Patents by Inventor Tron Black
Tron Black has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11948182Abstract: A system includes: a plurality of network nodes communicatively coupled in a peer-to-peer network; and a plurality of computing devices each communicatively coupled to at least one of the plurality of network nodes. Computing devices transmit market trade requests to at least one of the network nodes. A first subset of network nodes (including at least two network nodes) determine an order of receipt of the plurality of market trade requests. The first subset of network nodes reach a consensus of the order of receipt of the plurality of market trade requests. The first subset of network nodes generate ordered data based on the order of receipt agreed upon by the first subset of network nodes. A second subset of network nodes (including at least two network nodes) match the plurality of market trade requests.Type: GrantFiled: March 1, 2021Date of Patent: April 2, 2024Assignee: tZERO IP, LLCInventor: Tron Black
-
Patent number: 11888975Abstract: A system includes processor(s) and memory(s). When encryption key(s) need to be generated to encrypt a key, processor(s): generate encryption key(s); encrypt key using encryption key(s) to generate encrypted key; split encrypted key and encryption key(s) into set(s) of key components, wherein subset of key components can be used to reconstruct encrypted key and encryption key(s); and erase key from memory(s). When encryption key(s) need to be used, processor(s): receive set(s) of key components from subset(s) of users that can be used to reconstruct encrypted key and encryption key(s) used to decrypt key from encrypted key; when set(s) of key components is received from subset(s) of users that can be used to reconstruct encrypted key and encrypted key(s), reconstruct encrypted key and encryption key(s); and when the encrypted key and the encryption key(s) have both been reconstructed, decrypt encrypted key into key using encryption key(s).Type: GrantFiled: October 11, 2021Date of Patent: January 30, 2024Assignee: tZERO IP, LLCInventors: Tron Black, Denny Becker, Tyler Perkins, Joel Weight, Jesse Empey
-
Publication number: 20240007275Abstract: A system includes at least one processor and at least one memory communicatively coupled to the at least one processor. The at least one processor is configured to receive a plurality of doubly-encrypted secret parts that were encrypted using at least a public key belonging to a public/private keypair. The at least one processor is also configured to decrypt each of the plurality of doubly-encrypted secret parts into a corresponding singly-encrypted secret part using a private key belonging to the public/private keypair. The at least one processor is also configured to decrypt each corresponding singly-encrypted secret part into a corresponding secret part. A secret is reconstructed from a quantity of corresponding secret parts that is a subset of a total number of secret parts. The public key, the private key, or both are rotated by creating a new version of the public key, the private key, or both.Type: ApplicationFiled: September 15, 2023Publication date: January 4, 2024Applicant: tZERO IP, LLCInventors: Stephen Christensen, Denny Becker, Tron Black, Michael Calcano, Tyler Perkins
-
Patent number: 11764951Abstract: A system includes at least one processor and at least one memory communicatively coupled to the at least one processor. The at least one processor is configured to receive a plurality of doubly-encrypted secret parts that were encrypted using at least a public key belonging to a public/private keypair. The at least one processor is also configured to decrypt each of the plurality of doubly-encrypted secret parts into a corresponding singly-encrypted secret part using a private key belonging to the public/private keypair. The at least one processor is also configured to decrypt each corresponding singly-encrypted secret part into a corresponding secret part. A secret is reconstructed from a quantity of corresponding secret parts that is a subset of a total number of secret parts previously created from the secret.Type: GrantFiled: August 16, 2022Date of Patent: September 19, 2023Assignee: tZERO IP, LLCInventors: Stephen Christensen, Denny Becker, Tron Black, Michael Calcano, Tyler Perkins
-
Patent number: 11601264Abstract: A system includes processor(s) and at least one memory communicatively coupled to the processor(s). The processor(s) is/are configured to encrypt at least one set of asset encryption key parts into at least one set of encrypted asset encryption key parts using at least one symmetric key or at least one public key, each public key belonging to a corresponding one of at least one public/private keypair. At least a subset of the at least one set of asset encryption key parts are used to reconstruct the asset encryption key, which is used to perform an action using at least one asset key. The processor(s) is/are also configured to encrypt the encrypted asset encryption key parts and corresponding metadata using a public key of a public/private keypair so the at least one set of encrypted asset encryption key parts is doubly-encrypted.Type: GrantFiled: October 7, 2019Date of Patent: March 7, 2023Assignee: tZERO IP, LLCInventors: Stephen Christensen, Denny Becker, Tron Black, Tyler Perkins
-
Patent number: 11531985Abstract: A computing system that includes at least one processor and at least one memory communicatively coupled to the at least one processor is disclosed. The computing system also includes at least one network interface communicatively coupled to the at least one processor and configured to communicate with at least one vault system, each of the at least one vault system storing a respective one of N private keys or key components associated with a customer. The at least one processor is configured to generate, at the customer device, a sweeping transaction that transfers all funds from at least one input transaction address in a customer wallet to a new transaction address. The at least one processor is also configured to sign the sweeping transaction using at least M of N private keys or key components.Type: GrantFiled: January 17, 2019Date of Patent: December 20, 2022Assignee: tZERO IP, LLCInventors: Joel Weight, Tron Black, Denny Becker
-
Publication number: 20220399992Abstract: A system includes at least one processor and at least one memory communicatively coupled to the at least one processor. The at least one processor is configured to receive a plurality of doubly-encrypted secret parts that were encrypted using at least a public key belonging to a public/private keypair. The at least one processor is also configured to decrypt each of the plurality of doubly-encrypted secret parts into a corresponding singly-encrypted secret part using a private key belonging to the public/private keypair. The at least one processor is also configured to decrypt each corresponding singly-encrypted secret part into a corresponding secret part.Type: ApplicationFiled: August 16, 2022Publication date: December 15, 2022Applicant: tZERO IP, LLCInventors: Stephen Christensen, Denny Becker, Tron Black, Michael Calcano, Tyler Perkins
-
Patent number: 11444755Abstract: A system includes at least one processor and at least one memory communicatively coupled to the at least one processor. The at least one processor is configured to encrypt each secret part of at least one set of secret parts into a corresponding singly-encrypted secret part. The at least one processor is also configured to encrypt each corresponding singly-encrypted secret part into a corresponding doubly-encrypted secret part using a corresponding at least one public key, each public key belonging to a corresponding one of at least one public/private keypair. At least a subset of the secret parts of the at least one set of secret parts are used to reconstruct a secret.Type: GrantFiled: October 7, 2019Date of Patent: September 13, 2022Assignee: tZERO IP, LLCInventors: Stephen Christensen, Denny Becker, Tron Black, Michael Calcano, Tyler Perkins
-
Patent number: 11436673Abstract: A system includes processor(s), memory(s) and a network interface that receives information regarding a plurality of order books from a plurality of asset exchanges. The processor(s) is configured to update a consolidated order book based on information regarding the plurality of order books for local orders received from users of the system. When a received new order does not match any order in the consolidated order book, the processor(s) is configured to place the new order in at least one of the consolidated order book, a separate local order book, or at least one of the plurality of order books of the plurality of asset exchanges. When the new order matches an order in the consolidated order book, the processor(s) is configured to: communicate a custodial order to the particular asset exchange.Type: GrantFiled: March 14, 2019Date of Patent: September 6, 2022Assignee: tZERO IP, LLCInventors: Tron Black, Denny Becker, Stephen Christensen
-
Patent number: 11429959Abstract: A computing system that includes at least one processor and at least one memory communicatively coupled to the at least one processor is disclosed. The computing system also includes at least one network interface communicatively coupled to the at least one processor and configured to communicate with a customer device and a trusted third party. The at least one processor is configured to derive, using a hashing function, a multi-approval transaction address in a customer wallet from a first public key derived from a first parent public key, a second public key derived from a second parent public key, and a third public key derived from a third parent public key. The at least one network interface is also configured to transmit the multi-approval transaction address to the customer device.Type: GrantFiled: January 17, 2019Date of Patent: August 30, 2022Assignee: tZERO IP, LLCInventors: Tron Black, Denny Becker
-
Patent number: 11392940Abstract: A computing system that includes at least one processor and at least one memory communicatively coupled to the at least one processor is disclosed. The computing system also includes at least one network interface communicatively coupled to the at least one processor and configured to communicate with at least one vault system, each of the at least one vault system storing a respective one of N private keys or key components associated with a customer. The at least one processor is configured to receive, from each of at least one vault system, a respective private key or key component. The at least one processor is also configured to perform at least one action based on at least M of the N private keys or key components.Type: GrantFiled: January 17, 2019Date of Patent: July 19, 2022Assignee: tZERO IP, LLCInventors: Joel Weight, Steven Hopkins, Tron Black, Denny Becker
-
Publication number: 20220084022Abstract: A customer device that includes at least one processor and at least one memory communicatively coupled to the at least one processor. The at least one memory stores a customer private key of N private keys associated with a customer. The customer device also includes at least one network interface communicatively coupled to the at least one processor and configured to communicate with at least one vault system, each of the at least one vault system storing a respective one of the N private keys. The at least one processor is configured to receive at least one private key of the N private keys from the at least one vault system. The at least one processor is also configured to perform at least one cryptographic action based on the at least one private key and the customer private key.Type: ApplicationFiled: November 29, 2021Publication date: March 17, 2022Applicant: tZERO IP, LLCInventors: Tron Black, Denny Becker
-
Publication number: 20220029791Abstract: A system includes processor(s) and memory(s). When encryption key(s) need to be generated to encrypt a key, processor(s): generate encryption key(s); encrypt key using encryption key(s) to generate encrypted key; split encrypted key and encryption key(s) into set(s) of key components, wherein subset of key components can be used to reconstruct encrypted key and encryption key(s); and erase key from memory(s). When encryption key(s) need to be used, processor(s): receive set(s) of key components from subset(s) of users that can be used to reconstruct encrypted key and encryption key(s) used to decrypt key from encrypted key; when set(s) of key components is received from subset(s) of users that can be used to reconstruct encrypted key and encrypted key(s), reconstruct encrypted key and encryption key(s); and when the encrypted key and the encryption key(s) have both been reconstructed, decrypt encrypted key into key using encryption key(s).Type: ApplicationFiled: October 11, 2021Publication date: January 27, 2022Applicant: tZERO IP, LLCInventors: Tron Black, Denny Becker, Tyler Perkins, Joel Weight, Jesse Empey
-
Patent number: 11216809Abstract: A computing system that includes processor(s), memory(s) and a network interface that communicates with a customer device and a trusted third party. The at least one network interface is configured to receive, from the customer device, identity data for a customer and a request to restore a customer wallet. The at least one processor is configured to verify the identity data for the customer received from the customer device. When the at least one processor verifies the identity data for the customer received from the customer device, the at least one network interface is configured to communicate a request for a first key associated with the customer wallet to a key repository for the trusted third party. The at least one processor is configured to restore the customer wallet using the first key associated with the customer wallet and a second key associated with the customer wallet.Type: GrantFiled: January 17, 2019Date of Patent: January 4, 2022Assignee: tZERO IP, LLCInventors: Tron Black, Denny Becker
-
Patent number: 11146392Abstract: A system includes processor(s) and memory(s). When encryption key(s) need to be generated to encrypt a key, processor(s): securely generate encryption key(s); encrypt key using encryption key(s) to generate encrypted key; split encrypted key and encryption key(s) into set(s) of key components, wherein subset of key components can be used to reconstruct encrypted key and encryption key(s); and securely erase key from memory(s). When encryption key(s) need to be used, processor(s): receive set(s) of key components from subset(s) of users that can be used to reconstruct encrypted key and encryption key(s) used to securely decrypt key from encrypted key; when set(s) of key components is received from subset(s) of users that can be used to reconstruct encrypted key and encrypted key(s), securely reconstruct encrypted key and encryption key(s); and when the encrypted key and the encryption key(s) have both been reconstructed, securely decrypt encrypted key into key using encryption key(s).Type: GrantFiled: March 15, 2019Date of Patent: October 12, 2021Assignee: tZERO IP, LLCInventors: Tron Black, Denny Becker, Tyler Perkins, Joel Weight, Jesse Empey
-
Publication number: 20210192541Abstract: A computerized method includes receiving payment of an amount of cryptocurrency from a transaction account to another account. The computerized method also includes, when the payment of the amount of cryptocurrency is received at the another account from the transaction account, causing at least one of KYC, AML, and accredited investor review to be performed for an owner of the account. The computerized method also includes, when the at least one of the KYC, AML, and accredited investor review causes a status of the owner of the account to change, at least one of adding or removing at least one indication of the owner's status to a distributed ledger.Type: ApplicationFiled: December 18, 2020Publication date: June 24, 2021Applicant: Medici Ventures, Inc.Inventor: Tron Black
-
Publication number: 20210182941Abstract: A system includes: a plurality of network nodes communicatively coupled in a peer-to-peer network; and a plurality of computing devices each communicatively coupled to at least one of the plurality of network nodes. Computing devices transmit market trade requests to at least one of the network nodes. A first subset of network nodes (including at least two network nodes) determine an order of receipt of the plurality of market trade requests. The first subset of network nodes reach a consensus of the order of receipt of the plurality of market trade requests. The first subset of network nodes generate ordered data based on the order of receipt agreed upon by the first subset of network nodes. A second subset of network nodes (including at least two network nodes) match the plurality of market trade requests.Type: ApplicationFiled: March 1, 2021Publication date: June 17, 2021Applicant: Medici Ventures, Inc.Inventor: Tron Black
-
Patent number: 10937083Abstract: A system includes: a plurality of network nodes communicatively coupled in a peer-to-peer network; and a plurality of computing devices each communicatively coupled to at least one of the plurality of network nodes. Computing devices transmit market trade requests to at least one of the network nodes. A first subset of network nodes (including at least two network nodes) determine an order of receipt of the plurality of market trade requests. The first subset of network nodes reach a consensus of the order of receipt of the plurality of market trade requests. The first subset of network nodes generate ordered data based on the order of receipt agreed upon by the first subset of network nodes. A second subset of network nodes (including at least two network nodes) match the plurality of market trade requests.Type: GrantFiled: July 3, 2018Date of Patent: March 2, 2021Assignee: Medici Ventures, Inc.Inventor: Tron Black
-
Patent number: 10831902Abstract: Systems and methods described herein generally relate to storing and verifying data. In some embodiments, reference levels are generated according to time intervals, where the first reference level comprises a predetermined number of the time intervals, and where each of the time intervals of the remaining reference levels is comprised of a predetermined number of the time intervals of a previous reference level. Hashes of data can be created at the first reference level by performing a hashing function on the data in a time-sequenced manner. First reference level time interval hashes may be generated by performing the hashing function on the hashes of the data at each of the time intervals of the first reference level. Hashes for remaining reference level time intervals can be generated by performing the hashing function on the hashes of each of the time intervals of the previous reference level.Type: GrantFiled: May 24, 2019Date of Patent: November 10, 2020Assignee: tZERO Group, Inc.Inventors: Tron Black, Alec Wilkins, Robert Christensen
-
Publication number: 20200119917Abstract: A system includes at least one processor and at least one memory communicatively coupled to the at least one processor. The at least one processor is configured to encrypt each secret part of at least one set of secret parts into a corresponding singly-encrypted secret part. The at least one processor is also configured to encrypt each corresponding singly-encrypted secret part into a corresponding doubly-encrypted secret part using a corresponding at least one public key, each public key belonging to a corresponding one of at least one public/private keypair. At least a subset of the secret parts of the at least one set of secret parts are used to reconstruct a secret.Type: ApplicationFiled: October 7, 2019Publication date: April 16, 2020Applicant: Medici Ventures, Inc.Inventors: Stephen Christensen, Denny Becker, Tron Black, Michael Calcano, Tyler Perkins