Patents by Inventor Victor Shoup

Victor Shoup has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240354770
    Abstract: A system for providing notifications to client devices that includes one or more processors and one or more storage devices. The storage devices may store instructions that, when executed, configure the processors to perform operations. The operations include receiving a transaction notification from a third party; identifying a user account associated with the transaction notification; generating a push notification with a payload describing instructions to display a message and an interactive icon, and a resource identifier associated with the interactive icon, where the resource identifier includes a message ID encoding an interactive session and an action ID encoding a requested action. The operations also include transmitting the push notification to a client device associated with the user account; receiving a first indication indicating a user interaction with the interactive icon, the first indication having the resource identifier and updating the user account based on the action request.
    Type: Application
    Filed: June 18, 2024
    Publication date: October 24, 2024
    Applicant: Capital One Services, LLC
    Inventors: Maria-Andrea GERLING-OSPINA, Cara Jo RAWLS, Troy FRIEDLANDER, Naveed KHAN, Victor Raul LOPEZ VARGAS, Beth SHOUP, Michael KEATING, Angelina HUYNH, Erin RUPPERT, Lingyu CHU, DiAndrea KESSEE, Nicole M. WEAVER, Jacob Vernon Theodore YINGLING, Joshua Meyer WILBUR, Narayana Rao PAGOLU, Merin J. SAMUEL
  • Patent number: 12051075
    Abstract: A system for providing notifications to client devices that includes one or more processors and one or more storage devices. The storage devices may store instructions that, when executed, configure the processors to perform operations. The operations include receiving a transaction notification from a third party; identifying a user account associated with the transaction notification; generating a push notification with a payload describing instructions to display a message and an interactive icon, and a resource identifier associated with the interactive icon, where the resource identifier includes a message ID encoding an interactive session and an action ID encoding a requested action. The operations also include transmitting the push notification to a client device associated with the user account; receiving a first indication indicating a user interaction with the interactive icon, the first indication having the resource identifier and updating the user account based on the action request.
    Type: Grant
    Filed: January 7, 2022
    Date of Patent: July 30, 2024
    Assignee: Capital One Services, LLC
    Inventors: Maria-Andrea Gerling-Ospina, Cara Jo Rawls, Troy Friedlander, Naveed Khan, Victor Raul Lopez Vargas, Beth Shoup, Michael Keating, Angelina Huynh, Erin Ruppert, Lingyu Chu, DiAndrea Kessee, Nicole M. Weaver, Jacob Vernon Theodore Yingling, Joshua Meyer Wilbur, Narayana Rao Pagolu, Merin J. Samuel
  • Patent number: 7221758
    Abstract: The present scheme improves the security of encrypted data or information by using of a practical public-key cryptosystem that is able to resist adaptive attacks. The disclosed scheme does not leak any information about the secret of the used key. Therefor the scheme generates an extended private key and public key. A message m, also referred to as plaintext, is encryptable to a ciphertext t by using the public key. Only a recipient with the right private key is able to decrypt the ciphertext t. But before a decryption starts, a verification of the ciphertext t takes place. Such a verification allows to prove the legitimation of the ciphertext t. That means, the ciphertext t is investigated and either decrypted back to the plaintext or rejected if a chosen ciphertext is fed, ie. the ciphertext is illegitimate or invalid.
    Type: Grant
    Filed: December 23, 2003
    Date of Patent: May 22, 2007
    Assignee: International Business Machines Corporation
    Inventors: Ronald Cramer, Victor Shoup
  • Patent number: 7194089
    Abstract: A method is provided for reducing a known value modulo a shared secret value among network devices exchanging messages in a network. The reduction results in a share of reduced value for each network device of a reduced value. Each network device has its share of known value and its share of shared secret value. It performs an inversion step for deriving from the share of shared secret value a share of the inverse of the shared secret value by using an approximation process, resulting in a share of inverse value; a multiplication step for deriving from the share of inverse value by use of the share of known value a share of multiplied inverse value; a rounding step for rounding the share of multiplied inverse value; and a calculation step for deriving the share of reduced value from the share of known value, the rounded share of multiplied inverse value, and the share of shared secret value.
    Type: Grant
    Filed: October 24, 2002
    Date of Patent: March 20, 2007
    Assignee: International Business Machines Corporation
    Inventors: Joy Algesheimer, Jan Camenisch, Victor Shoup
  • Patent number: 6957331
    Abstract: Byzantine Agreement requires a set of parties in a distributed system to agree on a value even if some parties are corrupted. The invention comprises a method for achieving agreement among participating network devices in an asynchronous network is disclosed that makes use of cryptography, specifically of threshold digital signatures and a distributed coin-tossing protocol.
    Type: Grant
    Filed: January 12, 2001
    Date of Patent: October 18, 2005
    Assignee: International Business Machines Corporation
    Inventors: Klaus Kursawe, Victor Shoup, Christian Cachin
  • Patent number: 6931431
    Abstract: Methods and apparatus for achieving agreement among participating network devices in an asynchronous network for deciding on a common value is disclosed, whereby the common value is validated by a justification and both together satisfy a predetermined predicate. Moreover, a method for reliably broadcasting messages in an order within the asynchronous network is described. Up to one third or more of the participating network devices might be faulty in arbitrary ways.
    Type: Grant
    Filed: January 11, 2002
    Date of Patent: August 16, 2005
    Assignee: International Business Machines Corporation
    Inventors: Christian Cachin, Klaus Kursawe, Victor Shoup, Frank Petzold
  • Publication number: 20050169478
    Abstract: The present scheme improves the security of encrypted data or information by using of a practical public-key cryptosystem that is able to resist adaptive attacks. The disclosed scheme does not leak any information about the secret of the used key. Therefor the scheme generates an extended private key and public key. A message m, also referred to as plaintext, is encryptable to a ciphertext t by using the public key. Only a recipient with the right private key is able to decrypt the ciphertext t. But before a decryption starts, a verification of the ciphertext t takes place. Such a verification allows to prove the legitimation of the ciphertext t. That means, the ciphertext t is investigated and either decrypted back to the plaintext or rejected if a chosen ciphertext is fed, ie. the ciphertext is illegitimate or invalid.
    Type: Application
    Filed: December 23, 2003
    Publication date: August 4, 2005
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ronald Cramer, Victor Shoup
  • Patent number: 6754845
    Abstract: A method for achieving agreement among n participating network devices to an agree-value in a network is disclosed. The method proposes an optimistic approach to the consensus problem, whereby the number t of faulty devices is less than n/3. It is distinguished between an optimistic and pessimistic case. In the pessimistic case, a fallback agreement protocol is performed that reaches the same agree-value as the method in the optimistic case outputs.
    Type: Grant
    Filed: January 12, 2001
    Date of Patent: June 22, 2004
    Assignee: International Business Machines Corporation
    Inventors: Klaus Kursawe, Victor Shoup
  • Patent number: 6697488
    Abstract: The present scheme improves the security of encrypted data or information by using of a practical public-key cryptosystem that is able to resist adaptive attacks. The disclosed scheme does not leak any information about the secret of the used key. Therefor the scheme generates an extended private key and public key. A message m, also referred to as plaintext, is encryptable to a ciphertext t by using the public key. Only a recipient with the right private key is able to decrypt the ciphertext r. But before a decryption starts, a verification of the ciphertext t takes place. Such a verification allows to prove the legitimation of the ciphertext t. That means, the ciphertext t is investigated and either decrypted back to the plaintext or rejected if a chosen ciphertext is fed, ie. the ciphertext is illegitimate or invalid.
    Type: Grant
    Filed: February 16, 1999
    Date of Patent: February 24, 2004
    Assignees: International Business Machines Corporation, Swiss Federal Institute of Technology
    Inventors: Ronald Cramer, Victor Shoup
  • Publication number: 20030112969
    Abstract: A method is provided for reducing a known value modulo a shared secret value among network devices exchanging messages in a network. The reduction results in a share of reduced value for each network device of a reduced value. Each network device has its share of known value and its share of shared secret value. It performs an inversion step for deriving from the share of shared secret value a share of the inverse of the shared secret value by using an approximation process, resulting in a share of inverse value; a multiplication step for deriving from the share of inverse value by use of the share of known value a share of multiplied inverse value; a rounding step for rounding the share of multiplied inverse value; and a calculation step for deriving the share of reduced value from the share of known value, the rounded share of multiplied inverse value, and the share of shared secret value.
    Type: Application
    Filed: October 24, 2002
    Publication date: June 19, 2003
    Applicant: International Business Machines Corporation
    Inventors: Joy Algesheimer, Jan Camenisch, Victor Shoup
  • Publication number: 20020129087
    Abstract: Methods and apparatus for achieving agreement among participating network devices in an asynchronous network for deciding on a common value is disclosed, whereby the common value is validated by a justification and both together satisfy a predetermined predicate. Moreover, a method for reliably broadcasting messages in an order within the asynchronous network is described. Up to one third or more of the participating network devices might be faulty in arbitrary ways.
    Type: Application
    Filed: January 11, 2002
    Publication date: September 12, 2002
    Applicant: International Business Machines Corporation
    Inventors: Christian Cachin, Klaus Kursawe, Victor Shoup, Frank Petzold
  • Publication number: 20020049601
    Abstract: A method for the fair exchange of value items between two parties is presented in which a third party is only involved in exceptional situations. Each party sends initially in an exchange procedure, to the other party a permit which binds its value item in such a way that the receiving party can verify the fact that the value item is bound, but cannot yet extract the expected value item from the permit. If a party can accept a permit as correct, it then sends the actual value item to the other party. Thus, the exchange can be completed without involving the third party if no exceptional situation occurs.
    Type: Application
    Filed: October 28, 1998
    Publication date: April 25, 2002
    Inventors: NADARAJAH ASOKAN, VICTOR SHOUP, MICHAEL WAIDNER
  • Publication number: 20010039630
    Abstract: Byzantine Agreement requires a set of parties in a distributed system to agree on a value even if some parties are corrupted. The invention comprises a method for achieving agreement among participating network devices in an asynchronous network is disclosed that makes use of cryptography, specifically of threshold digital signatures and a distributed coin-tossing protocol.
    Type: Application
    Filed: January 12, 2001
    Publication date: November 8, 2001
    Inventors: Klaus Kursawe, Victor Shoup, Christian Cachin
  • Publication number: 20010025351
    Abstract: A method for achieving agreement among n participating network devices to an agree-value in a network is disclosed. The method proposes an optimistic approach to the consensus problem, whereby the number t of faulty devices is less than n/3. It is distinguished between an optimistic and pessimistic case. In the pessimistic case, a fallback agreement protocol is performed that reaches the same agree-value as the method in the optimistic case outputs.
    Type: Application
    Filed: January 12, 2001
    Publication date: September 27, 2001
    Inventors: Klaus Kursawe, Victor Shoup