SECURE TOKEN PASSING VIA HASH CHAINS
First Claim
1. A method comprising:
- receiving a request to add an expansion node to a hash chain associated with a resource to signify a transfer of a privilege associated with the resource, wherein the request includes a confirmation possession token;
generating a confirmation hash digest based on the confirmation possession token via a hashing function associated with the hash chain;
verifying the confirmation hash digest matches a predecessor hash digest indicated in a predecessor node of the hash chain, wherein the hashing function maps a predecessor possession token to the predecessor hash digest; and
linking the expansion node to the predecessor node, wherein the expansion node indicates the predecessor possession token and a successor hash digest, wherein the successor hash digest is based on a successor possession token.
2 Assignments
0 Petitions
Accused Products
Abstract
Embodiments presented herein provide systems and methods for creating and modifying a hash chain. A hash chain is created to track resource-privilege transfers between entities. A root node of the hash chain identifies the resource and specifies a digest of a possession token held by a first entity that initially possesses the privilege. A transfer of the privilege to a second entity can be recorded by adding an expansion node to the hash chain. If the second entity successfully reveals a possession token that a hashing function associated with the hash chain maps to the digest, an expansion node is linked to the root node. The expansion node indicates the possession token and a successor digest that is based on a successor possession token.
-
Citations
20 Claims
-
1. A method comprising:
-
receiving a request to add an expansion node to a hash chain associated with a resource to signify a transfer of a privilege associated with the resource, wherein the request includes a confirmation possession token; generating a confirmation hash digest based on the confirmation possession token via a hashing function associated with the hash chain; verifying the confirmation hash digest matches a predecessor hash digest indicated in a predecessor node of the hash chain, wherein the hashing function maps a predecessor possession token to the predecessor hash digest; and linking the expansion node to the predecessor node, wherein the expansion node indicates the predecessor possession token and a successor hash digest, wherein the successor hash digest is based on a successor possession token. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system comprising:
-
one or more processors; and memory storing one or more applications that, when executed on the one or more processors, perform an operation comprising; receiving a request to add an expansion node to a hash chain associated with a resource to signify a transfer of a privilege associated with the resource, wherein the request includes a confirmation possession token; generating a confirmation hash digest based on the confirmation possession token via a hashing function associated with the hash chain; verifying the confirmation hash digest matches a predecessor hash digest indicated in a predecessor node of the hash chain, wherein the hashing function maps a predecessor possession token to the predecessor hash digest; and linking the expansion node to the predecessor node, wherein the expansion node indicates the predecessor possession token and a successor hash digest, wherein the successor hash digest is based on a successor possession token. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable storage medium containing instructions that, when executed by one or more processors, perform an operation comprising:
-
receiving a request to add an expansion node to a hash chain associated with a resource to signify a transfer of a privilege associated with the resource, wherein the request includes a confirmation possession token; generating a confirmation hash digest based on the confirmation possession token via a hashing function associated with the hash chain; verifying the confirmation hash digest matches a predecessor hash digest indicated in a predecessor node of the hash chain, wherein the hashing function maps a predecessor possession token to the predecessor hash digest; and linking the expansion node to the predecessor node, wherein the expansion node indicates the predecessor possession token and a successor hash digest, wherein the successor hash digest is based on a successor possession token. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification