US 12,463,822 B2
Sharing security settings between entities using verifiable credentials
Bailey Marie Bercik, Seattle, WA (US); Mark David Morowczynski, Seattle, WA (US); Arvind Bipin Suthar, Medina, WA (US); and Ramiro Calderon Romero, Monroe, WA (US)
Filed by Microsoft Technology Licensing, LLC, Redmond, WA (US)
Filed on Nov. 22, 2022, as Appl. No. 18/058,205.
Prior Publication US 2024/0171406 A1, May 23, 2024
Int. Cl. H04L 9/32 (2006.01); H04L 9/40 (2022.01)
CPC H04L 9/3247 (2013.01) [H04L 63/102 (2013.01); H04L 63/20 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A computing system comprising:
one or more processors; and
one or more computer-readable hardware storage devices having thereon computer-executable instructions that are structured such that, when executed by the one or more processors, cause the computing system to:
receive, at a second entity, a first verifiable credential from a first entity, the first verifiable credential being cryptographically signed by the first entity using a decentralized identifier (DID) of the first entity, the first verifiable credential comprising a security indicator specifying a security posture of the second entity that is based on one or more security settings being implemented by the second entity;
generate, at the second entity, a second verifiable credential, the second verifiable credential embedding the first verifiable credential therein; and
provide the second verifiable credential to a third entity, the second verifiable credential being configured to cause the third entity to verify the cryptographic signature of the first entity with a public key associated with the DID of the first entity to determine that the first verifiable credential is valid and that the one or more security settings being implemented by the second entity are in compliance with security policies of the third entity.