Patents Assigned to tZERO IP, LLC
-
Patent number: 11394560Abstract: A system, includes at least one processor; and at least one memory communicatively coupled to the at least one processor. The at least one processor is configured to receive an order to execute a trade of at least one transactional item associated with a first account, wherein the order, the first account, and a second account are associated with a common identifier; generate a first transaction to transfer the at least one transactional item from the first account to the second account; generate a second transaction that includes the order; verify that the first transaction was authorized by a same party as the second transaction; and authorize placement of the order on an exchange if the first transaction was authorized by the same party as the second transaction.Type: GrantFiled: June 1, 2020Date of Patent: July 19, 2022Assignee: tZERO IP, LLCInventors: Alec Wilkins, Eric Nathaniel Fish, Trent Norman Larson, Patrick M. Byrne
-
Patent number: 11392940Abstract: A computing system that includes at least one processor and at least one memory communicatively coupled to the at least one processor is disclosed. The computing system also includes at least one network interface communicatively coupled to the at least one processor and configured to communicate with at least one vault system, each of the at least one vault system storing a respective one of N private keys or key components associated with a customer. The at least one processor is configured to receive, from each of at least one vault system, a respective private key or key component. The at least one processor is also configured to perform at least one action based on at least M of the N private keys or key components.Type: GrantFiled: January 17, 2019Date of Patent: July 19, 2022Assignee: tZERO IP, LLCInventors: Joel Weight, Steven Hopkins, Tron Black, Denny Becker
-
Patent number: 11374750Abstract: A computing system comprising: processor(s) and memory; at least one network interface communicatively coupled to the at least one processor and configured to communicate with at least one remotely located computing device; wherein the at least one network interface is configured to receive a plurality of public encryption keys from the at least one remotely located computing device; wherein the at least one processor is configured to: split at least one secret into a plurality of shares, wherein at least a subset of the plurality of shares is sufficient to reconstruct the at least one secret; encrypt each of the plurality of shares based on a different public encryption key of the plurality of public encryption keys to create a plurality of encrypted shares; wherein the at least one network interface is configured to communicate the encrypted shares to the at least one remotely located computing device.Type: GrantFiled: June 1, 2020Date of Patent: June 28, 2022Assignee: tZERO IP, LLCInventors: Jonathan Dolan, Michael D. Ornelas, Kevin Hartley, Pengyu Chen, Juston Johnson
-
Publication number: 20220101307Abstract: A network node in a peer-to-peer network of nodes includes at least one processor, at least one memory, and at least one network interface. The at least one processor is configured to receive a request to transfer a security token and execute a plurality of compliance rules associated with the security token. At least one of the compliance rules is implemented using at least one smart contract. The at least one smart contract references a global registry. The at least one processor is also configured to transfer the security token based on the execution of the compliance rules. The global registry includes personally identifiable information (PII) hash(es) for each of at least one investor associated with the transfer of the security token. The hashes are committed to the distributed ledger and updated when PII of a respective one of the at least one investor changes.Type: ApplicationFiled: December 9, 2021Publication date: March 31, 2022Applicant: tZERO IP, LLCInventors: Scott Overholser, Robert Christensen, Nicole Sanders, Justin Wilson, Robert Valmassoi, Chase Lester, Michael William Stuart Smith
-
Publication number: 20220084022Abstract: A customer device that includes at least one processor and at least one memory communicatively coupled to the at least one processor. The at least one memory stores a customer private key of N private keys associated with a customer. The customer device also includes at least one network interface communicatively coupled to the at least one processor and configured to communicate with at least one vault system, each of the at least one vault system storing a respective one of the N private keys. The at least one processor is configured to receive at least one private key of the N private keys from the at least one vault system. The at least one processor is also configured to perform at least one cryptographic action based on the at least one private key and the customer private key.Type: ApplicationFiled: November 29, 2021Publication date: March 17, 2022Applicant: tZERO IP, LLCInventors: Tron Black, Denny Becker
-
Publication number: 20220029791Abstract: A system includes processor(s) and memory(s). When encryption key(s) need to be generated to encrypt a key, processor(s): generate encryption key(s); encrypt key using encryption key(s) to generate encrypted key; split encrypted key and encryption key(s) into set(s) of key components, wherein subset of key components can be used to reconstruct encrypted key and encryption key(s); and erase key from memory(s). When encryption key(s) need to be used, processor(s): receive set(s) of key components from subset(s) of users that can be used to reconstruct encrypted key and encryption key(s) used to decrypt key from encrypted key; when set(s) of key components is received from subset(s) of users that can be used to reconstruct encrypted key and encrypted key(s), reconstruct encrypted key and encryption key(s); and when the encrypted key and the encryption key(s) have both been reconstructed, decrypt encrypted key into key using encryption key(s).Type: ApplicationFiled: October 11, 2021Publication date: January 27, 2022Applicant: tZERO IP, LLCInventors: Tron Black, Denny Becker, Tyler Perkins, Joel Weight, Jesse Empey
-
Patent number: 11216809Abstract: A computing system that includes processor(s), memory(s) and a network interface that communicates with a customer device and a trusted third party. The at least one network interface is configured to receive, from the customer device, identity data for a customer and a request to restore a customer wallet. The at least one processor is configured to verify the identity data for the customer received from the customer device. When the at least one processor verifies the identity data for the customer received from the customer device, the at least one network interface is configured to communicate a request for a first key associated with the customer wallet to a key repository for the trusted third party. The at least one processor is configured to restore the customer wallet using the first key associated with the customer wallet and a second key associated with the customer wallet.Type: GrantFiled: January 17, 2019Date of Patent: January 4, 2022Assignee: tZERO IP, LLCInventors: Tron Black, Denny Becker
-
Patent number: 11216802Abstract: A network node that includes at least one processor, at least one memory, and at least one network interface is disclosed. The network node is part of a peer-to-peer network of network nodes implementing a distributed ledger. The network node is communicatively coupled to at least one remotely located computing device through the at least one network interface. The at least one processor is configured to receive, from a remotely located computing device, a request to transfer a security token. The at least one processor is also configured to execute a plurality of compliance rules associated with the security token. At least one of the compliance rules is implemented using at least one smart contract. The at least one smart contract references a global registry. The at least one processor is also configured to transfer the security token based on the execution of the compliance rules.Type: GrantFiled: August 9, 2019Date of Patent: January 4, 2022Assignee: tZERO IP, LLCInventors: Scott Overholser, Robert Christensen, Nicole Sanders, Justin Wilson, Robert Valmassoi, Chase Lester, Michael William Stuart Smith
-
Patent number: 11146392Abstract: A system includes processor(s) and memory(s). When encryption key(s) need to be generated to encrypt a key, processor(s): securely generate encryption key(s); encrypt key using encryption key(s) to generate encrypted key; split encrypted key and encryption key(s) into set(s) of key components, wherein subset of key components can be used to reconstruct encrypted key and encryption key(s); and securely erase key from memory(s). When encryption key(s) need to be used, processor(s): receive set(s) of key components from subset(s) of users that can be used to reconstruct encrypted key and encryption key(s) used to securely decrypt key from encrypted key; when set(s) of key components is received from subset(s) of users that can be used to reconstruct encrypted key and encrypted key(s), securely reconstruct encrypted key and encryption key(s); and when the encrypted key and the encryption key(s) have both been reconstructed, securely decrypt encrypted key into key using encryption key(s).Type: GrantFiled: March 15, 2019Date of Patent: October 12, 2021Assignee: tZERO IP, LLCInventors: Tron Black, Denny Becker, Tyler Perkins, Joel Weight, Jesse Empey
-
Publication number: 20210266150Abstract: A computing device includes at least one processor and at least one memory communicatively coupled to the at least one processor. The at least one processor is configured to determine a secret to be protected. The at least one processor is also configured to split the secret into a plurality of secret shares, at least a subset of which are required to reconstitute the secret. The at least one processor is also configured to transfer each secret share to a respective portable storage device or media for distribution to a respective shareholder. The at least one processor is also configured to generate metadata with at least a hash of each secret share, wherein the metadata is stored separate from the portable storage devices or media with the secret shares.Type: ApplicationFiled: February 8, 2021Publication date: August 26, 2021Applicant: tZERO IP, LLCInventors: Michael D. Ornelas, Jesse Empey, Brad Welker