Automated verification of chains of credentials

A method, a computing system and a computer program product are provided. A computing device identifies a credential of a first entity and determines one or more second entities, each electronically verifying the credential of the first entity. The computing device determines one or more third entit...

Full description

Saved in:
Bibliographic Details
Main Authors Madduri, Hari H, Gupta, Rahul, Mukherjee, Maharaj, Kumhyr, David B
Format Patent
LanguageEnglish
Published 16.07.2019
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:A method, a computing system and a computer program product are provided. A computing device identifies a credential of a first entity and determines one or more second entities, each electronically verifying the credential of the first entity. The computing device determines one or more third entities, each electronically verifying one or more from a group of second entities and other ones of the third entities, wherein the second and third entities form a set of chains of verification from the first entity. The computing device analyzes the set of chains of verification to detect one or more loops within the set of chains among the second and third entities. A verification of the credential is generated by the computing device based on detection of a trusted entity within one of the set of chains and not detecting a loop within the one of the set of chains.
Bibliography:Application Number: US201715459669