Patents by Inventor Robert O. Keith, Jr.

Robert O. Keith, Jr. has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240121604
    Abstract: Low power devices are able to utilize encryption in communication. Low power devices typically cannot send/receive large amounts of data since sending/receiving more data uses more power. Implementing a key exchange with a small encrypted payload enables secure communication between the devices. A one-way data stream is implemented. The one-way data stream is able to be encrypted. The dynamic key exchange is able to be used for a moving target.
    Type: Application
    Filed: December 4, 2023
    Publication date: April 11, 2024
    Inventor: Robert O. Keith, JR.
  • Publication number: 20240113892
    Abstract: Digital signatures using the Diophantine system of equations are implemented. A digital signature is an authentication mechanism that enables the creator of a message to attach a code that acts as a signature. A digital signature scheme typically includes three algorithms: a key generation algorithm, a signing algorithm, and a signature verifying algorithm. The key generation algorithm selects a private key uniformly at random from a set of possible private keys. The key generation algorithm outputs the private key and a corresponding public key. The signing algorithm produces a signature given a message and a private key. The signature verifying algorithm either accepts or rejects a message's claim to authenticity based at least in part on the message, the public key, and the signature.
    Type: Application
    Filed: September 21, 2023
    Publication date: April 4, 2024
    Inventors: Robert O. Keith, JR., Rustam Islamov, Roustem Akhiarov, Maxim Silaev
  • Publication number: 20240106658
    Abstract: Digital signatures using the Diophantine system of equations are implemented. A digital signature is an authentication mechanism that enables the creator of a message to attach a code that acts as a signature. A digital signature scheme typically includes three algorithms: a key generation algorithm, a signing algorithm, and a signature verifying algorithm. The key generation algorithm selects a private key uniformly at random from a set of possible private keys. The key generation algorithm outputs the private key and a corresponding public key. The signing algorithm produces a signature given a message and a private key. The signature verifying algorithm either accepts or rejects a message's claim to authenticity based at least in part on the message, the public key, and the signature.
    Type: Application
    Filed: September 21, 2023
    Publication date: March 28, 2024
    Inventors: Robert O. Keith, JR., Rustam Islamov, Roustem Akhiarov, Maxim Silaev
  • Publication number: 20240106645
    Abstract: Digital signatures using the Diophantine system of equations are implemented. A digital signature is an authentication mechanism that enables the creator of a message to attach a code that acts as a signature. A digital signature scheme typically includes three algorithms: a key generation algorithm, a signing algorithm, and a signature verifying algorithm. The key generation algorithm selects a private key uniformly at random from a set of possible private keys. The key generation algorithm outputs the private key and a corresponding public key. The signing algorithm produces a signature given a message and a private key. The signature verifying algorithm either accepts or rejects a message's claim to authenticity based at least in part on the message, the public key, and the signature.
    Type: Application
    Filed: September 21, 2023
    Publication date: March 28, 2024
    Inventors: Robert O. Keith, JR., Rustam Islamov, Roustem Akhiarov, Maxim Silaev
  • Publication number: 20240106659
    Abstract: Digital signatures using the Diophantine system of equations are implemented. A digital signature is an authentication mechanism that enables the creator of a message to attach a code that acts as a signature. A digital signature scheme typically includes three algorithms: a key generation algorithm, a signing algorithm, and a signature verifying algorithm. The key generation algorithm selects a private key uniformly at random from a set of possible private keys. The key generation algorithm outputs the private key and a corresponding public key. The signing algorithm produces a signature given a message and a private key. The signature verifying algorithm either accepts or rejects a message's claim to authenticity based at least in part on the message, the public key, and the signature.
    Type: Application
    Filed: September 21, 2023
    Publication date: March 28, 2024
    Inventors: Robert O. Keith, JR., Rustam Islamov, Roustem Akhiarov, Maxim Silaev
  • Patent number: 11934514
    Abstract: A security platform architecture is described herein. The security platform architecture includes multiple layers and utilizes a combination of encryption and other security features to generate a secure environment.
    Type: Grant
    Filed: February 6, 2023
    Date of Patent: March 19, 2024
    Assignee: Winkk, Inc.
    Inventor: Robert O. Keith, Jr.
  • Patent number: 11936787
    Abstract: A security platform architecture is described herein. The security platform architecture includes multiple layers and utilizes a combination of encryption and other security features to generate a secure environment.
    Type: Grant
    Filed: May 6, 2020
    Date of Patent: March 19, 2024
    Assignee: Winkk, Inc.
    Inventor: Robert O. Keith, Jr.
  • Patent number: 11928193
    Abstract: A security platform architecture is described herein. The security platform architecture includes multiple layers and utilizes a combination of encryption and other security features to generate a secure environment.
    Type: Grant
    Filed: December 10, 2019
    Date of Patent: March 12, 2024
    Assignee: Winkk, Inc.
    Inventors: Robert O. Keith, Jr., Bradley E. Gray
  • Patent number: 11928194
    Abstract: A security platform architecture is described herein. The security platform architecture includes multiple layers and utilizes a combination of encryption and other security features to generate a secure environment.
    Type: Grant
    Filed: April 8, 2022
    Date of Patent: March 12, 2024
    Assignee: Wiinkk, Inc.
    Inventor: Robert O. Keith, Jr.
  • Publication number: 20240073009
    Abstract: Aspects of associative cryptography key operations are described. In one embodiment, a first cryptographic function is applied to secret data to produce a first encrypted result. The first encrypted result is transmitted by a first device to a second device. The second device applies a second cryptographic function to the first encrypted result to produce a second encrypted result. At this point, the secret data has been encrypted by two different cryptographic functions, each of them being sufficient to secure the secret data from others. The two different cryptographic function can be inversed or removed, in any order, to reveal the secret data. Thus, the first device can apply a first inverse cryptographic function to the second encrypted result to produce a first result, and the second device can apply a second inverse cryptographic function to the first result to decrypt the secret data.
    Type: Application
    Filed: September 21, 2023
    Publication date: February 29, 2024
    Inventor: Robert O. Keith, JR.
  • Publication number: 20240064012
    Abstract: Aspects of associative cryptography key operations are described. In one embodiment, a first cryptographic function is applied to secret data to produce a first encrypted result. The first encrypted result is transmitted by a first device to a second device. The second device applies a second cryptographic function to the first encrypted result to produce a second encrypted result. At this point, the secret data has been encrypted by two different cryptographic functions, each of them being sufficient to secure the secret data from others. The two different cryptographic function can be inversed or removed, in any order, to reveal the secret data. Thus, the first device can apply a first inverse cryptographic function to the second encrypted result to produce a first result, and the second device can apply a second inverse cryptographic function to the first result to decrypt the secret data.
    Type: Application
    Filed: September 21, 2023
    Publication date: February 22, 2024
    Inventor: Robert O. Keith, JR.
  • Patent number: 11902777
    Abstract: A security platform architecture is described herein. The security platform architecture includes multiple layers and utilizes a combination of encryption and other security features to generate a secure environment.
    Type: Grant
    Filed: October 18, 2021
    Date of Patent: February 13, 2024
    Assignee: Winkk, Inc.
    Inventors: Robert O. Keith, Jr., Bradley E. Gray
  • Publication number: 20240048559
    Abstract: Aspects of associative cryptography key operations are described. In one embodiment, a first cryptographic function is applied to secret data to produce a first encrypted result. The first encrypted result is transmitted by a first device to a second device. The second device applies a second cryptographic function to the first encrypted result to produce a second encrypted result. At this point, the secret data has been encrypted by two different cryptographic functions, each of them being sufficient to secure the secret data from others. The two different cryptographic function can be inversed or removed, in any order, to reveal the secret data. Thus, the first device can apply a first inverse cryptographic function to the second encrypted result to produce a first result, and the second device can apply a second inverse cryptographic function to the first result to decrypt the secret data.
    Type: Application
    Filed: September 21, 2023
    Publication date: February 8, 2024
    Inventor: Robert O. Keith, Jr.
  • Publication number: 20240048363
    Abstract: Aspects of associative cryptography key operations are described. In one embodiment, a first cryptographic function is applied to secret data to produce a first encrypted result. The first encrypted result is transmitted by a first device to a second device. The second device applies a second cryptographic function to the first encrypted result to produce a second encrypted result. At this point, the secret data has been encrypted by two different cryptographic functions, each of them being sufficient to secure the secret data from others. The two different cryptographic function can be inversed or removed, in any order, to reveal the secret data. Thus, the first device can apply a first inverse cryptographic function to the second encrypted result to produce a first result, and the second device can apply a second inverse cryptographic function to the first result to decrypt the secret data.
    Type: Application
    Filed: September 21, 2023
    Publication date: February 8, 2024
    Inventor: Robert O. Keith, Jr.
  • Publication number: 20240048364
    Abstract: Aspects of associative cryptography key operations are described. In one embodiment, a first cryptographic function is applied to secret data to produce a first encrypted result. The first encrypted result is transmitted by a first device to a second device. The second device applies a second cryptographic function to the first encrypted result to produce a second encrypted result. At this point, the secret data has been encrypted by two different cryptographic functions, each of them being sufficient to secure the secret data from others. The two different cryptographic function can be inversed or removed, in any order, to reveal the secret data. Thus, the first device can apply a first inverse cryptographic function to the second encrypted result to produce a first result, and the second device can apply a second inverse cryptographic function to the first result to decrypt the secret data.
    Type: Application
    Filed: September 21, 2023
    Publication date: February 8, 2024
    Inventor: Robert O. Keith, JR.
  • Publication number: 20240022565
    Abstract: A security platform architecture is described herein. A user identity platform architecture which uses a multitude of biometric analytics to create an identity token unique to an individual human. This token is derived on biometric factors like human behaviors, motion analytics, human physical characteristics like facial patterns, voice recognition prints, usage of device patterns, user location actions and other human behaviors which can derive a token or be used as a dynamic password identifying the unique individual with high calculated confidence. Because of the dynamic nature and the many different factors, this method is extremely difficult to spoof or hack by malicious actors or malware software.
    Type: Application
    Filed: September 20, 2023
    Publication date: January 18, 2024
    Inventor: Robert O. Keith, JR.
  • Publication number: 20240022568
    Abstract: Aspects of associative cryptography key operations are described. In one embodiment, a first cryptographic function is applied to secret data to produce a first encrypted result. The first encrypted result is transmitted by a first device to a second device. The second device applies a second cryptographic function to the first encrypted result to produce a second encrypted result. At this point, the secret data has been encrypted by two different cryptographic functions, each of them being sufficient to secure the secret data from others. The two different cryptographic function can be inversed or removed, in any order, to reveal the secret data. Thus, the first device can apply a first inverse cryptographic function to the second encrypted result to produce a first result, and the second device can apply a second inverse cryptographic function to the first result to decrypt the secret data.
    Type: Application
    Filed: September 21, 2023
    Publication date: January 18, 2024
    Inventor: Robert O. Keith, Jr.
  • Patent number: 11843943
    Abstract: Low power devices are able to utilize encryption in communication. Low power devices typically cannot send/receive large amounts of data since sending/receiving more data uses more power. Implementing a key exchange with a small encrypted payload enables secure communication between the devices. A one-way data stream is implemented. The one-way data stream is able to be encrypted. The dynamic key exchange is able to be used for a moving target.
    Type: Grant
    Filed: June 4, 2021
    Date of Patent: December 12, 2023
    Assignee: Winkk, Inc.
    Inventor: Robert O. Keith, Jr.
  • Publication number: 20230289431
    Abstract: A security platform architecture is described herein. The security platform architecture includes multiple layers and utilizes a combination of encryption and other security features to generate a secure environment.
    Type: Application
    Filed: May 19, 2023
    Publication date: September 14, 2023
    Inventor: Robert O. Keith, JR.
  • Publication number: 20230283602
    Abstract: A security platform architecture is described herein. The security platform architecture includes multiple layers and utilizes a combination of encryption and other security features to generate a secure environment.
    Type: Application
    Filed: May 9, 2023
    Publication date: September 7, 2023
    Inventors: Robert O. Keith, JR., Bradley E. Gray