You are on page 1of 3

INVENTION DISCLOSURE Date:

INVENTION DISCLOSURE

1. What is the title of the invention you are disclosing?

A REPOSITORY OF DIGITAL CERTIFICATES FOR IDENTITY MANAGEMENT AND OPTIONALLY AUTHENTICATION FOR CLIENT APPLICATIONS

2. What is the problem that is being solved by the invention? What is the use of the present invention? How is the invention better than or different from presently known or available products or processes? How are the presently known or available products or processes working or being used and how do they address the problem being solved?

LEVERAGE DIGITAL CERTIFICATE BASED IDENTITY RESOLUTION FOR AUTHENTICITY OF USERS IN E(ELECTRONIC)-ENABLED APPLICATIONS.

3. How does the invention address the current state of problems not addressed by the known products or processes?

Authenticity of users participating in social media/ web forums is just as authentic and reliable as they declare themselves to be in current state of world wide web based applications

The invention and proposed solution to the problem of authentic user identification is based on concept of the user uploading / making available the digital certificate issued to him/entity in the online identity management Repository , thus all users possessing or making available a digital certificate Issued by a recognized Certification Authority(CA like verizon ) are valid and verifiable users establishing a acknowledgeable circle of trust. Thus the conduct of the users identified by a digital certificate is both verifyable And reliable on social media and all other identifiable web transactions by user In the web-enabled application which uses the above described repository for User identification and potentially authentication.

4. How does the invention address the current state of problems not addressed by the known products or processes?

Anybody can create a user profile on applications like facebook / twitter/ Google+ / linkedin etc as far as and in the context of this document all the users in these kind of applications can be called or termable anonymous as there is no possible circle of trust establishable or possible because any user profile is just a self declared information that is neither reliable nor authentic the invention disclosed in this application solves authenticity of the users by very nature viz. employing digital certificate issued by authorized vendors or certification authorities.

5. How else can the same result be achieved besides using the invention? What other changes can be made to arrive at the same result provided by the use of the current invention?

None. 6. Has the invention been disclosed to anyone outside your company? (Disclosure can include publication in a journal describing the invention, sale, submission of data to regulatory bodies governing at the national or regional level, marketing,

word-of-mouth, prior commercial use, etc.)

No..

7. Describe the invention in detail, stating all the features which are novel and their respective functions. Please provide enough detail, without abbreviations, for a clear understanding of the invention. Please use any figures to illustrate the features of the invention, if necessary. The invention employees a repository to store digital certificates issued to endusers this is similar on the lines of public/private key based encryption a) Except that the invention proposes to extend the class of digital certificates available for the purpose to embedded a public-key in the digital certificate When issued by a issuer (digital certification authority) and a private key Which will be retained and not disclosed to anyone by the end-user entities and they Keep-it for them-selves.

b) It is proposed for the individual user entities a digital certificate be generated Which includes a valid public-key generated based on an algorithm that employees the finger-print or thumb impression of individual users and the thumb impression or finger-print Of the user itself serves as the private key.

OBJECTIVE: 1) digital certificate to serve the purpose of identification of end-user-entities 2) optionally to serve the purpose of authentication or authorization to e-nable applications. 3) employs or relies on storage of private key on private computer or secure location or the availability of a finger-print scanner embedded Into devices(those which are e-enabled) for authentication.

You might also like