Patents by Inventor Runting Shi

Runting Shi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240062193
    Abstract: An apparatus in one embodiment comprises a processing platform having at least one processing device. The processing platform implements a trusted bridge configured for at least temporary coupling between one or more data sources and a smart contract program of a blockchain. The trusted bridge comprises a secure enclave component and a relay component. Data obtained from a given one of the data sources via the relay component of the trusted bridge is authenticated in the secure enclave component of the trusted bridge. Information based at least in part on the data authenticated in the secure enclave component of the trusted bridge is provided to the smart contract program of the blockchain via the relay component of the trusted bridge. The secure enclave component illustratively receives a request for authenticated data from the blockchain smart contract program via the relay component, and responds to the request via the relay component.
    Type: Application
    Filed: October 30, 2023
    Publication date: February 22, 2024
    Inventors: Fan Zhang, Ethan Cecchetti, Kyle Croman, Ari Juels, Runting Shi
  • Patent number: 11829998
    Abstract: An apparatus in one embodiment comprises a processing platform having at least one processing device. The processing platform implements a trusted bridge configured for at least temporary coupling between one or more data sources and a smart contract program of a blockchain. The trusted bridge comprises a secure enclave component and a relay component. Data obtained from a given one of the data sources via the relay component of the trusted bridge is authenticated in the secure enclave component of the trusted bridge. Information based at least in part on the data authenticated in the secure enclave component of the trusted bridge is provided to the smart contract program of the blockchain via the relay component of the trusted bridge. The secure enclave component illustratively receives a request for authenticated data from the blockchain smart contract program via the relay component, and responds to the request via the relay component.
    Type: Grant
    Filed: June 6, 2017
    Date of Patent: November 28, 2023
    Assignee: Cornell University
    Inventors: Fan Zhang, Ethan Cecchetti, Kyle Croman, Ari Juels, Runting Shi
  • Publication number: 20220173888
    Abstract: The present invention is direct to a two-mode blockchain consensus protocol and a system implementing such a protocol. The system includes a plurality of node computers (and a communications network connecting the plurality of node computers. The plurality of node computers includes a first node computer, a collecting node computer, a committee of node computers, and one or more node computers that operate based on proof of work algorithms. Each node computer in the plurality includes a blockchain consensus software application running on the processor of the node computer. The blockchain consensus software application is adapted to connect to the plurality of node computers that are connected to the communications network. The blockchain consensus software application implements the two-mode blockchain consensus protocol. Through the software application, the plurality of node computers operate to reach a consensus on adding data to a public ledger.
    Type: Application
    Filed: February 16, 2022
    Publication date: June 2, 2022
    Inventors: Runting Shi, Rafael Pass, Yue Guo
  • Publication number: 20220129439
    Abstract: The present invention is directed blockchain systems and censuses protocols that adopt a pipelining technique. The systems and protocols involve a committee of consensus nodes that include proposer nodes and voter nodes. Each proposer node can send two or more unnotarized proposals to the voter nodes, and the voter nodes can vote on an unnotarized proposal when they have the same freshest notarized chain or block. A sequence number is provided to facilitate the operation of the systems and protocols. The sequence number can be used to determine the freshest notarized chain or block and the finalized chain and switch proposer node. The systems and protocols also provide other features such as chain syncer, committee election scheme, and committee reconfiguration. The systems and protocols further provide a simple finalization process and thus have a low finalization time.
    Type: Application
    Filed: January 10, 2022
    Publication date: April 28, 2022
    Inventors: Runting Shi, Rafael Nat Josef Pass, Taz Hong Hubert Chan, Chang-Zen Tsai, Chia-Hao Lo
  • Patent number: 11271717
    Abstract: The present invention is direct a two-mode blockchain consensus protocol and a system implementing such a protocol. The system includes a plurality of node computers (and a communications network connecting the plurality of node computers. The plurality of node computers includes a first node computer, a collecting node computer, a committee of node computers, and one or more node computers that operate based on proof of work algorithms. Each node computer in the plurality includes a blockchain consensus software application running on the processor of the node computer. The blockchain consensus software application is adapted to connect to the plurality of node computers that are connected to the communications network. The blockchain consensus software application implements the two-mode blockchain consensus protocol. Through the software application, the plurality of node computers operate to reach a consensus on adding data to a public ledger.
    Type: Grant
    Filed: February 20, 2019
    Date of Patent: March 8, 2022
    Assignee: Thunder Token Inc.
    Inventors: Runting Shi, Rafael Pass, Yue Guo
  • Patent number: 11222009
    Abstract: The present invention is directed blockchain systems and censuses protocols that adopt a pipelining technique. The systems and protocols involve a committee of consensus nodes that include proposer nodes and voter nodes. Each proposer node can send two or more unnotarized proposals to the voter nodes, and the voter nodes can vote on an unnotarized proposal when they have the same freshest notarized chain or block. A sequence number is provided to facilitate the operation of the systems and protocols. The sequence number can be used to determine the freshest notarized chain or block and the finalized chain and switch proposer node. The systems and protocols also provide other features such as chain syncer, committee election scheme, and committee reconfiguration. The systems and protocols further provide a simple finalization process and thus have a low finalization time.
    Type: Grant
    Filed: September 27, 2019
    Date of Patent: January 11, 2022
    Assignee: Thunder Token Inc.
    Inventors: Runting Shi, Rafael Nat Josef Pass, Tsz Hong Hubert Chan, Chang-Zen Tsai, Chia-Hao Lo
  • Publication number: 20200134578
    Abstract: The present blockchain systems and censuses protocols involve a committee of consensus nodes to notarize candidate blocks. The committee includes proposers and votes. A proposer can send an unnotarized proposal to the voters, and the voters can vote on an unnotarized proposal when the voter and the proposer have substantially the same freshest notarized chain. After receiving enough votes for the proposal, the proposal is notarized and added to the blockchain maintained by the systems and protocols. Epoch is provided to facilitate the operation of the systems and protocols. Epoch includes a value identifying a proposer and defines a duration in which the transmission and voting of the proposal can be completed. The time parameter can be used to determine the freshest notarized chain and the finalized chain. The finalized chain is determined by excluding a number of consecutive blocks with consecutive epoch values from the notarized chain.
    Type: Application
    Filed: October 25, 2019
    Publication date: April 30, 2020
    Inventors: Runting Shi, Rafael Nat Josef Pass, Tsz Hong Hubert CHAN
  • Publication number: 20200104293
    Abstract: The present invention is directed blockchain systems and censuses protocols that adopt a pipelining technique. The systems and protocols involve a committee of consensus nodes that include proposer nodes and voter nodes. Each proposer node can send two or more unnotarized proposals to the voter nodes, and the voter nodes can vote on an unnotarized proposal when they have the same freshest notarized chain or block. A sequence number is provided to facilitate the operation of the systems and protocols. The sequence number can be used to determine the freshest notarized chain or block and the finalized chain and switch proposer node. The systems and protocols also provide other features such as chain syncer, committee election scheme, and committee reconfiguration. The systems and protocols further provide a simple finalization process and thus have a low finalization time.
    Type: Application
    Filed: September 27, 2019
    Publication date: April 2, 2020
    Inventors: Runting Shi, Rafael Nat Josef Pass, Tsz Hong Hubert CHAN, Chang-Zen TSAI, Chia-Hao LO
  • Publication number: 20190260574
    Abstract: The present invention is direct a two-mode blockchain consensus protocol and a system implementing such a protocol. The system includes a plurality of node computers (and a communications network connecting the plurality of node computers. The plurality of node computers includes a first node computer, a collecting node computer, a committee of node computers, and one or more node computers that operate based on proof of work algorithms. Each node computer in the plurality includes a blockchain consensus software application running on the processor of the node computer. The blockchain consensus software application is adapted to connect to the plurality of node computers that are connected to the communications network. The blockchain consensus software application implements the two-mode blockchain consensus protocol. Through the software application, the plurality of node computers operate to reach a consensus on adding data to a public ledger.
    Type: Application
    Filed: February 20, 2019
    Publication date: August 22, 2019
    Inventors: Runting Shi, Rafael Pass, Yue Guo
  • Publication number: 20170352027
    Abstract: An apparatus in one embodiment comprises a processing platform having at least one processing device. The processing platform implements a trusted bridge configured for at least temporary coupling between one or more data sources and a smart contract program of a blockchain. The trusted bridge comprises a secure enclave component and a relay component. Data obtained from a given one of the data sources via the relay component of the trusted bridge is authenticated in the secure enclave component of the trusted bridge. Information based at least in part on the data authenticated in the secure enclave component of the trusted bridge is provided to the smart contract program of the blockchain via the relay component of the trusted bridge. The secure enclave component illustratively receives a request for authenticated data from the blockchain smart contract program via the relay component, and responds to the request via the relay component.
    Type: Application
    Filed: June 6, 2017
    Publication date: December 7, 2017
    Inventors: Fan Zhang, Ethan Cecchetti, Kyle Croman, Ari Juels, Runting Shi
  • Patent number: 9336388
    Abstract: One embodiment of the present invention provides a system for detecting insider attacks in an organization. During operation, the system collects data describing user activities. The system extracts information from the data that includes user information and user communications. The system then generates a topic-specific graph based on the extracted information. The system analyzes a structure of the graph to determine if one or more rules have been violated. The system may determine that a rule associated with the graph has been violated and signal an alarm in response to detecting the rule violation.
    Type: Grant
    Filed: December 10, 2012
    Date of Patent: May 10, 2016
    Assignee: PALO ALTO RESEARCH CENTER INCORPORATED
    Inventors: Oliver Brdiczka, Priya Mahadevan, Runting Shi
  • Publication number: 20140165195
    Abstract: One embodiment of the present invention provides a system for detecting insider attacks in an organization. During operation, the system collects data describing user activities. The system extracts information from the data that includes user information and user communications. The system then generates a topic-specific graph based on the extracted information. The system analyzes a structure of the graph to determine if one or more rules have been violated. The system may determine that a rule associated with the graph has been violated and signal an alarm in response to detecting the rule violation.
    Type: Application
    Filed: December 10, 2012
    Publication date: June 12, 2014
    Applicant: Palo Alto Research Center Incorporated
    Inventors: Oliver Brdiczka, Priya Mahadevan, Runting Shi
  • Patent number: 8555400
    Abstract: A private stream aggregation (PSA) system contributes a user's data to a data aggregator without compromising the user's privacy. The system can begin by determining a private key for a local user in a set of users, wherein the sum of the private keys associated with the set of users and the data aggregator is equal to zero. The system also selects a set of data values associated with the local user. Then, the system encrypts individual data values in the set based in part on the private key to produce a set of encrypted data values, thereby allowing the data aggregator to decrypt an aggregate value across the set of users without decrypting individual data values associated with the set of users, and without interacting with the set of users while decrypting the aggregate value. The system also sends the set of encrypted data values to the data aggregator.
    Type: Grant
    Filed: February 4, 2011
    Date of Patent: October 8, 2013
    Assignee: Palo Alto Research Center Incorporated
    Inventors: Runting Shi, Richard Chow, Tsz Hong Hubert Chan
  • Patent number: 8478768
    Abstract: A recommender system can generate a predicted item rating for one user by performing collaborative filtering on item ratings from other users. The recommender system can include a client device that interfaces with a server to obtain a predicted item rating for a local user. The client device can generate a standardized ratings vector for the user, and computes a group identifier for the user based on the standardized ratings vector. The system also generates a noisy ratings vector for the local user, and sends a user-ratings snapshot to a recommendation server that includes the group identifier and the noisy ratings vector. The recommender system can also include the recommendation server that generates a predicted item rating for the user by performing collaborative filtering on ratings vectors from a plurality of other users that belong to the same ratings group.
    Type: Grant
    Filed: December 8, 2011
    Date of Patent: July 2, 2013
    Assignee: Palo Alto Research Center Incorporated
    Inventors: Manas Ashok Pathak, Richard Chow, Runting Shi, Cong Wang
  • Publication number: 20130151540
    Abstract: A recommender system can generate a predicted item rating for one user by performing collaborative filtering on item ratings from other users. The recommender system can include a client device that interfaces with a server to obtain a predicted item rating for a local user. The client device can generate a standardized ratings vector for the user, and computes a group identifier for the user based on the standardized ratings vector. The system also generates a noisy ratings vector for the local user, and sends a user-ratings snapshot to a recommendation server that includes the group identifier and the noisy ratings vector. The recommender system can also include the recommendation server that generates a predicted item rating for the user by performing collaborative filtering on ratings vectors from a plurality of other users that belong to the same ratings group.
    Type: Application
    Filed: December 8, 2011
    Publication date: June 13, 2013
    Applicant: PALO ALTO RESEARCH CENTER INCORPORATED
    Inventors: Manas Ashok Pathak, Richard Chow, Runting Shi, Cong Wang
  • Patent number: 8312157
    Abstract: Embodiments of the present disclosure provide a method and system for implicitly authenticating a user to access controlled resources. The system receives a request to access the controlled resources. The system then determines a user behavior score based on a user behavior model, and recent contextual data about the user. The user behavior score facilitates identifying a level of consistency between one or more recent user events and a past user behavior pattern. The recent contextual data, which comprise a plurality of data streams, are collected from one or more user devices without prompting the user to perform an action explicitly associated with authentication. The plurality of data streams provide basis for determining the user behavior score, but a data stream alone provides insufficient basis for the determination of the user behavior score. The system also provides the user behavior score to an access controller of the controlled resource.
    Type: Grant
    Filed: July 16, 2009
    Date of Patent: November 13, 2012
    Assignee: Palo Alto Research Center Incorporated
    Inventors: Bjorn Markus Jakobsson, Mark J. Grandcolas, Philippe J. P. Golle, Richard Chow, Runting Shi
  • Patent number: 8266712
    Abstract: Embodiments of the present disclosure provide a method and system for protecting privacy by generating artificial contextual data. The system collects real contextual data related to a user. The system then generates artificial contextual data, based on the collected real contextual data. The system also groups the generated contextual data into one or more groups. Each group of contextual data corresponds to a persona that can be presented as the user's persona. Subsequently, the system transmits the generated contextual data to an entity, thereby allowing the user to obscure the real contextual data related to the user.
    Type: Grant
    Filed: November 3, 2009
    Date of Patent: September 11, 2012
    Assignee: Palo Alto Research Center Incorporated
    Inventors: Richard Chow, Philippe J. P. Golle, Runting Shi
  • Publication number: 20120204026
    Abstract: A private stream aggregation (PSA) system contributes a user's data to a data aggregator without compromising the user's privacy. The system can begin by determining a private key for a local user in a set of users, wherein the sum of the private keys associated with the set of users and the data aggregator is equal to zero. The system also selects a set of data values associated with the local user. Then, the system encrypts individual data values in the set based in part on the private key to produce a set of encrypted data values, thereby allowing the data aggregator to decrypt an aggregate value across the set of users without decrypting individual data values associated with the set of users, and without interacting with the set of users while decrypting the aggregate value. The system also sends the set of encrypted data values to the data aggregator.
    Type: Application
    Filed: February 4, 2011
    Publication date: August 9, 2012
    Applicant: PALO ALTO RESEARCH CENTER INCORPORATED
    Inventors: Runting Shi, Richard Chow, Tsz Hong Hubert Chan
  • Publication number: 20120137340
    Abstract: Embodiments of the present disclosure provide a method and system for implicitly authenticating a user to access controlled resources. The system first receives a request to access the controlled resource from a user. Then, the system determines whether the user request is inconsistent with regular user behavior by calculating a user behavior measure derived from historical contextual data of past user events. Next, responsive to the determined inconsistency of the user request, the system collects current contextual data of the user from one or more user devices without prompting the user to perform an explicit action for authentication. The system further updates the user behavior measure based on the collected current contextual data, and provides the updated user behavior measure to an access controller of the controlled resource to make an authentication decision based at least on the updated user behavior measure.
    Type: Application
    Filed: November 29, 2010
    Publication date: May 31, 2012
    Applicant: Palo Alto Research Center Incorporated
    Inventors: Bjorn Markus Jakobsson, Richard Chow, Runting Shi
  • Publication number: 20110107434
    Abstract: Embodiments of the present disclosure provide a method and system for protecting privacy by generating artificial contextual data. The system collects real contextual data related to a user. The system then generates artificial contextual data, based on the collected real contextual data. The system also groups the generated contextual data into one or more groups. Each group of contextual data corresponds to a persona that can be presented as the user's persona. Subsequently, the system transmits the generated contextual data to an entity, thereby allowing the user to obscure the real contextual data related to the user.
    Type: Application
    Filed: November 3, 2009
    Publication date: May 5, 2011
    Applicant: Palo Alto Research Center Incorporated
    Inventors: Richard Chow, Philippe J.P. Golle, Runting Shi