Patents by Inventor Garrett DAY

Garrett DAY has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220191048
    Abstract: A vaccination certificate is provided with at least one optically readable marking that encodes a digital signature of the identity of a patient, and well as data relating to a vaccine and its administration to the patient. The digital signature enables verification of purportedly correct information without needing to know the personal identifying information of the patient, and without querying an external database. A salt value may also be added to the patient identity information to increase entropy in the digital signature.
    Type: Application
    Filed: December 10, 2021
    Publication date: June 16, 2022
    Applicant: Guardtime SA
    Inventors: Garrett DAY, Gregory RAYMOND
  • Patent number: 10637669
    Abstract: Initial data is included in a data structure such as an initial container at an initial entity, along with rules and a data signature of at least a portion of the initial data and other container contents relating to the initial entity and the initial data. Each rule defines at least one condition governing the permissible transfer and processing of the initial data by other entities in a provenance chain. Each receiving entity creates a container of its own to encapsulate received containers, and, after optional processing of its own, such as adding or altering data and rules, digital signature for its container. The digital signatures may be obtained from a hash tree-based signing infrastructure that returns data signatures enabling recomputation of a logically uppermost value of the hash tree. A lineage map of any given container may also be displayed for analysis by a user.
    Type: Grant
    Filed: February 24, 2018
    Date of Patent: April 28, 2020
    Assignee: Guardtime SA
    Inventors: Matthew Johnson, Garrett Day, Gregory Raymond, Hema Krishnamurthy
  • Patent number: 10297094
    Abstract: Access by a requesting entity to an asset is authorized by an access-controlling entity, which transmits to the requesting entity a challenge data set and then receives from the requesting entity a response purportedly corresponding to a representation of the challenge data set in a non-repudiatable form, obtained from an event validation system. The access-controlling entity queries the event validation system to determine whether the response does correspond to a correct representation of the challenge data set in the non-repudiatable form, and authorizes the requesting entity for access only if the response is correct representation. Non-repudiation can be established through entry into a blockchain, or using a hash-tree-based digital signature infrastructure.
    Type: Grant
    Filed: December 29, 2017
    Date of Patent: May 21, 2019
    Assignee: Guardtime IP Holdings Limited
    Inventors: Garrett Day, Jeffrey Pearce, David E Hamilton, Jr., Kevin Zawicki, Roger Guseman
  • Patent number: 10284568
    Abstract: Data acquired, for example by a mobile platform, such as a sequence of images observed by a mobile platform, is grouped. A signature is computed for each group and is transmitted along with frame data to a reception system, which verifies correct transmission based on the group signature. The signature may be a root value of a hash tree that has at least selected ones of each group as inputs. Transmission events may also be separately signed as a whole using an event validation system. Although the signature maybe computed for all frames in a group, it may also be computed based on only a subset, selected pseudo-randomly.
    Type: Grant
    Filed: August 23, 2016
    Date of Patent: May 7, 2019
    Assignee: Guardtime IP Holdings Limited
    Inventors: Garrett Day, Hema Krishnamurthy
  • Patent number: 10249114
    Abstract: Control of access by a requesting entity to an asset includes defining an approved state of the requesting entity. A validation of a representation of the approved state of in a non-repudiatable form in obtained from an event validation system. The requesting entity is triggered to determine its current state by an access-control entity, which compares the current state with the approved state and allows access by the requesting entity to the asset only if the current state is the same as the approved state. In a pre-authorization procedure, one or both of the entities issues a data set challenge to the other, which then validates the challenge via the event validation system and returns this validation to the challenging entity, which then checks the validation to see if it is correct. Data sets may be validated, for example, with hash tree based signatures or blockchain entries.
    Type: Grant
    Filed: December 29, 2017
    Date of Patent: April 2, 2019
    Assignee: Guardtime IP Holdings Limited
    Inventors: Garrett Day, Jeffrey Pearce, David E Hamilton, Jr., Kevin Zawicki, Roger Guseman
  • Patent number: 10068397
    Abstract: Control of access by a requesting entity to an asset includes defining an approved state of the requesting entity. A validation of a representation of the approved state of in a non-repudiatable form in obtained from an event validation system. The requesting entity is triggered to determine its current state by an access-control entity, which compares the current state with the approved state and allows access by the requesting entity to the asset only if the current state is the same as the approved state. In a pre-authorization procedure, one or both of the entities issues a data set challenge to the other, which then validates the challenge via the event validation system and returns this validation to the challenging entity, which then checks the validation to see if it is correct. Data sets may be validated, for example, with hash tree based signatures or blockchain entries.
    Type: Grant
    Filed: April 6, 2016
    Date of Patent: September 4, 2018
    Assignee: GUARDTIME IP HOLDINGS, LTD.
    Inventors: Garrett Day, Jeffrey Pearce, David E Hamilton, Jr., Kevin Zawicki, Roger Guseman
  • Publication number: 20180248701
    Abstract: Initial data is included in a data structure such as an initial container at an initial entity, along with rules and a data signature of at least a portion of the initial data and other container contents relating to the initial entity and the initial data. Each rule defines at least one condition governing the permissible transfer and processing of the initial data by other entities in a provenance chain. Each receiving entity creates a container of its own to encapsulate received containers, and, after optional processing of its own, such as adding or altering data and rules, digital signature for its container. The digital signatures may be obtained from a hash tree-based signing infrastructure that returns data signatures enabling recomputation of a logically uppermost value of the hash tree. A lineage map of any given container may also be displayed for analysis by a user.
    Type: Application
    Filed: February 24, 2018
    Publication date: August 30, 2018
    Applicant: Guardtime IP Holdings Limited
    Inventors: Matthew JOHNSON, Garrett DAY, Gregory RAYMOND, Hema KRISHNAMURTHY
  • Publication number: 20180144565
    Abstract: Control of access by a requesting entity to an asset includes defining an approved state of the requesting entity. A validation of a representation of the approved state of in a non-repudiatable form in obtained from an event validation system. The requesting entity is triggered to determine its current state by an access-control entity, which compares the current state with the approved state and allows access by the requesting entity to the asset only if the current state is the same as the approved state. In a pre-authorization procedure, one or both of the entities issues a data set challenge to the other, which then validates the challenge via the event validation system and returns this validation to the challenging entity, which then checks the validation to see if it is correct. Data sets may be validated, for example, with hash tree based signatures or blockchain entries.
    Type: Application
    Filed: December 29, 2017
    Publication date: May 24, 2018
    Applicant: Guardtime IP Holdings Limited
    Inventors: Garrett DAY, Jeffrey PEARCE, David E. HAMILTON, JR., Kevin ZAWICKI, Roger GUSEMAN
  • Publication number: 20180144564
    Abstract: Access by a requesting entity to an asset is authorized by an access-controlling entity, which transmits to the requesting entity a challenge data set and then receives from the requesting entity a response purportedly corresponding to a representation of the challenge data set in a non-repudiatable form, obtained from an event validation system. The access-controlling entity queries the event validation system to determine whether the response does correspond to a correct representation of the challenge data set in the non-repudiatable form, and authorizes the requesting entity for access only if the response is correct representation. Non-repudiation can be established through entry into a blockchain, or using a hash-tree-based digital signature infrastructure.
    Type: Application
    Filed: December 29, 2017
    Publication date: May 24, 2018
    Applicant: Guardtime IP Holdings Limited
    Inventors: Garrett DAY, Jeffrey PEARCE, David E HAMILTON, JR., Kevin ZAWICKI, Roger GUSEMAN
  • Publication number: 20180063139
    Abstract: Data acquired, for example by a mobile platform, such as a sequence of images observed by a mobile platform, is grouped. A signature is computed for each group and is transmitted along with frame data to a reception system, which verifies correct transmission based on the group signature. The signature may be a root value of a hash tree that has at least selected ones of each group as inputs. Transmission events may also be separately signed as a whole using an event validation system. Although the signature maybe computed for all frames in a group, it may also be computed based on only a subset, selected pseudo-randomly.
    Type: Application
    Filed: August 23, 2016
    Publication date: March 1, 2018
    Applicant: Guardtime IP Holdings Limited
    Inventors: Garrett DAY, Hema KRISHNAMURTHY
  • Publication number: 20170295180
    Abstract: Control of access by a requesting entity to an asset includes defining an approved state of the requesting entity. A validation of a representation of the approved state of in a non-repudiatable form in obtained from an event validation system. The requesting entity is triggered to determine its current state by an access-control entity, which compares the current state with the approved state and allows access by the requesting entity to the asset only if the current state is the same as the approved state. In a pre-authorization procedure, one or both of the entities issues a data set challenge to the other, which then validates the challenge via the event validation system and returns this validation to the challenging entity, which then checks the validation to see if it is correct. Data sets may be validated, for example, with hash tree based signatures or blockchain entries.
    Type: Application
    Filed: April 6, 2016
    Publication date: October 12, 2017
    Applicant: Guardtime IP Holdings Limited
    Inventors: Garrett DAY, Jeffrey PEARCE, David E HAMILTON, JR., Kevin ZAWICKI, Roger GUSEMAN