Public Key Infrastructure based on the Public Certificates Ledger

Inactive Publication Date: 2017-11-30
MUFTIC SEAD
View PDF6 Cites 98 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0051]First, a new type of cryptographically encapsulated object, called a BIX certificate, is created. Its purpose is equivalent to X.509 certificates, i.e., to support verification of binding between user identities and their public cryptographic keys and verification of that binding and in that way support security services for users and transactions, but enhanced with privacy and anonymity. BIX certificates enable applications and transactions whose main purpose is to exchange sensitive personal and business information and data to provide full security, privacy, and anonymity of their users and data.

Problems solved by technology

If the infrastructure is unpermissioned this means that it does not have sponsoring entities that approve users who want to join the infrastructure.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Public Key Infrastructure based on the Public Certificates Ledger
  • Public Key Infrastructure based on the Public Certificates Ledger
  • Public Key Infrastructure based on the Public Certificates Ledger

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064]The Structure and Attributes of BIX Certificates

[0065]BIX certificates are cryptographically encapsulated objects that provide binding between identities of their owners and their public keys, provide cryptographic mechanism (digital signature) to verify that binding and correctness of certificate attribute values and in that way enable distribution of identities and cryptographic keys to transaction partners and verification of the binding and correctness of attribute values by those partners. These features with BIX certificates are achieved with the full anonymity of all BIX system members.

[0066]The structure and attributes of BIX certificates and protocols for their creation, distribution, and verification support the three main purposes of these certificates: (1) reliably distributing and using the correct and legal identities and correct cryptographic keys of BIX system members, (2) verification of user identities and cryptographic keys, and (3) binding of identities to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Systems and methods for managing public key certificates and supporting the users thereof. The certificates are cryptographically encapsulated objects that bind the identities of their owners to public keys and provide digital signature mechanisms for other users to verify the binding and correctness of other attributes of the certificate. Certificates include double links that reflect their validation and position in a public certificates ledger, thereby preventing insertion or removal of certificates in the ledger. Certificate protocols of the system include requesting issuance of certificates, issuing and returning certificates to their requesting users, storing certificates in the certificates ledger, requesting and distributing certificates to transaction partners, verification of certificates by transaction partners, and revoking certificates by their owners. These protocols are performed as direct peer-to-peer transactions between the members of the system.

Description

REFERENCES CITEDU.S. Patents[0001]9,344,832Shell, et al.9,344,282Yoo, et al.9,344,425Belton, et al.US 20080244685Andersson, et al.US 20150164192 A1Gross, A.US 20150324787 A1Schaffner, D.Other Publications[0002]Ali, M., et al., “Blockstack: Design and Implementation of a Global Naming System with Blockchains”, 2016 USENIX Annual Technical Conference (USENIX ATC'16)[0003]Bitcoin (web site) https: / / en.bitcoin.it / wiki, 2010[0004]BitID (web site) “BitID Open Protocol”, http: / / bitid.bitcoin.blue / , 2015[0005]Brickell, E., et al., “Direct Anonymous Attestation”, CCS '04, ACM 2004 pp. 132-145[0006]Certificate Transparency (web site) https: / / www.certificate-transparency.org / [0007]Chaum, D., “Security without identification: transactions system to make big brother obsolete”, CACM, 1985[0008]Dot-bit (web site) http: / / dot-bit.org / [0009]Fromknecht, C., et al., “CertCoin: A Namecoin based decentralized Authentication System”, MIT, Class 6,857 Project, May 14, 2014[0010]Fromknecht, C., et al., “A D...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L9/32H04L9/30H04L9/14
CPCH04L9/3263H04L9/3247H04L9/3268H04L9/30H04L9/14H04L2209/56H04L9/50
Inventor MUFTIC, SEAD
Owner MUFTIC SEAD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products