Patents by Inventor Dan Boneh

Dan Boneh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240380599
    Abstract: Disclosed are aspects of an untrusted decentralized computing platform that includes an untrusted decentralized database which participant computing systems within the platform reach consensus on an accepted representation thereof. Some aspects of the databased include one or more directed acyclic graphs, which may include cryptographic hash pointers. Some aspects include an untrusted decentralized database architecture that includes two constituent chains. Some aspects of a consensus layer of the untrusted decentralized computing platform alternate a proof of space with a verifiable delay function to reduce compute resource waste relative to systems reliant on compute sources for proofs of work. In some aspects of a consensus layer alternating the proof-of-space and the proof-of-time, a single difficulty factors may be determined by multiplying their difficulty factors together to generate a single variable which accounts for difficulty for both proofs.
    Type: Application
    Filed: July 17, 2024
    Publication date: November 14, 2024
    Inventors: Dan Boneh, Krzysztof Pietrzak, Bram Cohen, Lipa Long, Richard Kiss, Alex Wice, Mariano Sorgente, Benedikt Bunz, Ben Fisch
  • Patent number: 12074976
    Abstract: Disclosed are aspects of an untrusted decentralized computing platform that includes an untrusted decentralized database which participant computing systems within the platform reach consensus on an accepted representation thereof. Some aspects of the databased include one or more directed acyclic graphs, which may include cryptographic hash pointers. Some aspects include an untrusted decentralized database architecture that includes two constituent chains. Some aspects of a consensus layer of the untrusted decentralized computing platform alternate a proof of space with a verifiable delay function to reduce compute resource waste relative to systems reliant on compute sources for proofs of work. In some aspects of a consensus layer alternating the proof-of-space and the proof-of-time, a single difficulty factors may be determined by multiplying their difficulty factors together to generate a single variable which accounts for difficulty for both proofs.
    Type: Grant
    Filed: March 1, 2023
    Date of Patent: August 27, 2024
    Assignee: Chia Network Inc.
    Inventors: Dan Boneh, Krzysztof Pietrzak, Bram Cohen, Lipa Long, Richard Kiss, Alex Wice, Mariano Sorgente, Benedikt Bunz, Ben Fisch
  • Publication number: 20240095728
    Abstract: Blockchain-based, smart contract platforms have great promise to remove trust and add transparency to distributed applications. However, this benefit often comes at the cost of greatly reduced privacy. Techniques for implementing a privacy-preserving smart contract is described. The system can keep accounts private while not losing functionality and with only a limited performance overhead. This is achieved by building a confidential and anonymous token on top of a cryptocurrency. Multiple complex applications can also be built using the smart contract system.
    Type: Application
    Filed: November 20, 2023
    Publication date: March 21, 2024
    Applicants: VISA INTERNATIONAL SERVICE ASSOCIATIN, The Board of Trustees of the Leland Stanford Junior University
    Inventors: Shashank Agrawal, Karl Benedikt Bünz, Mahdi Zamani, Dan Boneh
  • Patent number: 11861606
    Abstract: Blockchain-based, smart contract platforms have great promise to remove trust and add transparency to distributed applications. However, this benefit often comes at the cost of greatly reduced privacy. Techniques for implementing a privacy-preserving smart contract is described. The system can keep accounts private while not losing functionality and with only a limited performance overhead. This is achieved by building a confidential and anonymous token on top of a cryptocurrency. Multiple complex applications can also be built using the smart contract system.
    Type: Grant
    Filed: January 7, 2022
    Date of Patent: January 2, 2024
    Assignees: Visa International Service Association, THE BOARD OF TRUSTEES OF THE LELAND STANFORD JUNIOR UNIVERSITY
    Inventors: Shashank Agrawal, Karl Benedikt Bünz, Mahdi Zamani, Dan Boneh
  • Publication number: 20230283474
    Abstract: Disclosed are aspects of an untrusted decentralized computing platform that includes an untrusted decentralized database which participant computing systems within the platform reach consensus on an accepted representation thereof. Some aspects of the databased include one or more directed acyclic graphs, which may include cryptographic hash pointers. Some aspects include an untrusted decentralized database architecture that includes two constituent chains. Some aspects of a consensus layer of the untrusted decentralized computing platform alternate a proof of space with a verifiable delay function to reduce compute resource waste relative to systems reliant on compute sources for proofs of work. In some aspects of a consensus layer alternating the proof-of-space and the proof-of-time, a single difficulty factors may be determined by multiplying their difficulty factors together to generate a single variable which accounts for difficulty for both proofs.
    Type: Application
    Filed: March 1, 2023
    Publication date: September 7, 2023
    Inventors: Dan Boneh, Krzysztof Pietrzak, Bram Cohen, Lipa Long, Richard Kiss, Alex Wice, Mariano Sorgente, Benedikt Bunz, Ben Fisch
  • Patent number: 11677556
    Abstract: Disclosed are aspects of an untrusted decentralized computing platform that includes an untrusted decentralized database which participant computing systems within the platform reach consensus on an accepted representation thereof. Some aspects of the databased include one or more directed acyclic graphs, which may include cryptographic hash pointers. Some aspects include an untrusted decentralized database architecture that includes two constituent chains. Some aspects of a consensus layer of the untrusted decentralized computing platform alternate a proof of space with a verifiable delay function to reduce compute resource waste relative to systems reliant on compute sources for proofs of work. In some aspects of a consensus layer alternating the proof-of-space and the proof-of-time, a single difficulty factors may be determined by multiplying their difficulty factors together to generate a single variable which accounts for difficulty for both proofs.
    Type: Grant
    Filed: October 5, 2021
    Date of Patent: June 13, 2023
    Assignee: Chia Network Inc.
    Inventors: Dan Boneh, Krzysztof Pietrzak, Bram Cohen, Lipa Long, Richard Kiss, Alex Wice, Mariano Sorgente, Benedikt Bunz, Ben Fisch
  • Patent number: 11621847
    Abstract: Disclosed are aspects of an untrusted decentralized computing platform that includes an untrusted decentralized database which participant computing systems within the platform reach consensus on an accepted representation thereof. Some aspects of the databased include one or more directed acyclic graphs, which may include cryptographic hash pointers. Some aspects include an untrusted decentralized database architecture that includes two constituent chains. Some aspects of a consensus layer of the untrusted decentralized computing platform alternate a proof of space with a verifiable delay function to reduce compute resource waste relative to systems reliant on compute sources for proofs of work. In some aspects of a consensus layer alternating the proof-of-space and the proof-of-time, a single difficulty factors may be determined by multiplying their difficulty factors together to generate a single variable which accounts for difficulty for both proofs.
    Type: Grant
    Filed: September 29, 2021
    Date of Patent: April 4, 2023
    Assignee: Chia Network Inc.
    Inventors: Dan Boneh, Krzysztof Pietrzak, Bram Cohen, Lipa Long, Richard Kiss, Alex Wice, Mariano Sorgente, Benedikt Bunz, Ben Fisch
  • Publication number: 20220129884
    Abstract: Blockchain-based, smart contract platforms have great promise to remove trust and add transparency to distributed applications. However, this benefit often comes at the cost of greatly reduced privacy. Techniques for implementing a privacy-preserving smart contract is described. The system can keep accounts private while not losing functionality and with only a limited performance overhead. This is achieved by building a confidential and anonymous token on top of a cryptocurrency. Multiple complex applications can also be built using the smart contract system.
    Type: Application
    Filed: January 7, 2022
    Publication date: April 28, 2022
    Inventors: Shashank Agrawal, Karl Benedikt Bünz, Mahdi Zamani, Dan Boneh
  • Patent number: 11257077
    Abstract: Blockchain-based, smart contract platforms have great promise to remove trust and add transparency to distributed applications. However, this benefit often comes at the cost of greatly reduced privacy. Techniques for implementing a privacy-preserving smart contract is described. The system can keep accounts private while not losing functionality and with only a limited performance overhead. This is achieved by building a confidential and anonymous token on top of a cryptocurrency. Multiple complex applications can also be built using the smart contract system.
    Type: Grant
    Filed: November 30, 2018
    Date of Patent: February 22, 2022
    Assignees: Visa International Service Association, The Board of Trustees of the Leland Stanford Junior University
    Inventors: Shashank Agrawal, Karl Benedikt Bünz, Mahdi Zamani, Dan Boneh
  • Publication number: 20220045860
    Abstract: Disclosed are aspects of an untrusted decentralized computing platform that includes an untrusted decentralized database which participant computing systems within the platform reach consensus on an accepted representation thereof. Some aspects of the databased include one or more directed acyclic graphs, which may include cryptographic hash pointers. Some aspects include an untrusted decentralized database architecture that includes two constituent chains. Some aspects of a consensus layer of the untrusted decentralized computing platform alternate a proof of space with a verifiable delay function to reduce compute resource waste relative to systems reliant on compute sources for proofs of work. In some aspects of a consensus layer alternating the proof-of-space and the proof-of-time, a single difficulty factors may be determined by multiplying their difficulty factors together to generate a single variable which accounts for difficulty for both proofs.
    Type: Application
    Filed: October 5, 2021
    Publication date: February 10, 2022
    Inventors: Dan Boneh, Krzysztof Pietrzak, Bram Cohen, Lipa Long, Richard Kiss, Alex Wice, Mariano Sorgente, Benedikt Bunz, Ben Fisch
  • Publication number: 20220029811
    Abstract: Disclosed are aspects of an untrusted decentralized computing platform that includes an untrusted decentralized database which participant computing systems within the platform reach consensus on an accepted representation thereof. Some aspects of the databased include one or more directed acyclic graphs, which may include cryptographic hash pointers. Some aspects include an untrusted decentralized database architecture that includes two constituent chains. Some aspects of a consensus layer of the untrusted decentralized computing platform alternate a proof of space with a verifiable delay function to reduce compute resource waste relative to systems reliant on compute sources for proofs of work. In some aspects of a consensus layer alternating the proof-of-space and the proof-of-time, a single difficulty factors may be determined by multiplying their difficulty factors together to generate a single variable which accounts for difficulty for both proofs.
    Type: Application
    Filed: September 29, 2021
    Publication date: January 27, 2022
    Inventors: Dan Boneh, Krzysztof Pietrzak, Bram Cohen, Lipa Long, Richard Kiss, Alex Wice, Mariano Sorgente, Benedikt Bunz, Ben Fisch
  • Patent number: 11165582
    Abstract: Disclosed are aspects of an untrusted decentralized computing platform that includes an untrusted decentralized database which participant computing systems within the platform reach consensus on an accepted representation thereof. Some aspects of the databased include one or more directed acyclic graphs, which may include cryptographic hash pointers. Some aspects include an untrusted decentralized database architecture that includes two constituent chains. Some aspects of a consensus layer of the untrusted decentralized computing platform alternate a proof of space with a verifiable delay function to reduce compute resource waste relative to systems reliant on compute sources for proofs of work. In some aspects of a consensus layer alternating the proof-of-space and the proof-of-time, a single difficulty factors may be determined by multiplying their difficulty factors together to generate a single variable which accounts for difficulty for both proofs.
    Type: Grant
    Filed: May 13, 2020
    Date of Patent: November 2, 2021
    Assignee: Chia Network Inc.
    Inventors: Dan Boneh, Krzysztof Pietrzak, Bram Cohen, Lipa Long, Richard Kiss, Alex Wice, Mariano Sorgente, Benedikt Bunz, Ben Fisch
  • Publication number: 20200389312
    Abstract: Disclosed are aspects of an untrusted decentralized computing platform that includes an untrusted decentralized database which participant computing systems within the platform reach consensus on an accepted representation thereof. Some aspects of the databased include one or more directed acyclic graphs, which may include cryptographic hash pointers. Some aspects include an untrusted decentralized database architecture that includes two constituent chains. Some aspects of a consensus layer of the untrusted decentralized computing platform alternate a proof of space with a verifiable delay function to reduce compute resource waste relative to systems reliant on compute sources for proofs of work. In some aspects of a consensus layer alternating the proof-of-space and the proof-of-time, a single difficulty factors may be determined by multiplying their difficulty factors together to generate a single variable which accounts for difficulty for both proofs.
    Type: Application
    Filed: May 13, 2020
    Publication date: December 10, 2020
    Inventors: Dan Boneh, Krzysztof Pietrzak, Bram Cohen, Lipa Long, Richard Kiss, Alex Wice, Mariano Sorgente, Benedikt Bunz, Ben Fisch
  • Publication number: 20190164153
    Abstract: Blockchain-based, smart contract platforms have great promise to remove trust and add transparency to distributed applications. However, this benefit often comes at the cost of greatly reduced privacy. Techniques for implementing a privacy-preserving smart contract is described. The system can keep accounts private while not losing functionality and with only a limited performance overhead. This is achieved by building a confidential and anonymous token on top of a cryptocurrency. Multiple complex applications can also be built using the smart contract system.
    Type: Application
    Filed: November 30, 2018
    Publication date: May 30, 2019
    Inventors: Shashank Agrawal, Karl Benedikt Bünz, Mahdi Zamani, Dan Boneh
  • Patent number: 10169253
    Abstract: A virtual-machine-based system that may protect the privacy and integrity of application data, even in the event of a total operating system compromise. An application is presented with a normal view of its resources, but the operating system is presented with an encrypted view. This allows the operating system to carry out the complex task of managing an application's resources, without allowing it to read or modify them. Different views of “physical” memory are presented, depending on a context performing the access. An additional dimension of protection beyond the hierarchical protection domains implemented by traditional operating systems and processors is provided.
    Type: Grant
    Filed: August 21, 2017
    Date of Patent: January 1, 2019
    Inventors: Xiaoxin Chen, Carl A. Waldspurger, Pratap Subrahmanyam, Tal Garfinkel, Dan Boneh
  • Publication number: 20170344496
    Abstract: A virtual-machine-based system that may protect the privacy and integrity of application data, even in the event of a total operating system compromise. An application is presented with a normal view of its resources, but the operating system is presented with an encrypted view. This allows the operating system to carry out the complex task of managing an application's resources, without allowing it to read or modify them. Different views of “physical” memory are presented, depending on a context performing the access. An additional dimension of protection beyond the hierarchical protection domains implemented by traditional operating systems and processors is provided.
    Type: Application
    Filed: August 21, 2017
    Publication date: November 30, 2017
    Inventors: Xiaoxin CHEN, Carl A. WALDSPURGER, Pratap SUBRAHMANYAM, Tal GARFINKEL, Dan BONEH
  • Patent number: 9740637
    Abstract: A virtual-machine-based system that may protect the privacy and integrity of application data, even in the event of a total operating system compromise. An application is presented with a normal view of its resources, but the operating system is presented with an encrypted view. This allows the operating system to carry out the complex task of managing an application's resources, without allowing it to read or modify them. Different views of “physical” memory are presented, depending on a context performing the access. An additional dimension of protection beyond the hierarchical protection domains implemented by traditional operating systems and processors is provided.
    Type: Grant
    Filed: October 8, 2013
    Date of Patent: August 22, 2017
    Assignee: VMware, Inc.
    Inventors: Xiaoxin Chen, Carl A. Waldspurger, Pratap Subrahmanyam, Tal Garfinkel, Dan Boneh
  • Publication number: 20170185531
    Abstract: A virtual-machine-based system that may protect the privacy and integrity of application data, even in the event of a total operating system compromise. An application is presented with a normal view of its resources, but the operating system is presented with an encrypted view. This allows the operating system to carry out the complex task of managing an application's resources, without allowing it to read or modify them. Different views of “physical” memory are presented, depending on a context performing the access. An additional dimension of protection beyond the hierarchical protection domains implemented by traditional operating systems and processors is provided.
    Type: Application
    Filed: October 8, 2013
    Publication date: June 29, 2017
    Applicant: VMware, Inc.
    Inventors: Xiaoxin CHEN, Carl A. WALDSPURGER, Pratap SUBRAHMANYAM, Tal GARFINKEL, Dan BONEH
  • Patent number: 9646306
    Abstract: A method for encrypting a passcode is disclosed. In one embodiment, the method includes: receiving an indication of a portion of the passcode from a user; encoding the portion of the passcode; encrypting the encoded portion into ciphertext using a homomorphic encryption system; updating a cumulative encryption string by executing a cumulative operation to aggregate the ciphertext corresponding to the encoded portion into the cumulative encryption string computed for a previous portion of the passcode, wherein the cumulative operation is dictated by a homomorphic property of the homomorphic encryption system; and generating a passcode message based at least in part on the cumulative encryption string, wherein the passcode message includes a message authentication code.
    Type: Grant
    Filed: March 13, 2014
    Date of Patent: May 9, 2017
    Assignee: SQUARE, INC.
    Inventors: Oliver S. C. Quigley, Jason Douglas Waddle, Benjamin Michael Adida, Max Joseph Guise, Dan Boneh
  • Patent number: 9356779
    Abstract: A method and system for encrypting a first piece of information M to be sent by a sender [100] to a receiver [110] allows both sender and receiver to compute a secret message key using identity-based information and a bilinear map. The sender uses a bilinear map to encrypt a message M, producing ciphertext V to be sent from the sender [100] to the receiver [110]. The receiver [110] uses the bilinear map to decrypt V and recover the original message M. According to one embodiment, the bilinear map is based on a Weil pairing or a Tate pairing defined on a subgroup of an elliptic curve. Also described are several applications of the techniques, including key revocation, credential management, and return receipt notification.
    Type: Grant
    Filed: February 8, 2012
    Date of Patent: May 31, 2016
    Assignees: The Board of Trustees of the Leland Stanford Junior University, The Regents of the University of California
    Inventors: Dan Boneh, Matthew Franklin