Patents by Inventor NATHAN ALLIN HASTINGS

NATHAN ALLIN HASTINGS has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190305968
    Abstract: A method includes identifying a set of computing-resistant puzzles and receiving human-input proposed solutions to at least a subset of the puzzles. The method further includes confirming the validity of the human-input proposed solutions and producing a proof-of-work based on at least a threshold quantity of validated human-input proposed solutions. A new block including the produced proof-of-work is added to a blockchain database.
    Type: Application
    Filed: March 27, 2018
    Publication date: October 3, 2019
    Inventors: Steven Cornelis VERSTEEG, John Sinclair BIRD, Nathan Allin HASTINGS, Xien YAO, Deborah Anne VETHECAN
  • Publication number: 20190052614
    Abstract: A registry is utilized to identify personally identifiable information (PII) that has been breached. The registry is a distributed database shared by multiple organizations to track which PII has been breached in other organizations. A first service provider initially receives PII and corresponding signed descriptor from a user. The PII is used to verify an identity of the user and the signed descriptor describes the type of PII that is received. The first service provider queries the registry to determine if the signed descriptor of the user has been written to the registry by a second service provider, indicating that it has been breached at a service provided by the second service provider. If the first service provider uses the breached PII, the breached PII is invalidated by the first service provider.
    Type: Application
    Filed: October 15, 2018
    Publication date: February 14, 2019
    Inventors: STEVEN CORNELIS VERSTEEG, NATHAN ALLIN HASTINGS, XIEN YAO, JOHN SINCLAIR BIRD
  • Publication number: 20190052673
    Abstract: A password breach registry is utilized to secure a service provided by a service provider. The password breach registry is a publicly accessible registry and includes password tokens written by breached service providers. The password tokens indicate passwords used to access breached service providers that may have been breached. A service provider can subscribe to the password breach registry and periodically query the password breach registry to determine if a password token corresponding to a user of a service provided by the service provider has been written to the password breach registry. This may indicate that the user of the service utilizes the same password on other services that have been breached. Upon determining that the password token has been written to the password breach registry, the user can be locked out from the service to prevent a malicious actor from gaining access to the account of the user.
    Type: Application
    Filed: October 15, 2018
    Publication date: February 14, 2019
    Inventors: STEVEN CORNELIS VERSTEEG, NATHAN ALLIN HASTINGS, XIEN YAO, JOHN SINCLAIR BIRD
  • Publication number: 20180205712
    Abstract: A registry is utilized to identify personally identifiable information (PII) that has been breached. The registry is a distributed database shared by multiple organizations to track which PII has been breached in other organizations. A first service provider initially receives PII and corresponding signed descriptor from a user. The PII is used to verify an identity of the user and the signed descriptor describes the type of PII that is received. The first service provider queries the registry to determine if the signed descriptor of the user has been written to the registry by a second service provider, indicating that it has been breached at a service provided by the second service provider. If the first service provider uses the breached PII, the breached PII is invalidated by the first service provider.
    Type: Application
    Filed: March 14, 2018
    Publication date: July 19, 2018
    Inventors: STEVEN CORNELIS VERSTEEG, NATHAN ALLIN HASTINGS, XIEN YAO, JOHN SINCLAIR BIRD
  • Publication number: 20180205757
    Abstract: A password breach registry is utilized to secure a service provided by a service provider. The password breach registry is a publicly accessible registry and includes password tokens written by breached service providers. The password tokens indicate passwords used to access breached service providers that may have been breached. A service provider can subscribe to the password breach registry and periodically query the password breach registry to determine if a password token corresponding to a user of a service provided by the service provider has been written to the password breach registry. This may indicate that the user of the service utilizes the same password on other services that have been breached. Upon determining that the password token has been written to the password breach registry, the user can be locked out from the service to prevent a malicious actor from gaining access to the account of the user.
    Type: Application
    Filed: March 14, 2018
    Publication date: July 19, 2018
    Inventors: STEVEN CORNELIS VERSTEEG, NATHAN ALLIN HASTINGS, XIEN YAO, JOHN SINCLAIR BIRD
  • Publication number: 20180063099
    Abstract: A registry is utilized to identify personally identifiable information (PII) that has been breached. The registry is a distributed database shared by multiple organizations to track which PII has been breached in other organizations. A first service provider initially receives PII and corresponding signed descriptor from a user. The PII is used to verify an identity of the user and the signed descriptor describes the type of PII that is received. The first service provider queries the registry to determine if the signed descriptor of the user has been written to the registry by a second service provider, indicating that it has been breached at a service provided by the second service provider. If the first service provider uses the breached PII, the breached PII is invalidated by the first service provider.
    Type: Application
    Filed: September 1, 2016
    Publication date: March 1, 2018
    Inventors: STEVEN CORNELIS VERSTEEG, NATHAN ALLIN HASTINGS, XIEN YAO, JOHN SINCLAIR BIRD
  • Publication number: 20180063189
    Abstract: A password breach registry is utilized to secure a service provided by a service provider. The password breach registry is a publicly accessible registry and includes password tokens written by breached service providers. The password tokens indicate passwords used to access breached service providers that may have been breached. A service provider can subscribe to the password breach registry and periodically query the password breach registry to determine if a password token corresponding to a user of a service provided by the service provider has been written to the password breach registry. This may indicate that the user of the service utilizes the same password on other services that have been breached. Upon determining that the password token has been written to the password breach registry, the user can be locked out from the service to prevent a malicious actor from gaining access to the account of the user.
    Type: Application
    Filed: September 1, 2016
    Publication date: March 1, 2018
    Inventors: STEVEN CORNELIS VERSTEEG, NATHAN ALLIN HASTINGS, XIEN YAO, JOHN SINCLAIR BIRD
  • Publication number: 20150261655
    Abstract: In a service emulation method, a transaction library storing a plurality of messages communicated between a system under test and a target system upon which the system under test depends is accessed responsive to receiving a request from the system under test. One of the messages stored in the transaction library is identified as corresponding to the received request based on different weightings assigned to respective sections of the messages, and a response to the received request is generated using the one of the messages that was identified. Related systems and computer program products are also discussed.
    Type: Application
    Filed: March 14, 2014
    Publication date: September 17, 2015
    Applicant: CA,INC,
    Inventors: Steven Cornelis Versteeg, JOHN SINCLAIR BIRD, NATHAN ALLIN HASTINGS, MIAO DU, Jean-David Dahan