, to the computing device, a challenge token; receives, from the computing device, a signed version of the challenge token, the signed version being signed by a private key associated with a user of the computing device; successfully validates, by comparison of the received version of the challenge token with a version of the challenge token generated by the ALU using the private key, that the signature of the signed version of the challenge token is associated with the user; in response to the successful validation of the signature, generates an obfuscated unique identity associated with the user or the user device made up or derived from the set of credentials and/or user device characteristics; and causes a digital distributed secure ledger to be updated to include the obfuscated unique identity. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A system, comprising:
-
an arithmetic/logic unit (“
ALU”
) to perform one or more mathematical operations and compare selected variables;a register to hold a value from a comparison of selected variables performed by the ALU; an instruction decoder to provide read and write commands to memory; an address bus to provide a location address to memory for a read or write operation; and a data bus to provide or access data for a write or read operation to or from memory, wherein; as a part of a transaction, the ALU continuously and automatically; receives a signed version of a token, a public electronic address of a computing device of a principal, and a crypto-variable; successfully validates, by comparison of the received version of the token with a version of the token generated by the ALU using a key of the principal, that a key of the principal was used to sign the signed version of the token; in response to the successful validation that the key of the principal was used to sign the signed version of the token, determines a non-expired transaction in a digital distributed secure ledger corresponds to selected first and second electronic addresses, non-expired transaction in the digital distributed secure ledger comprising an obfuscated attribute; and verifies that the obfuscated attribute was derived from the crypto-variable. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification