Patents by Inventor Jesse Empey

Jesse Empey has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240348430
    Abstract: A computing device includes at least one processor configured to determine a retrieved secret share from each of at least two secret share storage devices or media that are retrieved from at least two of a plurality of shareholders. The at least one processor is also configured to determine whether each respective retrieved secret share is one of the plurality of secret shares that were generated based on whether the respective hash of the respective retrieved secret share matches any hash in the list of hashes of the plurality of secret shares within the metadata. The at least one processor is also configured to, in response to determining that each retrieved secret share is among the plurality of secret shares that were generated, attempt to reconstitute a secret using retrieved secret shares from the at least two secret share storage devices or media.
    Type: Application
    Filed: June 27, 2024
    Publication date: October 17, 2024
    Applicant: tZERO IP, LLC
    Inventors: Michael D. Ornelas, Jesse Empey, Brad Welker
  • Patent number: 12052347
    Abstract: A computing device includes at least one processor and at least one memory communicatively coupled to the at least one processor. The at least one processor is configured to determine a secret to be protected. The at least one processor is also configured to split the secret into a plurality of secret shares, at least a subset of which are required to reconstitute the secret. The at least one processor is also configured to transfer each secret share to a respective portable storage device or media for distribution to a respective shareholder. The at least one processor is also configured to generate metadata with at least a hash of each secret share, wherein the metadata is stored separate from the portable storage devices or media with the secret shares.
    Type: Grant
    Filed: February 8, 2021
    Date of Patent: July 30, 2024
    Assignee: tZERO IP, LLC
    Inventors: Michael D. Ornelas, Jesse Empey, Brad Welker
  • Patent number: 11888975
    Abstract: A system includes processor(s) and memory(s). When encryption key(s) need to be generated to encrypt a key, processor(s): generate encryption key(s); encrypt key using encryption key(s) to generate encrypted key; split encrypted key and encryption key(s) into set(s) of key components, wherein subset of key components can be used to reconstruct encrypted key and encryption key(s); and erase key from memory(s). When encryption key(s) need to be used, processor(s): receive set(s) of key components from subset(s) of users that can be used to reconstruct encrypted key and encryption key(s) used to decrypt key from encrypted key; when set(s) of key components is received from subset(s) of users that can be used to reconstruct encrypted key and encrypted key(s), reconstruct encrypted key and encryption key(s); and when the encrypted key and the encryption key(s) have both been reconstructed, decrypt encrypted key into key using encryption key(s).
    Type: Grant
    Filed: October 11, 2021
    Date of Patent: January 30, 2024
    Assignee: tZERO IP, LLC
    Inventors: Tron Black, Denny Becker, Tyler Perkins, Joel Weight, Jesse Empey
  • Patent number: 11874803
    Abstract: Computer-implemented systems and methods for water asset management are disclosed. The systems include water data services components having computer implemented modules for generating a prompt for a user to input a water asset identification number, retrieving and returning water asset metadata in response to input of a valid water asset identification number, generating a prompt for user validation of the returned water asset metadata, storing validated water asset metadata; communicating the stored and validated water asset metadata to an interplanetary file system (IPFS) for generation of a water asset metadata hash value, and storage of the water asset metadata hash value in a cloud table. The systems also include a cloud big table component comprising modules for storing and updating the cloud table.
    Type: Grant
    Filed: November 4, 2021
    Date of Patent: January 16, 2024
    Assignee: Wetx Inc.
    Inventors: Tyler Dow, Eric Vogeler, Jesse Empey
  • Publication number: 20220138162
    Abstract: Computer-implemented systems and methods for water asset management are disclosed. The systems include water data services components having computer implemented modules for generating a prompt for a user to input a water asset identification number, retrieving and returning water asset metadata in response to input of a valid water asset identification number, generating a prompt for user validation of the returned water asset metadata, storing validated water asset metadata;, communicating the stored and validated water asset metadata to an interplanetary file system (IPFS) for generation of a water asset metadata hash value, and storage of the water asset metadata hash value in a cloud table. The systems also include a cloud big table component comprising modules for storing and updating the cloud table.
    Type: Application
    Filed: November 4, 2021
    Publication date: May 5, 2022
    Inventors: TYLER DOW, ERIC VOGELER, JESSE EMPEY
  • Publication number: 20220029791
    Abstract: A system includes processor(s) and memory(s). When encryption key(s) need to be generated to encrypt a key, processor(s): generate encryption key(s); encrypt key using encryption key(s) to generate encrypted key; split encrypted key and encryption key(s) into set(s) of key components, wherein subset of key components can be used to reconstruct encrypted key and encryption key(s); and erase key from memory(s). When encryption key(s) need to be used, processor(s): receive set(s) of key components from subset(s) of users that can be used to reconstruct encrypted key and encryption key(s) used to decrypt key from encrypted key; when set(s) of key components is received from subset(s) of users that can be used to reconstruct encrypted key and encrypted key(s), reconstruct encrypted key and encryption key(s); and when the encrypted key and the encryption key(s) have both been reconstructed, decrypt encrypted key into key using encryption key(s).
    Type: Application
    Filed: October 11, 2021
    Publication date: January 27, 2022
    Applicant: tZERO IP, LLC
    Inventors: Tron Black, Denny Becker, Tyler Perkins, Joel Weight, Jesse Empey
  • Patent number: 11146392
    Abstract: A system includes processor(s) and memory(s). When encryption key(s) need to be generated to encrypt a key, processor(s): securely generate encryption key(s); encrypt key using encryption key(s) to generate encrypted key; split encrypted key and encryption key(s) into set(s) of key components, wherein subset of key components can be used to reconstruct encrypted key and encryption key(s); and securely erase key from memory(s). When encryption key(s) need to be used, processor(s): receive set(s) of key components from subset(s) of users that can be used to reconstruct encrypted key and encryption key(s) used to securely decrypt key from encrypted key; when set(s) of key components is received from subset(s) of users that can be used to reconstruct encrypted key and encrypted key(s), securely reconstruct encrypted key and encryption key(s); and when the encrypted key and the encryption key(s) have both been reconstructed, securely decrypt encrypted key into key using encryption key(s).
    Type: Grant
    Filed: March 15, 2019
    Date of Patent: October 12, 2021
    Assignee: tZERO IP, LLC
    Inventors: Tron Black, Denny Becker, Tyler Perkins, Joel Weight, Jesse Empey
  • Publication number: 20210266150
    Abstract: A computing device includes at least one processor and at least one memory communicatively coupled to the at least one processor. The at least one processor is configured to determine a secret to be protected. The at least one processor is also configured to split the secret into a plurality of secret shares, at least a subset of which are required to reconstitute the secret. The at least one processor is also configured to transfer each secret share to a respective portable storage device or media for distribution to a respective shareholder. The at least one processor is also configured to generate metadata with at least a hash of each secret share, wherein the metadata is stored separate from the portable storage devices or media with the secret shares.
    Type: Application
    Filed: February 8, 2021
    Publication date: August 26, 2021
    Applicant: tZERO IP, LLC
    Inventors: Michael D. Ornelas, Jesse Empey, Brad Welker
  • Publication number: 20190288834
    Abstract: A system includes processor(s) and memory(s). When encryption key(s) need to be generated to encrypt a key, processor(s): securely generate encryption key(s); encrypt key using encryption key(s) to generate encrypted key; split encrypted key and encryption key(s) into set(s) of key components, wherein subset of key components can be used to reconstruct encrypted key and encryption key(s); and securely erase key from memory(s). When encryption key(s) need to be used, processor(s): receive set(s) of key components from subset(s) of users that can be used to reconstruct encrypted key and encryption key(s) used to securely decrypt key from encrypted key; when set(s) of key components is received from subset(s) of users that can be used to reconstruct encrypted key and encrypted key(s), securely reconstruct encrypted key and encryption key(s); and when the encrypted key and the encryption key(s) have both been reconstructed, securely decrypt encrypted key into key using encryption key(s).
    Type: Application
    Filed: March 15, 2019
    Publication date: September 19, 2019
    Applicant: Medici Ventures, Inc.
    Inventors: Tron Black, Denny Becker, Tyler Perkins, Joel Weight, Jesse Empey