USPTO Application No. 19/644,477.
TrueSign is the commercial implementation of a patent-pending method for cryptographically binding authorization to device, transaction intent, and policy state.
Subject matter
The application describes systems and methods for cryptographically binding an authorization decision to (i) a hardware-bound private key held in a Secure Enclave, TPM 2.0, or HSM, (ii) a canonical intent message describing the specific transaction under approval, and (iii) a server-side policy state evaluated at sign-time.
The combined construction produces an authorization artifact that is non-replayable, non-substitutable, and non-repudiable across counterparties, addressing the structural gap between session authentication and transaction authorization.
The information on this page reflects publicly disclosable filing metadata. The application is pending and additional details, including counsel correspondence and a redacted claim summary, are made available to qualified counterparties under mutual non-disclosure.
Three independent claims anchor the application.
The following describes the three independent claims that anchor the application as filed. Dependent claims, claim charts, and prosecution correspondence are made available to qualified counterparties under mutual non-disclosure.
Three structural figures.
The figures below are simplified schematic representations of the construction described in the application. They are provided as institutional reference; the application drawings and detailed specification are made available to qualified counterparties under mutual non-disclosure.
Four continuation streams.
The application is structured to support four continuation streams addressing post-quantum migration, cross-institutional verification, programmable policy primitives, and embedded device integration.
Categories of claim coverage.
The following describes categories of subject matter addressed by the application. The full claim set, as filed and amended, is available to qualified counterparties under mutual non-disclosure.
Authentication is not authorization.
FIDO2 / WebAuthn, OTP, push 2FA, and adaptive risk engines are mechanisms for authenticating a user, a device, or a session. They establish that the party in front of the system is who they claim to be at a moment in time. They do not, by construction, bind that act of authentication to a specific transaction.
TrueSign operates one layer deeper. The signed artifact attests, in a single deterministic structure, to the identity of the signer, the cryptographic identity of the device, the canonical content of the transaction, and the policy state under which the authorization was granted. The artifact survives the session, the user agent, and the verifier infrastructure that produced it.
This distinction is the basis on which TrueSign is positioned in regulated procurement, and the basis on which the application is drafted.
Authentication answers who. Authorization answers what, under what authority, with what binding. The distinction is not semantic; it is the difference between a session credential and an enforceable cryptographic receipt.
Where TrueSign sits.
Authorization and authentication are distinct controls. The matrix below positions TrueSign against the categories most often confused with it during institutional procurement review.
| Approach | Hardware-bound key | Bound to canonical intent | Policy at sign-time | Cryptographic receipt |
|---|---|---|---|---|
| OTP / SMS | No | No | No | No |
| Push 2FA / approval prompt | No | Partial | No | No |
| FIDO2 / WebAuthn | Yes | No | No | No |
| TrueSign | Yes | Yes | Yes | Yes |
Comparison reflects standard deployments of each approach. Vendor-specific extensions vary; the matrix is intended as an institutional reference, not a vendor evaluation.
