Patents by Inventor Roger GUSEMAN

Roger GUSEMAN has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10297094
    Abstract: Access by a requesting entity to an asset is authorized by an access-controlling entity, which transmits to the requesting entity a challenge data set and then receives from the requesting entity a response purportedly corresponding to a representation of the challenge data set in a non-repudiatable form, obtained from an event validation system. The access-controlling entity queries the event validation system to determine whether the response does correspond to a correct representation of the challenge data set in the non-repudiatable form, and authorizes the requesting entity for access only if the response is correct representation. Non-repudiation can be established through entry into a blockchain, or using a hash-tree-based digital signature infrastructure.
    Type: Grant
    Filed: December 29, 2017
    Date of Patent: May 21, 2019
    Assignee: Guardtime IP Holdings Limited
    Inventors: Garrett Day, Jeffrey Pearce, David E Hamilton, Jr., Kevin Zawicki, Roger Guseman
  • Patent number: 10249114
    Abstract: Control of access by a requesting entity to an asset includes defining an approved state of the requesting entity. A validation of a representation of the approved state of in a non-repudiatable form in obtained from an event validation system. The requesting entity is triggered to determine its current state by an access-control entity, which compares the current state with the approved state and allows access by the requesting entity to the asset only if the current state is the same as the approved state. In a pre-authorization procedure, one or both of the entities issues a data set challenge to the other, which then validates the challenge via the event validation system and returns this validation to the challenging entity, which then checks the validation to see if it is correct. Data sets may be validated, for example, with hash tree based signatures or blockchain entries.
    Type: Grant
    Filed: December 29, 2017
    Date of Patent: April 2, 2019
    Assignee: Guardtime IP Holdings Limited
    Inventors: Garrett Day, Jeffrey Pearce, David E Hamilton, Jr., Kevin Zawicki, Roger Guseman
  • Patent number: 10068397
    Abstract: Control of access by a requesting entity to an asset includes defining an approved state of the requesting entity. A validation of a representation of the approved state of in a non-repudiatable form in obtained from an event validation system. The requesting entity is triggered to determine its current state by an access-control entity, which compares the current state with the approved state and allows access by the requesting entity to the asset only if the current state is the same as the approved state. In a pre-authorization procedure, one or both of the entities issues a data set challenge to the other, which then validates the challenge via the event validation system and returns this validation to the challenging entity, which then checks the validation to see if it is correct. Data sets may be validated, for example, with hash tree based signatures or blockchain entries.
    Type: Grant
    Filed: April 6, 2016
    Date of Patent: September 4, 2018
    Assignee: GUARDTIME IP HOLDINGS, LTD.
    Inventors: Garrett Day, Jeffrey Pearce, David E Hamilton, Jr., Kevin Zawicki, Roger Guseman
  • Publication number: 20180144564
    Abstract: Access by a requesting entity to an asset is authorized by an access-controlling entity, which transmits to the requesting entity a challenge data set and then receives from the requesting entity a response purportedly corresponding to a representation of the challenge data set in a non-repudiatable form, obtained from an event validation system. The access-controlling entity queries the event validation system to determine whether the response does correspond to a correct representation of the challenge data set in the non-repudiatable form, and authorizes the requesting entity for access only if the response is correct representation. Non-repudiation can be established through entry into a blockchain, or using a hash-tree-based digital signature infrastructure.
    Type: Application
    Filed: December 29, 2017
    Publication date: May 24, 2018
    Applicant: Guardtime IP Holdings Limited
    Inventors: Garrett DAY, Jeffrey PEARCE, David E HAMILTON, JR., Kevin ZAWICKI, Roger GUSEMAN
  • Publication number: 20180144565
    Abstract: Control of access by a requesting entity to an asset includes defining an approved state of the requesting entity. A validation of a representation of the approved state of in a non-repudiatable form in obtained from an event validation system. The requesting entity is triggered to determine its current state by an access-control entity, which compares the current state with the approved state and allows access by the requesting entity to the asset only if the current state is the same as the approved state. In a pre-authorization procedure, one or both of the entities issues a data set challenge to the other, which then validates the challenge via the event validation system and returns this validation to the challenging entity, which then checks the validation to see if it is correct. Data sets may be validated, for example, with hash tree based signatures or blockchain entries.
    Type: Application
    Filed: December 29, 2017
    Publication date: May 24, 2018
    Applicant: Guardtime IP Holdings Limited
    Inventors: Garrett DAY, Jeffrey PEARCE, David E. HAMILTON, JR., Kevin ZAWICKI, Roger GUSEMAN
  • Publication number: 20170295180
    Abstract: Control of access by a requesting entity to an asset includes defining an approved state of the requesting entity. A validation of a representation of the approved state of in a non-repudiatable form in obtained from an event validation system. The requesting entity is triggered to determine its current state by an access-control entity, which compares the current state with the approved state and allows access by the requesting entity to the asset only if the current state is the same as the approved state. In a pre-authorization procedure, one or both of the entities issues a data set challenge to the other, which then validates the challenge via the event validation system and returns this validation to the challenging entity, which then checks the validation to see if it is correct. Data sets may be validated, for example, with hash tree based signatures or blockchain entries.
    Type: Application
    Filed: April 6, 2016
    Publication date: October 12, 2017
    Applicant: Guardtime IP Holdings Limited
    Inventors: Garrett DAY, Jeffrey PEARCE, David E HAMILTON, JR., Kevin ZAWICKI, Roger GUSEMAN