Patents by Inventor Roustem Akhiarov

Roustem Akhiarov has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240113892
    Abstract: Digital signatures using the Diophantine system of equations are implemented. A digital signature is an authentication mechanism that enables the creator of a message to attach a code that acts as a signature. A digital signature scheme typically includes three algorithms: a key generation algorithm, a signing algorithm, and a signature verifying algorithm. The key generation algorithm selects a private key uniformly at random from a set of possible private keys. The key generation algorithm outputs the private key and a corresponding public key. The signing algorithm produces a signature given a message and a private key. The signature verifying algorithm either accepts or rejects a message's claim to authenticity based at least in part on the message, the public key, and the signature.
    Type: Application
    Filed: September 21, 2023
    Publication date: April 4, 2024
    Inventors: Robert O. Keith, JR., Rustam Islamov, Roustem Akhiarov, Maxim Silaev
  • Publication number: 20240106645
    Abstract: Digital signatures using the Diophantine system of equations are implemented. A digital signature is an authentication mechanism that enables the creator of a message to attach a code that acts as a signature. A digital signature scheme typically includes three algorithms: a key generation algorithm, a signing algorithm, and a signature verifying algorithm. The key generation algorithm selects a private key uniformly at random from a set of possible private keys. The key generation algorithm outputs the private key and a corresponding public key. The signing algorithm produces a signature given a message and a private key. The signature verifying algorithm either accepts or rejects a message's claim to authenticity based at least in part on the message, the public key, and the signature.
    Type: Application
    Filed: September 21, 2023
    Publication date: March 28, 2024
    Inventors: Robert O. Keith, JR., Rustam Islamov, Roustem Akhiarov, Maxim Silaev
  • Publication number: 20240106658
    Abstract: Digital signatures using the Diophantine system of equations are implemented. A digital signature is an authentication mechanism that enables the creator of a message to attach a code that acts as a signature. A digital signature scheme typically includes three algorithms: a key generation algorithm, a signing algorithm, and a signature verifying algorithm. The key generation algorithm selects a private key uniformly at random from a set of possible private keys. The key generation algorithm outputs the private key and a corresponding public key. The signing algorithm produces a signature given a message and a private key. The signature verifying algorithm either accepts or rejects a message's claim to authenticity based at least in part on the message, the public key, and the signature.
    Type: Application
    Filed: September 21, 2023
    Publication date: March 28, 2024
    Inventors: Robert O. Keith, JR., Rustam Islamov, Roustem Akhiarov, Maxim Silaev
  • Publication number: 20240106659
    Abstract: Digital signatures using the Diophantine system of equations are implemented. A digital signature is an authentication mechanism that enables the creator of a message to attach a code that acts as a signature. A digital signature scheme typically includes three algorithms: a key generation algorithm, a signing algorithm, and a signature verifying algorithm. The key generation algorithm selects a private key uniformly at random from a set of possible private keys. The key generation algorithm outputs the private key and a corresponding public key. The signing algorithm produces a signature given a message and a private key. The signature verifying algorithm either accepts or rejects a message's claim to authenticity based at least in part on the message, the public key, and the signature.
    Type: Application
    Filed: September 21, 2023
    Publication date: March 28, 2024
    Inventors: Robert O. Keith, JR., Rustam Islamov, Roustem Akhiarov, Maxim Silaev
  • Publication number: 20240080209
    Abstract: Aspects and features of a cryptosystem and authentication for the cryptosystem, and a method or process for the cryptosystem, are described. In one example, a method for cryptographic communications includes storing a secret key, generating a system randomization number, and encrypting a plain data package into an encrypted data package by application of the plain data package, the secret key, and the system randomization number to a system of equations for encryption. The system of equations can be a system of linearly dependent equations in one example. Among other benefits, the cryptosystem relies upon the system of linearly dependent equations and the system randomization number to provide additional strength against known-plaintext attacks, chosen-plaintext attacks, and other types of attacks. The system is more semantically secure and offers ciphertext indistinguishability in a new approach using the system of linearly dependent equations.
    Type: Application
    Filed: November 6, 2023
    Publication date: March 7, 2024
    Inventors: Rustam Islamov, Roustem Akhiarov
  • Patent number: 11824999
    Abstract: Aspects and features of a cryptosystem and authentication for the cryptosystem, and a method or process for the cryptosystem, are described. In one example, a method for cryptographic communications includes storing a secret key, generating a system randomization number, and encrypting a plain data package into an encrypted data package by application of the plain data package, the secret key, and the system randomization number to a system of equations for encryption. The system of equations can be a system of linearly dependent equations in one example. Among other benefits, the cryptosystem relies upon the system of linearly dependent equations and the system randomization number to provide additional strength against known-plaintext attacks, chosen-plaintext attacks, and other types of attacks. The system is more semantically secure and offers ciphertext indistinguishability in a new approach using the system of linearly dependent equations.
    Type: Grant
    Filed: August 13, 2021
    Date of Patent: November 21, 2023
    Assignee: Winkk, Inc.
    Inventors: Rustam Islamov, Roustem Akhiarov
  • Publication number: 20230096233
    Abstract: Aspects and features of a cryptosystem and authentication for the cryptosystem, and a method or process for the cryptosystem, are described. In one example, a method for cryptographic communications includes storing a secret key, generating a system randomization number, and encrypting a plain data package into an encrypted data package by application of the plain data package, the secret key, and the system randomization number to a system of equations for encryption. The system of equations can be a system of linearly dependent equations in one example. Among other benefits, the cryptosystem relies upon the system of linearly dependent equations and the system randomization number to provide additional strength against known-plaintext attacks, chosen-plaintext attacks, and other types of attacks. The system is more semantically secure and offers ciphertext indistinguishability in a new approach using the system of linearly dependent equations.
    Type: Application
    Filed: August 13, 2021
    Publication date: March 30, 2023
    Inventors: Rustam Islamov, Roustem Akhiarov