Patents by Inventor Owen A. Davies
Owen A. Davies has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240232863Abstract: A challenge is input to a PUF device comprising a physically unclonable function, PUF. The device generates a corresponding response. A wallet application is instantiated to use a seed determined from the response, the instantiating comprising storing a transform of the seed or response in association with the wallet application. At a later time, a user supplies the wallet application with information demonstrating a right to use the seed, wherein the wallet application is configured so as in response to verify this information based on the transform as stored in association with the wallet application, and on condition that the information is thereby verified, to derive at least one child key from the seed. A blockchain transaction is then signed using the child key as derived by the wallet application in response to the verification.Type: ApplicationFiled: April 12, 2022Publication date: July 11, 2024Inventors: Craig Steven WRIGHT, Jack Owen DAVIES
-
Patent number: 12034798Abstract: A computer-implemented method for adapting connections between nodes of a layered network. The layered network comprises a plurality of nodes arranged in an ordered set of layers. The ordered set of layers comprises, in order, a core layer comprising a set of core nodes, a second layer comprising a set of second nodes, and one or more outer layers each comprising a respective set of outer nodes. Each core node is connected to at least one other core node. The method is performed by an adapting node, the adapting node being a node of the layered network that is connected to one or more second nodes and multiple core nodes. The method comprises, based on one or more network properties of the layered network, disabling a respective connection between the adapting node and at least one but not all of the multiple core nodes.Type: GrantFiled: January 19, 2021Date of Patent: July 9, 2024Assignee: nChain Licensing AGInventors: Owen Vaughan, Jack Owen Davies, Craig Steven Wright
-
Patent number: 12021924Abstract: A computer-implemented method for connecting to a layered network. The layered network comprises a plurality of nodes arranged in an ordered set of layers. The ordered set of layers comprises, in order, a core layer comprising a set of core nodes, a second layer comprising a set of second nodes, and one or more outer layers each comprising a respective set of outer nodes. Each core node is connected to at least one other core node. The method is performed by a connecting node and comprises connecting to the network according to a connection protocol. The connection protocol requires that each node must connect to at least one node of a preceding layer, and each outer node must also connect to at least one core node.Type: GrantFiled: January 19, 2021Date of Patent: June 25, 2024Assignee: nChain Licensing AGInventors: Owen Vaughan, Jack Owen Davies, Craig Steven Wright
-
Publication number: 20240202718Abstract: A token issuer issues a token evidencing that a first party passed a verification. A first blockchain transaction recorded on chain comprises an output comprising a) funds of the first party for a commercial transaction to be conducted with a second party and b) a locking script defining a condition for unlocking the funds. The locking script further comprises a data payload comprising the token. A second party verifies that the first blockchain transaction has been validated for recordal on the blockchain and that its output remains unspent, and thus in doing so verifies both that the first party has the funds available and is evidenced to have passed the verification by the token issuer. The commercial transaction is dependent on this verification, and involves a second blockchain transaction being recorded on chain, having an input pointing to the output of the first transaction and comprising a corresponding unlocking script.Type: ApplicationFiled: March 14, 2022Publication date: June 20, 2024Inventors: Craig Steven WRIGHT, Jack Owen DAVIES
-
Publication number: 20240205030Abstract: According to a first aspect of the present invention, there is provided a computer-implemented method for verifying that an identified transaction is stored in a blockchain. A blockchain uniform resource indicator (BURI) character string is obtained. The BURI character string is parsed to identify delimiter characters therein, and thereby extracting one or more Merkle proof portions and a transaction identifier portion separated by the delimiter characters, the Merkle proof portion(s) for verifying that the identified transaction belongs to an identified block. At least part of the BURI is used to obtain a Merkle root hash. The Merkle proof portion(s) is used to determine whether the transaction identifier portion is valid against the Merkle root hash, thereby verifying the identified transaction using the BURI character string, without accessing a payload of the identified block.Type: ApplicationFiled: March 8, 2022Publication date: June 20, 2024Inventors: Craig Steven WRIGHT, Alexander GRAHAM, Jack Owen DAVIES
-
Publication number: 20240171407Abstract: Embodiments provide verification methods and systems for use in respect of data-oriented blockchain applications. In contrast to conventional signature verification in blockchain protocols, embodiments disclosed herein are performed in-situ within a single transaction, using only data that is provided within that transaction. Therefore, there is no reliance upon signatures provided from other transactions, and potential exploits such as replay attacks can be prevented. In an embodiment, this can be achieved by placing the signature in the output of the transaction rather than the locking script.Type: ApplicationFiled: March 17, 2022Publication date: May 23, 2024Inventors: Craig Steven WRIGHT, Jack Owen DAVIES
-
Publication number: 20240137228Abstract: According to a first aspect disclosed herein there is provide a device comprising: a PUF module, and one or more outer layer components providing at least part of an unsecured channel for inputting a challenge to the PUF module and receiving back a response. Internal logic of the PUF module comprises a logging mechanism arranged to automatically log a record of the challenge and/or response in a log medium, e.g. a blockchain. According to a second aspect, there is provided a method comprising: sending a first message to be recorded on a blockchain, submitting a query to check that the first message has been recorded on the blockchain without manipulation, on condition thereof, sending a second messaging transaction to be recorded on the blockchain. The first and second aspects may be used together or independently.Type: ApplicationFiled: January 18, 2022Publication date: April 25, 2024Inventors: Jack Owen DAVIES, Craig Steven WRIGHT
-
Publication number: 20240095692Abstract: A method is provided by which payments for assets are recorded using blockchain transactions, and verified based on immutable logs associated with the transactions.Type: ApplicationFiled: June 22, 2022Publication date: March 21, 2024Inventors: Ricky Charles RAND, Andrew James MEE, Jack Owen DAVIES, Paul CLARK, Alex WOODS
-
Publication number: 20240015033Abstract: A method for enabling a verifying party to verify an identity of a target party or device. The method comprises, in a set-up phase: storing, in a data store, a respective piece of response data for each of a set of one or more responses resulting from a setting-up party inputting a respective set of one or more challenges into a PUF module comprising a physically unclonable function, PUF, to generate the one or more responses based on the PUF; and storing an indication of the set of challenges in the data store. The indication does not comprise a value of each of the challenges in the set, but rather a master challenge from which the set of challenges is derivable by applying a derivation function to the master challenge.Type: ApplicationFiled: August 31, 2021Publication date: January 11, 2024Inventors: Jack Owen DAVIES, Craig Steven WRIGHT
-
Publication number: 20230421366Abstract: A computer-implemented method of generating keys of a hierarchical key structure, wherein the method is performed by a key generator and comprises: obtaining a child key derivation path, wherein the child key derivation path comprises a sequence of elements, wherein the sequence of elements comprises one or more sets of one or more elements, each set of elements being generated based on a respective data item of a data path, and wherein each element in the sequence corresponds to a respective position of key in a respective level of the key structure; and generating one or more child keys based on the child key derivation path, wherein each respective child key is generated based on a respective element in the sequence at the respective position and of the respective level corresponding to that respective element.Type: ApplicationFiled: October 28, 2021Publication date: December 28, 2023Inventors: Jack Owen DAVIES, Simon ORDISH
-
Publication number: 20230394063Abstract: A computer-implemented method of providing proof that a data item of a blockchain transaction exists on a blockchain, wherein the method comprises: obtaining, from a requesting party, target data item of a target blockchain transaction; obtaining the target blockchain transaction; obtaining a target Merkle proof for the target blockchain transaction, wherein a corresponding target Merkle root is contained within a block of the blockchain, and wherein obtaining the target Merkle proof comprises calculating an index of a target transaction identifier of the target blockchain transaction within a leaf layer of a corresponding target Merkle tree; and outputting at least the target Merkle proof for use by the requesting party as proof that the target data item exists as part of the target blockchain transaction on the blockchain.Type: ApplicationFiled: October 12, 2021Publication date: December 7, 2023Inventors: Wei ZHANG, Bassem AMMAR, Jack Owen DAVIES, Craig Steven WRIGHT
-
Publication number: 20230388136Abstract: A computer-implemented method of providing proof that a blockchain transaction exists on a blockchain, wherein the method is performed by a Merkle proof entity configured to store a set of transaction identifiers of respective blockchain transactions but not to publish new blockchain blocks to the blockchain network, and wherein the method comprises: obtaining a target transaction identifier of a target blockchain transaction, wherein the target transaction identifier forms part of the stored set of transaction identifiers; obtaining a target Merkle proof for the target blockchain transaction, wherein a corresponding target Merkle root is contained within a blockheader of the blockchain; and outputting the target Merkle proof for use by the requesting party as proof that the target blockchain transaction exists on the blockchain.Type: ApplicationFiled: October 12, 2021Publication date: November 30, 2023Inventors: Wei ZHANG, Bassem AMMAR, Jack Owen DAVIES, Craig Steven WRIGHT
-
Publication number: 20230379175Abstract: A computer-implemented method comprising one or more instances of a challenge-response mapping operation. The challenge-response mapping operation comprises: from a submitting party, receiving challenge data comprising a secondary challenge, from among a set of multiple possible secondary challenges; inputting a primary challenge into a physically unclonable function, PUF, to generate a corresponding primary response; inputting the received secondary challenge and the generated primary response into a deterministic transform function in order to generate a secondary response, being a response to the secondary challenge, the transform function being a function of the secondary challenge and the primary response; and outputting response data comprising the secondary response or data derived therefrom.Type: ApplicationFiled: August 31, 2021Publication date: November 23, 2023Inventors: Jack Owen DAVIES, Craig Steven WRIGHT
-
Publication number: 20230370288Abstract: A method for enabling a verifying party to verify an identity of a target party or device. The method comprises, in a set-up phase: inputting of each of a set of one or more challenges into a PUF module comprising a physically unclonable function, PUF, to generate a respective one of a set of responses from each challenge; and causing to be stored, on a blockchain, a respective piece of response data for each of the set of one or more responses generated by the PUF module. The piece of response data for each response comprises the respective response or data derived therefrom. The pieces of response data are stored in one or more storage transactions recorded on the blockchain, thereby making at least one of the pieces of response data available to the verifying party for verifying the identity of the target in a subsequent verification phase.Type: ApplicationFiled: August 31, 2021Publication date: November 16, 2023Inventors: Jack Owen DAVIES, Craig Steven WRIGHT
-
Publication number: 20230360047Abstract: A computer-implemented method of authorising a payment by a target party to a verifying party. The method comprises, by the verifying party: performing a payment verification to verify a source of funds of the target party; and performing an identity verification to verify an identity of the target party. The identity verification comprises accessing response data stored in a data store in association with the identity of the target party, the data store being implemented in third party computer equipment of a trusted third party or on a peer-to-peer publication medium, wherein the response data comprises either a) a stored instance of a response to a challenge, or b) an attestation comprising a transformation of the response. The payment is authenticated on condition that the outputs of both the payment verification and identity verifications is true.Type: ApplicationFiled: August 31, 2021Publication date: November 9, 2023Inventors: Jack Owen DAVIES, Craig Steven WRIGHT
-
Publication number: 20230362019Abstract: A method for enabling a verifying party to verify an identity of a target comprising a target party or device. The method comprises, in a set-up phase, by a party other than the verifying party: inputting a set of one or more challenges into a PUF module comprising a physically unclonable function, PUF, in order to generate a respective set of one or more responses based on the PUF; and storing a respective response data record for each of the set of responses in a data store external to any equipment of the target party or verifying party, the data store either being part of third party computer equipment or being a public peer-to-peer publication medium. The response data records are thus made available to the verifying party to verify the identity of the target in a subsequent verification phase.Type: ApplicationFiled: August 31, 2021Publication date: November 9, 2023Inventors: Jack Owen DAVIES, Craig Steven WRIGHT
-
Publication number: 20230336366Abstract: A comprising, by target computer equipment of a target party: obtaining a cryptographic key derived from a response generated by PUF module comprising a physically unclonable function, PUF, the response having been generated by the PUF module based on the PUF in response to a corresponding challenge input to the PUF module, wherein key information comprising the cryptographic key or a corresponding public key is also made available to a verifying party; from an issuing party, receiving a computation request specifying the computation to be performed; in response to the computation request, performing the computation in order to generate a computation result; signing a message comprising the computation result with the cryptographic key; and making the signed message available to the verifying party by sending the signed message to be recorded on a blockchain.Type: ApplicationFiled: August 31, 2021Publication date: October 19, 2023Inventors: Jack Owen DAVIES, Craig Steven WRIGHT
-
Publication number: 20230275770Abstract: A computer-implemented method of pseudo-randomly selecting a data element using blockchain transactions, wherein the method is performed by a first party and comprises: obtaining an ordered list of data elements and a plurality of seed inputs; generating a first transaction; and causing the first transaction to be made available to one or more blockchain nodes for inclusion in the blockchain, wherein the first transaction comprises a first output script, and wherein when executed alongside an input script of a second transaction, the first output script is configured to: output a re-ordered list of the data elements; output a pseudorandom number generated based on the plurality of seed inputs; and output, as a selected data element, the data element positioned at a position in the re-ordered list of data elements corresponding to the pseudorandom number.Type: ApplicationFiled: July 19, 2021Publication date: August 31, 2023Inventors: Jack Owen DAVIES, Chloe TARTAN
-
Publication number: 20230230078Abstract: A computer-implemented method of accepting blockchain transactions, wherein the method is performed by a blockchain node of a blockchain network and comprises: generating a first transaction comprising a first output, the first output comprising a first output script; causing the first transaction to be published on the blockchain; receiving a second transaction comprising a second output, the second output comprising a second output script; and accepting the second transaction based on one or more conditions being met, wherein a first condition of said one or more conditions is that the second output script corresponds to the first output script.Type: ApplicationFiled: May 12, 2021Publication date: July 20, 2023Inventors: Jack Owen DAVIES, Chloe TARTAN, Alexander MACKAY, Antoaneta SERGUIEVA, Craig Steven WRIGHT
-
Publication number: 20230230076Abstract: A computer-implemented method of recording an agreement between a requesting party and a confirming party on a blockchain, wherein the method is performed by the requesting party and comprises: generating a request transaction, wherein the request transaction comprises an input signed by the requesting party, and at least a first output comprising a cryptographic puzzle based on a first data item known to both the requesting and confirming parties, wherein the first data item represents the agreement; and causing the request transaction to be transmitted to one or more blockchain nodes.Type: ApplicationFiled: May 17, 2021Publication date: July 20, 2023Inventors: Jack Owen DAVIES, Daniel JOSEPH, Craig Steven WRIGHT