Patents by Inventor Owen A. Davies

Owen A. Davies has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240232863
    Abstract: A challenge is input to a PUF device comprising a physically unclonable function, PUF. The device generates a corresponding response. A wallet application is instantiated to use a seed determined from the response, the instantiating comprising storing a transform of the seed or response in association with the wallet application. At a later time, a user supplies the wallet application with information demonstrating a right to use the seed, wherein the wallet application is configured so as in response to verify this information based on the transform as stored in association with the wallet application, and on condition that the information is thereby verified, to derive at least one child key from the seed. A blockchain transaction is then signed using the child key as derived by the wallet application in response to the verification.
    Type: Application
    Filed: April 12, 2022
    Publication date: July 11, 2024
    Inventors: Craig Steven WRIGHT, Jack Owen DAVIES
  • Patent number: 12034798
    Abstract: A computer-implemented method for adapting connections between nodes of a layered network. The layered network comprises a plurality of nodes arranged in an ordered set of layers. The ordered set of layers comprises, in order, a core layer comprising a set of core nodes, a second layer comprising a set of second nodes, and one or more outer layers each comprising a respective set of outer nodes. Each core node is connected to at least one other core node. The method is performed by an adapting node, the adapting node being a node of the layered network that is connected to one or more second nodes and multiple core nodes. The method comprises, based on one or more network properties of the layered network, disabling a respective connection between the adapting node and at least one but not all of the multiple core nodes.
    Type: Grant
    Filed: January 19, 2021
    Date of Patent: July 9, 2024
    Assignee: nChain Licensing AG
    Inventors: Owen Vaughan, Jack Owen Davies, Craig Steven Wright
  • Patent number: 12021924
    Abstract: A computer-implemented method for connecting to a layered network. The layered network comprises a plurality of nodes arranged in an ordered set of layers. The ordered set of layers comprises, in order, a core layer comprising a set of core nodes, a second layer comprising a set of second nodes, and one or more outer layers each comprising a respective set of outer nodes. Each core node is connected to at least one other core node. The method is performed by a connecting node and comprises connecting to the network according to a connection protocol. The connection protocol requires that each node must connect to at least one node of a preceding layer, and each outer node must also connect to at least one core node.
    Type: Grant
    Filed: January 19, 2021
    Date of Patent: June 25, 2024
    Assignee: nChain Licensing AG
    Inventors: Owen Vaughan, Jack Owen Davies, Craig Steven Wright
  • Publication number: 20240202718
    Abstract: A token issuer issues a token evidencing that a first party passed a verification. A first blockchain transaction recorded on chain comprises an output comprising a) funds of the first party for a commercial transaction to be conducted with a second party and b) a locking script defining a condition for unlocking the funds. The locking script further comprises a data payload comprising the token. A second party verifies that the first blockchain transaction has been validated for recordal on the blockchain and that its output remains unspent, and thus in doing so verifies both that the first party has the funds available and is evidenced to have passed the verification by the token issuer. The commercial transaction is dependent on this verification, and involves a second blockchain transaction being recorded on chain, having an input pointing to the output of the first transaction and comprising a corresponding unlocking script.
    Type: Application
    Filed: March 14, 2022
    Publication date: June 20, 2024
    Inventors: Craig Steven WRIGHT, Jack Owen DAVIES
  • Publication number: 20240205030
    Abstract: According to a first aspect of the present invention, there is provided a computer-implemented method for verifying that an identified transaction is stored in a blockchain. A blockchain uniform resource indicator (BURI) character string is obtained. The BURI character string is parsed to identify delimiter characters therein, and thereby extracting one or more Merkle proof portions and a transaction identifier portion separated by the delimiter characters, the Merkle proof portion(s) for verifying that the identified transaction belongs to an identified block. At least part of the BURI is used to obtain a Merkle root hash. The Merkle proof portion(s) is used to determine whether the transaction identifier portion is valid against the Merkle root hash, thereby verifying the identified transaction using the BURI character string, without accessing a payload of the identified block.
    Type: Application
    Filed: March 8, 2022
    Publication date: June 20, 2024
    Inventors: Craig Steven WRIGHT, Alexander GRAHAM, Jack Owen DAVIES
  • Publication number: 20240171407
    Abstract: Embodiments provide verification methods and systems for use in respect of data-oriented blockchain applications. In contrast to conventional signature verification in blockchain protocols, embodiments disclosed herein are performed in-situ within a single transaction, using only data that is provided within that transaction. Therefore, there is no reliance upon signatures provided from other transactions, and potential exploits such as replay attacks can be prevented. In an embodiment, this can be achieved by placing the signature in the output of the transaction rather than the locking script.
    Type: Application
    Filed: March 17, 2022
    Publication date: May 23, 2024
    Inventors: Craig Steven WRIGHT, Jack Owen DAVIES
  • Publication number: 20240137228
    Abstract: According to a first aspect disclosed herein there is provide a device comprising: a PUF module, and one or more outer layer components providing at least part of an unsecured channel for inputting a challenge to the PUF module and receiving back a response. Internal logic of the PUF module comprises a logging mechanism arranged to automatically log a record of the challenge and/or response in a log medium, e.g. a blockchain. According to a second aspect, there is provided a method comprising: sending a first message to be recorded on a blockchain, submitting a query to check that the first message has been recorded on the blockchain without manipulation, on condition thereof, sending a second messaging transaction to be recorded on the blockchain. The first and second aspects may be used together or independently.
    Type: Application
    Filed: January 18, 2022
    Publication date: April 25, 2024
    Inventors: Jack Owen DAVIES, Craig Steven WRIGHT
  • Publication number: 20240095692
    Abstract: A method is provided by which payments for assets are recorded using blockchain transactions, and verified based on immutable logs associated with the transactions.
    Type: Application
    Filed: June 22, 2022
    Publication date: March 21, 2024
    Inventors: Ricky Charles RAND, Andrew James MEE, Jack Owen DAVIES, Paul CLARK, Alex WOODS
  • Publication number: 20240015033
    Abstract: A method for enabling a verifying party to verify an identity of a target party or device. The method comprises, in a set-up phase: storing, in a data store, a respective piece of response data for each of a set of one or more responses resulting from a setting-up party inputting a respective set of one or more challenges into a PUF module comprising a physically unclonable function, PUF, to generate the one or more responses based on the PUF; and storing an indication of the set of challenges in the data store. The indication does not comprise a value of each of the challenges in the set, but rather a master challenge from which the set of challenges is derivable by applying a derivation function to the master challenge.
    Type: Application
    Filed: August 31, 2021
    Publication date: January 11, 2024
    Inventors: Jack Owen DAVIES, Craig Steven WRIGHT
  • Publication number: 20230421366
    Abstract: A computer-implemented method of generating keys of a hierarchical key structure, wherein the method is performed by a key generator and comprises: obtaining a child key derivation path, wherein the child key derivation path comprises a sequence of elements, wherein the sequence of elements comprises one or more sets of one or more elements, each set of elements being generated based on a respective data item of a data path, and wherein each element in the sequence corresponds to a respective position of key in a respective level of the key structure; and generating one or more child keys based on the child key derivation path, wherein each respective child key is generated based on a respective element in the sequence at the respective position and of the respective level corresponding to that respective element.
    Type: Application
    Filed: October 28, 2021
    Publication date: December 28, 2023
    Inventors: Jack Owen DAVIES, Simon ORDISH
  • Publication number: 20230394063
    Abstract: A computer-implemented method of providing proof that a data item of a blockchain transaction exists on a blockchain, wherein the method comprises: obtaining, from a requesting party, target data item of a target blockchain transaction; obtaining the target blockchain transaction; obtaining a target Merkle proof for the target blockchain transaction, wherein a corresponding target Merkle root is contained within a block of the blockchain, and wherein obtaining the target Merkle proof comprises calculating an index of a target transaction identifier of the target blockchain transaction within a leaf layer of a corresponding target Merkle tree; and outputting at least the target Merkle proof for use by the requesting party as proof that the target data item exists as part of the target blockchain transaction on the blockchain.
    Type: Application
    Filed: October 12, 2021
    Publication date: December 7, 2023
    Inventors: Wei ZHANG, Bassem AMMAR, Jack Owen DAVIES, Craig Steven WRIGHT
  • Publication number: 20230388136
    Abstract: A computer-implemented method of providing proof that a blockchain transaction exists on a blockchain, wherein the method is performed by a Merkle proof entity configured to store a set of transaction identifiers of respective blockchain transactions but not to publish new blockchain blocks to the blockchain network, and wherein the method comprises: obtaining a target transaction identifier of a target blockchain transaction, wherein the target transaction identifier forms part of the stored set of transaction identifiers; obtaining a target Merkle proof for the target blockchain transaction, wherein a corresponding target Merkle root is contained within a blockheader of the blockchain; and outputting the target Merkle proof for use by the requesting party as proof that the target blockchain transaction exists on the blockchain.
    Type: Application
    Filed: October 12, 2021
    Publication date: November 30, 2023
    Inventors: Wei ZHANG, Bassem AMMAR, Jack Owen DAVIES, Craig Steven WRIGHT
  • Publication number: 20230379175
    Abstract: A computer-implemented method comprising one or more instances of a challenge-response mapping operation. The challenge-response mapping operation comprises: from a submitting party, receiving challenge data comprising a secondary challenge, from among a set of multiple possible secondary challenges; inputting a primary challenge into a physically unclonable function, PUF, to generate a corresponding primary response; inputting the received secondary challenge and the generated primary response into a deterministic transform function in order to generate a secondary response, being a response to the secondary challenge, the transform function being a function of the secondary challenge and the primary response; and outputting response data comprising the secondary response or data derived therefrom.
    Type: Application
    Filed: August 31, 2021
    Publication date: November 23, 2023
    Inventors: Jack Owen DAVIES, Craig Steven WRIGHT
  • Publication number: 20230370288
    Abstract: A method for enabling a verifying party to verify an identity of a target party or device. The method comprises, in a set-up phase: inputting of each of a set of one or more challenges into a PUF module comprising a physically unclonable function, PUF, to generate a respective one of a set of responses from each challenge; and causing to be stored, on a blockchain, a respective piece of response data for each of the set of one or more responses generated by the PUF module. The piece of response data for each response comprises the respective response or data derived therefrom. The pieces of response data are stored in one or more storage transactions recorded on the blockchain, thereby making at least one of the pieces of response data available to the verifying party for verifying the identity of the target in a subsequent verification phase.
    Type: Application
    Filed: August 31, 2021
    Publication date: November 16, 2023
    Inventors: Jack Owen DAVIES, Craig Steven WRIGHT
  • Publication number: 20230360047
    Abstract: A computer-implemented method of authorising a payment by a target party to a verifying party. The method comprises, by the verifying party: performing a payment verification to verify a source of funds of the target party; and performing an identity verification to verify an identity of the target party. The identity verification comprises accessing response data stored in a data store in association with the identity of the target party, the data store being implemented in third party computer equipment of a trusted third party or on a peer-to-peer publication medium, wherein the response data comprises either a) a stored instance of a response to a challenge, or b) an attestation comprising a transformation of the response. The payment is authenticated on condition that the outputs of both the payment verification and identity verifications is true.
    Type: Application
    Filed: August 31, 2021
    Publication date: November 9, 2023
    Inventors: Jack Owen DAVIES, Craig Steven WRIGHT
  • Publication number: 20230362019
    Abstract: A method for enabling a verifying party to verify an identity of a target comprising a target party or device. The method comprises, in a set-up phase, by a party other than the verifying party: inputting a set of one or more challenges into a PUF module comprising a physically unclonable function, PUF, in order to generate a respective set of one or more responses based on the PUF; and storing a respective response data record for each of the set of responses in a data store external to any equipment of the target party or verifying party, the data store either being part of third party computer equipment or being a public peer-to-peer publication medium. The response data records are thus made available to the verifying party to verify the identity of the target in a subsequent verification phase.
    Type: Application
    Filed: August 31, 2021
    Publication date: November 9, 2023
    Inventors: Jack Owen DAVIES, Craig Steven WRIGHT
  • Publication number: 20230336366
    Abstract: A comprising, by target computer equipment of a target party: obtaining a cryptographic key derived from a response generated by PUF module comprising a physically unclonable function, PUF, the response having been generated by the PUF module based on the PUF in response to a corresponding challenge input to the PUF module, wherein key information comprising the cryptographic key or a corresponding public key is also made available to a verifying party; from an issuing party, receiving a computation request specifying the computation to be performed; in response to the computation request, performing the computation in order to generate a computation result; signing a message comprising the computation result with the cryptographic key; and making the signed message available to the verifying party by sending the signed message to be recorded on a blockchain.
    Type: Application
    Filed: August 31, 2021
    Publication date: October 19, 2023
    Inventors: Jack Owen DAVIES, Craig Steven WRIGHT
  • Publication number: 20230275770
    Abstract: A computer-implemented method of pseudo-randomly selecting a data element using blockchain transactions, wherein the method is performed by a first party and comprises: obtaining an ordered list of data elements and a plurality of seed inputs; generating a first transaction; and causing the first transaction to be made available to one or more blockchain nodes for inclusion in the blockchain, wherein the first transaction comprises a first output script, and wherein when executed alongside an input script of a second transaction, the first output script is configured to: output a re-ordered list of the data elements; output a pseudorandom number generated based on the plurality of seed inputs; and output, as a selected data element, the data element positioned at a position in the re-ordered list of data elements corresponding to the pseudorandom number.
    Type: Application
    Filed: July 19, 2021
    Publication date: August 31, 2023
    Inventors: Jack Owen DAVIES, Chloe TARTAN
  • Publication number: 20230230078
    Abstract: A computer-implemented method of accepting blockchain transactions, wherein the method is performed by a blockchain node of a blockchain network and comprises: generating a first transaction comprising a first output, the first output comprising a first output script; causing the first transaction to be published on the blockchain; receiving a second transaction comprising a second output, the second output comprising a second output script; and accepting the second transaction based on one or more conditions being met, wherein a first condition of said one or more conditions is that the second output script corresponds to the first output script.
    Type: Application
    Filed: May 12, 2021
    Publication date: July 20, 2023
    Inventors: Jack Owen DAVIES, Chloe TARTAN, Alexander MACKAY, Antoaneta SERGUIEVA, Craig Steven WRIGHT
  • Publication number: 20230230076
    Abstract: A computer-implemented method of recording an agreement between a requesting party and a confirming party on a blockchain, wherein the method is performed by the requesting party and comprises: generating a request transaction, wherein the request transaction comprises an input signed by the requesting party, and at least a first output comprising a cryptographic puzzle based on a first data item known to both the requesting and confirming parties, wherein the first data item represents the agreement; and causing the request transaction to be transmitted to one or more blockchain nodes.
    Type: Application
    Filed: May 17, 2021
    Publication date: July 20, 2023
    Inventors: Jack Owen DAVIES, Daniel JOSEPH, Craig Steven WRIGHT