Patents by Inventor William Roscoe
William Roscoe has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12099813Abstract: A computer implemented method for the automated analysis or use of data is implemented by a voice assistant. The method comprises the steps of: (a) storing in a memory a structured, machine-readable representation of data that conforms to a machine-readable language (‘machine representation’); the machine representation including representations of user speech or text input to a human/machine interface; and (b) automatically processing the machine representations to analyse the user speech or text input.Type: GrantFiled: April 29, 2024Date of Patent: September 24, 2024Assignee: UNLIKELY ARTIFICIAL INTELLIGENCE LIMITEDInventors: William Tunstall-Pedoe, Finlay Curran, Harry Roscoe, Robert Heywood
-
Patent number: 12099810Abstract: A computer implemented method for the automated analysis or use of data is implemented by a voice assistant. The method comprises the steps of: (a) storing in a memory a structured, machine-readable representation of data that conforms to a machine-readable language (‘machine representation’); the machine representation including representations of user speech or text input to a human/machine interface; and (b) automatically processing the machine representations to analyse the user speech or text input.Type: GrantFiled: December 25, 2022Date of Patent: September 24, 2024Assignee: UNLIKELY ARTIFICIAL INTELLIGENCE LIMITEDInventors: William Tunstall-Pedoe, Finlay Curran, Harry Roscoe, Robert Heywood
-
Patent number: 12099814Abstract: A computer implemented method for the automated analysis or use of data is implemented by a voice assistant. The method comprises the steps of:(a) storing in a memory a structured, machine-readable representation of data that conforms to a machine-readable language (‘machine representation’); the machine representation including representations of user speech or text input to a human/machine interface; and (b) automatically processing the machine representations to analyse the user speech or text input.Type: GrantFiled: April 29, 2024Date of Patent: September 24, 2024Assignee: UNLIKELY ARTIFICIAL INTELLIGENCE LIMITEDInventors: William Tunstall-Pedoe, Finlay Curran, Harry Roscoe, Robert Heywood
-
Publication number: 20240296030Abstract: A method of operating a trusted execution environment for analysing source code from a third-party vendor is disclosed. The method comprises receiving an encrypted source code and using a secure key stored within the trusted execution environment to decrypt the encrypted source code to produce a decrypted source code. The decrypted source code is analyzed to determine a trust metric for the decrypted source code. The decrypted source code is disallowed from being communicated to an external entity outside of the trusted execution environment.Type: ApplicationFiled: March 18, 2022Publication date: September 5, 2024Applicant: The Blockhouse Technology LimitedInventors: Andrew William ROSCOE, Pedro Ribeiro Goncalves ANTONINO
-
Publication number: 20240281617Abstract: A computer implemented method for the automated analysis or use of data is implemented by a voice assistant. The method comprises the steps of: (a) storing in a memory a structured, machine-readable representation of data that conforms to a machine-readable language (‘machine representation’); the machine representation including representations of user speech or text input to a human/machine interface; and (b) automatically processing the machine representations to analyse the user speech or text input.Type: ApplicationFiled: April 29, 2024Publication date: August 22, 2024Inventors: William TUNSTALL-PEDOE, Finlay CURRAN, Harry ROSCOE, Robert HEYWOOD
-
Publication number: 20240281616Abstract: A computer implemented method for the automated analysis or use of data is implemented by a voice assistant. The method comprises the steps of: (a) storing in a memory a structured, machine-readable representation of data that conforms to a machine-readable language (‘machine representation’); the machine representation including representations of user speech or text input to a human/machine interface; and (b) automatically processing the machine representations to analyse the user speech or text input.Type: ApplicationFiled: April 29, 2024Publication date: August 22, 2024Inventors: William TUNSTALL-PEDOE, Finlay CURRAN, Harry ROSCOE, Robert HEYWOOD
-
Publication number: 20240281618Abstract: A computer implemented method for the automated analysis or use of data is implemented by a voice assistant. The method comprises the steps of: (a) storing in a memory a structured, machine-readable representation of data that conforms to a machine-readable language (‘machine representation’); the machine representation including representations of user speech or text input to a human/machine interface; and (b) automatically processing the machine representations to analyse the user speech or text input.Type: ApplicationFiled: April 29, 2024Publication date: August 22, 2024Inventors: William TUNSTALL-PEDOE, Finlay CURRAN, Harry ROSCOE, Robert HEYWOOD
-
Patent number: 12067367Abstract: A computer implemented method for the automated analysis or use of data is implemented by a voice assistant. The method comprises the steps of: (a) storing in a memory a structured, machine-readable representation of data that conforms to a machine-readable language (‘machine representation’); the machine representation including representations of user speech or text input to a human/machine interface; and (b) automatically processing the machine representations to analyse the user speech or text input.Type: GrantFiled: November 22, 2023Date of Patent: August 20, 2024Assignee: UNLIKELY ARTIFICIAL INTELLIGENCE LIMITEDInventors: William Tunstall-Pedoe, Finlay Curran, Harry Roscoe, Robert Heywood
-
Patent number: 12050876Abstract: A computer implemented method for the automated analysis or use of data is implemented by a voice assistant. The method comprises the steps of: (a) storing in a memory a structured, machine-readable representation of data that conforms to a machine-readable language (‘machine representation’); the machine representation including representations of user speech or text input to a human/machine interface; and (b) automatically processing the machine representations to analyse the user speech or text input.Type: GrantFiled: September 18, 2023Date of Patent: July 30, 2024Assignee: UNLIKELY ARTIFICIAL INTELLIGENCE LIMITEDInventors: William Tunstall-Pedoe, Finlay Curran, Harry Roscoe, Robert Heywood
-
Patent number: 12045577Abstract: A computer implemented method for the automated analysis or use of data is implemented by a voice assistant. The method comprises the steps of: (a) storing in a memory a structured, machine-readable representation of data that conforms to a machine-readable language (‘machine representation’); the machine representation including representations of user speech or text input to a human/machine interface; and (b) automatically processing the machine representations to analyse the user speech or text input.Type: GrantFiled: December 25, 2022Date of Patent: July 23, 2024Assignee: UNLIKELY ARTIFICIAL INTELLIGENCE LIMITEDInventors: William Tunstall-Pedoe, Finlay Curran, Harry Roscoe, Robert Heywood
-
Patent number: 12039282Abstract: A computer implemented method for the automated analysis or use of data is implemented by a voice assistant. The method comprises the steps of: (a) storing in a memory a structured, machine-readable representation of data that conforms to a machine-readable language (‘machine representation’); the machine representation including representations of user speech or text input to a human/machine interface; and (b) automatically processing the machine representations to analyse the user speech or text input.Type: GrantFiled: December 25, 2022Date of Patent: July 16, 2024Assignee: UNLIKELY ARTIFICIAL INTELLIGENCE LIMITEDInventors: William Tunstall-Pedoe, Finlay Curran, Harry Roscoe, Robert Heywood
-
Publication number: 20230153806Abstract: Disclosed is a method and device for preventing blockchain forking. The method includes: selecting s consecutive blocks Bn to Bn+s; generating a key pair for block Bm by a node An that creates the block Bn; holding the node An active in the blockchain's continuously generating blocks Bn+1 to Bn+s until the block Bn+s of s consecutive blocks becomes tamper-proof; in response to that, signing on the block Ban+s with the private key PK?n; in response to the blockchain's subsequently generating a block Bm(m>n+s), placing the signature in Bm; making nodes creating each of the s blocks Bn to Bn+s all execute afore-mentioned steps, thereby forming multiple backlinks associated with the blockchain's block size. The number of backlinks is used for determining blockchain forking by a newly-added node creating a new block.Type: ApplicationFiled: April 8, 2021Publication date: May 18, 2023Inventors: Bangdao CHEN, Andrew William ROSCOE
-
Patent number: 11336464Abstract: The method of identity authentication at the user is provided to prove to the certificate authority that a key is owned by a user. The method can comprise selecting a certain number of keys from a set of keys of the user, obtaining a hash value of a correspondence between each key in the certain number of keys and a user identifier of the user respectively, and transmitting the obtained hash values to the certificate authority, and after receiving from the certificate authority a notification regarding a first subset of hash values, sending keys corresponding to the first subset of hash values as a first subset of keys to the certificate authority. The first subset of hash values can be selected by the certificate authority from the obtained hash values. Zero know ledge proof can be achieved with this technical solution.Type: GrantFiled: April 23, 2018Date of Patent: May 17, 2022Assignee: CROSBIL LTD.Inventors: Andrew William Roscoe, Bangdao Chen
-
Patent number: 11258613Abstract: Disclosed are methods and apparatuses for electronic signature. The method for electronic signature comprises obtaining a hash value of a first key created for a user and a user identifier of the user, generating a key certificate of the first key based on the obtained hash value, the user identifier and a current key, recording the key certificate on a public medium, which public medium ensures that information published thereon is not tampered with, signing a file with the first key and recording a resulting file signature and the file on the public medium, and recording the first key on the public medium only after the file is already on the public medium. With the technical solution of the disclosure, a key can be effectively utilized.Type: GrantFiled: April 23, 2018Date of Patent: February 22, 2022Assignee: CROSBIL LTD.Inventors: Andrew William Roscoe, Bangdao Chen
-
Publication number: 20210194702Abstract: Disclosed are methods and systems for identity authentication, and a computing device and a storage medium. The method of identity authentication at the user is provided to prove to the certificate authority that a key is owned by a user. The method can comprise selecting a certain number of keys from a set of keys of the user, obtaining a hash value of a correspondence between each key in the certain number of keys and a user identifier of the user respectively, and transmitting the obtained hash values to the certificate authority, and after receiving, from the certificate authority a notification regarding a first subset of hash values, sending keys corresponding to the first subset of hash values as a first subset of keys to the certificate authority. The first subset of hash values can be selected by the certificate authority from the obtained hash values. Zero knowledge proof can be achieved with the technical solution of the disclosure.Type: ApplicationFiled: April 23, 2018Publication date: June 24, 2021Inventors: Andrew William ROSCOE, Bangdao CHEN
-
Patent number: 11032256Abstract: A computer implemented method of exchanging first valuable data at a first node for second valuable data from a second node, the method comprising the steps of: applying a first encryption to a first plurality of messages, at the first node, with a function having a commutative property, so as to create a blinded first plurality of messages; sending the blinded first plurality of messages from the first node to the second node, wherein the first valuable data is concealed in one message of the blinded first plurality of messages; receiving a blinded second plurality of messages at the first node, wherein the second valuable data is concealed in one message of the blinded second plurality of messages and the blinded second plurality of messages have been encrypted with a second encryption; in response to receiving the blinded second plurality of messages at the first node, applying a third encryption to the blinded second plurality of messages with a function having a commutative property so as to create doType: GrantFiled: March 16, 2018Date of Patent: June 8, 2021Assignee: Oxford University Innovation LimitedInventors: Andrew William Roscoe, Peter Yvain Anthony Ryan
-
Publication number: 20210167963Abstract: First and second devices store respective device data and private keys. The first-device data is additionally stored by the second device and by a proxy; and the second-device data is additionally stored by the first device and by the proxy. In a commitment phase, each of the first and second devices uses its respective device data, private key and a random nonce to generate a one-time first-device commitment value, which it sends to the proxy. In a checking phase, the devices communicate secret-key information to the proxy, which verifies the received one-time commitment values. In a digest phase, the proxy calculates a one-time digest, which it sends to the second device. The second device (101) then verifies the received one-time digest to authenticate the first device.Type: ApplicationFiled: May 31, 2019Publication date: June 3, 2021Inventors: Christopher Patrick AUTRY, Andrew William ROSCOE, Mykhailo MAGAL
-
Patent number: 10958426Abstract: A computer implemented method of authenticating communication between a first node and a second node, using a function of combined information obtained from at least one of the nodes, the method comprising: sending a commitment message from the first node to the second node, the message containing content based on (at least) a first part of the combined information, which content commits the first node to a first value of the function, and wherein the first part of the combined information is communicated from the first node to the second node with a delay mechanism that only allows the first part of the information to be determined by the second node after a predetermined time; and in response to receiving notification at the first node that the second node has received the message, which receipt commits the second node to the first function value.Type: GrantFiled: January 18, 2017Date of Patent: March 23, 2021Inventor: Andrew William Roscoe
-
Publication number: 20200344064Abstract: Disclosed are methods and apparatuses for electronic signature. The method for electronic signature comprises obtaining a hash value of a first key created for a user and a user identifier of the user, generating a key certificate of the first key based on the obtained hash value, the user identifier and a current key, recording the key certificate on a public medium, which public medium ensures that information published thereon is not tampered with, signing a file with the first key and recording a resulting file signature and the file on the public medium, and recording the first key on the public medium only after the file is already on the public medium. With the technical solution of the disclosure, a key can be effectively utilized.Type: ApplicationFiled: April 23, 2018Publication date: October 29, 2020Inventors: Andrew William ROSCOE, Bangdao CHEN
-
Publication number: 20200036691Abstract: A computer implemented method of exchanging first valuable data at a first node for second valuable data from a second node, the method comprising the steps of: applying a first encryption to a first plurality of messages, at the first node, with a function having a commutative property, so as to create a blinded first plurality of messages; sending the blinded first plurality of messages from the first node to the second node, wherein the first valuable data is concealed in one message of the blinded first plurality of messages; receiving a blinded second plurality of messages at the first node, wherein the second valuable data is concealed in one message of the blinded second plurality of messages and the blinded second plurality of messages have been encrypted with a second encryption; in response to receiving the blinded second plurality of messages at the first node, applying a third encryption to the blinded second plurality of messages with a function having a commutative property so as to create doType: ApplicationFiled: March 16, 2018Publication date: January 30, 2020Applicant: Oxford University Innovation LimitedInventors: Andrew William ROSCOE, Peter Yvain Antony RYAN