US 12,333,532 B2
Method and system for zero-knowledge and identity based key management for decentralized applications
Vijay Madisetti, Alpharetta, GA (US); and Arshdeep Bahga, Chandigarh (IN)
Assigned to Vijay Madisetti, Alpharetta, GA (US)
Filed by Vijay Madisetti, Alpharetta, GA (US)
Filed on May 29, 2024, as Appl. No. 18/676,678.
Application 17/654,600 is a division of application No. 17/457,983, filed on Dec. 7, 2021, granted, now 11,720,891.
Application 18/676,678 is a continuation of application No. 18/303,963, filed on Apr. 20, 2023, granted, now 12,086,799.
Application 18/303,963 is a continuation of application No. 17/654,600, filed on Mar. 14, 2022, granted, now 11,651,362.
Application 17/457,983 is a continuation in part of application No. 15/830,099, filed on Dec. 4, 2017, granted, now 11,538,031.
Claims priority of provisional application 63/271,123, filed on Oct. 23, 2021.
Claims priority of provisional application 63/257,603, filed on Oct. 20, 2021.
Claims priority of provisional application 63/257,145, filed on Oct. 19, 2021.
Claims priority of provisional application 62/479,966, filed on Mar. 31, 2017.
Prior Publication US 2025/0014024 A1, Jan. 9, 2025
Int. Cl. H04L 9/40 (2022.01); G06F 21/33 (2013.01); G06F 21/62 (2013.01); G06Q 20/38 (2012.01); H04L 9/06 (2006.01); H04L 9/14 (2006.01); H04L 9/32 (2006.01); H04L 9/00 (2022.01)
CPC G06Q 20/3829 (2013.01) [H04L 9/14 (2013.01); H04L 63/061 (2013.01); G06F 21/33 (2013.01); G06F 21/6245 (2013.01); G06F 2221/2115 (2013.01); G06Q 2220/00 (2013.01); H04L 9/0643 (2013.01); H04L 9/3236 (2013.01); H04L 9/3297 (2013.01); H04L 9/50 (2022.05); H04L 2463/061 (2013.01)] 13 Claims
OG exemplary drawing
 
1. A method for qualifying a validator server used in zero-knowledge transactions comprising:
receiving at a prover client a first plurality of transactions from a verifier server;
generating by the prover client a hashed transaction for each transaction of the first plurality of transactions by applying a hashing function to each transaction of the first plurality of transactions, each hashed transaction comprising a secret-protected assertion, the hashed transactions collectively defined as the first plurality of hashed transactions;
transmitting the first plurality of hashed transactions to a smart contract on a blockchain network;
receiving at a smart contract the first plurality of hashed transactions;
receiving at the smart contract a second plurality of hashed transactions between the prover client and the verifier server, at least one of the hashed transactions of the second plurality of hashed transactions comprising the secret-protected assertion;
accessing each of the first plurality of hashed transactions and the second plurality of hashed transactions on the smart contract by an enforcement node;
analyzing the first and second pluralities of hashed transactions by the enforcement node; and
responsive to the analyzing of the first and second pluralities of hashed transactions, by the enforcement node, qualifies or disqualifies the mismatches of transmitted interaction state logs.