Patents by Inventor Victor Shoup
Victor Shoup has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240354770Abstract: A system for providing notifications to client devices that includes one or more processors and one or more storage devices. The storage devices may store instructions that, when executed, configure the processors to perform operations. The operations include receiving a transaction notification from a third party; identifying a user account associated with the transaction notification; generating a push notification with a payload describing instructions to display a message and an interactive icon, and a resource identifier associated with the interactive icon, where the resource identifier includes a message ID encoding an interactive session and an action ID encoding a requested action. The operations also include transmitting the push notification to a client device associated with the user account; receiving a first indication indicating a user interaction with the interactive icon, the first indication having the resource identifier and updating the user account based on the action request.Type: ApplicationFiled: June 18, 2024Publication date: October 24, 2024Applicant: Capital One Services, LLCInventors: Maria-Andrea GERLING-OSPINA, Cara Jo RAWLS, Troy FRIEDLANDER, Naveed KHAN, Victor Raul LOPEZ VARGAS, Beth SHOUP, Michael KEATING, Angelina HUYNH, Erin RUPPERT, Lingyu CHU, DiAndrea KESSEE, Nicole M. WEAVER, Jacob Vernon Theodore YINGLING, Joshua Meyer WILBUR, Narayana Rao PAGOLU, Merin J. SAMUEL
-
Patent number: 12051075Abstract: A system for providing notifications to client devices that includes one or more processors and one or more storage devices. The storage devices may store instructions that, when executed, configure the processors to perform operations. The operations include receiving a transaction notification from a third party; identifying a user account associated with the transaction notification; generating a push notification with a payload describing instructions to display a message and an interactive icon, and a resource identifier associated with the interactive icon, where the resource identifier includes a message ID encoding an interactive session and an action ID encoding a requested action. The operations also include transmitting the push notification to a client device associated with the user account; receiving a first indication indicating a user interaction with the interactive icon, the first indication having the resource identifier and updating the user account based on the action request.Type: GrantFiled: January 7, 2022Date of Patent: July 30, 2024Assignee: Capital One Services, LLCInventors: Maria-Andrea Gerling-Ospina, Cara Jo Rawls, Troy Friedlander, Naveed Khan, Victor Raul Lopez Vargas, Beth Shoup, Michael Keating, Angelina Huynh, Erin Ruppert, Lingyu Chu, DiAndrea Kessee, Nicole M. Weaver, Jacob Vernon Theodore Yingling, Joshua Meyer Wilbur, Narayana Rao Pagolu, Merin J. Samuel
-
Patent number: 7221758Abstract: The present scheme improves the security of encrypted data or information by using of a practical public-key cryptosystem that is able to resist adaptive attacks. The disclosed scheme does not leak any information about the secret of the used key. Therefor the scheme generates an extended private key and public key. A message m, also referred to as plaintext, is encryptable to a ciphertext t by using the public key. Only a recipient with the right private key is able to decrypt the ciphertext t. But before a decryption starts, a verification of the ciphertext t takes place. Such a verification allows to prove the legitimation of the ciphertext t. That means, the ciphertext t is investigated and either decrypted back to the plaintext or rejected if a chosen ciphertext is fed, ie. the ciphertext is illegitimate or invalid.Type: GrantFiled: December 23, 2003Date of Patent: May 22, 2007Assignee: International Business Machines CorporationInventors: Ronald Cramer, Victor Shoup
-
Patent number: 7194089Abstract: A method is provided for reducing a known value modulo a shared secret value among network devices exchanging messages in a network. The reduction results in a share of reduced value for each network device of a reduced value. Each network device has its share of known value and its share of shared secret value. It performs an inversion step for deriving from the share of shared secret value a share of the inverse of the shared secret value by using an approximation process, resulting in a share of inverse value; a multiplication step for deriving from the share of inverse value by use of the share of known value a share of multiplied inverse value; a rounding step for rounding the share of multiplied inverse value; and a calculation step for deriving the share of reduced value from the share of known value, the rounded share of multiplied inverse value, and the share of shared secret value.Type: GrantFiled: October 24, 2002Date of Patent: March 20, 2007Assignee: International Business Machines CorporationInventors: Joy Algesheimer, Jan Camenisch, Victor Shoup
-
Patent number: 6957331Abstract: Byzantine Agreement requires a set of parties in a distributed system to agree on a value even if some parties are corrupted. The invention comprises a method for achieving agreement among participating network devices in an asynchronous network is disclosed that makes use of cryptography, specifically of threshold digital signatures and a distributed coin-tossing protocol.Type: GrantFiled: January 12, 2001Date of Patent: October 18, 2005Assignee: International Business Machines CorporationInventors: Klaus Kursawe, Victor Shoup, Christian Cachin
-
Patent number: 6931431Abstract: Methods and apparatus for achieving agreement among participating network devices in an asynchronous network for deciding on a common value is disclosed, whereby the common value is validated by a justification and both together satisfy a predetermined predicate. Moreover, a method for reliably broadcasting messages in an order within the asynchronous network is described. Up to one third or more of the participating network devices might be faulty in arbitrary ways.Type: GrantFiled: January 11, 2002Date of Patent: August 16, 2005Assignee: International Business Machines CorporationInventors: Christian Cachin, Klaus Kursawe, Victor Shoup, Frank Petzold
-
Publication number: 20050169478Abstract: The present scheme improves the security of encrypted data or information by using of a practical public-key cryptosystem that is able to resist adaptive attacks. The disclosed scheme does not leak any information about the secret of the used key. Therefor the scheme generates an extended private key and public key. A message m, also referred to as plaintext, is encryptable to a ciphertext t by using the public key. Only a recipient with the right private key is able to decrypt the ciphertext t. But before a decryption starts, a verification of the ciphertext t takes place. Such a verification allows to prove the legitimation of the ciphertext t. That means, the ciphertext t is investigated and either decrypted back to the plaintext or rejected if a chosen ciphertext is fed, ie. the ciphertext is illegitimate or invalid.Type: ApplicationFiled: December 23, 2003Publication date: August 4, 2005Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ronald Cramer, Victor Shoup
-
Patent number: 6754845Abstract: A method for achieving agreement among n participating network devices to an agree-value in a network is disclosed. The method proposes an optimistic approach to the consensus problem, whereby the number t of faulty devices is less than n/3. It is distinguished between an optimistic and pessimistic case. In the pessimistic case, a fallback agreement protocol is performed that reaches the same agree-value as the method in the optimistic case outputs.Type: GrantFiled: January 12, 2001Date of Patent: June 22, 2004Assignee: International Business Machines CorporationInventors: Klaus Kursawe, Victor Shoup
-
Patent number: 6697488Abstract: The present scheme improves the security of encrypted data or information by using of a practical public-key cryptosystem that is able to resist adaptive attacks. The disclosed scheme does not leak any information about the secret of the used key. Therefor the scheme generates an extended private key and public key. A message m, also referred to as plaintext, is encryptable to a ciphertext t by using the public key. Only a recipient with the right private key is able to decrypt the ciphertext r. But before a decryption starts, a verification of the ciphertext t takes place. Such a verification allows to prove the legitimation of the ciphertext t. That means, the ciphertext t is investigated and either decrypted back to the plaintext or rejected if a chosen ciphertext is fed, ie. the ciphertext is illegitimate or invalid.Type: GrantFiled: February 16, 1999Date of Patent: February 24, 2004Assignees: International Business Machines Corporation, Swiss Federal Institute of TechnologyInventors: Ronald Cramer, Victor Shoup
-
Publication number: 20030112969Abstract: A method is provided for reducing a known value modulo a shared secret value among network devices exchanging messages in a network. The reduction results in a share of reduced value for each network device of a reduced value. Each network device has its share of known value and its share of shared secret value. It performs an inversion step for deriving from the share of shared secret value a share of the inverse of the shared secret value by using an approximation process, resulting in a share of inverse value; a multiplication step for deriving from the share of inverse value by use of the share of known value a share of multiplied inverse value; a rounding step for rounding the share of multiplied inverse value; and a calculation step for deriving the share of reduced value from the share of known value, the rounded share of multiplied inverse value, and the share of shared secret value.Type: ApplicationFiled: October 24, 2002Publication date: June 19, 2003Applicant: International Business Machines CorporationInventors: Joy Algesheimer, Jan Camenisch, Victor Shoup
-
Publication number: 20020129087Abstract: Methods and apparatus for achieving agreement among participating network devices in an asynchronous network for deciding on a common value is disclosed, whereby the common value is validated by a justification and both together satisfy a predetermined predicate. Moreover, a method for reliably broadcasting messages in an order within the asynchronous network is described. Up to one third or more of the participating network devices might be faulty in arbitrary ways.Type: ApplicationFiled: January 11, 2002Publication date: September 12, 2002Applicant: International Business Machines CorporationInventors: Christian Cachin, Klaus Kursawe, Victor Shoup, Frank Petzold
-
Publication number: 20020049601Abstract: A method for the fair exchange of value items between two parties is presented in which a third party is only involved in exceptional situations. Each party sends initially in an exchange procedure, to the other party a permit which binds its value item in such a way that the receiving party can verify the fact that the value item is bound, but cannot yet extract the expected value item from the permit. If a party can accept a permit as correct, it then sends the actual value item to the other party. Thus, the exchange can be completed without involving the third party if no exceptional situation occurs.Type: ApplicationFiled: October 28, 1998Publication date: April 25, 2002Inventors: NADARAJAH ASOKAN, VICTOR SHOUP, MICHAEL WAIDNER
-
Publication number: 20010039630Abstract: Byzantine Agreement requires a set of parties in a distributed system to agree on a value even if some parties are corrupted. The invention comprises a method for achieving agreement among participating network devices in an asynchronous network is disclosed that makes use of cryptography, specifically of threshold digital signatures and a distributed coin-tossing protocol.Type: ApplicationFiled: January 12, 2001Publication date: November 8, 2001Inventors: Klaus Kursawe, Victor Shoup, Christian Cachin
-
Publication number: 20010025351Abstract: A method for achieving agreement among n participating network devices to an agree-value in a network is disclosed. The method proposes an optimistic approach to the consensus problem, whereby the number t of faulty devices is less than n/3. It is distinguished between an optimistic and pessimistic case. In the pessimistic case, a fallback agreement protocol is performed that reaches the same agree-value as the method in the optimistic case outputs.Type: ApplicationFiled: January 12, 2001Publication date: September 27, 2001Inventors: Klaus Kursawe, Victor Shoup