Patents by Inventor Brian Spector
Brian Spector has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20210049600Abstract: A digital asset delivery network that consists of a cryptographic scheme and a decentralized network that runs on a blockchain. The decentralized network consists of a computer program that interact with the network by issuing electronic messages, computer programs that validate those messages as entries into blockchain and agree on blocks to publish next, and computer programs that run cryptographic multi-party computation protocols. The multi-party computation protocol generates public keys necessary to create cryptocurrency or crypto asset wallets, and also generates the digital signatures necessary to create a transaction for submission to the crypto asset's underlying decentralized network and blockchain.Type: ApplicationFiled: October 30, 2020Publication date: February 18, 2021Applicant: Qredo Ltd.Inventors: Brian Spector, Chris Morris, Howard Kitto, Kelan McCusker
-
Publication number: 20190354962Abstract: A distributed ledger system for cryptocurrency transactions uses two types of Directed Acyclic Graph (DAG) technologies into a dual chain architecture. Every transaction creates a unique identifier in the first graph is utilized to refer to a more expansive set of data housed within the second graph.Type: ApplicationFiled: May 17, 2019Publication date: November 21, 2019Applicant: Qredo Ltd.Inventor: Brian Spector
-
Publication number: 20190354969Abstract: The present invention generally relates to the field of data encryption processes for crypto-currency or other digital asset transactions between a principal and beneficiary utilizing a custodian. Cryptographic protocols protect the asset from the custodian. It can also protect the asset from the principal. It can also protect the asset against the beneficiary until such time as the beneficiary can prove certain logical conditions that give it exclusive control over the digital asset.Type: ApplicationFiled: May 13, 2019Publication date: November 21, 2019Applicant: Qredo Ltd.Inventors: Brian Spector, Christopher Steven Morris, Howard Kitto, Kealan McCusker
-
Publication number: 20190356481Abstract: The present invention generally relates to the field of data encryption processes for crypto-currency or other digital asset transactions between a principal and beneficiary utilizing a custodian. Cryptographic protocols protect the asset from the custodian. It can also protect the asset from the principal. It can also protect the asset against the beneficiary until such time as the beneficiary can prove certain logical conditions that give it exclusive control over the digital asset.Type: ApplicationFiled: May 13, 2019Publication date: November 21, 2019Applicant: Qredo Ltd.Inventors: Brian Spector, Chrstopher Steven Morris, Howard Kitto, Kealan McCusker
-
Patent number: 9698985Abstract: A method in a first entity for authenticating itself to a second entity by proving to the second entity that it is in possession of a full secret without sending the full secret to the second entity, the method comprising: receiving in the first entity an input from a user, the full secret having been divided into at least a first factor and a second factor and the input relating to the second factor of the full secret; reconstructing in the first entity the full secret from at least the first factor and the input; and carrying out a calculation in the first entity using the reconstructed full secret and sending the results of the calculation to the second entity, wherein the results provide an input to a pairing calculation in the second entity.Type: GrantFiled: May 30, 2014Date of Patent: July 4, 2017Assignee: MIRACL LIMITEDInventors: Kealan McCusker, Brian Spector, Michael Scott
-
Patent number: 9641333Abstract: There is disclosed a method of authenticating a client computing device to a server, the client computing device and the server both parties to a common authentication approach, the client computing device including an encrypted identifier containing a secret, in which the client computing device cannot decrypt the encrypted identifier, in which the client computing device encrypts the encrypted identifier using the common authentication approach and sends the encrypted encrypted identifier to the server, and in which the server decrypts the encrypted encrypted identifier, using the common authentication approach and a server secret, so as to determine the secret. Related systems, servers, client computing devices, pairs of computer program products comprising a server program product and a client computing device program product, the server program product, or the client computing program product, are disclosed.Type: GrantFiled: July 28, 2016Date of Patent: May 2, 2017Assignee: MIRACL LTD.Inventors: Michael Scott, Brian Spector
-
Publication number: 20160359630Abstract: There is disclosed a method of authenticating a client computing device to a server, the client computing device and the server both parties to a common authentication approach, the client computing device including an encrypted identifier containing a secret, in which the client computing device cannot decrypt the encrypted identifier, in which the client computing device encrypts the encrypted identifier using the common authentication approach and sends the encrypted encrypted identifier to the server, and in which the server decrypts the encrypted encrypted identifier, using the common authentication approach and a server secret, so as to determine the secret. Related systems, servers, client computing devices, pairs of computer program products comprising a server program product and a client computing device program product, the server program product, or the client computing program product, are disclosed.Type: ApplicationFiled: July 28, 2016Publication date: December 8, 2016Inventors: Michael SCOTT, Brian SPECTOR
-
Publication number: 20150244525Abstract: A method in a first entity for authenticating itself to a second entity by proving to the second entity that it is in possession of a full secret without sending the full secret to the second entity, the method comprising: receiving in the first entity an input from a user, the full secret having been divided into at least a first factor and a second factor and the input relating to the second factor of the full secret; reconstructing in the first entity the full secret from at least the first factor and the input; and carrying out a calculation in the first entity using the reconstructed full secret and sending the results of the calculation to the second entity, wherein the results provide an input to a pairing calculation in the second entity.Type: ApplicationFiled: May 30, 2014Publication date: August 27, 2015Inventors: Kealan McCusker, Brian Spector, Michael Scott
-
Patent number: 9106644Abstract: A method in a first entity for authenticating itself to a second entity by proving to the second entity that it is in possession of a full secret without sending the full secret to the second entity, the method comprising: receiving in the first entity an input from a user, the full secret having been divided into at least a first factor and a second factor and the input relating to the second factor of the full secret; reconstructing in the first entity the full secret from at least the first factor and the input; and carrying out a calculation in the first entity using the reconstructed full secret and sending the results of the calculation to the second entity, wherein the results provide an input to a pairing calculation in the second entity. The second entity carries out the pairing calculation to determine whether the client is in possession of the secret. The first entity may be a client and the second entity may be a server.Type: GrantFiled: January 13, 2015Date of Patent: August 11, 2015Assignee: CERTIVOX LTD.Inventors: Kealan McCusker, Brian Spector, Michael Scott
-
Publication number: 20150124963Abstract: A method in a first entity for authenticating itself to a second entity by proving to the second entity that it is in possession of a full secret without sending the full secret to the second entity, the method comprising: receiving in the first entity an input from a user, the full secret having been divided into at least a first factor and a second factor and the input relating to the second factor of the full secret; reconstructing in the first entity the full secret from at least the first factor and the input; and carrying out a calculation in the first entity using the reconstructed full secret and sending the results of the calculation to the second entity, wherein the results provide an input to a pairing calculation in the second entity. The second entity carries out the pairing calculation to determine whether the client is in possession of the secret. The first entity may be a client and the second entity may be a server.Type: ApplicationFiled: January 13, 2015Publication date: May 7, 2015Inventors: Kealan MCCUSKER, Brian SPECTOR, Michael SCOTT
-
Patent number: 8971540Abstract: A method in a first entity for authenticating itself to a second entity by proving to the second entity that it is in possession of a full secret without sending the full secret to the second entity, the method comprising: receiving in the first entity an input from a user, the full secret having been divided into at least a first factor and a second factor and the input relating to the second factor of the full secret; reconstructing in the first entity the full secret from at least the first factor and the input; and carrying out a calculation in the first entity using the reconstructed full secret and sending the results of the calculation to the second entity, wherein the results provide an input to a pairing calculation in the second entity.Type: GrantFiled: July 23, 2014Date of Patent: March 3, 2015Assignee: Certivox Ltd.Inventors: Kealan McCusker, Brian Spector, Michael Scott
-
Publication number: 20140359290Abstract: A method in a first entity for authenticating itself to a second entity by proving to the second entity that it is in possession of a full secret without sending the full secret to the second entity, the method comprising: receiving in the first entity an input from a user, the full secret having been divided into at least a first factor and a second factor and the input relating to the second factor of the full secret; reconstructing in the first entity the full secret from at least the first factor and the input; and carrying out a calculation in the first entity using the reconstructed full secret and sending the results of the calculation to the second entity, wherein the results provide an input to a pairing calculation in the second entity.Type: ApplicationFiled: July 23, 2014Publication date: December 4, 2014Inventors: Kealan MCCUSKER, Brian SPECTOR, Michael SCOTT
-
Publication number: 20070055517Abstract: A method for verifying a person's identity in order to gain access to electronic data, a data network, a physical location, or enable a commercial transaction. A request for identity verification is processed over a data network and the system is initiated which (i) transmits a disposable pass phrase over a data network to the user, (ii) prompts the user to vocalize the disposable pass phrase, a pass phrase, and user id, (iii) compares the recited speech of the user to the stored voiceprint of the user, the stored pass phrase and id of the user, and the generated disposable pass phrase, then (iv) issues a token or signal that represents whether the user was verified or not.Type: ApplicationFiled: August 30, 2005Publication date: March 8, 2007Inventor: Brian Spector