Patents by Inventor Adam Back

Adam Back has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11080665
    Abstract: Systems and methods are described for encrypting amounts and asset types of a verifiable transaction on a blockchain ledger. For each asset, an asset tag is blinded, multiplied by the amount of the asset, and the product is blinded again to create an encrypted amount of the asset. Both encrypted amount of the asset and a corresponding generated output value are within a value range, and the sum of the encrypted input value and the encrypted output value equals zero. Rangeproofs for each of the encrypted output values are associated with a different public key. Each public key is signed with a ring signature based on a public key of a recipient. A second ring signature is used to verify each asset tag, where the private key of the second ring signature for each asset is a difference between a first blinding value and an output coefficient.
    Type: Grant
    Filed: February 12, 2018
    Date of Patent: August 3, 2021
    Assignee: Blockstream Corporation
    Inventors: Andrew Poelstra, Gregory Maxwell, Adam Back, Pieter Wuille, Mark Friedenbach
  • Patent number: 10812274
    Abstract: Systems and methods are described for transferring an asset from a parent chain to a sidechain. A simplified payment verification (SPV) proof associated with the parent chain asset may be generated. The SPV proof may include a threshold level of work. The SPV proof associated with the parent chain asset may be validated, and a sidechain asset corresponding to the parent chain asset may be generated. If no reorganization proof is detected, the sidechain asset is released. To redeem the sidechain asset in the parent chain, a SPV proof associated with the sidechain asset may be generated. The parent chain may validate the SPV proof associated with the sidechain asset. The parent chain asset associated with the sidechain asset may be held for a second predetermined contest period. The parent chain asset may then be released if no reorganization proof associated with the sidechain asset is detected.
    Type: Grant
    Filed: May 9, 2016
    Date of Patent: October 20, 2020
    Assignee: Blockstream Corporation
    Inventors: Adam Back, Gregory Maxwell, Matt Corallo, Luke Dashjr, Mark Friedenbach, Andrew Poelstra, Jorge Timon, Pieter Wuille
  • Publication number: 20180173633
    Abstract: Embodiments present a virtual disk image to applications such as virtual machines (VMs) executing on a computing device. The virtual disk image corresponds to one or more subparts of binary large objects (blobs) of data stored by a cloud service, and is implemented in a log structured format. Grains of the virtual disk image are cached by the computing device. The computing device caches only a subset of the grains and performs write operations without blocking the applications to reduce storage latency perceived by the applications. Some embodiments enable the applications that lack enterprise class storage to benefit from enterprise class cloud storage services.
    Type: Application
    Filed: November 27, 2017
    Publication date: June 21, 2018
    Inventors: Thomas A. PHELAN, Erik COTA-ROBLES, David William BARRY, Adam BACK
  • Patent number: 9830271
    Abstract: Embodiments present a virtual disk image to applications such as virtual machines (VMs) executing on a computing device. The virtual disk image corresponds to one or more subparts of binary large objects (blobs) of data stored by a cloud service, and is implemented in a log structured format. Grains of the virtual disk image are cached by the computing device. The computing device caches only a subset of the grains and performs write operations without blocking the applications to reduce storage latency perceived by the applications. Some embodiments enable the applications that lack enterprise class storage to benefit from enterprise class cloud storage services.
    Type: Grant
    Filed: July 25, 2012
    Date of Patent: November 28, 2017
    Assignee: VMware, Inc.
    Inventors: Thomas A. Phelan, Erik Cota-Robles, David William Barry, Adam Back
  • Patent number: 9673984
    Abstract: Scalable session management is achieved by generating a cookie that includes an encrypted session key and encrypted cookie data. The cookie data is encrypted using the session key. The session key is then signed and encrypted using one or more public/private key pairs. The encrypted session key can be decrypted and verified using the same private/public key pair(s). Once verified, the decrypted session key can then be used to decrypt and verify the encrypted cookie data. A first server having the private/public key pair(s) may generate the cookie using a randomly generated session key. A second server having the same private/public key pair(s) may decrypt and verify the cookie even if the session key is not initially installed on the second server. A session key cache may be used to provide session key lookup to save public/private key operations on the servers.
    Type: Grant
    Filed: October 31, 2013
    Date of Patent: June 6, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Wei Jiang, Adam Back, John D. Whited, Yordan I. Rouskov, Ismail Cem Paya, Wei-QUiang Michael Guo
  • Publication number: 20160330034
    Abstract: Systems and methods are described for transferring an asset from a parent chain to a sidechain. A simplified payment verification (SPV) proof associated with the parent chain asset may be generated. The SPV proof may include a threshold level of work. The SPV proof associated with the parent chain asset may be validated, and a sidechain asset corresponding to the parent chain asset may be generated. If no reorganization proof is detected, the sidechain asset is released. To redeem the sidechain asset in the parent chain, a SPV proof associated with the sidechain asset may be generated. The parent chain may validate the SPV proof associated with the sidechain asset. The parent chain asset associated with the sidechain asset may be held for a second predetermined contest period. The parent chain asset may then be released if no reorganization proof associated with the sidechain asset is detected.
    Type: Application
    Filed: May 9, 2016
    Publication date: November 10, 2016
    Inventors: Adam BACK, Gregory MAXWELL
  • Patent number: 9203819
    Abstract: A method of pairing an unregistered device with a virtual identity may include, at a first repository: receiving a request from the unregistered device, sending a pairing code and an identifier to the unregistered device, receiving the pairing code from a registered device, and sending the identifier to the registered device. The method may also include, at a second repository, receiving the pairing code and secret information from the registered device, receiving the pairing code in a transmission associated with the unregistered device, associating the unregistered device with the virtual identity using the pairing code, and sending the secret information to the unregistered device.
    Type: Grant
    Filed: January 18, 2013
    Date of Patent: December 1, 2015
    Assignee: ONEID INC.
    Inventors: James Lewis Fenton, Adam Back, Steven Todd Kirsch
  • Patent number: 8751804
    Abstract: A technique controls access to a file. The technique involves creating a file encryption key based on (i) a user input parameter (e.g., a user password) from a user of the client device and (ii) an automatically generated salt parameter (e.g., a random number). The technique further involves encrypting the file using the file encryption key to form an encrypted copy of the file, and providing the salt parameter to an external storage system to externally store the salt parameter. Access to data within the encrypted copy of the file requires the salt parameter provided to the external storage system.
    Type: Grant
    Filed: June 30, 2011
    Date of Patent: June 10, 2014
    Assignee: DECHO Corporation
    Inventors: Magnus Nyström, Alina Oprea, Adam Back
  • Publication number: 20140059354
    Abstract: Scalable session management is achieved by generating a cookie that includes an encrypted session key and encrypted cookie data. The cookie data is encrypted using the session key. The session key is then signed and encrypted using one or more public/private key pairs. The encrypted session key can be decrypted and verified using the same private/public key pair(s). Once verified, the decrypted session key can then be used to decrypt and verify the encrypted cookie data. A first server having the private/public key pair(s) may generate the cookie using a randomly generated session key. A second server having the same private/public key pair(s) may decrypt and verify the cookie even if the session key is not initially installed on the second server. A session key cache may be used to provide session key lookup to save public/private key operations on the servers.
    Type: Application
    Filed: October 31, 2013
    Publication date: February 27, 2014
    Applicant: Microsoft Corporation
    Inventors: Wei Jiang, Adam Back, John D. Whited, Yordan I. Rouskov, Ismail Cem Paya, Wei-Quiang Michael Guo
  • Publication number: 20140032850
    Abstract: Embodiments present a virtual disk image to applications such as virtual machines (VMs) executing on a computing device. The virtual disk image corresponds to one or more subparts of binary large objects (blobs) of data stored by a cloud service, and is implemented in a log structured format. Grains of the virtual disk image are cached by the computing device. The computing device caches only a subset of the grains and performs write operations without blocking the applications to reduce storage latency perceived by the applications. Some embodiments enable the applications that lack enterprise class storage to benefit from enterprise class cloud storage services.
    Type: Application
    Filed: July 25, 2012
    Publication date: January 30, 2014
    Applicant: VMWARE, INC.
    Inventors: Thomas A. Phelan, Erik Cota-Robles, David William Barry, Adam Back
  • Patent number: 8626929
    Abstract: Scalable session management is achieved by generating a cookie that includes an encrypted session key and encrypted cookie data. The cookie data is encrypted using the session key. The session key is then signed and encrypted using one or more public/private key pairs. The encrypted session key can be decrypted and verified using the same private/public key pair(s). Once verified, the decrypted session key can then be used to decrypt and verify the encrypted cookie data. A first server having the private/public key pair(s) may generate the cookie using a randomly generated session key. A second server having the same private/public key pair(s) may decrypt and verify the cookie even if the session key is not initially installed on the second server. A session key cache may be used to provide session key lookup to save public/private key operations on the servers.
    Type: Grant
    Filed: February 14, 2011
    Date of Patent: January 7, 2014
    Assignee: Microsoft Corporation
    Inventors: Wei Jiang, Ismail Cem Paya, John D. Whited, Wei-Quiang Michael Guo, Yordan Rouskov, Adam Back
  • Patent number: 8510625
    Abstract: Storing data includes encoding the data using an erasure encoding to provide encoded data, separating the encoded data into a number of components, and providing each of the components to separate data sites. The data may be encoded using a Reed/Solomon encoding. The data may be encoded using a 3-1 Reed/Solomon encoding and the encoded data may be separated into four components that are provided to four separate sites. The data may be encoded by a site that receives the data prior to encoding. The data may be encoded by a client that provides the data to a plurality of sites coupled thereto. Storing data may also include each of the separate data sites providing an additional encoding for the components. The data and the components may be encoded using a Reed/Solomon encoding.
    Type: Grant
    Filed: March 31, 2010
    Date of Patent: August 13, 2013
    Assignee: Decho Corporation
    Inventors: Adam Back, Patrick E. Bozeman, Zachary Wily
  • Publication number: 20110138179
    Abstract: Scalable session management is achieved by generating a cookie that includes an encrypted session key and encrypted cookie data. The cookie data is encrypted using the session key. The session key is then signed and encrypted using one or more public/private key pairs. The encrypted session key can be decrypted and verified using the same private/public key pair(s). Once verified, the decrypted session key can then be used to decrypt and verify the encrypted cookie data. A first server having the private/public key pair(s) may generate the cookie using a randomly generated session key. A second server having the same private/public key pair(s) may decrypt and verify the cookie even if the session key is not initially installed on the second server. A session key cache may be used to provide session key lookup to save public/private key operations on the servers.
    Type: Application
    Filed: February 14, 2011
    Publication date: June 9, 2011
    Applicant: Microsoft Corporation
    Inventors: Wei Jiang, Ismail Cem Paya, John D. Whited, Wei-Quiang Michael Guo, Yordan Rouskov, Adam Back
  • Patent number: 7890634
    Abstract: Scalable session management is achieved by generating a cookie that includes an encrypted session key and encrypted cookie data. The cookie data is encrypted using the session key. The session key is then signed and encrypted using one or more public/private key pairs. The encrypted session key can be decrypted and verified using the same private/public key pair(s). Once verified, the decrypted session key can then be used to decrypt and verify the encrypted cookie data. A first server having the private/public key pair(s) may generate the cookie using a randomly generated session key. A second server having the same private/public key pair(s) may decrypt and verify the cookie even if the session key is not initially installed on the second server. A session key cache may be used to provide session key lookup to save public/private key operations on the servers.
    Type: Grant
    Filed: March 18, 2005
    Date of Patent: February 15, 2011
    Assignee: Microsoft Corporation
    Inventors: Wei Jiang, Ismail Cem Paya, John D Whited, Wei-Quiang Michael Guo, Yordan Rouskov, Adam Back
  • Patent number: 7584362
    Abstract: Systems and methods for providing signatures are described. In an implementation, a system includes a backend configured to generate a plurality of incomplete signatures using an offline portion of an online/offline signature algorithm, storage configured to store the plurality of incomplete signatures and a front end configured to process a plurality of messages using the plurality of incomplete signatures to form a plurality of digital signatures such that each of the messages has a corresponding one of the digital signatures.
    Type: Grant
    Filed: April 22, 2005
    Date of Patent: September 1, 2009
    Assignee: Microsoft Corporation
    Inventors: Ismail Cem Paya, Peter L. Montgomery, Adam Back
  • Patent number: 7523499
    Abstract: Detecting an attack on an authentication service. A first memory area is configured to store data relating to a plurality of requests communicated to an authentication service from a plurality of user agents. A second memory area is configured to store a predefined pattern of one or more requests. The predefined pattern characterizes an attack. A processor searches the stored data as a function of a query variable to identify at least one of the plurality of the requests communicated from at least one of the plurality of the user agents and compares the stored data associated with each of the identified requests with the predefined pattern to determine whether the identified request indicates the attack characterized by the predefined pattern. Other aspects of the invention are directed to computer-readable media for use with detecting the attack on the authentication service.
    Type: Grant
    Filed: March 25, 2004
    Date of Patent: April 21, 2009
    Assignee: Microsoft Corporation
    Inventors: Jonathan Wilkins, Gerard Gjonej, Adam Back
  • Patent number: 7379551
    Abstract: Securely roaming private data from one client computer to another in a network. A home client application generates a first key in response to a password, and encrypts designated private data as a function of the first key. A server receives and stores the encrypted private data. A roaming client application generates the first key in response to the password, and decrypts encrypted private data transferred from the server to obtain the private data. The invention further provides users the ability to retrieve encrypted private from the server even when the user cannot remember the password associated with the first key. Also, the server has no knowledge of the private data or the keys.
    Type: Grant
    Filed: April 2, 2004
    Date of Patent: May 27, 2008
    Assignee: Microsoft Corporation
    Inventors: Kok Wai Chan, Dafina Ivanova Toncheva, Baskaran Dharmarajan, Rahul Shrikant Newaskar, Adam Back
  • Publication number: 20060242417
    Abstract: Systems and methods for providing signatures are described. In an implementation, a system includes a backend configured to generate a plurality of incomplete signatures using an offline portion of an online/offline signature algorithm, storage configured to store the plurality of incomplete signatures and a front end configured to process a plurality of messages using the plurality of incomplete signatures to form a plurality of digital signatures such that each of the messages has a corresponding one of the digital signatures.
    Type: Application
    Filed: April 22, 2005
    Publication date: October 26, 2006
    Applicant: Microsoft Corporation
    Inventors: Ismail Paya, Peter Montgomery, Adam Back
  • Publication number: 20060212706
    Abstract: Scalable session management is achieved by generating a cookie that includes an encrypted session key and encrypted cookie data. The cookie data is encrypted using the session key. The session key is then signed and encrypted using one or more public/private key pairs. The encrypted session key can be decrypted and verified using the same private/public key pair(s). Once verified, the decrypted session key can then be used to decrypt and verify the encrypted cookie data. A first server having the private/public key pair(s) may generate the cookie using a randomly generated session key. A second server having the same private/public key pair(s) may decrypt and verify the cookie even if the session key is not initially installed on the second server. A session key cache may be used to provide session key lookup to save public/private key operations on the servers.
    Type: Application
    Filed: March 18, 2005
    Publication date: September 21, 2006
    Applicant: Microsoft Corporation
    Inventors: Wei Jiang, Ismail Paya, John Whited, Wei-Quiang Guo, Yordan Rouskov, Adam Back
  • Publication number: 20050223216
    Abstract: A system and method for securely roaming private data from a first client computer to a second client computer linked via a communication network. A user of the first client computer executes a home client application and designates private data for roaming. The home client application generates a first key in response to a password, and encrypts the designated private data as a function of the first key. The server receives and stores the encrypted private data. A user of the second computer executes a roaming client application and requests transfer of the encrypted private data from the server. The roaming client application generates the first key in response to the password, and decrypts encrypted private data transferred from the server to obtain the private data. The invention further provides users the ability to retrieve encrypted private from the server even when the user cannot remember the password associated with the first key. Also, the server has no knowledge of the private data nor the keys.
    Type: Application
    Filed: April 2, 2004
    Publication date: October 6, 2005
    Inventors: Kok Chan, Dafina Toncheva, Baskaran Dharmarajan, Rahul Newaskar, Adam Back