Patents by Inventor Rustam Islamov
Rustam Islamov has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240113892Abstract: Digital signatures using the Diophantine system of equations are implemented. A digital signature is an authentication mechanism that enables the creator of a message to attach a code that acts as a signature. A digital signature scheme typically includes three algorithms: a key generation algorithm, a signing algorithm, and a signature verifying algorithm. The key generation algorithm selects a private key uniformly at random from a set of possible private keys. The key generation algorithm outputs the private key and a corresponding public key. The signing algorithm produces a signature given a message and a private key. The signature verifying algorithm either accepts or rejects a message's claim to authenticity based at least in part on the message, the public key, and the signature.Type: ApplicationFiled: September 21, 2023Publication date: April 4, 2024Inventors: Robert O. Keith, JR., Rustam Islamov, Roustem Akhiarov, Maxim Silaev
-
Publication number: 20240106645Abstract: Digital signatures using the Diophantine system of equations are implemented. A digital signature is an authentication mechanism that enables the creator of a message to attach a code that acts as a signature. A digital signature scheme typically includes three algorithms: a key generation algorithm, a signing algorithm, and a signature verifying algorithm. The key generation algorithm selects a private key uniformly at random from a set of possible private keys. The key generation algorithm outputs the private key and a corresponding public key. The signing algorithm produces a signature given a message and a private key. The signature verifying algorithm either accepts or rejects a message's claim to authenticity based at least in part on the message, the public key, and the signature.Type: ApplicationFiled: September 21, 2023Publication date: March 28, 2024Inventors: Robert O. Keith, JR., Rustam Islamov, Roustem Akhiarov, Maxim Silaev
-
Publication number: 20240106658Abstract: Digital signatures using the Diophantine system of equations are implemented. A digital signature is an authentication mechanism that enables the creator of a message to attach a code that acts as a signature. A digital signature scheme typically includes three algorithms: a key generation algorithm, a signing algorithm, and a signature verifying algorithm. The key generation algorithm selects a private key uniformly at random from a set of possible private keys. The key generation algorithm outputs the private key and a corresponding public key. The signing algorithm produces a signature given a message and a private key. The signature verifying algorithm either accepts or rejects a message's claim to authenticity based at least in part on the message, the public key, and the signature.Type: ApplicationFiled: September 21, 2023Publication date: March 28, 2024Inventors: Robert O. Keith, JR., Rustam Islamov, Roustem Akhiarov, Maxim Silaev
-
Publication number: 20240106659Abstract: Digital signatures using the Diophantine system of equations are implemented. A digital signature is an authentication mechanism that enables the creator of a message to attach a code that acts as a signature. A digital signature scheme typically includes three algorithms: a key generation algorithm, a signing algorithm, and a signature verifying algorithm. The key generation algorithm selects a private key uniformly at random from a set of possible private keys. The key generation algorithm outputs the private key and a corresponding public key. The signing algorithm produces a signature given a message and a private key. The signature verifying algorithm either accepts or rejects a message's claim to authenticity based at least in part on the message, the public key, and the signature.Type: ApplicationFiled: September 21, 2023Publication date: March 28, 2024Inventors: Robert O. Keith, JR., Rustam Islamov, Roustem Akhiarov, Maxim Silaev
-
Publication number: 20240080209Abstract: Aspects and features of a cryptosystem and authentication for the cryptosystem, and a method or process for the cryptosystem, are described. In one example, a method for cryptographic communications includes storing a secret key, generating a system randomization number, and encrypting a plain data package into an encrypted data package by application of the plain data package, the secret key, and the system randomization number to a system of equations for encryption. The system of equations can be a system of linearly dependent equations in one example. Among other benefits, the cryptosystem relies upon the system of linearly dependent equations and the system randomization number to provide additional strength against known-plaintext attacks, chosen-plaintext attacks, and other types of attacks. The system is more semantically secure and offers ciphertext indistinguishability in a new approach using the system of linearly dependent equations.Type: ApplicationFiled: November 6, 2023Publication date: March 7, 2024Inventors: Rustam Islamov, Roustem Akhiarov
-
Patent number: 11824999Abstract: Aspects and features of a cryptosystem and authentication for the cryptosystem, and a method or process for the cryptosystem, are described. In one example, a method for cryptographic communications includes storing a secret key, generating a system randomization number, and encrypting a plain data package into an encrypted data package by application of the plain data package, the secret key, and the system randomization number to a system of equations for encryption. The system of equations can be a system of linearly dependent equations in one example. Among other benefits, the cryptosystem relies upon the system of linearly dependent equations and the system randomization number to provide additional strength against known-plaintext attacks, chosen-plaintext attacks, and other types of attacks. The system is more semantically secure and offers ciphertext indistinguishability in a new approach using the system of linearly dependent equations.Type: GrantFiled: August 13, 2021Date of Patent: November 21, 2023Assignee: Winkk, Inc.Inventors: Rustam Islamov, Roustem Akhiarov
-
Publication number: 20230254122Abstract: Aspects of associative cryptography key operations are described. In one embodiment, a first cryptographic function is applied to secret data to produce a first encrypted result. The first encrypted result is transmitted by a first device to a second device. The second device applies a second cryptographic function to the first encrypted result to produce a second encrypted result. At this point, the secret data has been encrypted by two different cryptographic functions, each of them being sufficient to secure the secret data from others. The two different cryptographic function can be inversed or removed, in any order, to reveal the secret data. Thus, the first device can apply a first inverse cryptographic function to the second encrypted result to produce a first result, and the second device can apply a second inverse cryptographic function to the first result to decrypt the secret data.Type: ApplicationFiled: April 18, 2023Publication date: August 10, 2023Inventor: Rustam Islamov
-
Publication number: 20230254120Abstract: Aspects of associative cryptography key operations are described. In one embodiment, a first cryptographic function is applied to secret data to produce a first encrypted result. The first encrypted result is transmitted by a first device to a second device. The second device applies a second cryptographic function to the first encrypted result to produce a second encrypted result. At this point, the secret data has been encrypted by two different cryptographic functions, each of them being sufficient to secure the secret data from others. The two different cryptographic function can be inversed or removed, in any order, to reveal the secret data. Thus, the first device can apply a first inverse cryptographic function to the second encrypted result to produce a first result, and the second device can apply a second inverse cryptographic function to the first result to decrypt the secret data.Type: ApplicationFiled: April 18, 2023Publication date: August 10, 2023Inventor: Rustam Islamov
-
Publication number: 20230254121Abstract: Aspects of associative cryptography key operations are described. In one embodiment, a first cryptographic function is applied to secret data to produce a first encrypted result. The first encrypted result is transmitted by a first device to a second device. The second device applies a second cryptographic function to the first encrypted result to produce a second encrypted result. At this point, the secret data has been encrypted by two different cryptographic functions, each of them being sufficient to secure the secret data from others. The two different cryptographic function can be inversed or removed, in any order, to reveal the secret data. Thus, the first device can apply a first inverse cryptographic function to the second encrypted result to produce a first result, and the second device can apply a second inverse cryptographic function to the first result to decrypt the secret data.Type: ApplicationFiled: April 18, 2023Publication date: August 10, 2023Inventor: Rustam Islamov
-
Patent number: 11637694Abstract: Aspects of associative cryptography key operations are described. In one embodiment, a first cryptographic function is applied to secret data to produce a first encrypted result. The first encrypted result is transmitted by a first device to a second device. The second device applies a second cryptographic function to the first encrypted result to produce a second encrypted result. At this point, the secret data has been encrypted by two different cryptographic functions, each of them being sufficient to secure the secret data from others. The two different cryptographic function can be inversed or removed, in any order, to reveal the secret data. Thus, the first device can apply a first inverse cryptographic function to the second encrypted result to produce a first result, and the second device can apply a second inverse cryptographic function to the first result to decrypt the secret data.Type: GrantFiled: July 15, 2019Date of Patent: April 25, 2023Assignee: Winkk, Inc.Inventor: Rustam Islamov
-
Publication number: 20230096233Abstract: Aspects and features of a cryptosystem and authentication for the cryptosystem, and a method or process for the cryptosystem, are described. In one example, a method for cryptographic communications includes storing a secret key, generating a system randomization number, and encrypting a plain data package into an encrypted data package by application of the plain data package, the secret key, and the system randomization number to a system of equations for encryption. The system of equations can be a system of linearly dependent equations in one example. Among other benefits, the cryptosystem relies upon the system of linearly dependent equations and the system randomization number to provide additional strength against known-plaintext attacks, chosen-plaintext attacks, and other types of attacks. The system is more semantically secure and offers ciphertext indistinguishability in a new approach using the system of linearly dependent equations.Type: ApplicationFiled: August 13, 2021Publication date: March 30, 2023Inventors: Rustam Islamov, Roustem Akhiarov
-
Publication number: 20220094545Abstract: Aspects of associative cryptography key operations are described. In one embodiment, a first cryptographic function is applied to secret data to produce a first encrypted result. The first encrypted result is transmitted by a first device to a second device. The second device applies a second cryptographic function to the first encrypted result to produce a second encrypted result. At this point, the secret data has been encrypted by two different cryptographic functions, each of them being sufficient to secure the secret data from others. The two different cryptographic function can be inversed or removed, in any order, to reveal the secret data. Thus, the first device can apply a first inverse cryptographic function to the second encrypted result to produce a first result, and the second device can apply a second inverse cryptographic function to the first result to decrypt the secret data.Type: ApplicationFiled: December 3, 2021Publication date: March 24, 2022Inventors: Rustam Islamov, Robert O. Keith, JR.
-
Publication number: 20210028929Abstract: Aspects of associative cryptography key operations are described. In one embodiment, a first cryptographic function is applied to secret data to produce a first encrypted result. The first encrypted result is transmitted by a first device to a second device. The second device applies a second cryptographic function to the first encrypted result to produce a second encrypted result. At this point, the secret data has been encrypted by two different cryptographic functions, each of them being sufficient to secure the secret data from others. The two different cryptographic function can be inversed or removed, in any order, to reveal the secret data. Thus, the first device can apply a first inverse cryptographic function to the second encrypted result to produce a first result, and the second device can apply a second inverse cryptographic function to the first result to decrypt the secret data.Type: ApplicationFiled: July 15, 2019Publication date: January 28, 2021Inventor: Rustam Islamov