Trusted data verification

  • US 10,181,953 B1
  • Filed: 09/16/2013
  • Issued: 01/15/2019
  • Est. Priority Date: 09/16/2013
  • Status: Active Grant
  • ×
    • Pin Icon | RPX Insight
    • Pin
First Claim
Patent Images

1. A computer-implemented method, comprising:

  • reading, by one or more computer systems from persistent data storage, data and an electronic signature, the electronic signature having been generated based at least in part on;

    the data; and

    first secret information shared between a first entity and a verification system, the first secret information being;

    derived from second secret information that indicates a scope of use of the first secret information, the scope of use comprising one or more computing operations allowed to be taken using the first secret information; and

    inaccessible to the one or more computer systems;

    submitting, over a network to the verification system, a request to verify the electronic signature, the request including the data and the electronic signature;

    obtaining, from the verification system, a response to the request that includes an indication whether the verification system attests to validity of the electronic signature, the indication being dependent at least in part on whether the electronic signature is verifiable as being within the scope of use indicated by the second secret information; and

    performing the one or more computing operations using the first secret information dependent on the indication.

View all claims

    Thank you for your feedback