APPARATUS AND PASSWORDS FOR PROVIDING DOUBLE-SIDED ESTATE PASSWORD AUTHENTICATION VIA PHYSICAL TOKENS AND A DISTRIBUTED LEDGER

Information

  • Patent Application
  • 20230069098
  • Publication Number
    20230069098
  • Date Filed
    August 27, 2021
    3 years ago
  • Date Published
    March 02, 2023
    a year ago
Abstract
Systems and methods for providing a double-sided estate authentication via a distributed ledger are set forth herein. A method may include periodically generating, for display by a first physical token, a first random password. The generating may be in response to periodic receipt of a biometric signal from a first human. The method may also include periodically generating, for display by a second physical token, a second random password. The method further includes receiving and storing the first random password at a distributed ledger and receiving and storing the second random password at the distributed ledger. Following a cessation of the periodic receipt of the biometric signal, the first physical token may stop generating the first random password, and the second physical token may start generating the first random password. The first random password and the second random password together may form a dual-knowledge password.
Description
FIELD OF TECHNOLOGY

Aspects of the disclosure relate to digital systems. Specifically, aspects of the disclosure relate to blockchain-based digital encryption systems.


BACKGROUND OF THE DISCLOSURE

It is common for individuals, during their lifetimes, to plan for when they will no longer be alive. Such plans often involve estate plans, such as the transfer of assets to a designated heir or heirs. Plans may also include social media plans, which may dictate the status of a particular social media account or set of accounts. For example, an account may be shut down, deleted, transferred, archived, or subject to other suitable action.


Such plans are often stored digitally. However, conventional digital estate plans face many deficiencies. They often lack robust security. Even when sufficiently encrypted, it is often difficult to ensure that the passwords are accessible to the necessary entities at precisely the correct time. For example, it may be desirable for an heir to have access to the estate plan as soon as possible after the death of the benefactor, but not before.


Accordingly, it would be desirable to provide systems and methods for digital encryption of sensitive digital content. It would be further desirable for the systems and methods to include an architecture that provides robust security and precise, timely, password propagation.


SUMMARY OF THE DISCLOSURE

Aspects of the disclosure relate to digital encryption systems. A bifurcated digital encryption system is provided. The system may include a first distributed ledger, a second distributed ledger, and an encrypted digital vault storing sensitive, self-executing, digital content. The system may also include a processor, a non-transitory memory, and computer executable instructions stored in the memory, that, when run on the processor, are configured to perform some or all the features of the system.


The system may generate a first password and a second password. The first password and the second password together may unlock the digital vault. The system may store the first password on the first distributed ledger and the second password on the second distributed ledger. The system may automatically update the first password periodically and store the updated first password as a new entry on the first distributed ledger. The system may automatically update the second password periodically and store the updated second password as a new entry on the second distributed ledger.


Access to the first password on the first distributed ledger may be locked to any entity that is not authenticated as the account holder. Access to the second password on the second distributed ledger may be locked to any entity that is not authenticated as the designated entity. When a document from a predetermined list of documents is digitally scanned and authenticated, access to the first password on the first distributed ledger may be unlocked for the designated entity. When the digital vault is unlocked with the first and the second passwords, the digital content may self-execute.





BRIEF DESCRIPTION OF THE DRAWINGS

The objects and advantages of the disclosure will be apparent upon consideration of the following detailed description, taken in conjunction with the accompanying drawings, in which like reference characters refer to like parts throughout, and in which:



FIG. 1 shows an illustrative system in accordance with principles of the disclosure;



FIG. 2 shows an illustrative apparatus in accordance with principles of the disclosure;



FIG. 3 shows an illustrative flowchart in accordance with principles of the disclosure;



FIG. 4 shows an illustrative system architecture in accordance with principles of the disclosure;



FIG. 5 shows an illustrative schematic diagram of two physical tokens in accordance with principles of the disclosure;



FIG. 6 shows an illustrative blockchain storage system for use with physical tokens in accordance with principles of the disclosure;



FIG. 7 shows an illustrative schematic diagram of two physical tokens, each of which that displays a digital password;



FIG. 8 shows another illustrative schematic diagram of two physical tokens, each of which that displays a digital password; and



FIG. 9 shows yet another illustrative schematic diagram of two physical tokens.





DETAILED DESCRIPTION OF THE DISCLOSURE

Aspects of the disclosure relate to systems and methods for digital encryption. Systems may include a processor, a non-transitory memory, and computer executable instructions stored in the memory. The computer executable instructions, when run on the processor, may be configured to perform some or all the features of the system. The system may, in some embodiments, be wholly or partially cloud based.


A bifurcated digital encryption system is provided. The system may include a first distributed ledger and a second distributed ledger. A distributed ledger may include a plurality of coordinated databases. Coordinating the databases may, for example, include syncing the databases based on a consensus. Each coordinated database may be stored on a distinct node from a plurality of nodes. Each coordinated database may include linked blocks of hashed data. A block that is linked to a previous block may include a hashing of the hashed data of the previous block. In certain embodiments, the data may be encrypted. In other embodiments, the data may not be hashed or encrypted. The link between the blocks may include a pointer.


Each one of the databases of the distributed ledger may be stored on a distinct one of a plurality of nodes. When the distributed ledger is initialized or updated, a data block containing data associated with the initialization/update may be created on each of the nodes. The data block may be linked to the most recent pre-update data block.


One example of a distributed ledger is a blockchain. A blockchain is a distributed database of records or public ledger of all transactions or digital events that have been executed and shared among participants. Each transaction or digital event in the public ledger is verified by a majority of participants included in the system. Once a transaction or digital event is executed, it can never be erased. The blockchain therefore contains an immutable and verifiable record of each transaction or event. An encrypted blockchain also provides a secure and anonymous architecture for storing sensitive information.


A distributed electronic ledger may store records in any suitable format. For example, records may be stored sequentially as they are generated, one after the other in a continuous ledger. Records may be stored in blocks, such as in a blockchain.


Records stored in a distributed electronic ledger may only be added to the ledger when the participants responsible for maintaining the distributed ledger (e.g., participant devices or nodes) reach a consensus. The distributed ledger may use any suitable consensus algorithm such as Proof of Work, Proof of Stake or Practical Byzantine Fault Tolerance.


The distributed ledger may be a public or unpermissioned distributed ledger. A public distributed ledger does not have restrictions on who may participate in establishing a consensus for adding a new record.


The distributed ledger may be a private or permissioned distributed ledger. A private distributed ledger has restrictions on who may participate in establishing a consensus for adding a new record.


The distributed ledger may utilize a combination of private and public participation in establishing a consensus. For example, the distributed ledger may require a threshold number of private and/or public votes before recording a transaction on the distributed ledger. Utilization of private entities may allow for achieving a consensus (or rejection) of a transaction faster than wholly public distributed ledgers.


The distributed ledger may be a blockchain. Records stored in a blockchain are organized in blocks. Each block may include multiple records. The blocks are linked to one another and secured using cryptography.


The distributed ledger may include a blockchain of electronic data records. Each record may be authenticated by a consensus protocol. A complete copy of the blockchain may be stored on multiple computer systems. Each computer system that stores a copy of the blockchain may be a “node.”


Groups of authenticated transactions may be gathered into “blocks.” A node may add a “block” to the blockchain. Each block may include data and metadata. Metadata may include a reference to the previous block in the chain and a unique identifier associated with the previous block. The unique identifier may be an output of a hash function.


The system may also include an encrypted digital vault storing sensitive, self-executing, digital content. Self-executing digital content may be programmed to perform certain pre-determined actions in response to a trigger. The trigger may, in certain embodiments, be an event. The trigger may, in some embodiments, be successful entry of a password or set of passwords. In some embodiments, the digital vault may be a third distributed ledger.


The system may generate a first password and a second password. The first password and the second password together may unlock the digital vault. Certain embodiments may be configured to generate a single combined password and bifurcate the combined password to generate the first and the second password. The system may store the first password on the first distributed ledger and the second password on the second distributed ledger.


The system may automatically update the first password. The automatic update may be performed periodically (e.g., every year, month, week, day, hour, minute, second, or substantially continuously). The automatic update may be performed at random intervals. The updated password may be generated randomly. The system may store the updated first password as a new entry on the first distributed ledger. The system may automatically update the second password periodically and store the updated second password as a new entry on the second distributed ledger.


Access to the first password on the first distributed ledger may be locked to any entity that is not authenticated as the account holder. For example, the first distributed ledger may be password protected and the account holder may be provided the password. In other embodiments, the first distributed ledger may be locked and only accessible from a device associated with the account holder. In still other embodiments, the first distributed ledger may be locked and only accessible upon biometric verification that the accessor is the account holder, e.g., via voice recognition, fingerprint scan, retina scan, or other suitable biometric verification. Similarly, access to the second password on the second distributed ledger may be locked to any entity that is not authenticated as the designated entity.


The designated entity may, in certain embodiments, include a trustee or an entity with power of attorney from the account holder. In some embodiments, the designated entity may be an heir to the account holder.


When a document from a predetermined list of documents is digitally scanned and authenticated, access to the first password on the first distributed ledger may be unlocked for the designated entity. The predetermined list of documents may, in some embodiments, include documents that indicate death of the account holder. For example, one document of the predetermined list of documents may be a death certificate.


In certain embodiments, the predetermined list of documents may include a document that records approval of the account holder to unlock access to the first password on the first distributed ledger for the designated entity.


When the digital vault is unlocked with the first and the second passwords, the digital content may self-execute. Self-execution of the digital content may include executing an asset transfer, executing a transfer of authority of a social media account, or any other suitable action or transaction that may be incorporated in the digital content. The system may, in certain embodiments, use an ML engine for the self-execution.


The digital content may, in some embodiments, include an estate plan. In certain embodiments, the estate plan may include a transfer of assets. In some embodiments, the estate plan may include a change of authority for a social media account.


The digital content may, in some embodiments, be a smart contract. A smart contract may include machine executable instructions running on a computing system. The executable instructions may be self-executing and trigger actions at specified times and/or based on reference to the occurrence or non-occurrence of a target action or event. Some or all of the computer executable instructions may be embodied in hardware or firmware components of a computing system.


A smart contract may be run in cloud computing and virtualization implementations of software. Such implementations may be designed to run on a physical apparatus supplied externally by a hosting provider, a client, or other virtualized platform. A smart contract may include computer executable instructions for invoking user functionality related to communication, such as email, short message service (“SMS”), and voice input and speech recognition applications.


Smart contracts may utilize computer-executable instructions, such as program modules, executed by a processor on the computing system. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. Smart contracts may be operational with distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices. Smart contracts may rely on a network of remote servers hosted on the Internet to store, manage, and process data (e.g., “cloud computing” and/or “fog computing”). For example, smart contracts may be run on nodes that form a blockchain environment.


Smart contracts may be computer programs that can automatically execute the terms of a contract. A smart contract may be made between two or more participating entities. When a preconfigured condition in a smart contract is met, payments or other digital actions between the parties involved in the contractual agreement may be executed, as per the contract, in a reliable manner.


A method for digitally encrypting sensitive, self-executing, digital content is provided. The method may include storing the digital content in an encrypted digital vault. The method may include generating a first password and a second password. The first password and the second password together may unlock the digital vault. The method may include storing the first password on a first distributed ledger and the second password on a second distributed ledger. The method may include locking access to the first password on the first distributed ledger to any entity that is not authenticated as the account holder. The method may include locking access to the second password on the second distributed ledger to any entity that is not authenticated as the designated entity.


The method may include automatically updating the first password periodically and storing the updated first password as a new entry on the first distributed ledger. The method may include automatically updating the second password periodically and storing the updated second password as a new entry on the second distributed ledger. When a document from a predetermined list of documents is digitally scanned and authenticated, the method may include unlocking access to the first password on the first distributed ledger for the designated entity. When the digital vault is unlocked with the first and the second passwords, the method may include executing the digital content.


A blockchain-based dual-password encryption system for a smart contract is provided. The system may include a first blockchain storing a first password. The first blockchain may be access restricted and an account holder may be granted access. The system may include a second blockchain storing a second password. The second blockchain may be access restricted and a designated entity may be granted access. The system may include a third blockchain storing the smart contract. The third blockchain may be access restricted and access may only be granted upon digital entry of the both the first password and the second password.


The first password may be automatically updated periodically. The updated first password may be stored as a new entry on the first distributed ledger. The second password may be automatically updated periodically. The updated second password may be stored as a new entry on the second distributed ledger.


When a document from a predetermined list of documents is digitally scanned and authenticated, access to the first password on the first distributed ledger may be unlocked for the designated entity. When the digital vault is unlocked with the first and the second passwords, the smart contract may self-execute.


In an embodiment, a password may be known to the trustee. By making it permanent, the trustee/POA cannot change it, protecting the owner of the account.


In an embodiment, one or both passwords (or halves of a single dual-knowledge password) may be constantly updated, and only users with access to the updates may see the current password(s). Different permutations of access may be given to different users. For example, a trustee/POA may only have access to one of the two passwords/halves, while the customer may have access to both.


The substantially constant updates (once every minute, for example) may be made through an existing application, such as CyberArk™, which can perform password rotation with application code, constantly rotating active directory passwords to randomly generated ones. This may mitigate risk associated with hard-coding passwords.


Alternatively, instead of, or in addition to, a distributed ledger, one or both of the two passwords/halves may be stored in a cloud-based escrow service.


Physical dongles (or applications on a mobile phone) may be used to authenticate dual-knowledge and double-sided passwords. Physical authentication may be useful in the estate context.


In an embodiment, a customer may use physical tokens displayed codes as authenticators instead of passwords. For example, RSA dongles will randomly generate new codes every 60 seconds. Software applications may perform the same function.


Both tokens may be necessary to access an account. (As a form of a dual-knowledge password: neither part alone will grant access, but combined they will.) Alternatively, one token may only become active upon death/incapacity (or another pre-determined point), and only at that point will both tokens be needed. Alternatively, upon death/incapacity, the customer may be able to grant access to an account to a trustee/POA easier than the current process (providing a death certificate, etc.).


In an embodiment, the financial institution itself may control one of the two tokens (analogous to a safe deposit box). The other token may be inherited, shared with, or passed to a trustee/POA through various means.


In some embodiments, a system for providing double-sided estate authentication via a distributed ledger is provided. The system may include a first physical electronic token. The first physical token may be configured to periodically generate a first random password in response to receipt of a periodic biometric signal from a first human.


The system may also include a second physical electronic token. The second physical token may be configured to periodically generate a second random password.


The system may also include a distributed ledger. In some embodiments, each time the first random password is generated it is stored in the distributed ledger and each time the second random password is generated it is stored in the distributed ledger.


The first random password and the second random password may combine to form a dual-knowledge password for providing electronic access to an estate electronic digital file.


Following a cessation of the periodic biometric signal, the first physical token is preferably configured to stop generating the first random password. After the cessation, the second physical token may be configured to start generating the first random password in addition to generating the second random password. The distributed ledger may be configured to store a date and time of the cessation of the periodic biometric signal. The date and time of the cessation may also, in certain embodiments, be transmitted for display on the second physical token.


In some embodiments, the biometric signal indicates whether the first human is alive. In certain embodiments, the estate digital file may correspond to an estate of the first human.


In some embodiments, the dual-knowledge password may be updated with each of the periodic generation of the first random password and the periodic generation of the second random password. In certain embodiments, the electronic access may include an electronic password for opening a safe. In some embodiments, the electronic access may include causing a digital file to self-execute.


In certain embodiments, the first physical token may periodically generate the first random password every 60 seconds and the second physical token may periodically generate the second random password every 60 seconds.


The first physical electronic token may include a receiver for receiving the periodic biometric signal and for validating that the periodic biometric signal corresponds to the first human.


Another system for providing double-sided estate authentication via a distributed ledger is provided. This system may include a first physical electronic token. The first physical token may be configured to periodically generate a first random password in response to receipt of a periodic biometric signal from a first human. The system may also include a second physical electronic token. The second physical token may be configured to periodically generate a second random password. The system may also include a distributed ledger. Each time the first random password is generated it is stored in the distributed ledger and each time the second random password is generated it is stored in the distributed ledger. The first random password and the second random password form a dual-knowledge password for providing electronic access to an estate file. In the currently-described system, following a cessation of the periodic biometric signal, the first token may be configured to transmit the first random password to the second token for display thereon such that the second token is configured to receive and display the first random password substantially simultaneously to generating the second random password. In this embodiment, the distributed ledger may be configured to store a date and time of the cessation of the periodic biometric signal.


Apparatus and methods described herein are illustrative. Apparatus and methods in accordance with this disclosure will now be described in connection with the figures, which form a part hereof. The figures show illustrative features of apparatus and method steps in accordance with the principles of this disclosure. It is understood that other embodiments may be utilized, and that structural, functional, and procedural modifications may be made without departing from the scope and spirit of the present disclosure.



FIG. 1 shows an illustrative block diagram of system 100 that includes computer 101. Computer 101 may alternatively be referred to herein as a “server” or a “computing device.” Computer 101 may be a workstation, desktop, laptop, tablet, smart phone, or any other suitable computing device. Elements of system 100, including computer 101, may be used to implement various aspects of the systems and methods disclosed herein.


Computer 101 may have a processor 103 for controlling the operation of the device and its associated components, and may include RAM 105, ROM 107, input/output module 109, and a memory 115. The processor 103 may also execute all software running on the computer—e.g., the operating system and/or voice recognition software. Other components commonly used for computers, such as EEPROM or Flash memory or any other suitable components, may also be part of the computer 101.


The memory 115 may be comprised of any suitable permanent storage technology—e.g., a hard drive. The memory 115 may store software including the operating system 117 and application(s) 119 along with any data 111 needed for the operation of the system 100. Memory 115 may also store videos, text, and/or audio assistance files. The videos, text, and/or audio assistance files may also be stored in cache memory, or any other suitable memory. Alternatively, some or all of computer executable instructions (alternatively referred to as “code”) may be embodied in hardware or firmware (not shown). The computer 101 may execute the instructions embodied by the software to perform various functions.


Input/output (“I/O”) module may include connectivity to a microphone, keyboard, touch screen, mouse, and/or stylus through which a user of computer 101 may provide input. The input may include input relating to cursor movement. The input may relate to password and security settings. The input/output module may also include one or more speakers for providing audio output and a video display device for providing textual, audio, audiovisual, and/or graphical output. The input and output may be related to computer application functionality. The input and output may be related to password and security settings.


System 100 may be connected to other systems via a local area network (LAN) interface 113.


System 100 may operate in a networked environment supporting connections to one or more remote computers, such as terminals 141 and 151. Terminals 141 and 151 may be personal computers or servers that include many or all of the elements described above relative to system 100. The network connections depicted in FIG. 1 include a local area network (LAN) 125 and a wide area network (WAN) 129, but may also include other networks. When used in a LAN networking environment, computer 101 is connected to LAN 125 through a LAN interface or adapter 113. When used in a WAN networking environment, computer 101 may include a modem 127 or other means for establishing communications over WAN 129, such as Internet 131.


It will be appreciated that the network connections shown are illustrative and other means of establishing a communications link between computers may be used. The existence of various well-known protocols such as TCP/IP, Ethernet, FTP, HTTP and the like is presumed, and the system can be operated in a client-server configuration to permit a user to retrieve web pages from a web-based server. The web-based server may transmit data to any other suitable computer system. The web-based server may also send computer-readable instructions, together with the data, to any suitable computer system. The computer-readable instructions may be to store the data in cache memory, the hard drive, secondary memory, or any other suitable memory.


Additionally, application program(s) 119, which may be used by computer 101, may include computer executable instructions for invoking user functionality related to communication, such as e-mail, Short Message Service (SMS), and voice input and speech recognition applications. Application program(s) 119 (which may be alternatively referred to herein as “plugins,” “applications,” or “apps”) may include computer executable instructions for invoking user functionality related performing various tasks. The various tasks may be related to password and security settings.


Computer 101 and/or terminals 141 and 151 may also be devices including various other components, such as a battery, speaker, and/or antennas (not shown).


Terminal 151 and/or terminal 141 may be portable devices such as a laptop, cell phone, Blackberry™, tablet, smartphone, or any other suitable device for receiving, storing, transmitting and/or displaying relevant information. Terminals 151 and/or terminal 141 may be other devices. These devices may be identical to system 100 or different. The differences may be related to hardware components and/or software components.


Any information described above in connection with database 111, and any other suitable information, may be stored in memory 115. One or more of applications 119 may include one or more algorithms that may be used to implement features of the disclosure, and/or any other suitable tasks.


The invention may be operational with numerous other general purpose or special purpose computing system environments or configurations. Examples of well-known computing systems, environments, and/or configurations that may be suitable for use with the invention include, but are not limited to, personal computers, server computers, hand-held or laptop devices, tablets, mobile phones, smart phones and/or other personal digital assistants (“PDAs”), multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like.


The invention may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc., that perform particular tasks or implement particular abstract data types. The invention may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.



FIG. 2 shows illustrative apparatus 200 that may be configured in accordance with the principles of the disclosure. Apparatus 200 may be a computing machine. Apparatus 200 may include one or more features of the apparatus shown in FIG. 1. Apparatus 200 may include chip module 202, which may include one or more integrated circuits, and which may include logic configured to perform any other suitable logical operations.


Apparatus 200 may include one or more of the following components: I/O circuitry 204, which may include a transmitter device and a receiver device and may interface with fiber optic cable, coaxial cable, telephone lines, wireless devices, PHY layer hardware, a keypad/display control device or any other suitable media or devices; peripheral devices 206, which may include counter timers, real-time timers, power-on reset generators or any other suitable peripheral devices; logical processing device 208, which may compute data structural information and structural parameters of the data; and machine-readable memory 210.


Machine-readable memory 210 may be configured to store in machine-readable data structures: machine executable instructions (which may be alternatively referred to herein as “computer instructions” or “computer code”), applications, signals, and/or any other suitable information or data structures.


Components 202, 204, 206, 208 and 210 may be coupled together by a system bus or other interconnections 212 and may be present on one or more circuit boards such as 220. In some embodiments, the components may be integrated into a single chip. The chip may be silicon-based.



FIG. 3 shows illustrative flowchart 300 in accordance with principles of the disclosure. Flowchart 300 begins at step 301 with storing digital content in a digital vault. At step 303 a first and a second password are generated. The first password may be stored on a first blockchain at step 305. The first password may be periodically updated at step 309, and the first blockchain may updated accordingly at step 313. The second password may be stored on a second blockchain at step 307. The second password may be periodically updated at step 311, and the second blockchain may updated accordingly at step 315.


Exclusive access may be granted to the account holder for the first password on the first blockchain at step 317. Exclusive access may be granted to the designated entity for the second password on the second blockchain at step 319. At step 321, the process may query if a qualifying document was scanned and authenticated. If a qualifying document was scanned and authenticated, the process may proceed to step 323 and grant access for the first password on the first blockchain to the designated entity. If both passwords register as being entered at the digital vault at step 325, the digital content may self-execute at step 327.



FIG. 4 shows illustrative system architecture 400 in accordance with principles of the disclosure. Architecture 400 includes distributed ledger 1 (401) and distributed ledger 2 (405). Distributed ledger 1 (401) includes a chain of ledgers with most recent ledger 403 at the end. Distributed ledger 2 (405) includes a chain of ledgers with most recent ledger 407 at the end. Ledgers 403 and 407 may represent the most updated versions of a first and second password, respectively. The first and second passwords may, in combination, act as a digital key 409 to unlock digital vault 411. Unlocking digital vault 411 may trigger self-execution of an estate plan file 413 contained in digital vault 411. Digital vault 411 may be a third distributed ledger. Estate plan file 413 may be a smart contract.



FIG. 5 shows an illustrative schematic diagram of two physical tokens in accordance with principles of the disclosure. A first electronic token (referred to herein in the alternative as a “dongle”) 502 displays a first password at 504. A second dongle 508 shows a second password at 510.


The first password 504 may be stored in a block chain at 506. The second password may be stored in a second (or the same) block chain at 512. Together the passwords may form a single digital key 509 for unlocking a digital file or digital safe.



FIG. 6 shows an illustrative blockchain storage system for use with physical tokens in accordance with principles of the disclosure. At stage I, block chain segment 602, which corresponds to a first password is shown. Also at stage I, block chain segment 604, which corresponds to a second password is shown. Token 606 preferably is configured to display at 608 the first password. Token 610 is preferably configured to display at 612 the second password.


Stage II corresponds to a second stage of the block chain. At stage II, block chain segment 614, which corresponds to a second generation of the first password is shown. Also at stage II, block chain segment 616, which corresponds to a second generation of the second password is shown. Token 618 preferably is configured to display at 620 the first password. Token 622 preferably is configured to display at 624 the second password.


Stage III corresponds to a third stage of the block chain. At stage III, block chain segment 626, which corresponds to a third generation of the first password is shown. Also at stage III, block chain segment 628, which corresponds to a third generation of the second password is shown. However, only one token is shown at 630. This is because a biometric signal that has been required to continue to send the second password to the second token has ceased. As such, both passwords are being sent to token 630 and displayed at 632. Alternatively, the first password could be sent to 632 and the second password could be sent to a second display 634 on token 630. Providing a second password to token 630 following cessation of the biometric signal obtains a distinct advantage because it provides an indication to the second token holder that a biometric signal used to maintain transmission of the first password to the first token has ceased.



FIG. 7 shows an illustrative schematic diagram of two physical tokens 706 and 710, each of which that displays a digital password, 708 and 712, respectively. Safe 702 represents either an actual, physical, safe or a digital safe—i.e., secure electronic file storage of sensitive electronic documents or other digital information. Passwords 708 and 712, in combination, provide the dual-knowledge password that may be used to open digital safe 702.


In one embodiment, token 710 preferably requires biometric signal 714, shown as schematically derived from user 716, in order to continue to display second password 712.



FIG. 8 shows further two electronic tokens 802 and 806, each of which displays a first password and second password, 804 and 808, respectively. Token 806 is shown as receiving biometric signal 80 from watch 814 affixed to user 812.



FIG. 9 shows yet another illustrative schematic diagram of two physical tokens 902 and 908. Each of tokens 902 and 908 are configured to display a password 904 and 910, respectively. Each of passwords 904 and 910 may form a portion of a dual-knowledge password.


At 912, a termination of a biometric signal 912 retrieved from user 914 is schematically indicated. Thereafter, the display on token 908 ceases, and an additional password 906 is displayed on token 902.


The steps of methods may be performed in an order other than the order shown and/or described herein. Embodiments may omit steps shown and/or described in connection with illustrative methods. Embodiments may include steps that are neither shown nor described in connection with illustrative methods.


Illustrative method steps may be combined. For example, an illustrative method may include steps shown in connection with another illustrative method.


Apparatus may omit features shown and/or described in connection with illustrative apparatus. Embodiments may include features that are neither shown nor described in connection with the illustrative apparatus. Features of illustrative apparatus may be combined. For example, an illustrative embodiment may include features shown in connection with another illustrative embodiment.


The drawings show illustrative features of apparatus and methods in accordance with the principles of the invention. The features are illustrated in the context of selected embodiments. It will be understood that features shown in connection with one of the embodiments may be practiced in accordance with the principles of the invention along with features shown in connection with another of the embodiments.


One of ordinary skill in the art will appreciate that the steps shown and described herein may be performed in other than the recited order and that one or more steps illustrated may be optional. The methods of the above-referenced embodiments may involve the use of any suitable elements, steps, computer-executable instructions, or computer-readable data structures. In this regard, other embodiments are disclosed herein as well that can be partially or wholly implemented on a computer-readable medium, for example, by storing computer-executable instructions or modules or by utilizing computer-readable data structures.


Thus, apparatus and methods for providing double-sided estate password authentication via a distributed ledger are provided. Persons skilled in the art will appreciate that the present invention can be practiced by other than the described embodiments, which are presented for purposes of illustration rather than of limitation, and that the present invention is limited only by the claims that follow.

Claims
  • 1. A system for providing double-sided estate authentication via a distributed ledger, the system comprising: a first physical electronic token, the first physical token configured to periodically generate a first random password in response to receipt of a periodic biometric signal from a first human;a second physical electronic token, the second physical token configured to periodically generate a second random password; anda distributed ledger, whereby each time the first random password is generated it is stored in the distributed ledger and each time the second random password is generated it is stored in the distributed ledger;wherein the first random password and the second random password comprise a dual-knowledge password for providing electronic access to an estate digital file; andwherein, following a cessation of the periodic biometric signal, the first physical token is configured to stop generating the first random password, the second physical token is configured to start generating the first random password in addition to generating the second random password, and the distributed ledger is configured to store a date and time of the cessation of the periodic biometric signal.
  • 2. The system of claim 1 wherein the biometric signal indicates whether the first human is alive.
  • 3. The system of claim 1 wherein the estate digital file corresponds to an estate of the first human.
  • 4. The system of claim 1 wherein the dual-knowledge password is updated with each of the periodic generation of the first random password and the periodic generation of the second random password.
  • 5. The system of claim 1 wherein the electronic access comprises an electronic password for opening a safe.
  • 6. The system of claim 1 wherein the first physical token periodically generates the first random password every 60 seconds and the second physical token periodically generates the second random password every 60 seconds.
  • 7. The system of claim 1 wherein the first physical electronic token comprises a receiver for receiving the periodic biometric signal and for validating that the periodic biometric signal corresponds to the first human.
  • 8. A system for providing double-sided estate authentication via a distributed ledger, the system comprising: a first physical electronic token, the first physical token configured to periodically generate a first random password in response to receipt of a periodic biometric signal from a first human;a second physical electronic token, the second physical token configured to periodically generate a second random password; anda distributed ledger, whereby each time the first random password is generated it is stored in the distributed ledger and each time the second random password is generated it is stored in the distributed ledger;wherein the first random password and the second random password comprise a dual-knowledge password for providing electronic access to an estate digital file; andwherein, following a cessation of the periodic biometric signal, the first token is configured to transmit the first random password to the second token for display thereon such that the second token is configured to receive and display the first random password substantially simultaneously to generating the second random password, and the distributed ledger is configured to store a date and time of the cessation of the periodic biometric signal.
  • 9. The system of claim 8 wherein the biometric signal indicates whether the first human is alive.
  • 10. The system of claim 8 wherein the estate digital file corresponds to an estate of the first human.
  • 11. The system of claim 8 wherein the dual-knowledge password is updated with each of the periodic generation of the first random password and the periodic generation of the second random password.
  • 12. The system of claim 8 wherein the electronic access comprises an electronic password for opening a safe.
  • 13. The system of claim 8 wherein the first physical token periodically generates the first random password every 60 seconds and the second physical token periodically generates the second random password every 60 seconds.
  • 14. The system of claim 8 wherein the first physical electronic token comprises a receiver for receiving the periodic biometric signal and for validating that the periodic biometric signal corresponds to the first human.
  • 15. A method for providing double-sided estate authentication via a distributed ledger, the method comprising: periodically generating, for display by a first physical token, a first random password, the periodically generating being in response to periodic receipt of a biometric signal from a first human;periodically generating, for display by a second physical token, a second random password;following each generation of the first random password, receiving and storing the first random password at a distributed ledger;following each generation of the second random password, receiving and storing the second random password at the distributed ledger; andfollowing a cessation of the periodic receipt of the biometric signal, the first physical token is configured to stop generating the first random password, and the second physical token is configured to start generating the first random password in addition to generating the second random password;wherein the first random password and the second random password comprise a dual-knowledge password for providing electronic access to an estate digital file.
  • 16. The method of claim 15 wherein the biometric signal indicates whether the first human is alive.
  • 17. The method of claim 15 wherein the estate digital file corresponds to an estate of the first human.
  • 18. The method of claim 15 further comprising updating the dual-knowledge password with each of the periodic generation of the first random password and the periodic generation of the second random password.
  • 19. The method of claim 15 wherein the dual-knowledge password comprises an electronic password for opening a safe.
  • 20. The method of claim 15 further comprising using the first physical token to periodically generate the first random password every 60 seconds and using the second physical token to periodically generate the second random password every 60 seconds.
  • 21. The method of claim 15 further comprising using the first physical electronic token to receive the periodic biometric signal and to validate that the periodic biometric signal corresponds to the first human.