Patents by Inventor Cem Paya

Cem Paya has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11562333
    Abstract: The present invention generally relates to a method, system and program product for generating a stable value digital asset tied to a blockchain.
    Type: Grant
    Filed: October 31, 2019
    Date of Patent: January 24, 2023
    Assignee: Gemini IP, LLC
    Inventors: Daniel William Halley James, Brandon Arvanaghi, Cem Paya, Eric Neiman Winer, Cameron Howard Winklevoss, Tyler Howard Winklevoss
  • Patent number: 11501370
    Abstract: The present invention generally relates to computer systems, methods and program products for non-custodial trading of digital assets on an exchange.
    Type: Grant
    Filed: June 11, 2020
    Date of Patent: November 15, 2022
    Assignee: Gemini IP, LLC
    Inventors: Ismail Cem Paya, Jason Alexander Mintz
  • Patent number: 11334883
    Abstract: The present invention generally relates to a method, system and program product for depositing, holding and/or distributing collateral in the form of digital assets in a peer-to-peer network.
    Type: Grant
    Filed: July 22, 2019
    Date of Patent: May 17, 2022
    Assignee: Gemini IP, LLC
    Inventors: Ira Auerbach, Cem Paya, Michael So, Daniel William Halley James, Cameron Howard Winklevoss, Tyler Howard Winklevoss, Anas Saidi, Jamie Chapman
  • Patent number: 11283797
    Abstract: Particular systems, methods, and program products for web-based security systems for user authentication and processing in a distributed computing environment are disclosed. A computing sub-system may receive an electronic processing request and a first signed data packet having a first payload that was hashed and encrypted using a first private key. The first payload may comprise first processing output and a first timestamp. The sub-system may verify the first signed data packet by decrypting it using a first public key. The sub-system may execute computing operations to satisfy the electronic processing request, producing second processing output. The sub-system may configure a data packet with a second payload comprising at least the second processing output and a second timestamp. The sub-system may encrypt the second payload using a second private key producing a second signed data packet. The sub-system may transmit to a second sub-system the second signed data packet.
    Type: Grant
    Filed: August 12, 2020
    Date of Patent: March 22, 2022
    Assignee: Gemini IP, LLC
    Inventors: Andrew Laucius, Ismail Cem Paya, Eric Neiman Winer
  • Patent number: 11200569
    Abstract: The present invention generally relates to the use of stable value digital assets and/or fiat-backed digital assets as cryptocurrencies that can be linked to other digital assets using blockchain technology and/or through a peer-to-peer network. In embodiments, the present invention relates to specific applications of fiat-backed digital assets and/or stable value digital asset tokens tied to a peer-to-peer network, such as a blockchain network.
    Type: Grant
    Filed: June 25, 2019
    Date of Patent: December 14, 2021
    Assignee: Winklevoss IP, LLC
    Inventors: Daniel William Halley James, Brandon Arvanaghi, Cem Paya, Eric Winer, Cameron Howard Winklevoss, Tyler Howard Winklevoss
  • Publication number: 20200389456
    Abstract: Particular systems, methods, and program products for web-based security systems for user authentication and processing in a distributed computing environment are disclosed. A computing sub-system may receive an electronic processing request and a first signed data packet having a first payload that was hashed and encrypted using a first private key. The first payload may comprise first processing output and a first timestamp. The sub-system may verify the first signed data packet by decrypting it using a first public key. The sub-system may execute computing operations to satisfy the electronic processing request, producing second processing output. The sub-system may configure a data packet with a second payload comprising at least the second processing output and a second timestamp. The sub-system may encrypt the second payload using a second private key producing a second signed data packet. The sub-system may transmit to a second sub-system the second signed data packet.
    Type: Application
    Filed: August 12, 2020
    Publication date: December 10, 2020
    Inventors: Andrew Laucius, Ismail Cem Paya, Eric Neiman Winer
  • Patent number: 10778682
    Abstract: Particular systems, methods, and program products for web-based security systems for user authentication and processing in a distributed computing environment are disclosed. A computing sub-system may receive an electronic processing request and a first signed data packet having a first payload that was hashed and encrypted using a first private key. The first payload may comprise first processing output and a first timestamp. The sub-system may verify the first signed data packet by decrypting it using a first public key. The sub-system may execute computing operations to satisfy the electronic processing request, producing second processing output. The sub-system may configure a data packet with a second payload comprising at least the second processing output and a second timestamp. The sub-system may encrypt the second payload using a second private key producing a second signed data packet. The sub-system may transmit to a second sub-system the second signed data packet.
    Type: Grant
    Filed: October 1, 2019
    Date of Patent: September 15, 2020
    Assignee: Winklevoss IP, LLC
    Inventors: Andrew Laucius, Cem Paya, Eric Neiman Winer
  • Patent number: 10616213
    Abstract: A method and system for deterring attacks at potential breach points between servers and an account and login server for creating and subsequent verification of accounts. Various cryptographic primitives are used to manipulate passwords to generate verifiers. The verifiers are used with external hardware security modules (HSMs) to eliminate HSMs and intermediate steps between the HSM and login servers as potential breach points.
    Type: Grant
    Filed: January 8, 2019
    Date of Patent: April 7, 2020
    Assignee: Airbnb, Inc.
    Inventors: Ismail Cem Paya, Kevin Nguyen
  • Patent number: 10599863
    Abstract: An online computer system including a database uses an encrypted table that allows for write protection its contents. Middleware logic operating on the system acts as an interface for access to the database, so that any business logic on the system accesses the database through simple procedural calls to the middleware rather than directly to the database itself. The middleware logic abstracts logic that helps implement write protection with the encrypted table. Data to be encrypted that has been traditionally written to other tables is migrated to the encrypted table, where the data encrypted using an authenticated encryption with additional data (AEAD) algorithm. To implement AEAD, the original table, column, and primary key indicating where the data would have otherwise been stored are together used as additional authenticated data (AAD). This tuple of information is also stored in the encrypted table.
    Type: Grant
    Filed: January 24, 2019
    Date of Patent: March 24, 2020
    Assignee: Airbnb, Inc.
    Inventors: Ismail Cem Paya, Nelson Aurel Gauthier, Kevin Nguyen
  • Patent number: 10581814
    Abstract: A re-programmable wireless device can store data securely and use near field communication (NFC) to exchange functionality data and/or program code from a central server system through a mobile device. A user requests a new re-programmable wireless device or a new re-programmable wireless device function via an application on the mobile device. The central server system transmits program code and a public key used to identify the re-programmable wireless device to the mobile device, which functions as a pass-through conduit for the information, storing it until the devices are synced. A NFC communication channel is created, and the mobile device authenticates the re-programmable wireless device by cross-referencing the public key received from the central server system with the public key transmitted by the re-programmable wireless device once the communication channel is established.
    Type: Grant
    Filed: October 28, 2016
    Date of Patent: March 3, 2020
    Assignee: Google LLC
    Inventors: Sarel Kobus Jooste, Shane Farmer, Ismail Cem Paya
  • Patent number: 10540654
    Abstract: The present invention generally relates to a method, system and program product for modifying a supply of stable value digital asset tokens tied to a blockchain.
    Type: Grant
    Filed: June 11, 2019
    Date of Patent: January 21, 2020
    Assignee: Winklevoss IP, LLC
    Inventors: Daniel William Halley James, Brandon Arvanaghi, Cem Paya, Cameron Howard Winklevoss, Tyler Howard Winklevoss, Eric Neiman Winer, Stephen Judkins, Alex Parkinson
  • Patent number: 10540640
    Abstract: The present invention generally relates to a method, system and program product for generating a stable value digital asset tied to a blockchain.
    Type: Grant
    Filed: May 9, 2019
    Date of Patent: January 21, 2020
    Assignee: WINKLEVOSS IP, LLC
    Inventors: Daniel William Halley James, Brandon Arvanaghi, Cem Paya, Eric Neiman Winer, Cameron Howard Winklevoss, Tyler Howard Winklevoss
  • Patent number: 10484376
    Abstract: Particular systems, methods, and program products for web-based security systems for user authentication and processing in a distributed computing environment are disclosed. A computing sub-system may receive an electronic processing request and a first signed data packet having a first payload that was hashed and encrypted using a first private key. The first payload may comprise first processing output and a first timestamp. The sub-system may verify the first signed data packet by decrypting it using a first public key. The sub-system may execute computing operations to satisfy the electronic processing request, producing second processing output. The sub-system may configure a data packet with a second payload comprising at least the second processing output and a second timestamp. The sub-system may encrypt the second payload using a second private key producing a second signed data packet. The sub-system may transmit to a second sub-system the second signed data packet.
    Type: Grant
    Filed: July 5, 2018
    Date of Patent: November 19, 2019
    Assignee: WINKLEVOSS IP, LLC
    Inventors: Andrew Laucius, Cem Paya, Eric Winer
  • Patent number: 10373129
    Abstract: The present invention generally relates to a method, system and program product for generating a stable value digital asset tied to a blockchain.
    Type: Grant
    Filed: June 27, 2018
    Date of Patent: August 6, 2019
    Assignee: Winklevoss IP, LLC
    Inventors: Daniel William Halley James, Brandon Arvanaghi, Cem Paya, Eric Winer, Cameron Howard Winklevoss, Tyler Howard Winklevoss
  • Publication number: 20190166113
    Abstract: A method and system for deterring attacks at potential breach points between servers and an account and login server for creating and subsequent verification of accounts. Various cryptographic primitives are used to manipulate passwords to generate verifiers. The verifiers are used with external hardware security modules (HSMs) to eliminate HSMs and intermediate steps between the HSM and login servers as potential breach points.
    Type: Application
    Filed: January 8, 2019
    Publication date: May 30, 2019
    Inventors: Ismail Cem Paya, Kevin Nguyen
  • Publication number: 20190156052
    Abstract: An online computer system including a database uses an encrypted table that allows for write protection its contents. Middleware logic operating on the system acts as an interface for access to the database, so that any business logic on the system accesses the database through simple procedural calls to the middleware rather than directly to the database itself. The middleware logic abstracts logic that helps implement write protection with the encrypted table. Data to be encrypted that has been traditionally written to other tables is migrated to the encrypted table, where the data encrypted using an authenticated encryption with additional data (AEAD) algorithm. To implement AEAD, the original table, column, and primary key indicating where the data would have otherwise been stored are together used as additional authenticated data (AAD). This tuple of information is also stored in the encrypted table.
    Type: Application
    Filed: January 24, 2019
    Publication date: May 23, 2019
    Inventors: Ismail Cem Paya, Nelson Aurel Gauthier, Kevin Nguyen
  • Patent number: 10229286
    Abstract: An online computer system including a database uses an encrypted table that allows for write protection its contents. Middleware logic operating on the system acts as an interface for access to the database, so that any business logic on the system accesses the database through simple procedural calls to the middleware rather than directly to the database itself. The middleware logic abstracts logic that helps implement write protection with the encrypted table. Data to be encrypted that has been traditionally written to other tables is migrated to the encrypted table, where the data encrypted using an authenticated encryption with additional data (AEAD) algorithm. To implement AEAD, the original table, column, and primary key indicating where the data would have otherwise been stored are together used as additional authenticated data (AAD). This tuple of information is also stored in the encrypted table.
    Type: Grant
    Filed: June 22, 2017
    Date of Patent: March 12, 2019
    Assignee: Airbnb, Inc.
    Inventors: Ismail Cem Paya, Nelson Aurel Gauthier, Kevin Nguyen
  • Patent number: 10205720
    Abstract: A method and system for deterring attacks at potential breach points between servers and an account and login server for creating and subsequent verification of accounts. Various cryptographic primitives are used to manipulate passwords to generate verifiers. The verifiers are used with external hardware security modules (HSMs) to eliminate HSMs and intermediate steps between the HSM and login servers as potential breach points.
    Type: Grant
    Filed: September 6, 2017
    Date of Patent: February 12, 2019
    Assignee: Airbnb, Inc.
    Inventors: Ismail Cem Paya, Kevin Nguyen
  • Patent number: 10063548
    Abstract: Particular systems, methods, and program products for web-based security systems for user authentication and processing in a distributed computing environment are disclosed. A computing sub-system may receive an electronic processing request and a first signed data packet having a first payload that was hashed and encrypted using a first private key. The first payload may comprise first processing output and a first timestamp. The sub-system may verify the first signed data packet by decrypting it using a first public key. The sub-system may execute computing operations to satisfy the electronic processing request, producing second processing output. The sub-system may configure a data packet with a second payload comprising at least the second processing output and a second timestamp. The sub-system may encrypt the second payload using a second private key producing a second signed data packet. The sub-system may transmit to a second sub-system the second signed data packet.
    Type: Grant
    Filed: February 27, 2018
    Date of Patent: August 28, 2018
    Assignee: Winklevoss IP, LLC
    Inventors: Andrew Laucius, Cem Paya, Eric Winer
  • Patent number: 9942231
    Abstract: Particular systems, methods, and program products for web-based security systems for user authentication and processing in a distributed computing environment are disclosed. A computing sub-system may receive an electronic processing request and a first signed data packet having a first payload that was hashed and encrypted using a first private key. The first payload may comprise first processing output and a first timestamp. The sub-system may verify the first signed data packet by decrypting it using a first public key. The sub-system may execute computing operations to satisfy the electronic processing request, producing second processing output. The sub-system may configure a data packet with a second payload comprising at least the second processing output and a second timestamp. The sub-system may encrypt the second payload using a second private key producing a second signed data packet. The sub-system may transmit to a second sub-system the second signed data packet.
    Type: Grant
    Filed: November 20, 2017
    Date of Patent: April 10, 2018
    Assignee: Winklevoss IP, LLC
    Inventors: Andrew Laucius, Cem Paya, Eric Winer