12 patents
Utility
Splitting Encrypted Key and Encryption Key Used to Encrypt Key into Key Components Allowing Assembly with Subset of Key Components to Decrypt Encrypted Key
27 Jan 22
A system includes processor(s) and memory(s).
Tron Black, Denny Becker, Tyler Perkins, Joel Weight, Jesse Empey
Filed: 11 Oct 21
Utility
Secret Splitting and Metadata Storage
26 Aug 21
A computing device includes at least one processor and at least one memory communicatively coupled to the at least one processor.
Michael D. Ornelas, Jesse Empey, Brad Welker
Filed: 8 Feb 21
Utility
Account Owner Funding of Know Your Customer and Accredited Investor Verification Renewal and Monitoring Charges Through Coin Payment
24 Jun 21
A computerized method includes receiving payment of an amount of cryptocurrency from a transaction account to another account.
Tron Black
Filed: 18 Dec 20
Utility
Decentralized Trading System for Fair Ordering and Matching of Trades Received at Multiple Network Nodes and Matched by Multiple Network Nodes Within Decentralized Trading System
17 Jun 21
A system includes: a plurality of network nodes communicatively coupled in a peer-to-peer network; and a plurality of computing devices each communicatively coupled to at least one of the plurality of network nodes.
Tron Black
Filed: 1 Mar 21
Utility
System and Method for Product Catalog Scoring, Advising, and Improving
23 Dec 20
A computing system includes: processor(s), memory(s), storage device(s), and network interface(s) configured to communicate with data source(s) and remotely located computing device(s).
Scott Douglas Nelson, Jacob William Harms, Martha Marie Tinker, Paul J. Kersey, Steven Lee Trousdale, Steven Brad Jeppesen, Mark Alan Baker, Cory Richard Hash, Anil Waddi
Filed: 23 Jun 20
Utility
Key Recovery Using Encrypted Secret Shares
9 Dec 20
A computing system comprising: processor(s) and memory; at least one network interface communicatively coupled to the at least one processor and configured to communicate with at least one remotely located computing device; wherein the at least one network interface is configured to receive a plurality of public encryption keys from the at least one remotely located computing device; wherein the at least one processor is configured to: split at least one secret into a plurality of shares, wherein at least a subset of the plurality of shares is sufficient to reconstruct the at least one secret; encrypt each of the plurality of shares based on a different public encryption key of the plurality of public encryption keys to create a plurality of encrypted shares; wherein the at least one network interface is configured to communicate the encrypted shares to the at least one remotely located computing device.
Jonathan Dolan, Michael D. Ornelas, Kevin Hartley, Pengyu Chen, Juston Johnson
Filed: 31 May 20
Utility
Crypto Integration Platform
7 Oct 20
A system, includes at least one processor; and at least one memory communicatively coupled to the at least one processor.
Alec Wilkins, Eric Nathaniel Fish, Trent Norman Larson, Patrick M. Byrne
Filed: 31 May 20
Utility
Context Based Filtering Within Subsets of Network Nodes Implementing a Trading System
22 Apr 20
A method includes generating first messages having a first message type, at a first subset of network nodes in a peer-to-peer network, based on requests received from a first external computing device; submitting second events to the peer-to-peer network, the first events having payloads that are based on the first message type; and using at least one directed acyclic graph (DAG) to attempt to reach a consensus about timestamps in the first events.
Scott Overholser
Filed: 7 Oct 19
Utility
Encrypted Asset Encryption Key Parts Allowing for Assembly of an Asset Encryption Key Using a Subset of the Encrypted Asset Encryption Key Parts
15 Apr 20
A system includes at least one processor and at least one memory communicatively coupled to the at least one processor.
Stephen Christensen, Denny Becker, Tron Black, Tyler Perkins
Filed: 6 Oct 19
Utility
Doubly-encrypted Secret Parts Allowing for Assembly of a Secret Using a Subset of the Doubly-encrypted Secret Parts
15 Apr 20
A system includes at least one processor and at least one memory communicatively coupled to the at least one processor.
Stephen Christensen, Denny Becker, Tron Black, Michael Calcano, Tyler Perkins
Filed: 6 Oct 19
Utility
Methods and Systems for Conducting Electronic Commerce
8 Apr 20
Various methods and systems are provided for conducting e-commerce.
Patrick M. Byrne
Filed: 3 Oct 19
Utility
System and Method for Optimizing Electronic Document Layouts
26 Feb 20
A system and method is provided that ranks and sorts websites, apps, email, or VR environment content in real-time to increase engagement, CTR, conversions, and revenue.
Sam Noursalehi, Yugang Hu, Allen Joel Dickson
Filed: 30 Oct 19
- Prev
- 1
- Next
Patents are sorted by USPTO publication date, most recent first