Patents by Inventor Tron Black

Tron Black has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11948182
    Abstract: A system includes: a plurality of network nodes communicatively coupled in a peer-to-peer network; and a plurality of computing devices each communicatively coupled to at least one of the plurality of network nodes. Computing devices transmit market trade requests to at least one of the network nodes. A first subset of network nodes (including at least two network nodes) determine an order of receipt of the plurality of market trade requests. The first subset of network nodes reach a consensus of the order of receipt of the plurality of market trade requests. The first subset of network nodes generate ordered data based on the order of receipt agreed upon by the first subset of network nodes. A second subset of network nodes (including at least two network nodes) match the plurality of market trade requests.
    Type: Grant
    Filed: March 1, 2021
    Date of Patent: April 2, 2024
    Assignee: tZERO IP, LLC
    Inventor: Tron Black
  • Patent number: 11888975
    Abstract: A system includes processor(s) and memory(s). When encryption key(s) need to be generated to encrypt a key, processor(s): generate encryption key(s); encrypt key using encryption key(s) to generate encrypted key; split encrypted key and encryption key(s) into set(s) of key components, wherein subset of key components can be used to reconstruct encrypted key and encryption key(s); and erase key from memory(s). When encryption key(s) need to be used, processor(s): receive set(s) of key components from subset(s) of users that can be used to reconstruct encrypted key and encryption key(s) used to decrypt key from encrypted key; when set(s) of key components is received from subset(s) of users that can be used to reconstruct encrypted key and encrypted key(s), reconstruct encrypted key and encryption key(s); and when the encrypted key and the encryption key(s) have both been reconstructed, decrypt encrypted key into key using encryption key(s).
    Type: Grant
    Filed: October 11, 2021
    Date of Patent: January 30, 2024
    Assignee: tZERO IP, LLC
    Inventors: Tron Black, Denny Becker, Tyler Perkins, Joel Weight, Jesse Empey
  • Publication number: 20240007275
    Abstract: A system includes at least one processor and at least one memory communicatively coupled to the at least one processor. The at least one processor is configured to receive a plurality of doubly-encrypted secret parts that were encrypted using at least a public key belonging to a public/private keypair. The at least one processor is also configured to decrypt each of the plurality of doubly-encrypted secret parts into a corresponding singly-encrypted secret part using a private key belonging to the public/private keypair. The at least one processor is also configured to decrypt each corresponding singly-encrypted secret part into a corresponding secret part. A secret is reconstructed from a quantity of corresponding secret parts that is a subset of a total number of secret parts. The public key, the private key, or both are rotated by creating a new version of the public key, the private key, or both.
    Type: Application
    Filed: September 15, 2023
    Publication date: January 4, 2024
    Applicant: tZERO IP, LLC
    Inventors: Stephen Christensen, Denny Becker, Tron Black, Michael Calcano, Tyler Perkins
  • Patent number: 11764951
    Abstract: A system includes at least one processor and at least one memory communicatively coupled to the at least one processor. The at least one processor is configured to receive a plurality of doubly-encrypted secret parts that were encrypted using at least a public key belonging to a public/private keypair. The at least one processor is also configured to decrypt each of the plurality of doubly-encrypted secret parts into a corresponding singly-encrypted secret part using a private key belonging to the public/private keypair. The at least one processor is also configured to decrypt each corresponding singly-encrypted secret part into a corresponding secret part. A secret is reconstructed from a quantity of corresponding secret parts that is a subset of a total number of secret parts previously created from the secret.
    Type: Grant
    Filed: August 16, 2022
    Date of Patent: September 19, 2023
    Assignee: tZERO IP, LLC
    Inventors: Stephen Christensen, Denny Becker, Tron Black, Michael Calcano, Tyler Perkins
  • Patent number: 11601264
    Abstract: A system includes processor(s) and at least one memory communicatively coupled to the processor(s). The processor(s) is/are configured to encrypt at least one set of asset encryption key parts into at least one set of encrypted asset encryption key parts using at least one symmetric key or at least one public key, each public key belonging to a corresponding one of at least one public/private keypair. At least a subset of the at least one set of asset encryption key parts are used to reconstruct the asset encryption key, which is used to perform an action using at least one asset key. The processor(s) is/are also configured to encrypt the encrypted asset encryption key parts and corresponding metadata using a public key of a public/private keypair so the at least one set of encrypted asset encryption key parts is doubly-encrypted.
    Type: Grant
    Filed: October 7, 2019
    Date of Patent: March 7, 2023
    Assignee: tZERO IP, LLC
    Inventors: Stephen Christensen, Denny Becker, Tron Black, Tyler Perkins
  • Patent number: 11531985
    Abstract: A computing system that includes at least one processor and at least one memory communicatively coupled to the at least one processor is disclosed. The computing system also includes at least one network interface communicatively coupled to the at least one processor and configured to communicate with at least one vault system, each of the at least one vault system storing a respective one of N private keys or key components associated with a customer. The at least one processor is configured to generate, at the customer device, a sweeping transaction that transfers all funds from at least one input transaction address in a customer wallet to a new transaction address. The at least one processor is also configured to sign the sweeping transaction using at least M of N private keys or key components.
    Type: Grant
    Filed: January 17, 2019
    Date of Patent: December 20, 2022
    Assignee: tZERO IP, LLC
    Inventors: Joel Weight, Tron Black, Denny Becker
  • Publication number: 20220399992
    Abstract: A system includes at least one processor and at least one memory communicatively coupled to the at least one processor. The at least one processor is configured to receive a plurality of doubly-encrypted secret parts that were encrypted using at least a public key belonging to a public/private keypair. The at least one processor is also configured to decrypt each of the plurality of doubly-encrypted secret parts into a corresponding singly-encrypted secret part using a private key belonging to the public/private keypair. The at least one processor is also configured to decrypt each corresponding singly-encrypted secret part into a corresponding secret part.
    Type: Application
    Filed: August 16, 2022
    Publication date: December 15, 2022
    Applicant: tZERO IP, LLC
    Inventors: Stephen Christensen, Denny Becker, Tron Black, Michael Calcano, Tyler Perkins
  • Patent number: 11444755
    Abstract: A system includes at least one processor and at least one memory communicatively coupled to the at least one processor. The at least one processor is configured to encrypt each secret part of at least one set of secret parts into a corresponding singly-encrypted secret part. The at least one processor is also configured to encrypt each corresponding singly-encrypted secret part into a corresponding doubly-encrypted secret part using a corresponding at least one public key, each public key belonging to a corresponding one of at least one public/private keypair. At least a subset of the secret parts of the at least one set of secret parts are used to reconstruct a secret.
    Type: Grant
    Filed: October 7, 2019
    Date of Patent: September 13, 2022
    Assignee: tZERO IP, LLC
    Inventors: Stephen Christensen, Denny Becker, Tron Black, Michael Calcano, Tyler Perkins
  • Patent number: 11436673
    Abstract: A system includes processor(s), memory(s) and a network interface that receives information regarding a plurality of order books from a plurality of asset exchanges. The processor(s) is configured to update a consolidated order book based on information regarding the plurality of order books for local orders received from users of the system. When a received new order does not match any order in the consolidated order book, the processor(s) is configured to place the new order in at least one of the consolidated order book, a separate local order book, or at least one of the plurality of order books of the plurality of asset exchanges. When the new order matches an order in the consolidated order book, the processor(s) is configured to: communicate a custodial order to the particular asset exchange.
    Type: Grant
    Filed: March 14, 2019
    Date of Patent: September 6, 2022
    Assignee: tZERO IP, LLC
    Inventors: Tron Black, Denny Becker, Stephen Christensen
  • Patent number: 11429959
    Abstract: A computing system that includes at least one processor and at least one memory communicatively coupled to the at least one processor is disclosed. The computing system also includes at least one network interface communicatively coupled to the at least one processor and configured to communicate with a customer device and a trusted third party. The at least one processor is configured to derive, using a hashing function, a multi-approval transaction address in a customer wallet from a first public key derived from a first parent public key, a second public key derived from a second parent public key, and a third public key derived from a third parent public key. The at least one network interface is also configured to transmit the multi-approval transaction address to the customer device.
    Type: Grant
    Filed: January 17, 2019
    Date of Patent: August 30, 2022
    Assignee: tZERO IP, LLC
    Inventors: Tron Black, Denny Becker
  • Patent number: 11392940
    Abstract: A computing system that includes at least one processor and at least one memory communicatively coupled to the at least one processor is disclosed. The computing system also includes at least one network interface communicatively coupled to the at least one processor and configured to communicate with at least one vault system, each of the at least one vault system storing a respective one of N private keys or key components associated with a customer. The at least one processor is configured to receive, from each of at least one vault system, a respective private key or key component. The at least one processor is also configured to perform at least one action based on at least M of the N private keys or key components.
    Type: Grant
    Filed: January 17, 2019
    Date of Patent: July 19, 2022
    Assignee: tZERO IP, LLC
    Inventors: Joel Weight, Steven Hopkins, Tron Black, Denny Becker
  • Publication number: 20220084022
    Abstract: A customer device that includes at least one processor and at least one memory communicatively coupled to the at least one processor. The at least one memory stores a customer private key of N private keys associated with a customer. The customer device also includes at least one network interface communicatively coupled to the at least one processor and configured to communicate with at least one vault system, each of the at least one vault system storing a respective one of the N private keys. The at least one processor is configured to receive at least one private key of the N private keys from the at least one vault system. The at least one processor is also configured to perform at least one cryptographic action based on the at least one private key and the customer private key.
    Type: Application
    Filed: November 29, 2021
    Publication date: March 17, 2022
    Applicant: tZERO IP, LLC
    Inventors: Tron Black, Denny Becker
  • Publication number: 20220029791
    Abstract: A system includes processor(s) and memory(s). When encryption key(s) need to be generated to encrypt a key, processor(s): generate encryption key(s); encrypt key using encryption key(s) to generate encrypted key; split encrypted key and encryption key(s) into set(s) of key components, wherein subset of key components can be used to reconstruct encrypted key and encryption key(s); and erase key from memory(s). When encryption key(s) need to be used, processor(s): receive set(s) of key components from subset(s) of users that can be used to reconstruct encrypted key and encryption key(s) used to decrypt key from encrypted key; when set(s) of key components is received from subset(s) of users that can be used to reconstruct encrypted key and encrypted key(s), reconstruct encrypted key and encryption key(s); and when the encrypted key and the encryption key(s) have both been reconstructed, decrypt encrypted key into key using encryption key(s).
    Type: Application
    Filed: October 11, 2021
    Publication date: January 27, 2022
    Applicant: tZERO IP, LLC
    Inventors: Tron Black, Denny Becker, Tyler Perkins, Joel Weight, Jesse Empey
  • Patent number: 11216809
    Abstract: A computing system that includes processor(s), memory(s) and a network interface that communicates with a customer device and a trusted third party. The at least one network interface is configured to receive, from the customer device, identity data for a customer and a request to restore a customer wallet. The at least one processor is configured to verify the identity data for the customer received from the customer device. When the at least one processor verifies the identity data for the customer received from the customer device, the at least one network interface is configured to communicate a request for a first key associated with the customer wallet to a key repository for the trusted third party. The at least one processor is configured to restore the customer wallet using the first key associated with the customer wallet and a second key associated with the customer wallet.
    Type: Grant
    Filed: January 17, 2019
    Date of Patent: January 4, 2022
    Assignee: tZERO IP, LLC
    Inventors: Tron Black, Denny Becker
  • Patent number: 11146392
    Abstract: A system includes processor(s) and memory(s). When encryption key(s) need to be generated to encrypt a key, processor(s): securely generate encryption key(s); encrypt key using encryption key(s) to generate encrypted key; split encrypted key and encryption key(s) into set(s) of key components, wherein subset of key components can be used to reconstruct encrypted key and encryption key(s); and securely erase key from memory(s). When encryption key(s) need to be used, processor(s): receive set(s) of key components from subset(s) of users that can be used to reconstruct encrypted key and encryption key(s) used to securely decrypt key from encrypted key; when set(s) of key components is received from subset(s) of users that can be used to reconstruct encrypted key and encrypted key(s), securely reconstruct encrypted key and encryption key(s); and when the encrypted key and the encryption key(s) have both been reconstructed, securely decrypt encrypted key into key using encryption key(s).
    Type: Grant
    Filed: March 15, 2019
    Date of Patent: October 12, 2021
    Assignee: tZERO IP, LLC
    Inventors: Tron Black, Denny Becker, Tyler Perkins, Joel Weight, Jesse Empey
  • Publication number: 20210192541
    Abstract: A computerized method includes receiving payment of an amount of cryptocurrency from a transaction account to another account. The computerized method also includes, when the payment of the amount of cryptocurrency is received at the another account from the transaction account, causing at least one of KYC, AML, and accredited investor review to be performed for an owner of the account. The computerized method also includes, when the at least one of the KYC, AML, and accredited investor review causes a status of the owner of the account to change, at least one of adding or removing at least one indication of the owner's status to a distributed ledger.
    Type: Application
    Filed: December 18, 2020
    Publication date: June 24, 2021
    Applicant: Medici Ventures, Inc.
    Inventor: Tron Black
  • Publication number: 20210182941
    Abstract: A system includes: a plurality of network nodes communicatively coupled in a peer-to-peer network; and a plurality of computing devices each communicatively coupled to at least one of the plurality of network nodes. Computing devices transmit market trade requests to at least one of the network nodes. A first subset of network nodes (including at least two network nodes) determine an order of receipt of the plurality of market trade requests. The first subset of network nodes reach a consensus of the order of receipt of the plurality of market trade requests. The first subset of network nodes generate ordered data based on the order of receipt agreed upon by the first subset of network nodes. A second subset of network nodes (including at least two network nodes) match the plurality of market trade requests.
    Type: Application
    Filed: March 1, 2021
    Publication date: June 17, 2021
    Applicant: Medici Ventures, Inc.
    Inventor: Tron Black
  • Patent number: 10937083
    Abstract: A system includes: a plurality of network nodes communicatively coupled in a peer-to-peer network; and a plurality of computing devices each communicatively coupled to at least one of the plurality of network nodes. Computing devices transmit market trade requests to at least one of the network nodes. A first subset of network nodes (including at least two network nodes) determine an order of receipt of the plurality of market trade requests. The first subset of network nodes reach a consensus of the order of receipt of the plurality of market trade requests. The first subset of network nodes generate ordered data based on the order of receipt agreed upon by the first subset of network nodes. A second subset of network nodes (including at least two network nodes) match the plurality of market trade requests.
    Type: Grant
    Filed: July 3, 2018
    Date of Patent: March 2, 2021
    Assignee: Medici Ventures, Inc.
    Inventor: Tron Black
  • Patent number: 10831902
    Abstract: Systems and methods described herein generally relate to storing and verifying data. In some embodiments, reference levels are generated according to time intervals, where the first reference level comprises a predetermined number of the time intervals, and where each of the time intervals of the remaining reference levels is comprised of a predetermined number of the time intervals of a previous reference level. Hashes of data can be created at the first reference level by performing a hashing function on the data in a time-sequenced manner. First reference level time interval hashes may be generated by performing the hashing function on the hashes of the data at each of the time intervals of the first reference level. Hashes for remaining reference level time intervals can be generated by performing the hashing function on the hashes of each of the time intervals of the previous reference level.
    Type: Grant
    Filed: May 24, 2019
    Date of Patent: November 10, 2020
    Assignee: tZERO Group, Inc.
    Inventors: Tron Black, Alec Wilkins, Robert Christensen
  • Publication number: 20200119917
    Abstract: A system includes at least one processor and at least one memory communicatively coupled to the at least one processor. The at least one processor is configured to encrypt each secret part of at least one set of secret parts into a corresponding singly-encrypted secret part. The at least one processor is also configured to encrypt each corresponding singly-encrypted secret part into a corresponding doubly-encrypted secret part using a corresponding at least one public key, each public key belonging to a corresponding one of at least one public/private keypair. At least a subset of the secret parts of the at least one set of secret parts are used to reconstruct a secret.
    Type: Application
    Filed: October 7, 2019
    Publication date: April 16, 2020
    Applicant: Medici Ventures, Inc.
    Inventors: Stephen Christensen, Denny Becker, Tron Black, Michael Calcano, Tyler Perkins