Patents by Inventor Jeffrey Pearce
Jeffrey Pearce has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11018856Abstract: Parties communicate input values to a central entity by first decomposing them according to a chosen operation into share values, which are sent either directly or, in a transformed form such as being hashed and/or encrypted, via a bulletin board data structure, to respective nodes, such that no node receives the input value itself. The nodes then combine the share values using the operation and pass these respective node values to the central entity for computation of a global value. The operation of the parties and of the nodes may be made verifiable by aggregating the share values within a party or the received share values within a node using a data and computational structure such as a hash tree or skip list. Digital signing and timestamping may also be applied.Type: GrantFiled: September 11, 2019Date of Patent: May 25, 2021Assignee: Guardtime SAInventors: Ahto Truu, Rando Mihkelsaar, Hema Krishnamurthy, Jeffrey Pearce
-
Publication number: 20210075595Abstract: Parties communicate input values to a central entity by first decomposing them according to a chosen operation into share values, which are sent either directly or, in a transformed form such as being hashed and/or encrypted, via a bulletin board data structure, to respective nodes, such that no node receives the input value itself. The nodes then combine the share values using the operation and pass these respective node values to the central entity for computation of a global value. The operation of the parties and of the nodes may be made verifiable by aggregating the share values within a party or the received share values within a node using a data and computational structure such as a hash tree or skip list. Digital signing and timestamping may also be applied.Type: ApplicationFiled: September 11, 2019Publication date: March 11, 2021Applicant: Guardtime SAInventors: Ahto TRUU, Rando MIHKELSAAR, Hema KRISHNAMURTHY, Jeffrey PEARCE
-
Patent number: 10637772Abstract: Data packets passing from a source to a destination in a network according to a Service Function Chain (SFC) are processed by an ordered sequence of at least one service function (SF). For each SF in the SFC in order, a current value of a function, such as a hash function, is recursively computed including, as input values, at least current identifying data that identifies a corresponding current one of the SFs, and a value of the function output from an immediately preceding SF. After computing the current value of the function for a selected SF in the SFC, the current value of the function is compared with an expected value. If the value of the function for the selected SF is the same as the expected value, the data packet is allowed to be transmitted to a subsequent processing stage; if not, then an error response action is taken.Type: GrantFiled: May 28, 2016Date of Patent: April 28, 2020Assignee: Guardtime SAInventors: Hema Krishnamurthy, Jeffrey Pearce
-
Patent number: 10297094Abstract: Access by a requesting entity to an asset is authorized by an access-controlling entity, which transmits to the requesting entity a challenge data set and then receives from the requesting entity a response purportedly corresponding to a representation of the challenge data set in a non-repudiatable form, obtained from an event validation system. The access-controlling entity queries the event validation system to determine whether the response does correspond to a correct representation of the challenge data set in the non-repudiatable form, and authorizes the requesting entity for access only if the response is correct representation. Non-repudiation can be established through entry into a blockchain, or using a hash-tree-based digital signature infrastructure.Type: GrantFiled: December 29, 2017Date of Patent: May 21, 2019Assignee: Guardtime IP Holdings LimitedInventors: Garrett Day, Jeffrey Pearce, David E Hamilton, Jr., Kevin Zawicki, Roger Guseman
-
Patent number: 10249114Abstract: Control of access by a requesting entity to an asset includes defining an approved state of the requesting entity. A validation of a representation of the approved state of in a non-repudiatable form in obtained from an event validation system. The requesting entity is triggered to determine its current state by an access-control entity, which compares the current state with the approved state and allows access by the requesting entity to the asset only if the current state is the same as the approved state. In a pre-authorization procedure, one or both of the entities issues a data set challenge to the other, which then validates the challenge via the event validation system and returns this validation to the challenging entity, which then checks the validation to see if it is correct. Data sets may be validated, for example, with hash tree based signatures or blockchain entries.Type: GrantFiled: December 29, 2017Date of Patent: April 2, 2019Assignee: Guardtime IP Holdings LimitedInventors: Garrett Day, Jeffrey Pearce, David E Hamilton, Jr., Kevin Zawicki, Roger Guseman
-
Patent number: 10158492Abstract: Location data from one or more geolocation engines such as GPS, a system that determines location from relative signal strengths or transit times, etc., within and/or connected to a device, such as a mobile phone, vehicle, movable electronic device, computer, etc., is included in a digital record that submitted to obtain a digital signature such that the presence of the device at the particular location can later be proven. The digital record may include data that encodes a message, as well as other parameters such as time. The digital signature encodes recomputation parameters of a hash tree signature infrastructure to a highest level value, a function of which is submitted as a transaction in a blockchain.Type: GrantFiled: October 18, 2016Date of Patent: December 18, 2018Assignee: Guardtime IP Holdings LimitedInventor: Jeffrey Pearce
-
Patent number: 10103893Abstract: A distributed hash tree-based authentication system for digital input records has more than one upper-level core node, each of which receives at least one uppermost value from aggregators. Communicating with each other about which aggregator values they have received, the nodes try to reach agreement as to which of these values should be included in duplicated current intra-node hash tree evaluations so as to form a consistent top-level value used as the basis for digital signatures associated with the digital input records. The top-level value is then entered either directly, or after combination with other top-level values over a period, into a block of a blockchain.Type: GrantFiled: March 6, 2018Date of Patent: October 16, 2018Assignee: GUARDTIME IP HOLDINGS, LTD.Inventors: Andres Kroonmaa, Ahto Buldas, Jeffrey Pearce
-
Patent number: 10068397Abstract: Control of access by a requesting entity to an asset includes defining an approved state of the requesting entity. A validation of a representation of the approved state of in a non-repudiatable form in obtained from an event validation system. The requesting entity is triggered to determine its current state by an access-control entity, which compares the current state with the approved state and allows access by the requesting entity to the asset only if the current state is the same as the approved state. In a pre-authorization procedure, one or both of the entities issues a data set challenge to the other, which then validates the challenge via the event validation system and returns this validation to the challenging entity, which then checks the validation to see if it is correct. Data sets may be validated, for example, with hash tree based signatures or blockchain entries.Type: GrantFiled: April 6, 2016Date of Patent: September 4, 2018Assignee: GUARDTIME IP HOLDINGS, LTD.Inventors: Garrett Day, Jeffrey Pearce, David E Hamilton, Jr., Kevin Zawicki, Roger Guseman
-
Publication number: 20180198626Abstract: A distributed hash tree-based authentication system for digital input records has more than one upper-level core node, each of which receives at least one uppermost value from aggregators. Communicating with each other about which aggregator values they have received, the nodes try to reach agreement as to which of these values should be included in duplicated current intra-node hash tree evaluations so as to form a consistent top-level value used as the basis for digital signatures associated with the digital input records. The top-level value is then entered either directly, or after combination with other top-level values over a period, into a block of a blockchain.Type: ApplicationFiled: March 6, 2018Publication date: July 12, 2018Applicant: GUARDTIME IP HOLDINGS LIMITEDInventors: ANDRES KROONMAA, AHTO BULDAS, JEFFREY PEARCE
-
Publication number: 20180152442Abstract: Transformations of digital records are used as lowest level inputs to a tree data structure having nodes computed as digital combinations of child node values up to a current calendar value. Signature vectors are generated for each of the digital records and have parameters that enable recomputation of the respective current calendar. Recomputation yields the same calendar value only if a candidate digital record is an exact version of the original digital record included in the original computation of the value. Either the current calendar value, or a function of a plurality of calendar values over a period, is encoded in a transaction value that is stored in a block of a blockchain.Type: ApplicationFiled: January 23, 2018Publication date: May 31, 2018Applicant: Guardtime IP Holdings LimitedInventors: Ahto BULDAS, Märt SAAREPERA, JEFFREY PEARCE
-
Publication number: 20180144564Abstract: Access by a requesting entity to an asset is authorized by an access-controlling entity, which transmits to the requesting entity a challenge data set and then receives from the requesting entity a response purportedly corresponding to a representation of the challenge data set in a non-repudiatable form, obtained from an event validation system. The access-controlling entity queries the event validation system to determine whether the response does correspond to a correct representation of the challenge data set in the non-repudiatable form, and authorizes the requesting entity for access only if the response is correct representation. Non-repudiation can be established through entry into a blockchain, or using a hash-tree-based digital signature infrastructure.Type: ApplicationFiled: December 29, 2017Publication date: May 24, 2018Applicant: Guardtime IP Holdings LimitedInventors: Garrett DAY, Jeffrey PEARCE, David E HAMILTON, JR., Kevin ZAWICKI, Roger GUSEMAN
-
Publication number: 20180144565Abstract: Control of access by a requesting entity to an asset includes defining an approved state of the requesting entity. A validation of a representation of the approved state of in a non-repudiatable form in obtained from an event validation system. The requesting entity is triggered to determine its current state by an access-control entity, which compares the current state with the approved state and allows access by the requesting entity to the asset only if the current state is the same as the approved state. In a pre-authorization procedure, one or both of the entities issues a data set challenge to the other, which then validates the challenge via the event validation system and returns this validation to the challenging entity, which then checks the validation to see if it is correct. Data sets may be validated, for example, with hash tree based signatures or blockchain entries.Type: ApplicationFiled: December 29, 2017Publication date: May 24, 2018Applicant: Guardtime IP Holdings LimitedInventors: Garrett DAY, Jeffrey PEARCE, David E. HAMILTON, JR., Kevin ZAWICKI, Roger GUSEMAN
-
Patent number: 9911007Abstract: A distributed hash tree-based authentication system for digital input records has more than one upper-level core node, each of which receives at least one uppermost value from aggregators. Communicating with each other about which aggregator values they have received, the nodes try to reach agreement as to which of these values should be included in duplicated current intra-node hash tree evaluations so as to form a consistent top-level value used as the basis for digital signatures associated with the digital input records.Type: GrantFiled: February 27, 2015Date of Patent: March 6, 2018Assignee: GUARDTIME IP HOLDINGS, LTD.Inventors: Andres Kroonmaa, Ahto Buldas, Jeffrey Pearce
-
Patent number: 9853819Abstract: At least one node in a distributed hash tree verification infrastructure is augmented with an identifier of an entity in a registration path. A data signature, which includes parameters for recomputation of a verifying value, and which is associated with a digital input record, will therefore also include data that identifies at least one entity in the hash tree path used for its initial registration in the infrastructure. An uppermost value of the hash tree verification infrastructure is entered as, or as part of, a transaction in a blockchain.Type: GrantFiled: October 17, 2016Date of Patent: December 26, 2017Assignee: GUARDTIME IP HOLDINGS LTD.Inventors: Ahto Truu, Andres Kroonmaa, Michael Gault, Jeffrey Pearce
-
Publication number: 20170346752Abstract: Data packets passing from a source to a destination in a network according to a Service Function Chain (SFC) are processed by an ordered sequence of at least one service function (SF). For each SF in the SFC in order, a current value of a function, such as a hash function, is recursively computed including, as input values, at least current identifying data that identifies a corresponding current one of the SFs, and a value of the function output from an immediately preceding SF. After computing the current value of the function for a selected SF in the SFC, the current value of the function is compared with an expected value. If the value of the function for the selected SF is the same as the expected value, the data packet is allowed to be transmitted to a subsequent processing stage; if not, then an error response action is taken.Type: ApplicationFiled: May 28, 2016Publication date: November 30, 2017Applicant: Guardtime IP Holdings LimitedInventors: Hema KRISHNAMURTHY, Jeffrey PEARCE
-
Publication number: 20170295180Abstract: Control of access by a requesting entity to an asset includes defining an approved state of the requesting entity. A validation of a representation of the approved state of in a non-repudiatable form in obtained from an event validation system. The requesting entity is triggered to determine its current state by an access-control entity, which compares the current state with the approved state and allows access by the requesting entity to the asset only if the current state is the same as the approved state. In a pre-authorization procedure, one or both of the entities issues a data set challenge to the other, which then validates the challenge via the event validation system and returns this validation to the challenging entity, which then checks the validation to see if it is correct. Data sets may be validated, for example, with hash tree based signatures or blockchain entries.Type: ApplicationFiled: April 6, 2016Publication date: October 12, 2017Applicant: Guardtime IP Holdings LimitedInventors: Garrett DAY, Jeffrey PEARCE, David E HAMILTON, JR., Kevin ZAWICKI, Roger GUSEMAN
-
Publication number: 20170041148Abstract: Location data from one or more geolocation engines such as GPS, a system that determines location from relative signal strengths or transit times, etc., within and/or connected to a device, such as a mobile phone, vehicle, movable electronic device, computer, etc., is included in a digital record that submitted to obtain a digital signature such that the presence of the device at the particular location can later be proven. The digital record may include data that encodes a message, as well as other parameters such as time. The digital signature encodes recomputation parameters of a hash tree signature infrastructure to a highest level value, a function of which is submitted as a transaction in a blockchain.Type: ApplicationFiled: October 18, 2016Publication date: February 9, 2017Applicant: Guardtime IP Holdings LimitedInventor: Jeffrey PEARCE
-
Publication number: 20170033932Abstract: At least one node in a distributed hash tree verification infrastructure is augmented with an identifier of an entity in a registration path. A data signature, which includes parameters for recomputation of a verifying value, and which is associated with a digital input record, will therefore also include data that identifies at least one entity in the hash tree path used for its initial registration in the infrastructure. An uppermost value of the hash tree verification infrastructure is entered as, or as part of, a transaction in a blockchain.Type: ApplicationFiled: October 17, 2016Publication date: February 2, 2017Applicant: Guardtime IP Holdings LimitedInventors: Ahto TRUU, Andres KROONMAA, Michael GAULT, Jeffrey PEARCE
-
Patent number: 9473510Abstract: Location data from one or more geolocation engines such as GPS, a system that determines location from relative signal strengths or transit times, etc., within and/or connected to a device, such as a mobile phone, vehicle, movable electronic device, computer, etc., is included in a digital record that submitted to obtain a digital signature such that the presence of the device at the particular location can later be proven. The digital record may include data that encodes a message, as well as other parameters such as time. The digital signature may include recomputation parameters for recomputing a verifying calendar value, formed by a keyless, hash tree-based signing infrastructure as an uppermost hash value in a calendar period.Type: GrantFiled: February 25, 2015Date of Patent: October 18, 2016Assignee: GUARDTIME IP HOLDINGS, LTD.Inventor: Jeffrey Pearce
-
Publication number: 20160253523Abstract: A distributed hash tree-based authentication system for digital input records has more than one upper-level core node, each of which receives at least one uppermost value from aggregators. Communicating with each other about which aggregator values they have received, the nodes try to reach agreement as to which of these values should be included in duplicated current intra-node hash tree evaluations so as to form a consistent top-level value used as the basis for digital signatures associated with the digital input records.Type: ApplicationFiled: February 27, 2015Publication date: September 1, 2016Applicant: GUARDTIME IP HOLDINGS LIMITEDInventors: ANDRES KROONMAA, AHTO BULDAS, JEFFREY PEARCE