Patents by Inventor David William Kravitz
David William Kravitz has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11646897Abstract: A coordinating network element manages a protocol that makes attestations of off-platform-resolved data and decisions available for use on a blockchain platform or on another decentralized-execution-based platform operational within a multi-tenant environment. By one approach, these teachings provide for off-platform-verified data pertaining to individual-, group- or machine-based users to be blinded from access by the coordinating network element and by the platform while utilizing a tokenized form of such data to enable user-initiated queries that involve solely on-platform vetting of users as a condition of fulfilling user requests for service.Type: GrantFiled: February 18, 2022Date of Patent: May 9, 2023Assignee: Springcoin, Inc.Inventors: David William Kravitz, Fabrice Cheng, Matthew Benjamin Smith, Mollie Zechlin Halverson
-
Patent number: 11637817Abstract: A coordinating network element manages a protocol that prohibits the coordinating network element from substantively accessing data content that, at least in part, underlies received protocol-compliant requests. By one approach, these teachings provide for preventing substantive access to data information that is included within the protocol-compliant request in tokenized form, wherein the tokens are generated using secrets, at least one of which is unavailable to the coordinating network element.Type: GrantFiled: June 3, 2022Date of Patent: April 25, 2023Assignee: Springcoin, Inc.Inventors: David William Kravitz, Mollie Zechlin Halverson, Matthew Benjamin Smith
-
Publication number: 20230075354Abstract: A protocol that is managed by a coordinating network element or third-party intermediary or peer network elements and utilizes tokens prohibits any subset of a union of the coordinating network element or third-party intermediary, if any, and a proper subset of the processors involved in token generation from substantively accessing underlying data. By one approach, processors utilize uniquely-held secrets. By one approach, an audit capability involves a plurality of processors. By one approach, the protocol enables data transference and/or corroboration. By one approach, transferred data is hosted independently of the coordinating network element. By one approach, the coordinating network element or third-party intermediary or a second requesting network element is at least partially blinded from access to tokens submitted by a first requesting network element. By one approach, a third-party intermediary uses a single- or consortium-sourced database.Type: ApplicationFiled: July 21, 2022Publication date: March 9, 2023Inventors: David William Kravitz, Mollie Zechlin Halverson, Matthew Benjamin Smith
-
Patent number: 11595365Abstract: A protocol that is managed by a coordinating network element or third-party intermediary or peer network elements and utilizes tokens prohibits any subset of a union of the coordinating network element or third-party intermediary, if any, and a proper subset of the processors involved in token generation from substantively accessing underlying data. By one approach, processors utilize uniquely-held secrets. By one approach, an audit capability involves a plurality of processors. By one approach, the protocol enables data transference and/or corroboration. By one approach, transferred data is hosted independently of the coordinating network element. By one approach, the coordinating network element or third-party intermediary or a second requesting network element is at least partially blinded from access to tokens submitted by a first requesting network element. By one approach, a third-party intermediary uses a single- or consortium-sourced database.Type: GrantFiled: July 21, 2022Date of Patent: February 28, 2023Assignee: Springcoin, Inc.Inventors: David William Kravitz, Mollie Zechlin Halverson, Matthew Benjamin Smith
-
Publication number: 20220417038Abstract: Method for authenticating a first and a second electronic devices associated through a communication line includes: creating a unique ID, by a third electronic device; transmitting the unique ID to the first electronic device; signing the transmitted unique ID by the first electronic device; transmitting the signed unique ID to the second electronic device, by the first electronic device; signing the transmitted signed unique ID by the second electronic device; transmitting the unique ID signed by the first and second electronic devices to the third electronic device; verifying and accepting the unique ID signed by the first device and the second device, by the third device; issuing a certificate for a secure communication line between the first electronic device and the second electronic device; and transmitting the certificate to the first electronic device and the second electronic device.Type: ApplicationFiled: August 26, 2022Publication date: December 29, 2022Inventors: David William Kravitz, Donald Houston Graham, III, Josselyn Lee Boudett, Russell S. Dietz, James Jones, Jamie Lynn Juarez
-
Publication number: 20220385477Abstract: A coordinating network element manages a protocol that makes attestations of off-platform-resolved data and decisions available for use on a blockchain platform or on another decentralized-execution-based platform operational within a multi-tenant environment. By one approach, these teachings provide for off-platform-verified data pertaining to individual-, group- or machine-based users to be blinded from access by the coordinating network element and by the platform while utilizing a tokenized form of such data to enable user-initiated queries that involve solely on-platform vetting of users as a condition of fulfilling user requests for service.Type: ApplicationFiled: February 18, 2022Publication date: December 1, 2022Inventors: David William Kravitz, Fabrice Cheng, Matthew Benjamin Smith, Mollie Zechlin Halverson
-
Publication number: 20220385642Abstract: A coordinating network element manages a protocol that prohibits the coordinating network element from substantively accessing data content that, at least in part, underlies received protocol-compliant requests. By one approach, these teachings provide for preventing substantive access to data information that is included within the protocol-compliant request in tokenized form, wherein the tokens are generated using secrets, at least one of which is unavailable to the coordinating network element.Type: ApplicationFiled: June 3, 2022Publication date: December 1, 2022Inventors: David William Kravitz, Mollie Zechlin Halverson, Matthew Benjamin Smith
-
Patent number: 11456882Abstract: Method for authenticating a first and a second electronic devices associated through a communication line includes: creating a unique ID, by a third electronic device; transmitting the unique ID to the first electronic device; signing the transmitted unique ID by the first electronic device; transmitting the signed unique ID to the second electronic device, by the first electronic device; signing the transmitted signed unique ID by the second electronic device; transmitting the unique ID signed by the first and second electronic devices to the third electronic device; verifying and accepting the unique ID signed by the first device and the second device, by the third device; issuing a certificate for a secure communication line between the first electronic device and the second electronic device; and transmitting the certificate to the first electronic device and the second electronic device.Type: GrantFiled: May 11, 2020Date of Patent: September 27, 2022Assignee: T-CENTRAL, INC.Inventors: David William Kravitz, Donald Houston Graham, III, Josselyn Lee Boudett, Russell S. Dietz, James Jones, Jamie Lynn Juarez
-
Patent number: 11425107Abstract: A protocol that is managed by a coordinating network element or third-party intermediary or peer network elements and utilizes tokens prohibits any subset of a union of the coordinating network element or third-party intermediary, if any, and a proper subset of the processors involved in token generation from substantively accessing underlying data. By one approach, processors utilize uniquely-held secrets. By one approach, an audit capability involves a plurality of processors. By one approach, the protocol enables data transference and/or corroboration. By one approach, transferred data is hosted independently of the coordinating network element. By one approach, the coordinating network element or third-party intermediary or a second requesting network element is at least partially blinded from access to tokens submitted by a first requesting network element. By one approach, a third-party intermediary uses a single- or consortium-sourced database.Type: GrantFiled: September 9, 2021Date of Patent: August 23, 2022Assignee: SPRINGCOIN, INC.Inventors: David William Kravitz, Mollie Zechlin Halverson, Matthew Benjamin Smith, Christopher Daniel Neckar
-
Patent number: 11405365Abstract: A third-party intermediary manages a protocol that prohibits the third-party intermediary from substantively accessing data content that, at least in part, underlies received protocol-compliant requests. By one approach, these teachings provide for preventing substantive access to data information that is included within the protocol-compliant request as one or more functions of data, parts of which data may be in tokenized or untokenized form, wherein the values of the functions are generated using secrets, at least one of which is unavailable to the third-party intermediary. By one approach, tokens comprised of data in tokenized form are generated using secrets, at least one of which is unavailable to the third-party intermediary.Type: GrantFiled: August 6, 2021Date of Patent: August 2, 2022Assignee: SPRINGCOIN, INC.Inventors: David William Kravitz, Matthew Benjamin Smith, Mollie Johanna Zechlin
-
Patent number: 11374910Abstract: A coordinating network element manages a protocol that prohibits the coordinating network element from substantively accessing data content that, at least in part, underlies received protocol-compliant requests. By one approach, these teachings provide for preventing substantive access to data information that is included within the protocol-compliant request in tokenized form, wherein the tokens are generated using secrets, at least one of which is unavailable to the coordinating network element.Type: GrantFiled: March 12, 2020Date of Patent: June 28, 2022Assignee: SPRINGCOIN, INC.Inventors: David William Kravitz, Mollie Johanna Zechlin, Matthew Benjamin Smith, Fabrice Cheng, John Sun, Robert Zbigniew Krzyzanowski, Ashwini Rao
-
Publication number: 20220078170Abstract: A protocol that is managed by a coordinating network element or third-party intermediary or peer network elements and utilizes tokens prohibits any subset of a union of the coordinating network element or third-party intermediary, if any, and a proper subset of the processors involved in token generation from substantively accessing underlying data. By one approach, processors utilize uniquely-held secrets. By one approach, an audit capability involves a plurality of processors. By one approach, the protocol enables data transference and/or corroboration. By one approach, transferred data is hosted independently of the coordinating network element. By one approach, the coordinating network element or third-party intermediary or a second requesting network element is at least partially blinded from access to tokens submitted by a first requesting network element. By one approach, a third-party intermediary uses a single- or consortium-sourced database.Type: ApplicationFiled: September 9, 2021Publication date: March 10, 2022Inventors: David William Kravitz, Mollie Jechlin Halverson, Matthew Benjamin Smith, Christopher Daniel Neckar
-
Publication number: 20220029969Abstract: A third-party intermediary manages a protocol that prohibits the third-party intermediary from substantively accessing data content that, at least in part, underlies received protocol-compliant requests. By one approach, these teachings provide for preventing substantive access to data information that is included within the protocol-compliant request as one or more functions of data, parts of which data may be in tokenized or untokenized form, wherein the values of the functions are generated using secrets, at least one of which is unavailable to the third-party intermediary. By one approach, tokens comprised of data in tokenized form are generated using secrets, at least one of which is unavailable to the third-party intermediary.Type: ApplicationFiled: August 6, 2021Publication date: January 27, 2022Inventors: David William Kravitz, Matthew Benjamin Smith, Mollie Johanna Zechlin
-
Patent number: 10944575Abstract: Methods, systems, and computer programs for using an implicit certificate are disclosed. In some aspects, a message and an implicit certificate are accessed. The implicit certificate is associated with an entity. A modified message is generated by combining the message with a value based on the implicit certificate. A digital signature can be generated based on the modified message and transmitted to a recipient. In some aspects, a digital signature from an entity and a message to be verified based on the digital signature are accessed. An implicit certificate associated with the entity is accessed. A modified message is generated by combining the message with a value based on the implicit certificate. The message is verified based on the digital signature and the modified message.Type: GrantFiled: May 8, 2020Date of Patent: March 9, 2021Assignee: BlackBerry LimitedInventors: Gregory Marc Zaverucha, David William Kravitz, Daniel Richard L. Brown
-
Publication number: 20200336470Abstract: A coordinating network element manages a protocol that prohibits the coordinating network element from substantively accessing data content that, at least in part, underlies received protocol-compliant requests. By one approach, these teachings provide for preventing substantive access to data information that is included within the protocol-compliant request in tokenized form, wherein the tokens are generated using secrets, at least one of which is unavailable to the coordinating network element.Type: ApplicationFiled: March 12, 2020Publication date: October 22, 2020Inventors: David William Kravitz, Mollie Johanna Zechlin, Matthew Benjamin Smith, Fabrice Cheng, John Sun, Robert Zbigniew Krzyzanowski, Ashwini Rao
-
Publication number: 20200304318Abstract: Method for authenticating a first and a second electronic devices associated through a communication line includes: creating a unique ID, by a third electronic device; transmitting the unique ID to the first electronic device; signing the transmitted unique ID by the first electronic device; transmitting the signed unique ID to the second electronic device, by the first electronic device; signing the transmitted signed unique ID by the second electronic device; transmitting the unique ID signed by the first and second electronic devices to the third electronic device; verifying and accepting the unique ID signed by the first device and the second device, by the third device; issuing a certificate for a secure communication line between the first electronic device and the second electronic device; and transmitting the certificate to the first electronic device and the second electronic device.Type: ApplicationFiled: May 11, 2020Publication date: September 24, 2020Inventors: David William Kravitz, Donald Houston Graham, III, Josselyn Lori Boudett, Russell S. Dietz, James Jones, Jamie Lynn Juarez
-
Publication number: 20200304316Abstract: Methods, systems, and computer programs for using an implicit certificate are disclosed. In some aspects, a message and an implicit certificate are accessed. The implicit certificate is associated with an entity. A modified message is generated by combining the message with a value based on the implicit certificate. A digital signature can be generated based on the modified message and transmitted to a recipient. In some aspects, a digital signature from an entity and a message to be verified based on the digital signature are accessed. An implicit certificate associated with the entity is accessed. A modified message is generated by combining the message with a value based on the implicit certificate. The message is verified based on the digital signature and the modified message.Type: ApplicationFiled: May 8, 2020Publication date: September 24, 2020Applicant: BlackBerry LimitedInventors: Gregory Marc ZAVERUCHA, David William KRAVITZ, Daniel Richard L. BROWN
-
Patent number: 10652026Abstract: In some aspects, a message and an implicit certificate are accessed. The implicit certificate is associated with an entity. A modified message is generated by combining the message with a value based on the implicit certificate. A digital signature can be generated based on the modified message and transmitted to a recipient. In some aspects, a digital signature from an entity and a message to be verified based on the digital signature are accessed. An implicit certificate associated with the entity is accessed. A modified message is generated by combining the message with a value based on the implicit certificate. The message is verified based on the digital signature and the modified message.Type: GrantFiled: October 3, 2018Date of Patent: May 12, 2020Assignee: BlackBerry LimitedInventors: Gregory Marc Zaverucha, David William Kravitz, Daniel Richard L. Brown
-
Patent number: 10644875Abstract: One embodiment provides a method for pre-authorizing public key infrastructure communication between entities, the method comprising: utilizing at least one processor to execute computer code that performs the steps of: determining if pre-authorization is required from a remote device to establish a communication channel between a first entity and a second entity; establishing a shared secret value between the first entity and the remote device; receiving, at the second entity, from the remote device, proof of pre-authorization, thereby pre-authorizing communication between the first and second entity, wherein the pre-authorization is based on the shared secret value; and storing the proof of pre-authorization for any subsequent communication with the first entity. Other aspects are described and claimed.Type: GrantFiled: April 28, 2016Date of Patent: May 5, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: David William Kravitz
-
Publication number: 20200028694Abstract: Methods, systems, and computer programs for using an implicit certificate are disclosed. In some aspects, a message and an implicit certificate are accessed. The implicit certificate is associated with an entity. A modified message is generated by combining the message with a value based on the implicit certificate. A digital signature can be generated based on the modified message and transmitted to a recipient. In some aspects, a digital signature from an entity and a message to be verified based on the digital signature are accessed. An implicit certificate associated with the entity is accessed. A modified message is generated by combining the message with a value based on the implicit certificate. The message is verified based on the digital signature and the modified message.Type: ApplicationFiled: October 3, 2018Publication date: January 23, 2020Applicant: Certicom Corp.Inventors: Gregory Marc ZAVERUCHA, David William KRAVITZ, Daniel Richard L. BROWN