Threshold Cryptographic Authentication via Push-Delivered Session-Bound Digital Signatures with Distributed Signing Key Custody
Push-based authentication eliminating shared secrets, preventing push bombing, and providing non-repudiable authorization through Ed25519 session-bound signatures and threshold key distribution.
20 Claims Filed11 Independent9 Dependent32 Method6 System
20
claims filed
11
independent
9
dependent
16
figures
Ed25519
signature scheme
0
shared secrets
Filing Strategy: Claims are organized into filing groups. Group A (20 claims) files now. Group B (18 claims) is reserved for a continuation application using the same specification. All claims are supported by the current specification.
GROUP A · FILING NOW
20 claims · 11 independent · 9 dependent
Claim 1 · Method
Push-Based Session-Bound Authentication
Generate random session ID, deliver challenge via push gateway to user device with session ID + relying party DID + timestamp. User computes Ed25519 signature over session ID + relying party DID + user DID + timestamp. Fraudulent relying party structurally cannot obtain valid approval.
Claim 3 · Method
Push Bombing Resistance
Each challenge has unique session ID + relying party DID + timestamp. Approval signature bound to specific session ID. Push flooding eliminated — each approval mathematically non-transferable.
Claim 6 · Method
Threshold Multi-Device Authentication
Register n devices (n>=2), each with distinct Ed25519 keypair + DID. Deliver challenge to all n. Grant auth when k distinct devices return valid signatures. Fault tolerance + compromise resistance.
Claim 10 · System
Cross-Provider M2M Authentication System
n nodes across at least 2 independent cloud providers, each storing one share. Threshold signing requires k nodes. Compromise of all infrastructure from any single provider = insufficient.
Claim 23 · System
Zero Server-Side Secret Authentication System
Trust registry stores only public keys + DIDs. No shared secrets, TOTP secrets, or symmetric keys. Challenge generator produces 128+ bit random session IDs. Complete credential store breach = only public keys revealed.
Claim 24 · Method
Relay Transparency — E2E Encrypted Gateway
Challenge encrypted with AES-256-GCM, signed with relying party's Ed25519. Gateway relays without ability to decrypt or forge. User decrypts, signs response. Relying party verifies independently of gateway.
Claim 25 · Method
Asymmetric Registration — xlock:// URI
Registration code contains relying party DID + gateway URL + optional callback. No shared secret at any point. User scans QR, registers RP in local trust store, sends public key to RP.
Claim 26 · Method
Multi-Party Transaction Approval
Transaction requires K-of-N approvers. Challenge sent to all N via push. Each approver signs with their Ed25519 key. Execute only upon K valid signatures from K distinct DIDs.
Claim 27 · Method
Three-Layer Anti-Push-Bombing Defense
Layer 1: rate limit (max pending challenges per recipient per window). Layer 2: challenge-bound Ed25519 signature (non-replayable). Layer 3: E2E encrypted context display. Three layers operate independently.
Claim 28 · Method
Scope-Gated Authorization via Trust Registry
Third-party apps register challenge scope in trust registry. Gateway verifies requesting app's DID has valid scope before delivering. Users implicitly authorized to respond to challenges directed to their DID.
Distribute agent's signing key across n nodes via threshold IDA. Signing ceremony reconstructs key transiently from k shares, signs, discards. Key never exists complete except during signing.
Claim 14 · Method CONTINUATION 1
Structural Prompt Injection Defense
Split instruction payload into n shares via GF(2) IDA. Transmit to n independent endpoints. Recipient validates timestamp + nonce + signature + scope per share. Reconstruct from k verified shares. Attacker controlling <k endpoints = cannot inject.
Claim 17 · Method CONTINUATION 1
Three-Layer Instruction Integrity Verification
Three layers: (1) per-share HMAC verification, (2) threshold reconstruction, (3) digital signature over reconstructed payload. Compliance record without content.
Claim 29 · Method CONTINUATION 1
Gateway-Relayed Authorization of Threshold Operations
Threshold operations (split, reconstruct, transfer) require push-authenticated human approval. Ed25519-signed approval covers operation ID + type + timestamp. Non-repudiable audit record.
Divided Infringement Note
All steps — generating the challenge, delivering via push gateway, verifying the Ed25519 signature, and gating the threshold operation — are performed by or attributable to a single platform operator. No third-party action is required to practice this claim.
Claim 30 · System CONTINUATION 1
Unified ACI Authorization Layer
Push auth module + plurality of ACIs (message splitting, file vault, key ceremony, code deployment, cross-border transfer) + authorization gate requiring Ed25519-signed approval. Single DID identity across all ACIs.
Claim 31 · Method CONTINUATION 1
Non-Repudiable Chain of Custody
Each custody operation on threshold-shared data requires push-authenticated Ed25519 signature. Chain of custody links: authorizer DID + operation + data ID + timestamp + signature. Cryptographically verifiable, non-forgeable.
Claim 32 · Method CONTINUATION 1
Cross-Border Transfer with Compliance Proof
Detect jurisdictional boundary crossing. Push challenge with compliance metadata (source/destination jurisdiction, regulation, classification). Execute only after Ed25519-signed approval. Compliance proof = signed approval + metadata.