US 12,216,771 B2
Encrypted verifiable credentials
Brandon Murdoch, Reading (GB); Ankur Patel, Sammamish, WA (US); and Guillermo P. Proano, Kirkland, WA (US)
Assigned to Microsoft Technology Licensing, LLC, Redmond, WA (US)
Appl. No. 17/997,511
Filed by Microsoft Technology Licensing, LLC, Redmond, WA (US)
PCT Filed Apr. 23, 2021, PCT No. PCT/US2021/028888
§ 371(c)(1), (2) Date Oct. 28, 2022,
PCT Pub. No. WO2021/222027, PCT Pub. Date Nov. 4, 2021.
Claims priority of application No. LU101757 (LU), filed on Apr. 28, 2020.
Prior Publication US 2023/0177174 A1, Jun. 8, 2023
Int. Cl. G06F 21/60 (2013.01); G06F 21/34 (2013.01); G06F 21/62 (2013.01)
CPC G06F 21/602 (2013.01) [G06F 21/34 (2013.01); G06F 21/6209 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A computing system associated with a credential holder comprising:
one or more processors; and
one or more computer-readable media having thereon computer-executable instructions that are structured such that, when executed by the one or more processors, cause the computing system to perform the following:
receive a verifiable credential (VC) from a credential issuer, the VC containing one or more claims about a subject entity;
obtain a public key of the credential issuer;
encrypt the VC by the public key of the credential issuer;
generate one or more instruction(s), at least one of the instructions instructing the credential issuer to grant a scope of permission associated with the encrypted VC to a relying entity, the scope of permission comprising at least permission to access a subset of data that can be extracted from the VC or a portion of data that can be derived from the VC;
send the encrypted VC and the instruction(s) to the credential issuer or the relying entity;
such that if the encrypted VC and the instruction(s) have been sent to the relying entity, the relying entity forwards the encrypted VC and the instruction(s) to the credential issuer;
cause the credential issuer to generate a response containing the subset of verifiable data or the portion of data and proof code, the proof code being configured to prove validity of the subset of data or the portion of data; and
cause the credential issuer to send the response to the computing system associated with the credential holder or to the relying entity.