WO2021086597A1 - Proxied cross-ledger authentication - Google Patents

Proxied cross-ledger authentication Download PDF

Info

Publication number
WO2021086597A1
WO2021086597A1 PCT/US2020/055426 US2020055426W WO2021086597A1 WO 2021086597 A1 WO2021086597 A1 WO 2021086597A1 US 2020055426 W US2020055426 W US 2020055426W WO 2021086597 A1 WO2021086597 A1 WO 2021086597A1
Authority
WO
WIPO (PCT)
Prior art keywords
ledger
issuer
verifier
client
market maker
Prior art date
Application number
PCT/US2020/055426
Other languages
French (fr)
Inventor
Mark Chen
Ramesh Kesanupalli
Soonhyung LEE
Jason S. BURNETT
Taejin Kim
Changsoo Kim
Original Assignee
Digital Trust Networks Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Digital Trust Networks Inc. filed Critical Digital Trust Networks Inc.
Priority to JP2022525180A priority Critical patent/JP2023500260A/en
Priority to EP20880816.2A priority patent/EP4052206A4/en
Priority to KR1020227014549A priority patent/KR20220070303A/en
Publication of WO2021086597A1 publication Critical patent/WO2021086597A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/381Currency conversion
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/405Establishing or using transaction specific rules
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3218Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
    • H04L9/3221Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs interactive zero-knowledge proofs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q2220/00Business processing using cryptography

Definitions

  • Distributed ledger technology such as blockchain technology, has been used to provide distributed ledger-based identity networks.
  • Distributed ledger technology enables user identity and/or other claims (e.g., postal address, social security number, passport number, bank account number, etc.), potentially from different issuers, to be verified while protecting privacy and control by each user/owner of the user/owner’s data.
  • claims e.g., postal address, social security number, passport number, bank account number, etc.
  • More than one distributed ledger-based identity network exists.
  • An entity wishing to be authenticated and or to have a claim verified (sometimes referred to herein as a Client) may be on a different distributed ledger based identity network than the entity seeking to verify the Client (sometimes referred to herein as a Verifier).
  • a Client may be on a different distributed ledger based identity network than the entity seeking to verify the Client (sometimes referred to herein as a Verifier).
  • each network must include cross-ledger transaction capability for that ledger pair.
  • Figure 1 A is a block diagram illustrating an embodiment of a proxied cross ledger authentication system and environment.
  • Figure IB is a block diagram illustrating an embodiment of a proxied cross- ledger authentication system.
  • Figures 2A and 2B are flow diagrams illustrating an embodiment of a process to perform proxied cross-ledger authentication.
  • Figure 3 is a call sequence diagram illustrating an embodiment of a Zero-
  • ZKCP Knowledge Contingent Payment
  • the invention can be implemented in numerous ways, including as a process; an apparatus; a system; a composition of matter; a computer program product embodied on a computer readable storage medium; and/or a processor, such as a processor configured to execute instructions stored on and or provided by a memory coupled to the processor.
  • these implementations, or any other form that the invention may take, may be referred to as techniques.
  • the order of the steps of disclosed processes may be altered within the scope of the invention.
  • a component such as a processor or a memory described as being configured to perform a task may be implemented as a general component that is temporarily configured to perform the task at a given time or a specific component that is manufactured to perform the task.
  • processor refers to one or more devices, circuits, and or processing cores configured to process data, such as computer program instructions.
  • Market Maker provides cross-ledger liquidity for all participating token types and enables Client- Verifier rendezvous across ledgers.
  • a solution as disclosed herein allows users of a distributed ledger-based identity network (“Clients”) to authenticate to relying parties (“Verifiers”) on different ledgers.
  • a solution as disclosed herein has one or more of the following properties, in various embodiments:
  • a solution as disclosed herein may involve one or more of the following roles:
  • Client entity wishing to be authenticated by a Verifier. An example is an individual user.
  • Issuer entity that signs the Client's public key, binding it to a set of attributes.
  • An example is a passport agency that binds the Client's nationality, date of birth, etc.
  • Market Maker intermediary in the authentication transaction. Provides cross-ledger liquidity for all participating token types and enables Client-Verifier rendezvous.
  • Trust Source signer of Issuer's signing key. May also be signer of Market Maker's key (though the Market Maker can be its own trust source). The Trust Source's public key is available on all participating ledgers.
  • Verifier the relying party in a transaction.
  • An example is an online store.
  • a solution as disclosed herein may be used to facilitate cross-ledger transactions, including but not limited to cross-ledger payments.
  • a Verifier may make a payment to a Client and/or Issuer on another ledger, such as to pay the Issuer for verifying that a claim issued/signed by the Issuer has not been revoked, or paying a Client to provide the user’s identity credential and or other data.
  • Authentication Initiation Contract smart contract written by the Client to the Market Maker Ledger to initiate an authentication transaction. Pledges a time locked Authentication Security Deposit, which is released back to the Client upon timeout or contract completion.
  • Maker Ledger Tokens and time locked by the Client in the Authentication Initiation Contract The purpose of this object is to discourage spend-forcing attacks against Verifiers.
  • Client Authentication Address address or key pair on the Client Ledger, created by the Client for the purpose of conducting a cross-ledger authentication transaction
  • Client Handle unique identifier for the Client. Consists of the Client
  • Client Ledger Token cryptocurrency unit on the Client Ledger.
  • Client Public Key public component of a cryptographic key pair owned by the Client and associated with the Client Authentication Address.
  • Client Revocation Data Client-supplied component of publicly verifiable revocation (or validity) data pertaining to the Client Public Key. For example, in a bilinear- map revocation scheme, this would correspond to the witness.
  • Issuer Authentication Contract smart contract between Issuer and Verifier, written to the Market Maker Ledger. Stipulates the Issuer Fee amount (to be paid by the Verifier) and commits to release of the Issuer Revocation Data upon payment.
  • Issuer Fee fee paid by the Verifier to the Issuer in exchange for the Issuer
  • Issuer Handle unique identifier for the Issuer. Consists of the Issuer's address on the Market Maker Ledger and the Issuer's public key.
  • Issuer Revocation Data Issuer-supplied component of publicly verifiable revocation (or validity) data pertaining to the Client Public Key. For example, in a bilinear- map revocation scheme, this would correspond to the accumulator. In other implementations, it may be a simple certificate revocation list. In any case, this value is signed by the Issuer.
  • Market Maker Ledger a distributed ledger associated with a Market Maker.
  • a Market Maker may have and/or comprise its own distributed ledger and or may use or otherwise be on and or associated with a distributed ledger operated by another entity, including in some embodiments a ledger on which the Client and or Verifier happen to be on.
  • Market Maker Ledger Token cryptocurrency unit on the Market Maker
  • off-ledger address (for example, a
  • Validation Requirements Issuer's requirements for supplying the Issuer's component of the Validity Proof. At minimum, this will include the Issuer Fee expressed in Client Ledger tokens.
  • Validity Proof proof of the validity of the Client Public Key. This may be in any agreed form. For example, in a bilinear-map revocation scheme, this would be an actual validity proof (including the Issuer Revocation Data). In other implementations, it may be a simple certificate revocation list.
  • Verifier Exchange Rate exchange rate between Verifier Ledger Tokens and Market Maker Ledger Tokens when the Authentication Initiation Contract is instantiated.
  • Verifier Handle cross-ledger unique identifier for the Verifier's account on the Market Maker Ledger. Consists of the Market Maker Ledger Identifier, the Verifier's address on the Market Maker Ledger, and the Verifier Public Key.
  • Verifier Off-Ledger Address off-ledger address (for example, a URL) at which a transaction participant may communicate with the Verifier
  • Verifier Presentation Requirements list of Verifier's requirements for performing authentication of a Client, written on the Verifier Ledger. This includes the Verifier Off-Ledger Address, required Client Security Deposit amount, and Security Deposit Target Currency, and may include, for example, a liveness requirement for revocation data.
  • the values in this structure may optionally default to values supplied by the Market Maker via any on- or off-ledger channel.
  • Verifier Public Key public component of the cryptographic key pair owned by the Verifier.
  • Figure 1 A is a block diagram illustrating an embodiment of a proxied cross ledger authentication system and environment.
  • system 100 includes a plurality of distributed ledger-based identity networks, represented in Figure 1 A by distributed ledger-based identity networks 102, 104, and 106.
  • a market maker system 108 e.g., a computer server configured to operate as a Market Maker as disclosed herein, is connected via one or more network connections to each of the distributed ledger-based identity networks comprising the plurality of distributed ledger-based identity networks, such as distributed ledger-based identity networks 102, 104, and 106, in this example.
  • the market maker system 108 acts as an intermediary in authentication transactions, as disclosed herein, including by providing cross-ledger liquidity for all participating token types to facilitate transactions when a client and verifier (or other transaction participant) are on different identity networks.
  • market maker system 108 and enables Client- Verifier rendezvous, such as by enabling Clients and or Verifiers to establish identities and or to initiate and or consummate transactions on a Market Maker Ledger associated with the market maker system 108.
  • market maker system 108 is represented as being external to the distributed ledger-based identity networks 102, 104, and 106.
  • market maker system 108 may be included in (e.g., be an entity having an identity and or participating on) one or more of the distributed ledger-based identity networks 102, 104, and 106.
  • Clients, Issuers, and or Verifiers may each establish a temporary and or a more permanent or long term use address on a Market Maker Ledger, as disclosed herein, for use in performing authentication and or other transactions via the
  • a Market Maker maintains an account on each of a plurality of participating ledgers and the Market Maker uses its respective accounts on each ledger to perform the Market Maker function disclosed herein.
  • participants such as Clients, Issuers, Verifiers, and/or the Market Maker may use a universal address that is recognized by/on each participating ledger and or which can be resolved to an address usable on each ledger.
  • Figure IB is a block diagram illustrating an embodiment of a proxied cross ledger authentication system.
  • market maker system 108 of Figure 1A is shown to be on a Market Maker Ledger 120.
  • Market maker system 108 is connected, e.g., via one or more networks, to Client 122 on Client Ledger 124 and Verifier 126 on Verifier Ledger 128.
  • Client 122, Verifier 126, and Market Maker 108 are all on separate distributed ledgers, and the Client 122 and Issuer 130 are on the same ledger 124.
  • Client 122, Issuer 130, and Verifier 126 each has an address on the Market Maker Ledger 126, and monitors its transactions on Market Maker Ledger 126.
  • the public keys of Trust Source 132 are available on all participating Ledgers 120, 124, 128 (and or installed on Client 122, Issuer 130, and Verifier 126 devices).
  • the Client 122 knows the Verifier Flandle of Verifier 126 (consisting of the Verifier's address on the Market Maker Ledger 120 and the Verifier's public key). This is obtained, in various embodiments, via the Verifier's web site, a QR code, e-mail, text message, or other such mechanism.
  • all off-ledger channels are encrypted and authenticated via some standard protocol such as TLS.
  • the Client 122 and Verifier 126 are on different ledgers, with a Market Maker Ledger 120 serving as an intermediary, in various embodiments, the Client 122 and Verifier 126 may be on the same ledger. In some embodiments, in cases in which the Client 122 and Verifier 126 are on the same ledger the Market Maker Ledger 120 is not needed or used to perform techniques disclosed herein, including without limitation one or more of the following: Verifier paying Issuer for revocation data; Verifier paying Client for client revocation data and or other Client data; and requiring the Client to make a security deposit to discourage spend-forcing attacks against the Verifier.
  • a client such as Client 122
  • a verifying entity such as Verifier 126
  • the Client 122 may determine the Verifier’s 126 presentation requirements and initiate a transaction on Market Maker Ledger 120, e.g., an Authentication Initiation Contract.
  • the Client 122 may initiate the transaction by writing an Authentication Initiation Contract on a ledger other than the Market Maker Ledger 120.
  • the presentation requirements may include a requirement to provide a Client Revocation Data pertaining to the Client Public Key, e.g., a “witness” data in the case of a bilinear-map revocation scheme.
  • the Client 122 may include in the Authentication Initiation Contract information such as the Client Handle, Issuer Handle, Verifier Handle, in some embodiments a refundable deposit (to protect against spend force attacks, e.g., as described below), the Client Revocation Data, and any other information required by the Verifier Presentation Requirements.
  • the Verifier 126 reads the Authentication Initiation Contract instance from the
  • a transaction such as described above may include one or more payments, such as a deposit in a nominal amount by the Client 122, which is refunded or otherwise released at the conclusion of the authentication process.
  • Such a deposit may protect against a “spend force” attack, such as by repeatedly initiating authentication transactions to force a Verifier to spend money (e.g., cryptocurrency) or other resources.
  • a Verifier may also make payments, such as to a Client and or Issuer, to obtain the Client’s data or the Issuer Revocation Data.
  • a Market Maker and or Market Maker Ledger as disclosed herein may facilitate cross-ledger transactions by providing cross-ledger liquidity, e.g., by acting as a cryptocurrency exchange and or by holding funds for Clients and or Verifiers, e.g., in a currency of the Market Maker Ledger, for use to conduct future transactions.
  • a transaction as described above but including payments as described above may be conducted as follows: Client reads Verifier Presentation Requirements from the Market Maker Ledger or from the Verifier via an off-ledger channel Client creates a Client Authentication Address on the Market Maker Ledger for conducting the authentication protocol. If applicable, the controlling key for this address may be signed by another key owned by the Client or belong to an enclosing account structure controlled by the Client Client reads the exchange rate for converting Client Ledger Tokens into Security Deposit Target Currency from any authoritative on- or off-ledger source. For example, this information may be periodically written to the Market Maker Ledger or simply posted on a web site.
  • the Client obtains this information directly from the Market Maker through an off-ledger channel
  • Client exchanges Client Ledger Tokens for Market Maker Ledger Tokens sufficient for making the Authentication Security Deposit (both values of which, i.e., the Security Deposit Target Currency and the Security Deposit amount, are specified in the Verifier Presentation Requirements read in step 1). This occurs according to the
  • Client creates an Authentication Initiation Contract instance on Market Maker Ledger with the Client Handle, Issuer Handle, Verifier Handle, Client Revocation Data (if any), and Authentication Security Deposit (obtained in step 4, above) supplied as arguments, ensuring that the included Client Revocation Data complies with the Verifier Presentation Requirements (received in step 1).
  • the Authentication Initiation Contract time locks the Client's Authentication Security Deposit (for example, by means of a check-lock-time-verify command) for a duration specified in the Verifier Presentation Requirements.
  • Client may optionally include a higher Deposit amount than the computed required amount in order to compensate for possible exchange-rate fluctuations.
  • the Issuer Handle and Authentication Security Deposit may be written to the Market Maker Ledger separately from the Authentication Initiation Contract (but referenced from it), and the remaining informational contents of the Contract traded to the Verifier through a Zero-Knowledge Contingent Payment
  • Verifier reads the Authentication Initiation Contract instance from the Market Maker Ledger. If Verifier is dissatisfied with any of the Contract terms, the transaction stops and the Client is notified via any on- or off-ledger channel 7. Verifier obtains the exchange rate between Verifier Ledger Tokens and Market Maker
  • Ledger tokens in a manner analogous to step 3, above, then determines if the Authentication Security Deposit is adequate. If not, the transaction stops and the Client is notified via any on- or off-ledger channel
  • Verifier connects to Issuer via any on- or off-ledger channel and sends its Verifier Handle.
  • this step may be required to be on ledger in order to discourage spend-forcing attacks against Issuers
  • Issuer supplies Issuer Revocation Data to Verifier in exchange for the Issuer Fee via any trustless exchange protocol, such as Zero-Knowledge Contingent Payment (see below), or through an escrow service provided by a third party (such as the Market Maker) or via any escrow protocol, such as a multi-signature scheme.
  • any trustless exchange protocol such as Zero-Knowledge Contingent Payment (see below)
  • escrow service provided by a third party (such as the Market Maker)
  • any escrow protocol such as a multi-signature scheme.
  • Zero-Knowledge Contingent Payment a. Issuer encrypts Issuer Revocation Data with Verifier's public key (extracted from the Verifier Handle received in the previous step) to create the first encrypted image El b. Issuer generates a random symmetric key K and uses it to encrypt El, resulting in the second encrypted image E2 c. Issuer hashes K to create the hash image H d. Issuer creates a signed Issuer Authentication Contract instance that includes E2, H, the required Issuer Fee amount (expressed in either Client Ledger Tokens or Market Maker Ledger tokens), and any other relevant terms, and sends it to the Verifier via any on- or off-ledger channel e.
  • Verifier looks up the current exchange rate between Verifier Ledger Tokens and the currency denominating the required Issuer Fee (received in step d, above) in a manner analogous to step 3, above g. Verifier exchanges (through the Market Maker) the required quantity of Verifier Ledger Tokens (calculated from the exchange rate obtained in the previous step) for the Issuer Fee, denominated in Market Maker Ledger Tokens h.
  • Verifier creates a signed, hashed time-lock contract instance C containing the Issuer Fee (payable to the Issuer), with the hash condition set to H (the timeout condition may be any value of the Verifier's choosing) i.
  • Verifier writes C to the Market Maker Ledger j.
  • Issuer reads C from the Market Maker Ledger. If it is dissatisfied with any contract terms, the transaction stops and Issuer is notified via any on- or off- ledger channel; the Issuer, in turn, then notifies the Client k.
  • Issuer writes K to the ledger (which is the pre-image of H), thus receiving the payment contained in C l.
  • Verifier reads K from the ledger and uses it to decrypt E2, which yields El m. Verifier uses its private key to decrypt El, which yields the Issuer Revocation Data 10.
  • Verifier constructs the Validity Proof from the Issuer Revocation Data and the Client
  • FIGS. 2A and 2B are flow diagrams illustrating an embodiment of a process to perform proxied cross-ledger authentication.
  • Figure 2A shows the authentication process 200 as performed by a client system, device, and/or application, such as Client 122 in the example shown in Figure IB
  • Figure 2B shows the authentication process 200 as performed by a verifier, such as Verifier 126 in the example shown in Figure IB.
  • the Client determines the Verifier’s Presentation Requirements.
  • the client initiates an authentication transaction on the Market Maker Ledger, including by providing any required deposit, if any.
  • the Verifier reads the Client’s data from the Market Maker Ledger and determines whether the data satisfies the Verifier’s Presentation Requirements. If not, the Verifier terminates the transaction (not shown). If so, at 208 the Verifier obtains Issuer Revocation Data from the Issuer associated with the Client’s data (e.g., the Client’s Public Key).
  • the Verifier uses the Client Revocation Data provided by the Client, via the Market Maker Ledger, and the Issuer Revocation Data obtained from the Issuer to construct and verify the Validity Proof. If the Validity Proof fails, the Verifier terminates the transaction (not shown).
  • the Verifier determines the Client has been authenticated and releases the Client’s security deposit (if any).
  • the Client receives an indication that the authentication has been completed successfully and the deposit is returned (or released) to the Client.
  • Figure 3 is a call sequence diagram illustrating an embodiment of a Zero-
  • ZKCP Knowledge Contingent Payment
  • the system, process, and protocol of Figure 3 may be used to make a zero- knowledge contingent payment in connection with an authentication operation as disclosed herein, such as a payment to a Client for supplying client information or a payment by an Issuer to provide, for example, Issuer Revocation Data.
  • the payment may be made via a Market Maker Ledger, as disclosed herein.
  • the system, process, and protocol of Figure 3 may be used by Seller 302 to sell information to Buyer 304, e.g., for some pre-agreed and/or dynamically negotiated price.
  • Buyer 304 may trust that information disclosed by Seller 302 is correct but does not otherwise need to trust Seller 302 if the technique illustrated in Figure 3 is used. Likewise, Seller 302 does not need to trust Buyer 304.
  • payment can occur on any ledger that supports hashing and time locking, while disclosure can occur on any ledger (e.g., Ledger 306, as shown) or off ledger (not shown in Figure 3).
  • the disclosed information is known only to Seller 302 and Buyer 304 (that is, it is not disclosed publicly).
  • the protocol of Figure 3 is used to guarantee payment to Seller 302 upon release of the Seller’s information, and to guarantee to Buyer 304 that the Seller’s information will be available to Buyer 304 upon release of payment.
  • the protocol is may be used in situations where it is in Seller’s 302 interest to reveal correct information (for example, if Seller 302 is an Issuer or Seller 302 is a Client or other user in a context in which the Seller 302 is highly motivated to disclose only correct information).
  • Seller 302 encrypts plaintext data P with Buyer 304’s public key Bpub to create a first encrypted image El.
  • Seller 302 generates a random symmetric key K and uses it to encrypt El, resulting in a second encrypted image E2.
  • Seller 302 hashes K to create the hashed key image H and Seller 302 sends E2 and H to Buyer 304 via any on- or off-ledger channel.
  • These values (E2, H) may optionally be signed by Seller 302 to allow Buyer 304 to verify their source.
  • Buyer 304 creates a signed, hashed time-lock contract instance C containing a payment to Seller 302, with the hash condition set to H (the timeout condition may be any value of Buyer’s 304 choosing) and writes C to Ledger 306.
  • Seller 302 reads C from the Ledger 306 and writes K (which is the pre-image of H) to the Ledger 306, thus receiving the payment contained in C.
  • Buyer 304 reads K from the Ledger 306 and uses it to decrypt E2, which yields El.
  • Buyer 304 uses its private key (corresponding to Bpub) to decrypt El, which yields P, thus completing the transaction.
  • An example retail commercial transaction facilitated using techniques as disclosed herein follows.
  • a retailer purchaser referred to as “Customer” purchases from a retail store “Store” a product called “Product” which requires the Store to obtain satisfactory proof that the Customer is at least 21 years of age.
  • the “Client” is an app on the Customer’s phone or other mobile device
  • the “Issuer” of the credential that will be presented e.g., a credentialized data affirming that Customer is age 21 years or older, but which does not disclose the Customer’s actual age or birth date
  • the DMV the “Verifier” is the “Store” or its service provider.
  • the Client and Issuer ore on a “First Ledger” e.g., OmniOneTM
  • the Verifier is on a “Second Ledger” (e.g., SovrinTM).
  • the entities may be on the same and/or different ledgers.
  • Customer arrives at a checkout station at the Store and presents the Product for purchase. Customer will use a DMV-issued digital credential on his phone to prove Customer is 21 years or older. Customer begins the authentication process by starting his authentication app (his Client) and scanning a QR code, for example, displayed or presented at the checkout station. The Client then conducts the following protocol, in various embodiments:
  • Client extracts a URL from the scanned QR code, connects to it, and downloads the Verifiers Presentation Requirements (i.e., Store’s presentation requirements, in this example).
  • Verifiers Presentation Requirements i.e., Store
  • Customer has a decentralized identity account on the First Ledger blockchain, but the
  • the Client therefore creates an address on the Market Maker Ledger blockchain, which it will use as an intermediary.
  • the Client creates a single-use address.
  • the Client may have a pre-existing, non-single-use address on the Market Maker Ledger and may use the pre-existing address.
  • the Presentation Requirements inform Customer’s Client that the Store requires one Second Ledger token as Authentication Security Deposit, to be held for ten minutes (the purpose of which is to discourage spend-forcing attacks).
  • the Client Upon reading the current exchange rates from the Market Maker Ledger, the Client learns that the current exchange rate between Second Ledger tokens and Market Maker Ledger tokens is 3-2, and the rate between First Ledger tokens and Market Maker Ledger tokens is 4-5.
  • the required Authentication Security Deposit is therefore 8/15 of a First Ledger token.
  • Customer’s Client computes that 2/3 of a First Ledger token should be sufficient to meet the Deposit requirement. It therefore presents a screen on his phone that reads, “Store needs a security deposit of 2/3 of an First Ledger token for ten minutes. Do you agree?” Customer taps the “Yes” button.
  • Customer’s Client converts 2/3 of a First Ledger token into Market Maker Ledger tokens through the Market Maker’s exchange service. This exchange happens according to Market Maker’s native exchange protocol. 5.
  • Customer’s Client creates an Authentication Initiation Contract on the Market Maker Ledger blockchain. This contract time locks Customer’s 2/3 Market Maker Ledger token for ten minutes (as stipulated in step 3, above). The contract also includes a unique identifier extracted from the QR code scanned at the beginning of the transaction.
  • DMV encrypts the Issuer Revocation Data and writes it to the Market Maker Ledger blockchain, along with the price.
  • Store purchases the key to the Issuer Revocation Data through a ZKCP protocol (e.g., Figure 3 above), checking exchange rates and exchanging Second Ledger tokens for Market Maker Ledger tokens as needed (similarly to steps 3 and 4, above).
  • DMV converts the fee into its own native tokens, i.e., First Ledger tokens in this example, but it could be any ledger. 10.
  • Store sees from Customer’s Client Revocation Data (extracted from the
  • techniques disclosed herein may be used to facilitate cross-ledger authentication and other cross-ledger transactions and operations, without having to build cross-ledger transaction capability for every ledger pair.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Accounting & Taxation (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Finance (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

Proxied cross-ledger authentication techniques are disclosed. In various embodiments, a verifier presentation requirement is determined, the verifier presentation requirement indicating a set of elements required to be provided by a client to authenticate the client. An authentication contract instance is created on a market maker ledger not associated specifically with the verifier, the authentication contract instance including at least a subset of the elements required by the verifier presentation requirement. A verifier system associated with the verifier presentation requirement is configured to read information from the authentication contract instance, obtain from an issuer associated with the client an issuer revocation data associated with the authentication contract instance, and use the information read from the authentication contract instance and the issuer revocation data to authenticate the client.

Description

PROXIED CROSS-LEDGER AUTHENTICATION
CROSS REFERENCE TO OTHER APPLICATIONS
[0001] This application claims priority to U.S. Provisional Patent Application No. 62/928,943 entitled PROXIED CROSS-LEDGER AUTHENTICATION filed October 31 ,
2019 which is incorporated herein by reference for all purposes.
BACKGROUND OF THE INVENTION
[0002] Distributed ledger technology, such as blockchain technology, has been used to provide distributed ledger-based identity networks. Distributed ledger technology enables user identity and/or other claims (e.g., postal address, social security number, passport number, bank account number, etc.), potentially from different issuers, to be verified while protecting privacy and control by each user/owner of the user/owner’s data.
[0003] More than one distributed ledger-based identity network exists. An entity wishing to be authenticated and or to have a claim verified (sometimes referred to herein as a Client) may be on a different distributed ledger based identity network than the entity seeking to verify the Client (sometimes referred to herein as a Verifier). Currently, to facilitate cross ledger transactions (e.g., token exchange), each network must include cross-ledger transaction capability for that ledger pair.
BRIEF DESCRIPTION OF THE DRAWINGS [0004] Various embodiments of the invention are disclosed in the following detailed description and the accompanying drawings.
[0005] Figure 1 A is a block diagram illustrating an embodiment of a proxied cross ledger authentication system and environment.
[0006] Figure IB is a block diagram illustrating an embodiment of a proxied cross- ledger authentication system.
[0007] Figures 2A and 2B are flow diagrams illustrating an embodiment of a process to perform proxied cross-ledger authentication.
[0008] Figure 3 is a call sequence diagram illustrating an embodiment of a Zero-
Knowledge Contingent Payment (ZKCP) system, process, and protocol.
DETAILED DESCRIPTION [0009] The invention can be implemented in numerous ways, including as a process; an apparatus; a system; a composition of matter; a computer program product embodied on a computer readable storage medium; and/or a processor, such as a processor configured to execute instructions stored on and or provided by a memory coupled to the processor. In this specification, these implementations, or any other form that the invention may take, may be referred to as techniques. In general, the order of the steps of disclosed processes may be altered within the scope of the invention. Unless stated otherwise, a component such as a processor or a memory described as being configured to perform a task may be implemented as a general component that is temporarily configured to perform the task at a given time or a specific component that is manufactured to perform the task. As used herein, the term ‘processor’ refers to one or more devices, circuits, and or processing cores configured to process data, such as computer program instructions.
[0010] A detailed description of one or more embodiments of the invention is provided below along with accompanying figures that illustrate the principles of the invention. The invention is described in connection with such embodiments, but the invention is not limited to any embodiment. The scope of the invention is limited only by the claims and the invention encompasses numerous alternatives, modifications and equivalents. Numerous specific details are set forth in the following description in order to provide a thorough understanding of the invention. These details are provided for the purpose of example and the invention may be practiced according to the claims without some or all of these specific details. For the purpose of clarity, technical material that is known in the technical fields related to the invention has not been described in detail so that the invention is not unnecessarily obscured.
[0011] Techniques are disclosed to provide proxied cross-ledger authentication through an intermediary, sometimes referred to herein as a “Market Maker” or “Market Maker Ledger”. In various embodiments, the Market Maker provides cross-ledger liquidity for all participating token types and enables Client- Verifier rendezvous across ledgers.
[0012] In various embodiments, a solution as disclosed herein allows users of a distributed ledger-based identity network (“Clients”) to authenticate to relying parties (“Verifiers”) on different ledgers. A solution as disclosed herein has one or more of the following properties, in various embodiments:
1. obviates the need to build cross-ledger transaction capability for every ledger pair
2. prevents transaction delays resulting from low cross-ledger liquidity
3. enables a Verifier-pays economic model while discouraging spend-forcing attacks against Verifiers 4. preserves Client privacy (even against Issuer-Verifier collusion) if the underlying revocation mechanism permits it
[0013] A solution as disclosed herein may involve one or more of the following roles:
[0014] Client: entity wishing to be authenticated by a Verifier. An example is an individual user. [0015] Issuer: entity that signs the Client's public key, binding it to a set of attributes.
An example is a passport agency that binds the Client's nationality, date of birth, etc.
[0016] Market Maker: intermediary in the authentication transaction. Provides cross-ledger liquidity for all participating token types and enables Client-Verifier rendezvous.
[0017] Trust Source: signer of Issuer's signing key. May also be signer of Market Maker's key (though the Market Maker can be its own trust source). The Trust Source's public key is available on all participating ledgers.
[0018] Verifier: the relying party in a transaction. An example is an online store.
[0019] In various embodiments, a solution as disclosed herein may be used to facilitate cross-ledger transactions, including but not limited to cross-ledger payments. For example, in some embodiments, a Verifier may make a payment to a Client and/or Issuer on another ledger, such as to pay the Issuer for verifying that a claim issued/signed by the Issuer has not been revoked, or paying a Client to provide the user’s identity credential and or other data. [0020] The following terms are used in the description of various embodiments:
[0021] Authentication Initiation Contract: smart contract written by the Client to the Market Maker Ledger to initiate an authentication transaction. Pledges a time locked Authentication Security Deposit, which is released back to the Client upon timeout or contract completion.
[0022] Authentication Security Deposit: security deposit denominated in Market
Maker Ledger Tokens and time locked by the Client in the Authentication Initiation Contract. The purpose of this object is to discourage spend-forcing attacks against Verifiers.
[0023] Client Authentication Address: address or key pair on the Client Ledger, created by the Client for the purpose of conducting a cross-ledger authentication transaction
[0024] Client Handle: unique identifier for the Client. Consists of the Client
Authentication Address and the Client Public Key.
[0025] Client Ledger Token: cryptocurrency unit on the Client Ledger.
[0026] Client Public Key: public component of a cryptographic key pair owned by the Client and associated with the Client Authentication Address.
[0027] Client Revocation Data: Client-supplied component of publicly verifiable revocation (or validity) data pertaining to the Client Public Key. For example, in a bilinear- map revocation scheme, this would correspond to the witness.
[0028] Issuer Authentication Contract: smart contract between Issuer and Verifier, written to the Market Maker Ledger. Stipulates the Issuer Fee amount (to be paid by the Verifier) and commits to release of the Issuer Revocation Data upon payment.
[0029] Issuer Fee: fee paid by the Verifier to the Issuer in exchange for the Issuer
Revocation Data.
[0030] Issuer Handle: unique identifier for the Issuer. Consists of the Issuer's address on the Market Maker Ledger and the Issuer's public key.
[0031] Issuer Revocation Data: Issuer-supplied component of publicly verifiable revocation (or validity) data pertaining to the Client Public Key. For example, in a bilinear- map revocation scheme, this would correspond to the accumulator. In other implementations, it may be a simple certificate revocation list. In any case, this value is signed by the Issuer.
[0032] Market Maker Ledger: a distributed ledger associated with a Market Maker.
In various embodiments, a Market Maker may have and/or comprise its own distributed ledger and or may use or otherwise be on and or associated with a distributed ledger operated by another entity, including in some embodiments a ledger on which the Client and or Verifier happen to be on.
[0033] Market Maker Ledger Token: cryptocurrency unit on the Market Maker
Ledger. [0034] Market Maker Off-Ledger Address: off-ledger address (for example, a
URL) at which the Client connects to the Market Maker.
[0035] Validation Requirements: Issuer's requirements for supplying the Issuer's component of the Validity Proof. At minimum, this will include the Issuer Fee expressed in Client Ledger tokens. [0036] Validity Proof: proof of the validity of the Client Public Key. This may be in any agreed form. For example, in a bilinear-map revocation scheme, this would be an actual validity proof (including the Issuer Revocation Data). In other implementations, it may be a simple certificate revocation list.
[0037] Verifier Exchange Rate: exchange rate between Verifier Ledger Tokens and Market Maker Ledger Tokens when the Authentication Initiation Contract is instantiated.
[0038] Verifier Handle: cross-ledger unique identifier for the Verifier's account on the Market Maker Ledger. Consists of the Market Maker Ledger Identifier, the Verifier's address on the Market Maker Ledger, and the Verifier Public Key.
[0039] Verifier Off-Ledger Address: off-ledger address (for example, a URL) at which a transaction participant may communicate with the Verifier
[0040] Verifier Presentation Requirements: list of Verifier's requirements for performing authentication of a Client, written on the Verifier Ledger. This includes the Verifier Off-Ledger Address, required Client Security Deposit amount, and Security Deposit Target Currency, and may include, for example, a liveness requirement for revocation data. The values in this structure may optionally default to values supplied by the Market Maker via any on- or off-ledger channel.
[0041] Verifier Public Key: public component of the cryptographic key pair owned by the Verifier.
[0042] Some, all, or none of the above defined terms may be used and/or relevant to a given embodiment.
[0043] Figure 1 A is a block diagram illustrating an embodiment of a proxied cross ledger authentication system and environment. In the example shown, system 100 includes a plurality of distributed ledger-based identity networks, represented in Figure 1 A by distributed ledger-based identity networks 102, 104, and 106. A market maker system 108, e.g., a computer server configured to operate as a Market Maker as disclosed herein, is connected via one or more network connections to each of the distributed ledger-based identity networks comprising the plurality of distributed ledger-based identity networks, such as distributed ledger-based identity networks 102, 104, and 106, in this example. In various embodiments, the market maker system 108 acts as an intermediary in authentication transactions, as disclosed herein, including by providing cross-ledger liquidity for all participating token types to facilitate transactions when a client and verifier (or other transaction participant) are on different identity networks. In various embodiments, market maker system 108 and enables Client- Verifier rendezvous, such as by enabling Clients and or Verifiers to establish identities and or to initiate and or consummate transactions on a Market Maker Ledger associated with the market maker system 108.
[0044] In the example shown in Figure 1A the market maker system 108 is represented as being external to the distributed ledger-based identity networks 102, 104, and 106. In some embodiments, market maker system 108 may be included in (e.g., be an entity having an identity and or participating on) one or more of the distributed ledger-based identity networks 102, 104, and 106.
[0045] In various embodiments, Clients, Issuers, and or Verifiers may each establish a temporary and or a more permanent or long term use address on a Market Maker Ledger, as disclosed herein, for use in performing authentication and or other transactions via the
Market Maker Ledger. In some embodiments, a Market Maker maintains an account on each of a plurality of participating ledgers and the Market Maker uses its respective accounts on each ledger to perform the Market Maker function disclosed herein. In some embodiments, participants such as Clients, Issuers, Verifiers, and/or the Market Maker may use a universal address that is recognized by/on each participating ledger and or which can be resolved to an address usable on each ledger.
[0046] Figure IB is a block diagram illustrating an embodiment of a proxied cross ledger authentication system. In the example shown, market maker system 108 of Figure 1A is shown to be on a Market Maker Ledger 120. Market maker system 108 is connected, e.g., via one or more networks, to Client 122 on Client Ledger 124 and Verifier 126 on Verifier Ledger 128.
[0047] In this example, Client 122, Verifier 126, and Market Maker 108 are all on separate distributed ledgers, and the Client 122 and Issuer 130 are on the same ledger 124. Client 122, Issuer 130, and Verifier 126 each has an address on the Market Maker Ledger 126, and monitors its transactions on Market Maker Ledger 126. In various embodiments, the public keys of Trust Source 132 are available on all participating Ledgers 120, 124, 128 (and or installed on Client 122, Issuer 130, and Verifier 126 devices). Moreover, the Client 122 knows the Verifier Flandle of Verifier 126 (consisting of the Verifier's address on the Market Maker Ledger 120 and the Verifier's public key). This is obtained, in various embodiments, via the Verifier's web site, a QR code, e-mail, text message, or other such mechanism. In various embodiments, all off-ledger channels are encrypted and authenticated via some standard protocol such as TLS.
[0048] While in the example shown in Figure IB the Client 122 and Verifier 126 are on different ledgers, with a Market Maker Ledger 120 serving as an intermediary, in various embodiments, the Client 122 and Verifier 126 may be on the same ledger. In some embodiments, in cases in which the Client 122 and Verifier 126 are on the same ledger the Market Maker Ledger 120 is not needed or used to perform techniques disclosed herein, including without limitation one or more of the following: Verifier paying Issuer for revocation data; Verifier paying Client for client revocation data and or other Client data; and requiring the Client to make a security deposit to discourage spend-forcing attacks against the Verifier.
[0049] Referring further to Figure IB, in various embodiments a client, such as Client 122, is authenticated to a verifying (relying) entity, such as Verifier 126, via a transaction conducted via Market Maker Ledger 120. For example, the Client 122 may determine the Verifier’s 126 presentation requirements and initiate a transaction on Market Maker Ledger 120, e.g., an Authentication Initiation Contract. In some embodiments, the Client 122 may initiate the transaction by writing an Authentication Initiation Contract on a ledger other than the Market Maker Ledger 120. The presentation requirements may include a requirement to provide a Client Revocation Data pertaining to the Client Public Key, e.g., a “witness” data in the case of a bilinear-map revocation scheme. The Client 122 may include in the Authentication Initiation Contract information such as the Client Handle, Issuer Handle, Verifier Handle, in some embodiments a refundable deposit (to protect against spend force attacks, e.g., as described below), the Client Revocation Data, and any other information required by the Verifier Presentation Requirements.
[0050] The Verifier 126 reads the Authentication Initiation Contract instance from the
Market Maker Ledger 120. If Verifier is dissatisfied with any of the Contract terms, the transaction stops and the Client is notified via any on- or off-ledger channel. The Verifier 126 obtains from Issuer 130 Issuer Revocation Data corresponding to the Client Public Key and/or Client Revocation Data obtained from Client 122. The Verifier 126 constructs the Validity Proof from the Issuer Revocation Data and the Client Revocation Data. If the Validity Proof is valid, the authentication of Client 122 is determined to be successful. [0051] In some embodiments, a transaction such as described above may include one or more payments, such as a deposit in a nominal amount by the Client 122, which is refunded or otherwise released at the conclusion of the authentication process. Such a deposit may protect against a “spend force” attack, such as by repeatedly initiating authentication transactions to force a Verifier to spend money (e.g., cryptocurrency) or other resources. A Verifier may also make payments, such as to a Client and or Issuer, to obtain the Client’s data or the Issuer Revocation Data. In various embodiments, a Market Maker and or Market Maker Ledger as disclosed herein may facilitate cross-ledger transactions by providing cross-ledger liquidity, e.g., by acting as a cryptocurrency exchange and or by holding funds for Clients and or Verifiers, e.g., in a currency of the Market Maker Ledger, for use to conduct future transactions.
[0052] In some embodiments, a transaction as described above but including payments as described above may be conducted as follows: Client reads Verifier Presentation Requirements from the Market Maker Ledger or from the Verifier via an off-ledger channel Client creates a Client Authentication Address on the Market Maker Ledger for conducting the authentication protocol. If applicable, the controlling key for this address may be signed by another key owned by the Client or belong to an enclosing account structure controlled by the Client Client reads the exchange rate for converting Client Ledger Tokens into Security Deposit Target Currency from any authoritative on- or off-ledger source. For example, this information may be periodically written to the Market Maker Ledger or simply posted on a web site. In some embodiments, the Client obtains this information directly from the Market Maker through an off-ledger channel Client exchanges Client Ledger Tokens for Market Maker Ledger Tokens sufficient for making the Authentication Security Deposit (both values of which, i.e., the Security Deposit Target Currency and the Security Deposit amount, are specified in the Verifier Presentation Requirements read in step 1). This occurs according to the
Market Maker's native exchange protocol (e.g., the Bancor protocol or other native protocol). Client creates an Authentication Initiation Contract instance on Market Maker Ledger with the Client Handle, Issuer Handle, Verifier Handle, Client Revocation Data (if any), and Authentication Security Deposit (obtained in step 4, above) supplied as arguments, ensuring that the included Client Revocation Data complies with the Verifier Presentation Requirements (received in step 1). The Authentication Initiation Contract time locks the Client's Authentication Security Deposit (for example, by means of a check-lock-time-verify command) for a duration specified in the Verifier Presentation Requirements. Client may optionally include a higher Deposit amount than the computed required amount in order to compensate for possible exchange-rate fluctuations. Also optionally, the Issuer Handle and Authentication Security Deposit may be written to the Market Maker Ledger separately from the Authentication Initiation Contract (but referenced from it), and the remaining informational contents of the Contract traded to the Verifier through a Zero-Knowledge Contingent Payment
(see below) or other escrow protocol. This enables a revenue model for the Client and allows the Verifier to reimburse the Client for any costs related to creation of the Contract
6. Verifier reads the Authentication Initiation Contract instance from the Market Maker Ledger. If Verifier is dissatisfied with any of the Contract terms, the transaction stops and the Client is notified via any on- or off-ledger channel 7. Verifier obtains the exchange rate between Verifier Ledger Tokens and Market Maker
Ledger tokens in a manner analogous to step 3, above, then determines if the Authentication Security Deposit is adequate. If not, the transaction stops and the Client is notified via any on- or off-ledger channel
8. Verifier connects to Issuer via any on- or off-ledger channel and sends its Verifier Handle. Optionally, this step may be required to be on ledger in order to discourage spend-forcing attacks against Issuers
9. Issuer supplies Issuer Revocation Data to Verifier in exchange for the Issuer Fee via any trustless exchange protocol, such as Zero-Knowledge Contingent Payment (see below), or through an escrow service provided by a third party (such as the Market Maker) or via any escrow protocol, such as a multi-signature scheme. Example using
Zero-Knowledge Contingent Payment: a. Issuer encrypts Issuer Revocation Data with Verifier's public key (extracted from the Verifier Handle received in the previous step) to create the first encrypted image El b. Issuer generates a random symmetric key K and uses it to encrypt El, resulting in the second encrypted image E2 c. Issuer hashes K to create the hash image H d. Issuer creates a signed Issuer Authentication Contract instance that includes E2, H, the required Issuer Fee amount (expressed in either Client Ledger Tokens or Market Maker Ledger tokens), and any other relevant terms, and sends it to the Verifier via any on- or off-ledger channel e. If Verifier is dissatisfied with any of the Issuer Authentication Contract terms (or with the signature on the Contract), the transaction stops and Client and Issuer are notified via any on- or off-ledger channel f. Verifier looks up the current exchange rate between Verifier Ledger Tokens and the currency denominating the required Issuer Fee (received in step d, above) in a manner analogous to step 3, above g. Verifier exchanges (through the Market Maker) the required quantity of Verifier Ledger Tokens (calculated from the exchange rate obtained in the previous step) for the Issuer Fee, denominated in Market Maker Ledger Tokens h. Verifier creates a signed, hashed time-lock contract instance C containing the Issuer Fee (payable to the Issuer), with the hash condition set to H (the timeout condition may be any value of the Verifier's choosing) i. Verifier writes C to the Market Maker Ledger j. Issuer reads C from the Market Maker Ledger. If it is dissatisfied with any contract terms, the transaction stops and Issuer is notified via any on- or off- ledger channel; the Issuer, in turn, then notifies the Client k. Issuer writes K to the ledger (which is the pre-image of H), thus receiving the payment contained in C l. Verifier reads K from the ledger and uses it to decrypt E2, which yields El m. Verifier uses its private key to decrypt El, which yields the Issuer Revocation Data 10. Verifier constructs the Validity Proof from the Issuer Revocation Data and the Client
Revocation Data
11. Authentication Security Deposit is released (via timeout) back to the Client
[0053] In various embodiments, one or more of the steps 1 through 11 above may be omitted from an operation to authenticate a Client, via a Market Maker, as disclosed herein. [0054] Figures 2A and 2B are flow diagrams illustrating an embodiment of a process to perform proxied cross-ledger authentication. Specifically, Figure 2A shows the authentication process 200 as performed by a client system, device, and/or application, such as Client 122 in the example shown in Figure IB, and Figure 2B shows the authentication process 200 as performed by a verifier, such as Verifier 126 in the example shown in Figure IB. In the example shown, at 202 the Client determines the Verifier’s Presentation Requirements. At 204, the client initiates an authentication transaction on the Market Maker Ledger, including by providing any required deposit, if any. At 206, the Verifier reads the Client’s data from the Market Maker Ledger and determines whether the data satisfies the Verifier’s Presentation Requirements. If not, the Verifier terminates the transaction (not shown). If so, at 208 the Verifier obtains Issuer Revocation Data from the Issuer associated with the Client’s data (e.g., the Client’s Public Key). At 210, the Verifier uses the Client Revocation Data provided by the Client, via the Market Maker Ledger, and the Issuer Revocation Data obtained from the Issuer to construct and verify the Validity Proof. If the Validity Proof fails, the Verifier terminates the transaction (not shown). If the Validity Proof is successful, at 212 the Verifier determines the Client has been authenticated and releases the Client’s security deposit (if any). At 214, the Client receives an indication that the authentication has been completed successfully and the deposit is returned (or released) to the Client.
[0055] Figure 3 is a call sequence diagram illustrating an embodiment of a Zero-
Knowledge Contingent Payment (ZKCP) system, process, and protocol. In various embodiments, the system, process, and protocol of Figure 3 may be used to make a zero- knowledge contingent payment in connection with an authentication operation as disclosed herein, such as a payment to a Client for supplying client information or a payment by an Issuer to provide, for example, Issuer Revocation Data.
[0056] In the example shown in Figure 3, a Seller 302 provides information to Buyer
304 in exchange for a zero-knowledge contingent payment made via a ledger 306. In some embodiments, the payment may be made via a Market Maker Ledger, as disclosed herein. [0057] In various embodiments, the system, process, and protocol of Figure 3 may be used by Seller 302 to sell information to Buyer 304, e.g., for some pre-agreed and/or dynamically negotiated price. Buyer 304 may trust that information disclosed by Seller 302 is correct but does not otherwise need to trust Seller 302 if the technique illustrated in Figure 3 is used. Likewise, Seller 302 does not need to trust Buyer 304. In various embodiments, payment can occur on any ledger that supports hashing and time locking, while disclosure can occur on any ledger (e.g., Ledger 306, as shown) or off ledger (not shown in Figure 3).
At the end of the protocol, the disclosed information is known only to Seller 302 and Buyer 304 (that is, it is not disclosed publicly).
[0058] In various embodiments, the protocol of Figure 3 is used to guarantee payment to Seller 302 upon release of the Seller’s information, and to guarantee to Buyer 304 that the Seller’s information will be available to Buyer 304 upon release of payment. The protocol is may be used in situations where it is in Seller’s 302 interest to reveal correct information (for example, if Seller 302 is an Issuer or Seller 302 is a Client or other user in a context in which the Seller 302 is highly motivated to disclose only correct information).
[0059] In the example shown in Figure 3, at 308, Seller 302 encrypts plaintext data P with Buyer 304’s public key Bpub to create a first encrypted image El. At 310, Seller 302 generates a random symmetric key K and uses it to encrypt El, resulting in a second encrypted image E2. At 312, Seller 302 hashes K to create the hashed key image H and Seller 302 sends E2 and H to Buyer 304 via any on- or off-ledger channel. These values (E2, H) may optionally be signed by Seller 302 to allow Buyer 304 to verify their source. At 314, Buyer 304 creates a signed, hashed time-lock contract instance C containing a payment to Seller 302, with the hash condition set to H (the timeout condition may be any value of Buyer’s 304 choosing) and writes C to Ledger 306. At 316, Seller 302 reads C from the Ledger 306 and writes K (which is the pre-image of H) to the Ledger 306, thus receiving the payment contained in C. At 318, Buyer 304 reads K from the Ledger 306 and uses it to decrypt E2, which yields El. At 320, Buyer 304 uses its private key (corresponding to Bpub) to decrypt El, which yields P, thus completing the transaction.
[0060] An example retail commercial transaction facilitated using techniques as disclosed herein follows. In this example, a retailer purchaser referred to as “Customer” purchases from a retail store “Store” a product called “Product” which requires the Store to obtain satisfactory proof that the Customer is at least 21 years of age. In this example, the “Client” is an app on the Customer’s phone or other mobile device, and the “Issuer” of the credential that will be presented (e.g., a credentialized data affirming that Customer is age 21 years or older, but which does not disclose the Customer’s actual age or birth date) is the DMV, and the “Verifier” is the “Store” or its service provider. In this example, the Client and Issuer ore on a “First Ledger” (e.g., OmniOne™) and the Verifier is on a “Second Ledger” (e.g., Sovrin™). However, in other embodiments and scenarios the entities may be on the same and/or different ledgers. [0061] In this example, Customer arrives at a checkout station at the Store and presents the Product for purchase. Customer will use a DMV-issued digital credential on his phone to prove Customer is 21 years or older. Customer begins the authentication process by starting his authentication app (his Client) and scanning a QR code, for example, displayed or presented at the checkout station. The Client then conducts the following protocol, in various embodiments:
1. Client extracts a URL from the scanned QR code, connects to it, and downloads the Verifiers Presentation Requirements (i.e., Store’s presentation requirements, in this example). 2. Customer has a decentralized identity account on the First Ledger blockchain, but the
Presentation Requirements inform his Client that the Store’s Verifier account is on the Second Ledger blockchain. The Client therefore creates an address on the Market Maker Ledger blockchain, which it will use as an intermediary. In some embodiments, the Client creates a single-use address. In some embodiments, the Client may have a pre-existing, non-single-use address on the Market Maker Ledger and may use the pre-existing address.
3. The Presentation Requirements inform Customer’s Client that the Store requires one Second Ledger token as Authentication Security Deposit, to be held for ten minutes (the purpose of which is to discourage spend-forcing attacks). Upon reading the current exchange rates from the Market Maker Ledger, the Client learns that the current exchange rate between Second Ledger tokens and Market Maker Ledger tokens is 3-2, and the rate between First Ledger tokens and Market Maker Ledger tokens is 4-5. The required Authentication Security Deposit is therefore 8/15 of a First Ledger token. To compensate for possible market fluctuations, Customer’s Client computes that 2/3 of a First Ledger token should be sufficient to meet the Deposit requirement. It therefore presents a screen on his phone that reads, “Store needs a security deposit of 2/3 of an First Ledger token for ten minutes. Do you agree?” Customer taps the “Yes” button.
4. Customer’s Client converts 2/3 of a First Ledger token into Market Maker Ledger tokens through the Market Maker’s exchange service. This exchange happens according to Market Maker’s native exchange protocol. 5. Customer’s Client creates an Authentication Initiation Contract on the Market Maker Ledger blockchain. This contract time locks Customer’s 2/3 Market Maker Ledger token for ten minutes (as stipulated in step 3, above). The contract also includes a unique identifier extracted from the QR code scanned at the beginning of the transaction.
6. Store reads the Authentication Initiation Contract from the Market Maker Ledger blockchain and sees from the identifier that it corresponds to the transaction currently taking place at Store’s checkout station.
7. Store reads the current exchange rates from the Market Maker Ledger blockchain and sees that the rate between Second Ledger tokens and Market Maker Ledger tokens is
5-4 (slightly changed since step 3), and the rate between First Ledger tokens and Market Maker Ledger tokens is still 4-5; however, Customer’s deposit of 2/3 of a First Ledger token is still sufficient to meet the requirement, so the transaction continues. 8. Store extracts the Issuer Handle from the Authentication Initiation Contract (read in step 6, above), connects to the DMV's revocation server, and requests the DMV's Issuer Revocation Data.
9. DMV encrypts the Issuer Revocation Data and writes it to the Market Maker Ledger blockchain, along with the price. Store (if it agrees to the price) purchases the key to the Issuer Revocation Data through a ZKCP protocol (e.g., Figure 3 above), checking exchange rates and exchanging Second Ledger tokens for Market Maker Ledger tokens as needed (similarly to steps 3 and 4, above). At the end of the exchange, DMV converts the fee into its own native tokens, i.e., First Ledger tokens in this example, but it could be any ledger. 10. Store sees from Customer’s Client Revocation Data (extracted from the
Authentication Initiation Contract read in step 6, above) that the revocation algorithm for Customer’s key is a bilinear map. Store therefore reads the witness component from the Client Revocation Data and the accumulator component from the Issuer Revocation Data and establishes that Customer’s public key (and, consequently, any DMV-issued claim bound to it, i.e., the claim that Customer is 21 years or older, in this example) is still valid. 11. Customer’s Authentication Security Deposit is (asynchronously) released at the contracted time. At the prompting of his Client app, Customer may decide to leave the released tokens in his account on the Market Maker Ledger blockchain, ready for the next time he needs to perform a cross-ledger authentication as disclosed herein. [0062] With the revocation/validity check of Customer’s public key now complete,
Customer’s Client uses the key and its DMV-bound credentials in a zero-knowledge authentication protocol to prove that Customer is at least twenty-one years of age, and Customer buys the Product.
[0063] In various embodiments, techniques disclosed herein may be used to facilitate cross-ledger authentication and other cross-ledger transactions and operations, without having to build cross-ledger transaction capability for every ledger pair.
[0064] Although the foregoing embodiments have been described in some detail for purposes of clarity of understanding, the invention is not limited to the details provided.
There are many alternative ways of implementing the invention. The disclosed embodiments are illustrative and not restrictive.

Claims

1. A system, comprising: a communication interface; and a processor coupled to the communication interface and configured to: determine a verifier presentation requirement, the verifier presentation requirement indicating a set of elements required to be provided by a client to authenticate the client; and create on a market maker ledger not associated specifically with the verifier an authentication contract instance, the authentication contract instance including at least a subset of the elements required by the verifier presentation requirement; wherein a verifier system associated with the verifier presentation requirement is configured to read information from the authentication contract instance, obtain from an issuer associated with the client an issuer revocation data associated with the authentication contract instance, and use the information read from the authentication contract instance and the issuer revocation data to authenticate the client.
2. The system of claim 1 , wherein the processor is configured to include in the authentication contract instance a client revocation data and the verifier system is further configured to use the client revocation data and the issuer revocation data to construct a validity proof. 3. The system of claim 1, wherein the processor is configured to include in the authentication contract instance an issuer handle associated with the issuer and the verifier system is configured to use the issuer handle to obtain the issuer revocation data.
4. The system of claim 1, wherein the processor is configured to write an issuer handle associated with the issuer to the market maker ledger at a location indicated in the authentication contract instance and the verifier system is configured to determine the location by reading the authentication contract instance, read the issuer handle from the location, and use the issuer handle to obtain the issuer revocation data.
5. The system of claim 1, wherein the verifier presentation requirement includes a refundable deposit the client is required to make and the processor is further configured to provide the deposit in connection with the authentication contract instance.
6. The system of claim 5, wherein the client is associated with a first ledger having associated therewith a first ledger cryptocurrency denominated in first ledger tokens and wherein the market maker ledger has associated therewith a market maker ledger cryptocurrency denominated in market maker ledger tokens.
7. The system of claim 6, wherein the processor is configured to provide the deposit at least in part by reading a first cryptocurrency exchange rate from the market maker ledger and using a cryptocurrency exchange service associated with the market maker ledger to exchange a quantity of first ledger tokens to a corresponding quantity of market maker ledger tokens to be used to provide the deposit.
8. The system of claim 7, wherein the verifier system is associated with a second ledger having a second cryptocurrency denominated in second ledger tokens, the deposit as included in the verifier presentation requirement is expressed in an amount of second ledger tokens, and the processor is configured to read a second cryptocurrency exchange rate to determine an amount of market maker ledger tokens required to provide the deposit.
9. The system of claim 1 , wherein the client is associated with a first ledger having associated therewith a first ledger cryptocurrency denominated in first ledger tokens, the verifier system is associated with a second ledger having a second cryptocurrency denominated in second ledger tokens, and the issuer is associated with a third ledger having a third cryptocurrency denominated in third ledger tokens, and wherein to obtain the issuer revocation data the verifier system is configured to use a cryptocurrency service associated with the market maker ledger to obtain a quantity of market maker ledger tokens equivalent in value to a quantity of third party tokens required by the issuer as an issuer fee to provide the issuer revocation data.
10. The system of claim 9, wherein the verifier system is configured to pay the issuer fee and obtain the issuer revocation data via a zero-knowledge contingent payment transaction made via the market maker ledger.
11. A system, comprising: a communication interface; and a processor coupled to the communication interface and configured to: read information from a market maker ledger an authentication contract instance; determine that the authentication contract instance includes a set of the elements required by a verifier presentation requirement; obtain an issuer an issuer revocation data associated with the authentication contract instance; and use the information read from the authentication contract instance and the issuer revocation data to authenticate the client; wherein the authentication contract instance is written to the market maker ledger by a client seeking to be authenticated and the market maker ledger is configured facilitate cross ledger transactions including by facilitating zero knowledge contingent payments between buyers and sellers of information.
12. The system of claim 11, wherein the information read from the authentication contract instance includes an issuer handle and the processor is configured to use the issuer handle to obtain the issuer revocation data.
13. The system of claim 11, wherein the verifier presentation requirement includes a refundable deposit the client is required to make and the processor is further configured to verify the deposit has been provided in connection with the authentication contract instance. i4. The system of claim 11, wherein the client is associated with a first ledger having associated therewith a first ledger cryptocurrency denominated in first ledger tokens, the system is associated with a second ledger having a second cryptocurrency denominated in second ledger tokens, and the issuer is associated with a third ledger having a third cryptocurrency denominated in third ledger tokens, and wherein to obtain the issuer revocation data the processor is configured to use a cryptocurrency service associated with the market maker ledger to obtain a quantity of market maker ledger tokens equivalent in value to a quantity of third party tokens required by the issuer as an issuer fee to provide the issuer revocation data.
15. The system of claim 14, wherein the processor is configured to pay the issuer fee and obtain the issuer revocation data via a zero-knowledge contingent payment transaction made via the market maker ledger.
16. A method, comprising: determining a verifier presentation requirement, the verifier presentation requirement indicating a set of elements required to be provided by a client to authenticate the client; and creating on a market maker ledger not associated specifically with the verifier an authentication contract instance, the authentication contract instance including at least a subset of the elements required by the verifier presentation requirement; wherein a verifier system associated with the verifier presentation requirement is configured to read information from the authentication contract instance, obtain from an issuer associated with the client an issuer revocation data associated with the authentication contract instance, and use the information read from the authentication contract instance and the issuer revocation data to authenticate the client.
17. The method of claim 16, wherein the processor is configured to include in the authentication contract instance a client revocation data and the verifier system is further configured to use the client revocation data and the issuer revocation data to construct a validity proof. 18. The method of claim 16, wherein the verifier presentation requirement includes a refundable deposit the client is required to make and the processor is further configured to provide the deposit in connection with the authentication contract instance.
19. The method of claim 16, wherein the client is associated with a first ledger having associated therewith a first ledger cryptocurrency denominated in first ledger tokens, the verifier system is associated with a second ledger having a second cryptocurrency denominated in second ledger tokens, and the issuer is associated with a third ledger having a third cryptocurrency denominated in third ledger tokens, and wherein to obtain the issuer revocation data the verifier system is configured to use a cryptocurrency service associated with the market maker ledger to obtain a quantity of market maker ledger tokens equivalent in value to a quantity of third party tokens required by the issuer as an issuer fee to provide the issuer revocation data.
20. A computer program product embodied in a non-transitory computer readable medium, comprising computer instructions for: determining a verifier presentation requirement, the verifier presentation requirement indicating a set of elements required to be provided by a client to authenticate the client; and creating on a market maker ledger not associated specifically with the verifier an authentication contract instance, the authentication contract instance including at least a subset of the elements required by the verifier presentation requirement; wherein a verifier system associated with the verifier presentation requirement is configured to read information from the authentication contract instance, obtain from an issuer associated with the client an issuer revocation data associated with the authentication contract instance, and use the information read from the authentication contract instance and the issuer revocation data to authenticate the client.
PCT/US2020/055426 2019-10-31 2020-10-13 Proxied cross-ledger authentication WO2021086597A1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
JP2022525180A JP2023500260A (en) 2019-10-31 2020-10-13 Proxy mutual ledger authentication
EP20880816.2A EP4052206A4 (en) 2019-10-31 2020-10-13 Proxied cross-ledger authentication
KR1020227014549A KR20220070303A (en) 2019-10-31 2020-10-13 Proxyed Ledger-to-Ledger Authentication

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US201962928943P 2019-10-31 2019-10-31
US62/928,943 2019-10-31
US17/068,566 2020-10-12
US17/068,566 US11704636B2 (en) 2019-10-31 2020-10-12 Proxied cross-ledger authentication

Publications (1)

Publication Number Publication Date
WO2021086597A1 true WO2021086597A1 (en) 2021-05-06

Family

ID=75687865

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2020/055426 WO2021086597A1 (en) 2019-10-31 2020-10-13 Proxied cross-ledger authentication

Country Status (5)

Country Link
US (2) US11704636B2 (en)
EP (1) EP4052206A4 (en)
JP (1) JP2023500260A (en)
KR (1) KR20220070303A (en)
WO (1) WO2021086597A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11669812B2 (en) * 2020-06-05 2023-06-06 Serge M Krasnyansky Contingent payments for virtual currencies
US11995210B2 (en) * 2021-10-05 2024-05-28 Bank Of America Corporation Identity vault system using distributed ledgers for event processing

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080034231A1 (en) * 1995-02-13 2008-02-07 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US20090210347A1 (en) * 2000-04-14 2009-08-20 Branko Sarcanin Method and System for a Virtual Safe
US20150006403A1 (en) * 1995-02-13 2015-01-01 Intertrust Technologies Corporation Cryptographic methods, apparatus and systems for storage media electronic rights management in closed and connected appliances
US20160162897A1 (en) * 2014-12-03 2016-06-09 The Filing Cabinet, LLC System and method for user authentication using crypto-currency transactions as access tokens
US20170232300A1 (en) * 2016-02-02 2017-08-17 Bao Tran Smart device

Family Cites Families (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5785875B2 (en) * 2012-01-13 2015-09-30 株式会社日立製作所 Public key certificate verification method, verification server, relay server, and program
CA2878850A1 (en) * 2012-05-25 2013-11-28 Arbor Research Holdings, Llc Biddable financial instrument, online competitive bidding platform for trading thereof and associated system and method of trading thereof
US9768962B2 (en) * 2013-03-15 2017-09-19 Microsoft Technology Licensing, Llc Minimal disclosure credential verification and revocation
US9906512B2 (en) * 2015-07-28 2018-02-27 International Business Machines Corporation Flexible revocation of credentials
US10079682B2 (en) * 2015-12-22 2018-09-18 Gemalto Sa Method for managing a trusted identity
US10839378B1 (en) * 2016-01-12 2020-11-17 21, Inc. Systems and methods for performing device authentication operations using cryptocurrency transactions
US10546296B2 (en) * 2016-04-13 2020-01-28 Paypal, Inc. Public ledger authentication system
JP6867769B2 (en) * 2016-09-15 2021-05-12 健 坪井 Deposit account information disclosure system for virtual currency addresses
US10790980B2 (en) * 2017-07-14 2020-09-29 International Business Machines Corporation Establishing trust in an attribute authentication system
US20200242594A1 (en) * 2017-09-18 2020-07-30 Nth Round, Inc. Systems and methods for specialized cryptocurrency transactions
US20190251573A1 (en) * 2018-02-09 2019-08-15 Airbus (S.A.S.) Systems and methods of verifying credentials of aircraft personnel using a blockchain computer system
JP7361706B2 (en) * 2018-03-23 2023-10-16 エヌチェーン ライセンシング アーゲー Computer-implemented system and method for enabling zero-knowledge proofs
CN108683630B (en) * 2018-04-03 2020-05-29 阿里巴巴集团控股有限公司 Cross-block-chain authentication method and device and electronic equipment
US20190385156A1 (en) * 2018-04-27 2019-12-19 Bing Liu Decentralized Crypto Token Swap Platform on Mobile Device Apps
US10819503B2 (en) * 2018-07-03 2020-10-27 International Business Machines Corporation Strengthening non-repudiation of blockchain transactions
CN110874464A (en) * 2018-09-03 2020-03-10 巍乾全球技术有限责任公司 Method and equipment for managing user identity authentication data
WO2020181427A1 (en) * 2019-03-08 2020-09-17 云图有限公司 Signing method, device, and system employing secure multi-party computation
CA3058236C (en) * 2019-03-27 2020-08-25 Alibaba Group Holding Limited Retrieving public data for blockchain networks using highly available trusted execution environments

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080034231A1 (en) * 1995-02-13 2008-02-07 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US20150006403A1 (en) * 1995-02-13 2015-01-01 Intertrust Technologies Corporation Cryptographic methods, apparatus and systems for storage media electronic rights management in closed and connected appliances
US20090210347A1 (en) * 2000-04-14 2009-08-20 Branko Sarcanin Method and System for a Virtual Safe
US20160162897A1 (en) * 2014-12-03 2016-06-09 The Filing Cabinet, LLC System and method for user authentication using crypto-currency transactions as access tokens
US20170232300A1 (en) * 2016-02-02 2017-08-17 Bao Tran Smart device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP4052206A4 *

Also Published As

Publication number Publication date
KR20220070303A (en) 2022-05-30
US20230325791A1 (en) 2023-10-12
US11704636B2 (en) 2023-07-18
US20210133701A1 (en) 2021-05-06
EP4052206A1 (en) 2022-09-07
JP2023500260A (en) 2023-01-05
EP4052206A4 (en) 2023-11-22

Similar Documents

Publication Publication Date Title
Cox et al. NetBill Security and Transaction Protocol.
US7003497B2 (en) System and method for confirming electronic transactions
RU2292589C2 (en) Authentified payment
US20230146705A1 (en) Federated closed-loop system
KR100349779B1 (en) Four-party credit/debit payment protocol
US6385725B1 (en) System and method for providing commitment security among users in a computer network
US20230325791A1 (en) Proxied cross-ledger authentication
JP2011081838A (en) System and method for electronically exchanging value among distributed users
WO2007092577A2 (en) A point-of-sale terminal transactions using mutating identifiers
GB2549118A (en) Electronic payment system using identity-based public key cryptography
CN111062717B (en) Data transfer processing method, device and computer readable storage medium
WO2002039391A2 (en) Returning of change in an electronic payment system
US20240303635A1 (en) Token-based off-chain interaction authorization
NZ566555A (en) Transaction authorisation system
KR100509924B1 (en) Method of multiple payment based on electronic cash using a mobile phone
US20200242573A1 (en) Cryptographic transactions supporting real world requirements
WO2000057328A2 (en) Anonymous purchases while allowing verifiable identities for refunds returned along the paths taken to make the purchase
US20240078522A1 (en) Interaction channel balancing
Al-Meaither Secure electronic payments for Islamic finance
JP4148465B2 (en) Electronic value distribution system and electronic value distribution method
US20070219902A1 (en) Electronic payment method and related system and devices
AU2006279265B2 (en) Transaction authorisation system
CN118157898A (en) NFT interactive processing system and method
KR20210008235A (en) System for fin tech based on block chain
KR20080009357A (en) System and method for operating account and program recording medium

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20880816

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2022525180

Country of ref document: JP

Kind code of ref document: A

Ref document number: 20227014549

Country of ref document: KR

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2020880816

Country of ref document: EP

Effective date: 20220531