Invention Title:

CRYPTOGRAPHIC SYSTEMS AND METHODS USING DISTRIBUTED LEDGERS

Publication number:

US20240204990

Publication date:
Section:

Electricity

Class:

H04L9/0847

Inventor:

Assignee:

Applicant:

Drawings (4 of 16)

Smart overview of the Invention

Innovative systems and methods are introduced for securely recording assertions made by entities associated with specific identities. These systems leverage distributed ledgers to enable users to make cryptographic assertions that are non-revocable and resistant to forgery. By posting entries in an immutable ledger, users can ensure that their assertions remain valid even if their private keys are compromised.

Utilization of Distributed Ledgers

Distributed ledgers, often linked with blockchain technology, play a crucial role in enhancing public key infrastructure and identity verification services. These ledgers allow users to make cryptographic assertions tied to their identity, ensuring that even if both the user's and signing authority’s keys are lost, the assertions remain protected from impersonation and fraud.

Role of Trusted Authorities

Trusted entities, known as name authorities, are essential in binding enciphering keys to specific identities. They can post certificates on the ledger that authenticate a user’s key association with their identity. This setup allows users to verify the legitimacy of their identity claims and submit messages securely using their enciphering keys.

Mechanisms for User Control

Users have mechanisms at their disposal to disable further messages signed with their keys. By posting terminal messages on the ledger, users can prevent impersonation even if their enciphering key is compromised. Additionally, name authorities can confirm the legitimacy of all prior entries made under a user’s key, ensuring accountability and integrity in the assertion process.

Enhanced Privacy and Security Measures

The disclosed systems provide methods for users to assert ownership of files or data without revealing their contents, protecting sensitive information from unauthorized access. Furthermore, these systems address challenges associated with maintaining long-term control over enciphering keys, offering recourse for disputes between users and name authorities while minimizing risks related to key compromise.