US 12,438,730 B2
Systems and methods for reputation-based transactions over a network
Allan Thomson, Pleasanton, CA (US); Drummond Reed, Seattle, WA (US); and Jamie Smith, Great Bookham (GB)
Assigned to Avast Software s.r.o., Prague (CZ)
Filed by Avast Software s.r.o., Prague (CZ)
Filed on Nov. 4, 2022, as Appl. No. 18/052,752.
Prior Publication US 2024/0154815 A1, May 9, 2024
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 29/06 (2006.01); H04L 9/32 (2006.01)
CPC H04L 9/3247 (2013.01) 23 Claims
OG exemplary drawing
 
1. A system for transacting over a computer network comprising a first computing system, a first agent operating on the first computing system, a second computing system, and a second agent operating on the second computing system, the first computing system comprising at least one of an operating system or a security application, and the first computing system configured to:
determine at least one version of the at least one of the operating system or the security application; and
transmit an indication of the at least one version to the second agent;
the first agent configured to:
transact on behalf of a first entity;
transact with the second agent for at least a first cryptographically verifiable credential;
transmit the at least the first cryptographically verifiable credential to a third agent; and
transact with the third agent based on the at least the first cryptographically verifiable credential for at least a second cryptographically verifiable credential to facilitate transacting by the first agent with a fourth agent for a first service; and
the second agent configured to:
receive telemetry data of the first computing system from the first computing system, the first computing system configured to monitor the telemetry data;
determine at least one assessment of the first entity based on the telemetry data comprising determining a first assessment of the first entity based on the at least one version;
generate the at least the first cryptographically verifiable credential as at least one digitally signed credential based on the at least one assessment of the first entity by the second agent; and
transmit the at least the first cryptographically verifiable credential to the first agent.