Patents by Inventor Marek Olszewski
Marek Olszewski has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240264983Abstract: Systems and techniques are provided for a decentralized database associating public keys and communications addresses. A signed secret message may be sent by a validator computing device of a peer-to-peer network for a decentralized database to a communications address from a request for verification entry in a verification queue of the decentralized database. A second request for verification including the communications address and a user-signed secret message may be received. The user-signed secret message may be verified using a public key from the request for verification entry in the verification queue. The communications address and public key may be written to a verified database of the decentralized database when verifying the user-signed secret message causes a number of user-signed secret messages received in requests for verification with the communications address and successfully verified to meet a threshold number.Type: ApplicationFiled: February 13, 2024Publication date: August 8, 2024Inventors: Rene Reinsberg, Sepandar Kamvar, Marek Olszewski
-
Publication number: 20240097910Abstract: Systems and techniques are provided for a tree structure for byzantine fault tolerance. A validator computing device may receive a candidate block from a block producer. The block producer may be a second validator computing device of the distributed network. The validator computing device may determine whether or not the candidate block is valid. The validator computing device may sign an indication of whether or not the candidate block is valid to generate a signature. The validator computing device may send the signature to a third validator computing device that is a sibling node to the validator computing device. The validator computing device may receive a second signature from the third validator computing device. The validator computing device may combine the signature and the second signature to generate a combine signature if the signature and the second signature agree.Type: ApplicationFiled: March 20, 2023Publication date: March 21, 2024Inventors: Jason Ansel, Marek Olszewski
-
Patent number: 11899629Abstract: Systems and techniques are provided for a decentralized database associating public keys and communications addresses. A signed secret message may be sent by a validator computing device of a peer-to-peer network for a decentralized database to a communications address from a request for verification entry in a verification queue of the decentralized database. A second request for verification including the communications address and a user-signed secret message may be received. The user-signed secret message may be verified using a public key from the request for verification entry in the verification queue. The communications address and public key may be written to a verified database of the decentralized database when verifying the user-signed secret message causes a number of user-signed secret messages received in requests for verification with the communications address and successfully verified to meet a threshold number.Type: GrantFiled: August 2, 2021Date of Patent: February 13, 2024Assignee: CELO FOUNDATIONInventors: Rene Reinsberg, Sepandar Kamvar, Marek Olszewski
-
Publication number: 20230153276Abstract: Systems and techniques are provided for a decentralized database associating public keys and communications addresses. A signed secret message may be sent by a validator computing device of a peer-to-peer network for a decentralized database to a communications address from a request for verification entry in a verification queue of the decentralized database. A second request for verification including the communications address and a user-signed secret message may be received. The user-signed secret message may be verified using a public key from the request for verification entry in the verification queue. The communications address and public key may be written to a verified database of the decentralized database when verifying the user-signed secret message causes a number of user-signed secret messages received in requests for verification with the communications address and successfully verified to meet a threshold number.Type: ApplicationFiled: August 2, 2021Publication date: May 18, 2023Inventors: Rene Reinsberg, Sepandar Kamvar, Marek Olszewski
-
Patent number: 11611439Abstract: Systems and techniques are provided for a tree structure for byzantine fault tolerance. A validator computing device may receive a candidate block from a block producer. The block producer may be a second validator computing device of the distributed network. The validator computing device may determine whether or not the candidate block is valid. The validator computing device may sign an indication of whether or not the candidate block is valid to generate a signature. The validator computing device may send the signature to a third validator computing device that is a sibling node to the validator computing device. The validator computing device may receive a second signature from the third validator computing device. The validator computing device may combine the signature and the second signature to generate a combine signature if the signature and the second signature agree.Type: GrantFiled: June 11, 2020Date of Patent: March 21, 2023Assignee: CELO FOUNDATIONInventors: Jason Ansel, Marek Olszewski
-
Patent number: 11140094Abstract: Systems and techniques are provided for a resource stabilization in a distributed network. A computing device in a distributed network may check the median value of a transactional resource in relation to a specified external resource. The computing device in the distributed network may compare the median value of the transactional resource to a threshold value for the transactional resource to determine whether the median value of the transactional resource is above the threshold value or below the threshold value. The supply of the transactional resource in the distributed network may be increased in response to determining that the transactional resource is above the threshold value or may be in response to determining that the transactional resource is below the threshold value.Type: GrantFiled: March 20, 2020Date of Patent: October 5, 2021Assignee: Celo FoundationInventors: Sepandar Kamvar, Marek Olszewski, Rene Reinsberg, Marcin Jerzy Chrzanowski, Asa Oines, Roman Croessmann, Markus Franke
-
Patent number: 11106767Abstract: Systems and techniques are provided for decentralized name verification using recursive attestation. A name and identifying information may be received at a computing device. The computing device may determine that there is a contact item that includes both the name and the identifying information in a contacts database stored on the computing device or accessible to the computing device. A positive attestation and an attestation score for an entity associated with the computing device may be sent to be used to generate an attestation score for the name and identifying information. The attestation score for the name and identifying information is used to determine whether to allow the creation of an account with the name. The attestation score for the entity associated with the computing device may be generated based a positive attestation from another computing device.Type: GrantFiled: December 11, 2018Date of Patent: August 31, 2021Assignee: CELO FOUNDATIONInventors: Rene Reinsberg, Sepandar Kamvar, Marek Olszewski
-
Patent number: 11080246Abstract: Systems and techniques are provided for a decentralized database associating public keys and communications addresses. A signed secret message may be sent by a validator computing device of a peer-to-peer network for a decentralized database to a communications address from a request for verification entry in a verification queue of the decentralized database. A second request for verification including the communications address and a user-signed secret message may be received. The user-signed secret message may be verified using a public key from the request for verification entry in the verification queue. The communications address and public key may be written to a verified database of the decentralized database when verifying the user-signed secret message causes a number of user-signed secret messages received in requests for verification with the communications address and successfully verified to meet a threshold number.Type: GrantFiled: December 11, 2018Date of Patent: August 3, 2021Assignee: CELO FOUNDATIONInventors: Rene Reinsberg, Sepandar Kamvar, Marek Olszewski
-
Patent number: 11018989Abstract: Systems and techniques are provided for a resource stabilization in a distributed network. A computing device in a distributed network may check the median value of a transactional resource in relation to a specified external resource. The computing device in the distributed network may compare the median value of the transactional resource to a threshold value for the transactional resource to determine whether the median value of the transactional resource is above the threshold value or below the threshold value. The supply of the transactional resource in the distributed network may be increased in response to determining that the transactional resource is above the threshold value or may be in response to determining that the transactional resource is below the threshold value.Type: GrantFiled: March 20, 2020Date of Patent: May 25, 2021Assignee: Celo FoundationInventors: Sepandar Kamvar, Marek Olszewski, Rene Reinsberg, Marcin Jerzy Chrzanowski, Asa Oines, Roman Croessmann, Markus Franke
-
Publication number: 20200396081Abstract: Systems and techniques are provided for a tree structure for byzantine fault tolerance. A validator computing device may receive a candidate block from a block producer. The block producer may be a second validator computing device of the distributed network. The validator computing device may determine whether or not the candidate block is valid. The validator computing device may sign an indication of whether or not the candidate block is valid to generate a signature. The validator computing device may send the signature to a third validator computing device that is a sibling node to the validator computing device. The validator computing device may receive a second signature from the third validator computing device. The validator computing device may combine the signature and the second signature to generate a combine signature if the signature and the second signature agree.Type: ApplicationFiled: June 11, 2020Publication date: December 17, 2020Inventors: Jason Ansel, Marek Olszewski
-
Patent number: 10848479Abstract: A domain name registrar may provide a service for a domain name registrant to automatically and without further action by the domain name registrant (other than possibly paying for the service) enable secure socket layer (SSL) for a domain name to a third party hosting service, even when the domain name registrar does not own or control the third party hosting service. The invention allows a user (that may or may not be the domain name registrant) to use the domain name registered to the domain name registrant to communicate with a domain name registrant account (possibly a website) on the third party hosting service via a proxy server. The communication between the user and the proxy server may be encrypted such as by the SSL protocol.Type: GrantFiled: December 30, 2016Date of Patent: November 24, 2020Assignee: Go Daddy Operating Company, LLCInventors: Wayne Thayer, Elissa Murphy, Marek Olszewski, Silas Boyd-Wickizer
-
Publication number: 20200304421Abstract: Systems and techniques are provided for a resource stabilization in a distributed network. A computing device in a distributed network may check the median value of a transactional resource in relation to a specified external resource. The computing device in the distributed network may compare the median value of the transactional resource to a threshold value for the transactional resource to determine whether the median value of the transactional resource is above the threshold value or below the threshold value. The supply of the transactional resource in the distributed network may be increased in response to determining that the transactional resource is above the threshold value or may be in response to determining that the transactional resource is below the threshold value.Type: ApplicationFiled: March 20, 2020Publication date: September 24, 2020Inventors: Sepandar Kamvar, Marek Olszewski, Rene Reinsberg, Marcin Jerzy Chrzanowski, Asa Oines, Roman Croessmann, Markus Franke
-
Publication number: 20200106850Abstract: A system and method for application deep linking is presented. A request is received, via a communications network, from a computing device of a user for a first web page of a website and a content of the first web page is retrieved from a first computer server via a communications network. A deep link setting is retrieved for the first web page of the website from a data storage server and a uniform resource indicator is inserted into the first web page to create a modified content of the first web page. The uniform resource indicator includes the deep link setting and, when executed by the computing device of the user, the uniform resource indicator causes the computing device to load an application identified by the uniform resource indicator. The modified content of the first web page is transmitted to the computing device of the user.Type: ApplicationFiled: December 2, 2019Publication date: April 2, 2020Inventors: David Popowitz, Marek Olszewski, Moninder Jheeta, Nitin Gupta, Rene Reinsberg
-
Patent number: 10498847Abstract: A system and method for application deep linking is presented. The system includes a proxy server configured to receive a request for a first web page of a website. The proxy server retrieves content of the first web page and modifies the content to include a uniform resource indicator to create a modified content of the first web page. The uniform resource indicator includes the deep link setting and, when executed by a computing device, the uniform resource indicator causes the computing device to load an application identified by the uniform resource indicator. The proxy server is configured to transmit the modified content of the first web page to a requesting computing device.Type: GrantFiled: February 11, 2016Date of Patent: December 3, 2019Assignee: Go Daddy Operating Company, LLCInventors: David Popowitz, Marek Olszewski, Moninder Jheeta, Nitin Gupta, Rene Reinsberg
-
Publication number: 20190180011Abstract: Systems and techniques are provided for decentralized name verification using recursive attestation. A name and identifying information may be received at a computing device. The computing device may determine that there is a contact item that includes both the name and the identifying information in a contacts database stored on the computing device or accessible to the computing device. A positive attestation and an attestation score for an entity associated with the computing device may be sent to be used to generate an attestation score for the name and identifying information. The attestation score for the name and identifying information is used to determine whether to allow the creation of an account with the name. The attestation score for the entity associated with the computing device may be generated based a positive attestation from another computing device.Type: ApplicationFiled: December 11, 2018Publication date: June 13, 2019Inventors: Rene Reinsberg, Sepandar Kamvar, Marek Olszewski
-
Publication number: 20190179806Abstract: Systems and techniques are provided for a decentralized database associating public keys and communications addresses. A signed secret message may be sent by a validator computing device of a peer-to-peer network for a decentralized database to a communications address from a request for verification entry in a verification queue of the decentralized database. A second request for verification including the communications address and a user-signed secret message may be received. The user-signed secret message may be verified using a public key from the request for verification entry in the verification queue. The communications address and public key may be written to a verified database of the decentralized database when verifying the user-signed secret message causes a number of user-signed secret messages received in requests for verification with the communications address and successfully verified to meet a threshold number.Type: ApplicationFiled: December 11, 2018Publication date: June 13, 2019Inventors: Rene Reinsberg, Sepandar Kamvar, Marek Olszewski
-
Patent number: 10055391Abstract: Illustrative embodiments improve upon prior machine learning techniques by introducing an additional classification layer that mimics human visual pattern recognition. Building upon classification passes that extract contextual information, illustrative embodiments look for hints of high-level semantic categorization that manifest as visual artifacts in the document, such as font family, font weight, text color, text justification, white space, or CSS class name. An improved lightweight markup language enables display of machine-categorized tokens on a screen for human correction, thereby providing ground truths for further machine classification.Type: GrantFiled: December 28, 2015Date of Patent: August 21, 2018Assignee: Locu, Inc.Inventors: Marek Olszewski, Stylianos Sidiroglou, Jason Ansel, Marc Piette, Rene Reinsberg
-
Publication number: 20180191709Abstract: A domain name registrar may provide a service for a domain name registrant to automatically and without further action by the domain name registrant (other than possibly paying for the service) enable secure socket layer (SSL) for a domain name to a third party hosting service, even when the domain name registrar does not own or control the third party hosting service. The invention allows a user (that may or may not be the domain name registrant) to use the domain name registered to the domain name registrant to communicate with a domain name registrant account (possibly a website) on the third party hosting service via a proxy server. The communication between the user and the proxy server may be encrypted such as by the SSL protocol.Type: ApplicationFiled: December 30, 2016Publication date: July 5, 2018Inventors: Wayne Thayer, Elissa Murphy, Marek Olszewski, Silas Boyd-Wickizer
-
Patent number: 9906503Abstract: A domain name registrar may provide a service for a domain name registrant to automatically and without further action by the domain name registrant (other than possibly paying for the service) enable secure socket layer (SSL) for a domain name to a third party hosting service, even when the domain name registrar does not own or control the third party hosting service. The invention allows a user (that may or may not be the domain name registrant) to use the domain name registered to the domain name registrant to communicate with a domain name registrant account (possibly a website) on the third party hosting service via a proxy server. The communication between the user and the proxy server may be encrypted such as by the SSL protocol.Type: GrantFiled: December 30, 2016Date of Patent: February 27, 2018Assignee: Go Daddy Operating Company, LLCInventors: Wayne Thayer, Elissa Murphy, Marek Olszewski, Silas Boyd-Wickizer
-
Patent number: 9817801Abstract: Systems and methods for assisting a user to redesign a live website using a browser-based interface are presented. A first computer server hosts a target website that includes a first code snippet configured to, once executed, create a communication channel to a second computer server. The second computer server is configured to, after execution of the first code snippet, retrieve a content of the target website using the communication channel, analyze the content of the target website to identify one or more candidate keywords to incorporate into the target website, transmit, through the communication channel, the one or more candidate keywords for selection by a user on the target website, receive, through the communication channel, a selection of one of the one or more candidate keywords, generate a second code snippet configured to modify the target website to incorporate the selected one of the one or more candidate keywords, and store the second code snippet on the second computer server.Type: GrantFiled: December 4, 2014Date of Patent: November 14, 2017Assignee: GO DADDY OPERATING COMPANY, LLCInventors: Marek Olszewski, Rene Reinsberg