Patents by Inventor Amit Biyani
Amit Biyani has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11848939Abstract: The present disclosure relates to a method and system for managing and securing a distributed ledger for a decentralized peer-to-peer (p2p) network. The method receives an encrypted block and a group key generated by at least one peer node on the p2p network, wherein each peer node is IoT device and determines a virtual device block in a device chain on verifying the unique device ID, and address of a corresponding event chain associated with the virtual device block. Further, the method generates a transaction ID for a new transaction using the unique ID of the virtual device block and determines a valid event block in the event chain associated with the virtual device block for storing the new transaction and associated transaction ID. Further, the method updates the distributed ledger with the valid event block upon verification by one or more peer IoT devices of the p2p network.Type: GrantFiled: June 7, 2021Date of Patent: December 19, 2023Assignee: SMARTAXIOM, INC.Inventors: Amit Biyani, Gunjan Karun
-
Patent number: 11831628Abstract: The present disclosure relates to a method and system for enabling TOT security using a decentralized TOT security platform that leverages the advanced communication and blockchain security thread model to protect TOT eco-systems. The platform uses a multi-chain data schema including a device chain and an event chain. The multi-chain data schema uses a time-envelope mechanism to generate an event to connect different device chains and enforce a set of security rules through smart contracts. The method comprising receiving an encrypted block from TOT device with event data and verifying the device signature and identity based on certain rules within the device chain. Further, the method comprising determining access to event chain using previous token, current token and timestamp of the encrypted block and updating the event chain upon access determination. The event chain protects data integrity and confidentiality against malicious packets, unauthorized devices, weak encryption and man-in-the-middle attacks.Type: GrantFiled: February 5, 2021Date of Patent: November 28, 2023Assignee: SmartAxiom, Inc.Inventors: Amit Biyani, Gunjan Karun
-
Patent number: 11627003Abstract: A system for a shared and synchronous time series identification that matches a hardware clock-generating signal of a blockchain identified node device, with a generated data event time stamp and shared by all computing nodes participating in a complete system based on a blockchain design pattern and protocol. A blockchain cybersecurity system time signature is applied to synchronize the device level ID or device chain; this time sync is matched to the client master clocking time signal governing data transactions on the data event level or event chain. The combination of these two disparate blockchain mechanisms is termed as a multi-chain application. The matched time signals now provide referenced smart contract time sequencing. This matched time sequencing is unique and customized in its application to a multi-chain block chain cyber security application.Type: GrantFiled: March 5, 2019Date of Patent: April 11, 2023Assignee: SmartAxiom, Inc.Inventor: Amit Biyani
-
Publication number: 20210297424Abstract: The present disclosure relates to a method and system for managing and securing a distributed ledger for a decentralized peer-to-peer (p2p) network. The method receives an encrypted block and a group key generated by at least one peer node on the p2p network, wherein each peer node is IoT device and determines a virtual device block in a device chain on verifying the unique device ID, and address of a corresponding event chain associated with the virtual device block. Further, the method generates a transaction ID for a new transaction using the unique ID of the virtual device block and determines a valid event block in the event chain associated with the virtual device block for storing the new transaction and associated transaction ID. Further, the method updates the distributed ledger with the valid event block upon verification by one or more peer IoT devices of the p2p network.Type: ApplicationFiled: June 7, 2021Publication date: September 23, 2021Applicant: SMARTAXIOM, INC.Inventors: Amit Biyani, Gunjan Karun
-
Patent number: 11032293Abstract: The present disclosure relates to a method and system for managing and securing a distributed ledger for a decentralized peer-to-peer (p2p) network. The method receives an encrypted block and a group key generated by at least one peer node on the p2p network, wherein each peer node is IoT device and determines a virtual device block in a device chain on verifying the unique device ID, and address of a corresponding event chain associated with the virtual device block. Further, the method generates a transaction ID for a new transaction using the unique ID of the virtual device block and determines a valid event block in the event chain associated with the virtual device block for storing the new transaction and associated transaction ID. Further, the method updates the distributed ledger with the valid event block upon verification by one or more peer IoT devices of the p2p network.Type: GrantFiled: February 11, 2019Date of Patent: June 8, 2021Assignee: SmartAxiom, Inc.Inventors: Amit Biyani, Gunjan Karun
-
Publication number: 20210160233Abstract: The present disclosure relates to a method and system for enabling TOT security using a decentralized TOT security platform that leverages the advanced communication and blockchain security thread model to protect TOT eco-systems. The platform uses a multi-chain data schema including a device chain and an event chain. The multi-chain data schema uses a time-envelope mechanism to generate an event to connect different device chains and enforce a set of security rules through smart contracts. The method comprising receiving an encrypted block from TOT device with event data and verifying the device signature and identity based on certain rules within the device chain. Further, the method comprising determining access to event chain using previous token, current token and timestamp of the encrypted block and updating the event chain upon access determination. The event chain protects data integrity and confidentiality against malicious packets, unauthorized devices, weak encryption and man-in-the-middle attacks.Type: ApplicationFiled: February 5, 2021Publication date: May 27, 2021Applicant: SmartAxiom, Inc.Inventors: Amit BIYANI, Gunjan KARUN
-
Patent number: 10924466Abstract: The present disclosure relates to a method and system for enabling IOT security using a decentralized IOT security platform that leverages the advanced communication and blockchain security thread model to protect IOT eco-systems. The platform uses a multi-chain data schema including a device chain and an event chain. The multi-chain data schema uses a time-envelope mechanism to generate an event to connect different device chains and enforce a set of security rules through smart contracts. The method comprising receiving an encrypted block from IOT device with event data and verifying the device signature and identity based on certain rules within the device chain. Further, the method comprising determining access to event chain using previous token, current token and timestamp of the encrypted block and updating the event chain upon access determination. The event chain protects data integrity and confidentiality against malicious packets, unauthorized devices, weak encryption and man-in-the-middle attacks.Type: GrantFiled: July 27, 2018Date of Patent: February 16, 2021Assignee: SmartAxiom, Inc.Inventors: Amit Biyani, Gunjan Karun
-
Publication number: 20190273623Abstract: A system for a shared and synchronous time series identification that matches a hardware clock-generating signal of a blockchain identified node device, with a generated data event time stamp and shared by all computing nodes participating in a complete system based on a blockchain design pattern and protocol. A blockchain cybersecurity system time signature is applied to synchronize the device level ID or device chain; this time sync is matched to the client master clocking time signal governing data transactions on the data event level or event chain. The combination of these two disparate blockchain mechanisms is termed as a multi-chain application. The matched time signals now provide referenced smart contract time sequencing. This matched time sequencing is unique and customized in its application to a multi-chain block chain cyber security application.Type: ApplicationFiled: March 5, 2019Publication date: September 5, 2019Inventor: Amit Biyani
-
Publication number: 20190253434Abstract: The present disclosure relates to a method and system for managing and securing a distributed ledger for a decentralized peer-to-peer (p2p) network. The method receives an encrypted block and a group key generated by at least one peer node on the p2p network, wherein each peer node is IoT device and determines a virtual device block in a device chain on verifying the unique device ID, and address of a corresponding event chain associated with the virtual device block. Further, the method generates a transaction ID for a new transaction using the unique ID of the virtual device block and determines a valid event block in the event chain associated with the virtual device block for storing the new transaction and associated transaction ID. Further, the method updates the distributed ledger with the valid event block upon verification by one or more peer IoT devices of the p2p network.Type: ApplicationFiled: February 11, 2019Publication date: August 15, 2019Inventors: Amit Biyani, Gunjan Karun
-
Publication number: 20190036906Abstract: An architecture for a security frame work based on Blockchain specifications for an access manager including a Software Development Kit (SDK) and an application programming interface (API) is described. The Access Manager insures only authorized entities can be integrated in the managed security framework environment. Only authorized applications can access a resource. From a security perspective, the Access Manager enables horizontal security between a data provider and a data consumer. The security protocols insure confidentiality, integrity of the messages and peer authentication based on Blockchain security. For the privacy perspective, it is important to dissociate the security roles. For example, it is important that data can only be received by allowed entities. All technical components (gateways, proxies . . . ) used to transport data shall not have access to the data. This principle insures data cannot be retrieved and used by entities without user controls.Type: ApplicationFiled: July 27, 2018Publication date: January 31, 2019Applicant: SmartAxiom, Inc.Inventors: Amit Biyani, Gunjan Karun