Patents Assigned to tZERO IP, LLC
  • Patent number: 11394560
    Abstract: A system, includes at least one processor; and at least one memory communicatively coupled to the at least one processor. The at least one processor is configured to receive an order to execute a trade of at least one transactional item associated with a first account, wherein the order, the first account, and a second account are associated with a common identifier; generate a first transaction to transfer the at least one transactional item from the first account to the second account; generate a second transaction that includes the order; verify that the first transaction was authorized by a same party as the second transaction; and authorize placement of the order on an exchange if the first transaction was authorized by the same party as the second transaction.
    Type: Grant
    Filed: June 1, 2020
    Date of Patent: July 19, 2022
    Assignee: tZERO IP, LLC
    Inventors: Alec Wilkins, Eric Nathaniel Fish, Trent Norman Larson, Patrick M. Byrne
  • Patent number: 11392940
    Abstract: A computing system that includes at least one processor and at least one memory communicatively coupled to the at least one processor is disclosed. The computing system also includes at least one network interface communicatively coupled to the at least one processor and configured to communicate with at least one vault system, each of the at least one vault system storing a respective one of N private keys or key components associated with a customer. The at least one processor is configured to receive, from each of at least one vault system, a respective private key or key component. The at least one processor is also configured to perform at least one action based on at least M of the N private keys or key components.
    Type: Grant
    Filed: January 17, 2019
    Date of Patent: July 19, 2022
    Assignee: tZERO IP, LLC
    Inventors: Joel Weight, Steven Hopkins, Tron Black, Denny Becker
  • Patent number: 11374750
    Abstract: A computing system comprising: processor(s) and memory; at least one network interface communicatively coupled to the at least one processor and configured to communicate with at least one remotely located computing device; wherein the at least one network interface is configured to receive a plurality of public encryption keys from the at least one remotely located computing device; wherein the at least one processor is configured to: split at least one secret into a plurality of shares, wherein at least a subset of the plurality of shares is sufficient to reconstruct the at least one secret; encrypt each of the plurality of shares based on a different public encryption key of the plurality of public encryption keys to create a plurality of encrypted shares; wherein the at least one network interface is configured to communicate the encrypted shares to the at least one remotely located computing device.
    Type: Grant
    Filed: June 1, 2020
    Date of Patent: June 28, 2022
    Assignee: tZERO IP, LLC
    Inventors: Jonathan Dolan, Michael D. Ornelas, Kevin Hartley, Pengyu Chen, Juston Johnson
  • Publication number: 20220101307
    Abstract: A network node in a peer-to-peer network of nodes includes at least one processor, at least one memory, and at least one network interface. The at least one processor is configured to receive a request to transfer a security token and execute a plurality of compliance rules associated with the security token. At least one of the compliance rules is implemented using at least one smart contract. The at least one smart contract references a global registry. The at least one processor is also configured to transfer the security token based on the execution of the compliance rules. The global registry includes personally identifiable information (PII) hash(es) for each of at least one investor associated with the transfer of the security token. The hashes are committed to the distributed ledger and updated when PII of a respective one of the at least one investor changes.
    Type: Application
    Filed: December 9, 2021
    Publication date: March 31, 2022
    Applicant: tZERO IP, LLC
    Inventors: Scott Overholser, Robert Christensen, Nicole Sanders, Justin Wilson, Robert Valmassoi, Chase Lester, Michael William Stuart Smith
  • Publication number: 20220084022
    Abstract: A customer device that includes at least one processor and at least one memory communicatively coupled to the at least one processor. The at least one memory stores a customer private key of N private keys associated with a customer. The customer device also includes at least one network interface communicatively coupled to the at least one processor and configured to communicate with at least one vault system, each of the at least one vault system storing a respective one of the N private keys. The at least one processor is configured to receive at least one private key of the N private keys from the at least one vault system. The at least one processor is also configured to perform at least one cryptographic action based on the at least one private key and the customer private key.
    Type: Application
    Filed: November 29, 2021
    Publication date: March 17, 2022
    Applicant: tZERO IP, LLC
    Inventors: Tron Black, Denny Becker
  • Publication number: 20220029791
    Abstract: A system includes processor(s) and memory(s). When encryption key(s) need to be generated to encrypt a key, processor(s): generate encryption key(s); encrypt key using encryption key(s) to generate encrypted key; split encrypted key and encryption key(s) into set(s) of key components, wherein subset of key components can be used to reconstruct encrypted key and encryption key(s); and erase key from memory(s). When encryption key(s) need to be used, processor(s): receive set(s) of key components from subset(s) of users that can be used to reconstruct encrypted key and encryption key(s) used to decrypt key from encrypted key; when set(s) of key components is received from subset(s) of users that can be used to reconstruct encrypted key and encrypted key(s), reconstruct encrypted key and encryption key(s); and when the encrypted key and the encryption key(s) have both been reconstructed, decrypt encrypted key into key using encryption key(s).
    Type: Application
    Filed: October 11, 2021
    Publication date: January 27, 2022
    Applicant: tZERO IP, LLC
    Inventors: Tron Black, Denny Becker, Tyler Perkins, Joel Weight, Jesse Empey
  • Patent number: 11216809
    Abstract: A computing system that includes processor(s), memory(s) and a network interface that communicates with a customer device and a trusted third party. The at least one network interface is configured to receive, from the customer device, identity data for a customer and a request to restore a customer wallet. The at least one processor is configured to verify the identity data for the customer received from the customer device. When the at least one processor verifies the identity data for the customer received from the customer device, the at least one network interface is configured to communicate a request for a first key associated with the customer wallet to a key repository for the trusted third party. The at least one processor is configured to restore the customer wallet using the first key associated with the customer wallet and a second key associated with the customer wallet.
    Type: Grant
    Filed: January 17, 2019
    Date of Patent: January 4, 2022
    Assignee: tZERO IP, LLC
    Inventors: Tron Black, Denny Becker
  • Patent number: 11216802
    Abstract: A network node that includes at least one processor, at least one memory, and at least one network interface is disclosed. The network node is part of a peer-to-peer network of network nodes implementing a distributed ledger. The network node is communicatively coupled to at least one remotely located computing device through the at least one network interface. The at least one processor is configured to receive, from a remotely located computing device, a request to transfer a security token. The at least one processor is also configured to execute a plurality of compliance rules associated with the security token. At least one of the compliance rules is implemented using at least one smart contract. The at least one smart contract references a global registry. The at least one processor is also configured to transfer the security token based on the execution of the compliance rules.
    Type: Grant
    Filed: August 9, 2019
    Date of Patent: January 4, 2022
    Assignee: tZERO IP, LLC
    Inventors: Scott Overholser, Robert Christensen, Nicole Sanders, Justin Wilson, Robert Valmassoi, Chase Lester, Michael William Stuart Smith
  • Patent number: 11146392
    Abstract: A system includes processor(s) and memory(s). When encryption key(s) need to be generated to encrypt a key, processor(s): securely generate encryption key(s); encrypt key using encryption key(s) to generate encrypted key; split encrypted key and encryption key(s) into set(s) of key components, wherein subset of key components can be used to reconstruct encrypted key and encryption key(s); and securely erase key from memory(s). When encryption key(s) need to be used, processor(s): receive set(s) of key components from subset(s) of users that can be used to reconstruct encrypted key and encryption key(s) used to securely decrypt key from encrypted key; when set(s) of key components is received from subset(s) of users that can be used to reconstruct encrypted key and encrypted key(s), securely reconstruct encrypted key and encryption key(s); and when the encrypted key and the encryption key(s) have both been reconstructed, securely decrypt encrypted key into key using encryption key(s).
    Type: Grant
    Filed: March 15, 2019
    Date of Patent: October 12, 2021
    Assignee: tZERO IP, LLC
    Inventors: Tron Black, Denny Becker, Tyler Perkins, Joel Weight, Jesse Empey
  • Publication number: 20210266150
    Abstract: A computing device includes at least one processor and at least one memory communicatively coupled to the at least one processor. The at least one processor is configured to determine a secret to be protected. The at least one processor is also configured to split the secret into a plurality of secret shares, at least a subset of which are required to reconstitute the secret. The at least one processor is also configured to transfer each secret share to a respective portable storage device or media for distribution to a respective shareholder. The at least one processor is also configured to generate metadata with at least a hash of each secret share, wherein the metadata is stored separate from the portable storage devices or media with the secret shares.
    Type: Application
    Filed: February 8, 2021
    Publication date: August 26, 2021
    Applicant: tZERO IP, LLC
    Inventors: Michael D. Ornelas, Jesse Empey, Brad Welker