7 patents
Utility
Method and System for Private Identity Verification
10 Aug 23
Methods, systems, and techniques for private identity verification involve obtaining a cryptographically secure commitment that is generated using a first user identifier and a private user identifier associated with the first user identifier; receiving, from an identity verification system, initial zero knowledge proof messages comprising the commitment; sending, to the identity verification system, a set of cryptographically secure known identifier commitments generated using a set of private user identifiers; receiving, from the identity verification system: (i) a zero knowledge proof response generated using the zero knowledge proof challenge; and (ii) proof that the private user identifier used in the initial zero knowledge proof messages comprises part of the set of private user identifiers; and verifying that the private user identifier used in the initial zero knowledge proof messages comprises part of the set of private user identifiers.
Arash AFSHAR, Aram JIVANYAN
Filed: 28 Oct 22
Utility
Method and system for private identity verification
1 Nov 22
Methods, systems, and techniques for private identity verification involve obtaining a cryptographically secure commitment that is generated using a first user identifier and a private user identifier associated with the first user identifier; receiving, from an identity verification system, initial zero knowledge proof messages comprising the commitment; sending, to the identity verification system, a set of cryptographically secure known identifier commitments generated using a set of private user identifiers; receiving, from the identity verification system: (i) a zero knowledge proof response generated using the zero knowledge proof challenge; and (ii) proof that the private user identifier used in the initial zero knowledge proof messages comprises part of the set of private user identifiers; and verifying that the private user identifier used in the initial zero knowledge proof messages comprises part of the set of private user identifiers.
Arash Afshar, Aram Jivanyan
Filed: 9 Apr 21
Utility
Distributed Cryptographic Tokens with Downstream Administrative Control
1 Sep 22
Disclosed is a platform That enables centralized control over updates to a distributed cryptocurrency network through inclusion of an administrative user to a set of tokens that operate on a base cryptocurrency network but include rule sets that are separate from those of the base cryptocurrency.
Chris Housser, Trevor Koverko, Pablo Ruiz, Adam Dossa
Filed: 17 May 22
Utility
Distributed cryptographic tokens with downstream administrative control
14 Jun 22
Disclosed is a platform That enables centralized control over updates to a distributed cryptocurrency network through inclusion of an administrative user to a set of tokens that operate on a base cryptocurrency network but include rule sets that are separate from those of the base cryptocurrency.
Chris Housser, Trevor Koverko, Pablo Ruiz, Adam Dossa
Filed: 27 Feb 19
Utility
Cryptographic Encryption Protocol for Data Types and Values
20 Jan 22
Disclosed herein is a means that takes advantage of the immutable security provided by blockchain data structures and further implements measures that enable data in blockchain records to remain private to their respective users via the use of multiple ciphertexts that are subjected to zero-knowledge proofs and manipulated homomorphically.
Aram JIVANYAN, Jesse LANCASTER
Filed: 14 Dec 20
Utility
Method, System, and Medium for Blockchain-enabled Atomic Settlement
4 Nov 21
Methods, systems, and techniques for performing blockchain-enabled atomic settlement.
Adam DOSSA, Nicholas CAFARO, Mudit GUPTA
Filed: 9 Jul 21
Utility
Method and System for Private Identity Verification
29 Jul 21
Methods, systems, and techniques for private identity verification involve obtaining a cryptographically secure commitment that is generated using a first user identifier and a private user identifier associated with the first user identifier; receiving, from an identity verification system, initial zero knowledge proof messages comprising the commitment; sending, to the identity verification system, a set of cryptographically secure known identifier commitments generated using a set of private user identifiers; receiving, from the identity verification system: (i) a zero knowledge proof response generated using the zero knowledge proof challenge; and (ii) proof that the private user identifier used in the initial zero knowledge proof messages comprises part of the set of private user identifiers; and verifying that the private user identifier used in the initial zero knowledge proof messages comprises part of the set of private user identifiers.
Arash AFSHAR, Aram JIVANYAN
Filed: 9 Apr 21
- Prev
- 1
- Next
Patents are sorted by USPTO publication date, most recent first