Patents by Inventor Matthew Benjamin Smith
Matthew Benjamin Smith has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240155351Abstract: A method of authenticating a passcode entered by a user on an unstable electronic computing device. The method includes receiving an indication that an input is unstable, impacting the ability of a user to provide the input; generating a dynamic keyboard including at least one alphanumeric key, the dynamic keyboard being configured to address the unstable input; presenting the dynamic keyboard to the user; receiving the input from the user, the input comprising a selection of at least one alphanumeric character of a passcode on the dynamic keyboard; and authenticating the input received from the user by comparing the at least one alphanumeric character and a stored passcode.Type: ApplicationFiled: January 12, 2024Publication date: May 9, 2024Inventors: Graham Linn, Marjorie Summit Anzalone, Andriy Fedorchuk, Robert Glenn Hamchuk, Jason Huang, Dennis E. Montenegro, Matthew Pearce, Ramanathan Ramanathan, Rajiv Ranjan, Debarchana Roy, Adam Benjamin Smith-Kipnis
-
Patent number: 11930117Abstract: Participants as requestors using a requesting network element request one or more tokenization processors to generate tokens that represent a sanitized version of data such that the resultant tokens are amenable to comparison across participants. As circumstances warrant, one or more such tokens can be submitted to the tokenization processor(s) to privately retrieve the original data. Role-based access control scope parameters and tokenization processor-specific tokenization processor secrets can be embedded into reversible tokens that remain invariant under updating of the tokenization processor secrets across tokenization processors.Type: GrantFiled: July 31, 2023Date of Patent: March 12, 2024Assignee: Springcoin, Inc.Inventors: David William Kravitz, Michael Young, Mollie Zechlin Halverson, Matthew Benjamin Smith
-
Publication number: 20240039724Abstract: Participants as requestors using a requesting network element request one or more tokenization processors to generate tokens that represent a sanitized version of data such that the resultant tokens are amenable to comparison across participants. As circumstances warrant, one or more such tokens can be submitted to the tokenization processor(s) to privately retrieve the original data. Role-based access control scope parameters and tokenization processor-specific tokenization processor secrets can be embedded into reversible tokens that remain invariant under updating of the tokenization processor secrets across tokenization processors.Type: ApplicationFiled: July 31, 2023Publication date: February 1, 2024Inventors: David William Kravitz, Michael Young, Mollie Zechlin Halverson, Matthew Benjamin Smith
-
Publication number: 20230328046Abstract: A protocol that is managed by a coordinating network element or third-party intermediary or peer network elements and utilizes tokens prohibits any subset of a union of the coordinating network element or third-party intermediary, if any, and a proper subset of the processors involved in token generation from substantively accessing underlying data. By one approach, processors utilize uniquely-held secrets. By one approach, an audit capability involves a plurality of processors. By one approach, the protocol enables data transference and/or corroboration. By one approach, transferred data is hosted independently of the coordinating network element. By one approach, the coordinating network element or third-party intermediary or a second requesting network element is at least partially blinded from access to tokens submitted by a first requesting network element. By one approach, a third-party intermediary uses a single- or consortium- sourced database.Type: ApplicationFiled: June 2, 2023Publication date: October 12, 2023Inventors: David William Kravitz, Mollie Zechlin Halverson, Matthew Benjamin Smith, Christopher Daniel Neckar
-
Patent number: 11722469Abstract: A protocol that is managed by a coordinating network element or third-party intermediary or peer network elements and utilizes tokens prohibits any subset of a union of the coordinating network element or third-party intermediary, if any, and a proper subset of the processors involved in token generation from substantively accessing underlying data. By one approach, processors utilize uniquely-held secrets. By one approach, an audit capability involves a plurality of processors. By one approach, the protocol enables data transference and/or corroboration. By one approach, transferred data is hosted independently of the coordinating network element. By one approach, the coordinating network element or third-party intermediary or a second requesting network element is at least partially blinded from access to tokens submitted by a first requesting network element. By one approach, a third-party intermediary uses a single- or consortium-sourced database.Type: GrantFiled: January 23, 2023Date of Patent: August 8, 2023Assignee: Springcoin, Inc.Inventors: David William Kravitz, Mollie Zechlin Halverson, Matthew Benjamin Smith
-
Patent number: 11646897Abstract: A coordinating network element manages a protocol that makes attestations of off-platform-resolved data and decisions available for use on a blockchain platform or on another decentralized-execution-based platform operational within a multi-tenant environment. By one approach, these teachings provide for off-platform-verified data pertaining to individual-, group- or machine-based users to be blinded from access by the coordinating network element and by the platform while utilizing a tokenized form of such data to enable user-initiated queries that involve solely on-platform vetting of users as a condition of fulfilling user requests for service.Type: GrantFiled: February 18, 2022Date of Patent: May 9, 2023Assignee: Springcoin, Inc.Inventors: David William Kravitz, Fabrice Cheng, Matthew Benjamin Smith, Mollie Zechlin Halverson
-
Patent number: 11637817Abstract: A coordinating network element manages a protocol that prohibits the coordinating network element from substantively accessing data content that, at least in part, underlies received protocol-compliant requests. By one approach, these teachings provide for preventing substantive access to data information that is included within the protocol-compliant request in tokenized form, wherein the tokens are generated using secrets, at least one of which is unavailable to the coordinating network element.Type: GrantFiled: June 3, 2022Date of Patent: April 25, 2023Assignee: Springcoin, Inc.Inventors: David William Kravitz, Mollie Zechlin Halverson, Matthew Benjamin Smith
-
Publication number: 20230075354Abstract: A protocol that is managed by a coordinating network element or third-party intermediary or peer network elements and utilizes tokens prohibits any subset of a union of the coordinating network element or third-party intermediary, if any, and a proper subset of the processors involved in token generation from substantively accessing underlying data. By one approach, processors utilize uniquely-held secrets. By one approach, an audit capability involves a plurality of processors. By one approach, the protocol enables data transference and/or corroboration. By one approach, transferred data is hosted independently of the coordinating network element. By one approach, the coordinating network element or third-party intermediary or a second requesting network element is at least partially blinded from access to tokens submitted by a first requesting network element. By one approach, a third-party intermediary uses a single- or consortium-sourced database.Type: ApplicationFiled: July 21, 2022Publication date: March 9, 2023Inventors: David William Kravitz, Mollie Zechlin Halverson, Matthew Benjamin Smith
-
Patent number: 11595365Abstract: A protocol that is managed by a coordinating network element or third-party intermediary or peer network elements and utilizes tokens prohibits any subset of a union of the coordinating network element or third-party intermediary, if any, and a proper subset of the processors involved in token generation from substantively accessing underlying data. By one approach, processors utilize uniquely-held secrets. By one approach, an audit capability involves a plurality of processors. By one approach, the protocol enables data transference and/or corroboration. By one approach, transferred data is hosted independently of the coordinating network element. By one approach, the coordinating network element or third-party intermediary or a second requesting network element is at least partially blinded from access to tokens submitted by a first requesting network element. By one approach, a third-party intermediary uses a single- or consortium-sourced database.Type: GrantFiled: July 21, 2022Date of Patent: February 28, 2023Assignee: Springcoin, Inc.Inventors: David William Kravitz, Mollie Zechlin Halverson, Matthew Benjamin Smith
-
Publication number: 20220385642Abstract: A coordinating network element manages a protocol that prohibits the coordinating network element from substantively accessing data content that, at least in part, underlies received protocol-compliant requests. By one approach, these teachings provide for preventing substantive access to data information that is included within the protocol-compliant request in tokenized form, wherein the tokens are generated using secrets, at least one of which is unavailable to the coordinating network element.Type: ApplicationFiled: June 3, 2022Publication date: December 1, 2022Inventors: David William Kravitz, Mollie Zechlin Halverson, Matthew Benjamin Smith
-
Publication number: 20220385477Abstract: A coordinating network element manages a protocol that makes attestations of off-platform-resolved data and decisions available for use on a blockchain platform or on another decentralized-execution-based platform operational within a multi-tenant environment. By one approach, these teachings provide for off-platform-verified data pertaining to individual-, group- or machine-based users to be blinded from access by the coordinating network element and by the platform while utilizing a tokenized form of such data to enable user-initiated queries that involve solely on-platform vetting of users as a condition of fulfilling user requests for service.Type: ApplicationFiled: February 18, 2022Publication date: December 1, 2022Inventors: David William Kravitz, Fabrice Cheng, Matthew Benjamin Smith, Mollie Zechlin Halverson
-
Patent number: 11425107Abstract: A protocol that is managed by a coordinating network element or third-party intermediary or peer network elements and utilizes tokens prohibits any subset of a union of the coordinating network element or third-party intermediary, if any, and a proper subset of the processors involved in token generation from substantively accessing underlying data. By one approach, processors utilize uniquely-held secrets. By one approach, an audit capability involves a plurality of processors. By one approach, the protocol enables data transference and/or corroboration. By one approach, transferred data is hosted independently of the coordinating network element. By one approach, the coordinating network element or third-party intermediary or a second requesting network element is at least partially blinded from access to tokens submitted by a first requesting network element. By one approach, a third-party intermediary uses a single- or consortium-sourced database.Type: GrantFiled: September 9, 2021Date of Patent: August 23, 2022Assignee: SPRINGCOIN, INC.Inventors: David William Kravitz, Mollie Zechlin Halverson, Matthew Benjamin Smith, Christopher Daniel Neckar
-
Patent number: 11405365Abstract: A third-party intermediary manages a protocol that prohibits the third-party intermediary from substantively accessing data content that, at least in part, underlies received protocol-compliant requests. By one approach, these teachings provide for preventing substantive access to data information that is included within the protocol-compliant request as one or more functions of data, parts of which data may be in tokenized or untokenized form, wherein the values of the functions are generated using secrets, at least one of which is unavailable to the third-party intermediary. By one approach, tokens comprised of data in tokenized form are generated using secrets, at least one of which is unavailable to the third-party intermediary.Type: GrantFiled: August 6, 2021Date of Patent: August 2, 2022Assignee: SPRINGCOIN, INC.Inventors: David William Kravitz, Matthew Benjamin Smith, Mollie Johanna Zechlin
-
Patent number: 11374910Abstract: A coordinating network element manages a protocol that prohibits the coordinating network element from substantively accessing data content that, at least in part, underlies received protocol-compliant requests. By one approach, these teachings provide for preventing substantive access to data information that is included within the protocol-compliant request in tokenized form, wherein the tokens are generated using secrets, at least one of which is unavailable to the coordinating network element.Type: GrantFiled: March 12, 2020Date of Patent: June 28, 2022Assignee: SPRINGCOIN, INC.Inventors: David William Kravitz, Mollie Johanna Zechlin, Matthew Benjamin Smith, Fabrice Cheng, John Sun, Robert Zbigniew Krzyzanowski, Ashwini Rao
-
Publication number: 20220078170Abstract: A protocol that is managed by a coordinating network element or third-party intermediary or peer network elements and utilizes tokens prohibits any subset of a union of the coordinating network element or third-party intermediary, if any, and a proper subset of the processors involved in token generation from substantively accessing underlying data. By one approach, processors utilize uniquely-held secrets. By one approach, an audit capability involves a plurality of processors. By one approach, the protocol enables data transference and/or corroboration. By one approach, transferred data is hosted independently of the coordinating network element. By one approach, the coordinating network element or third-party intermediary or a second requesting network element is at least partially blinded from access to tokens submitted by a first requesting network element. By one approach, a third-party intermediary uses a single- or consortium-sourced database.Type: ApplicationFiled: September 9, 2021Publication date: March 10, 2022Inventors: David William Kravitz, Mollie Jechlin Halverson, Matthew Benjamin Smith, Christopher Daniel Neckar
-
Publication number: 20220029969Abstract: A third-party intermediary manages a protocol that prohibits the third-party intermediary from substantively accessing data content that, at least in part, underlies received protocol-compliant requests. By one approach, these teachings provide for preventing substantive access to data information that is included within the protocol-compliant request as one or more functions of data, parts of which data may be in tokenized or untokenized form, wherein the values of the functions are generated using secrets, at least one of which is unavailable to the third-party intermediary. By one approach, tokens comprised of data in tokenized form are generated using secrets, at least one of which is unavailable to the third-party intermediary.Type: ApplicationFiled: August 6, 2021Publication date: January 27, 2022Inventors: David William Kravitz, Matthew Benjamin Smith, Mollie Johanna Zechlin
-
Publication number: 20200336470Abstract: A coordinating network element manages a protocol that prohibits the coordinating network element from substantively accessing data content that, at least in part, underlies received protocol-compliant requests. By one approach, these teachings provide for preventing substantive access to data information that is included within the protocol-compliant request in tokenized form, wherein the tokens are generated using secrets, at least one of which is unavailable to the coordinating network element.Type: ApplicationFiled: March 12, 2020Publication date: October 22, 2020Inventors: David William Kravitz, Mollie Johanna Zechlin, Matthew Benjamin Smith, Fabrice Cheng, John Sun, Robert Zbigniew Krzyzanowski, Ashwini Rao
-
Publication number: 20180308072Abstract: The system is a scalable, flexible, and extensible platform for building, deploying, and managing distributed applications that interact with multiple blockchain technologies. The system implements well-defined and well-managed microservices to encapsulate functionality, isolate sensitive data, enable responsive and efficient scaling, and provide a framework for future improvements and support for future blockchain technologies. The system in one embodiment uses an event-driven architecture to construct fast, responsive systems, but still provide support for alternate modes of operation. The system exposes high-level abstractions of the foundational elements of distributed applications in a powerful, well-understood programming environment to simplify development of extensions, adapters, and applications.Type: ApplicationFiled: April 21, 2017Publication date: October 25, 2018Inventors: Matthew Benjamin Smith, Julian Vergel de Dios, Sivasubramanian Hyderabadkannan, Joshua Lederman