Patents by Inventor Atul Luykx

Atul Luykx has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11438152
    Abstract: Systems and methods for improved distributed symmetric cryptography are disclosed. A client computer may communicate with a number of cryptographic devices in order to encrypt or decrypt data. Each cryptographic device may possess a secret share and a verification share, which may be used in the process of encrypting or decrypting data. The client computer may generate a commitment and transmit the commitment to the cryptographic devices. Each cryptographic device may generate a partial computation based on the commitment and their respective secret share, and likewise generate a partial signature based on the commitment and their respective verification share. The partial computations and partial signatures may be transmitted to the client computer. The client computer may use the partial computations and partial signatures to generate a cryptographic key and verification signature respectively. The client computer may use the cryptographic key to encrypt or decrypt a message.
    Type: Grant
    Filed: January 31, 2020
    Date of Patent: September 6, 2022
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Pratyay Mukherjee, Shashank Agrawal, Peter Rindal, Atul Luykx, Wei Dai
  • Publication number: 20220270088
    Abstract: A method, system, and computer program product generate, with a payment network, a first value (a) and a second value (ga), the second value (ga) generated based on the first value (a) and a generator value (g); generate, with the payment network, a plurality of random merchant numbers (mi) for a respective plurality of merchant banks; determine, with the payment network, a merchant product (M) based on a product of the plurality of random merchant numbers (mi); generate, with the payment network, a public key (pki) based on the second value (ga), the merchant product (M), and the random merchant number (mi) and a random key (rki) based on the merchant product (M) and the random merchant number (mi) for each respective merchant bank; and communicate, with the payment network, the public key (pki) and the random key (rki) to at least one respective merchant bank.
    Type: Application
    Filed: April 29, 2022
    Publication date: August 25, 2022
    Inventors: Sivanarayana Gaddam, Gaven James Watson, Rohit Sinha, Atul Luykx
  • Publication number: 20220045997
    Abstract: A method, system, and computer program product generate, with a payment network, a first value (a) and a second value (ga), the second value (ga) generated based on the first value (a) and a generator value (g); generate, with the payment network, a plurality of random merchant numbers (mi) for a respective plurality of merchant banks; determine, with the payment network, a merchant product (M) based on a product of the plurality of random merchant numbers (mi); generate, with the payment network, a public key (pki) based on the second value (ga), the merchant product (M), and the random merchant number (mi) and a random key (rki) based on the merchant product (M) and the random merchant number (mi) for each respective merchant bank; and communicate, with the payment network, the public key (pki) and the random key (rki) to at least one respective merchant bank.
    Type: Application
    Filed: January 9, 2020
    Publication date: February 10, 2022
    Inventors: Sivanarayana Gaddam, Gaven James Watson, Rohit Sinha, Atul Luykx
  • Publication number: 20210351924
    Abstract: A method including obtaining, by a key management computer, a key rotation period based on at least an adversarial storage limit. The key management computer can then generate a first cryptographic key. The key management computer can then generate a second cryptographic key to replace the first cryptographic key according to the key rotation period.
    Type: Application
    Filed: October 25, 2019
    Publication date: November 11, 2021
    Inventors: Atul Luykx, Wei Dai
  • Publication number: 20210243020
    Abstract: Systems and methods for improved distributed symmetric cryptography are disclosed. A client computer may communicate with a number of cryptographic devices in order to encrypt or decrypt data. Each cryptographic device may possess a secret share and a verification share, which may be used in the process of encrypting or decrypting data. The client computer may generate a commitment and transmit the commitment to the cryptographic devices. Each cryptographic device may generate a partial computation based on the commitment and their respective secret share, and likewise generate a partial signature based on the commitment and their respective verification share. The partial computations and partial signatures may be transmitted to the client computer. The client computer may use the partial computations and partial signatures to generate a cryptographic key and verification signature respectively. The client computer may use the cryptographic key to encrypt or decrypt a message.
    Type: Application
    Filed: January 31, 2020
    Publication date: August 5, 2021
    Inventors: Pratyay Mukherjee, Shashank Agrawal, Peter Rindal, Atul Luykx, Wei Dai
  • Publication number: 20210119793
    Abstract: The system and methods described herein may be utilized to perform operations in a faster and less complex manner than provided by conventional systems. An encrypted record may be stored at a user device. The encrypted record may include entries related to operations that were previously requested by the user device. The encrypted record may have been encrypted using a dynamic value and a key that is associated with an entity associated with the user. A recipient computer of a request by the user device may be configured to utilize the dynamic value provided in the request and the key associated with the entity to derive the encryption key(s) last used to encrypt the record. The recipient computer may decrypt and modify the decrypted record to perform the requested operation while the user device is precluded from doing so.
    Type: Application
    Filed: April 24, 2019
    Publication date: April 22, 2021
    Inventors: Sivanarayana Gaddam, Rohit Sinha, Atul Luykx, Hao Yang
  • Publication number: 20210027283
    Abstract: An enhanced federated custodian system is described. One embodiment is directed to a computer system executing instructions to: receive, from one or more members of a federated blockchain on a network of computing devices, an approval for a transaction associated with an authentication capsule; generate, via a first trusted execution environment, a first machine readable code in response to receiving the approval for the transaction; transmit to a cold interaction system, the first machine readable code; and the cold interaction system comprising one or more processors and one or more memories, the one or more memories comprising instructions executable by the one or more processors to: receive the first machine readable code comprising the encrypted information and the approval; decrypt the encrypted information for the transaction and the approval; and generate a private key that corresponds to a public key for the transaction.
    Type: Application
    Filed: July 22, 2019
    Publication date: January 28, 2021
    Inventors: Sivanarayana Gaddam, Atul Luykx, Cuy Sheffield
  • Publication number: 20200279258
    Abstract: Systems, methods, and computer readable media are provided for improving the usability of a cryptogram generated in a first cryptographic protocol such as triple-DES. The methods may generate a first cryptogram using a first identifier in a first cryptographic protocol, stored in a key store within an insecure memory of the mobile communication device, generate, within a secure memory of the mobile communication device, a second cryptogram using a second identifier in a second cryptographic protocol, stored in the secure memory, combining, the first cryptogram and a number of characters of the second cryptogram equal to the length of the first cryptogram to generate a third cryptogram and transmitting the third cryptogram to an payment processing network to validate a transaction. A transaction associated with the third cryptogram may be validated by an authorization entity or an issue entity.
    Type: Application
    Filed: September 26, 2019
    Publication date: September 3, 2020
    Inventors: Shashank Agrawal, Dmitri Bannikov, Atul Luykx, Payman Mohassel, Sergey Smirnoff, Selvaganesh Vasudevan, Gaven Watson