SYSTEMS AND METHODS AUTHENTICATING A DIGITALLY SIGNED ASSERTION USING VERIFIED EVALUATORS
First Claim
1. A method of authenticating a requesting device using verified evaluators, the method comprising:
- receiving, by an authenticating device, at least a first digitally signed assertion from a requesting device, the at least a first digitally signed assertion linked to at least a verification datum;
evaluating, by the authenticating device, at least a second digitally signed assertion, signed by at least a cryptographic evaluator, conferring a credential to the requesting device;
validating, by the authenticating device, the credential as a function of the at least a second digitally signed assertion; and
authenticating, by the authenticating device, the requesting device based on the credential.
2 Assignments
0 Petitions
Accused Products
Abstract
A system for authenticating a requesting device using verified evaluators includes an authenticating device. The authenticating device is designed and configured to receive at least a first digitally signed assertion from a requesting device, the at least a first digitally signed assertion linked to at least a verification datum, evaluate at least a second digitally signed assertion, signed by at least a cryptographic evaluator, conferring a credential to the requesting device, validate the credential, as a function of the at least a second digitally signed assertion, and authenticate the requesting device based on the credential.
81 Citations
20 Claims
-
1. A method of authenticating a requesting device using verified evaluators, the method comprising:
-
receiving, by an authenticating device, at least a first digitally signed assertion from a requesting device, the at least a first digitally signed assertion linked to at least a verification datum; evaluating, by the authenticating device, at least a second digitally signed assertion, signed by at least a cryptographic evaluator, conferring a credential to the requesting device; validating, by the authenticating device, the credential as a function of the at least a second digitally signed assertion; and authenticating, by the authenticating device, the requesting device based on the credential. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 20)
-
-
14. A system for authenticating a requesting device using verified evaluators, the system comprising:
an authenticating device, wherein the authenticating device is designed and configured to receive at least a first digitally signed assertion from a requesting device, the at least a first digitally signed assertion linked to at least a verification datum, evaluate at least a second digitally signed assertion, signed by at least a cryptographic evaluator, conferring a credential to the requesting device, validate the credential, as a function of the at least a second digitally signed assertion, and authenticate the requesting device based on the credential. - View Dependent Claims (15, 16, 17, 18, 19)
Specification