Patent application number | Description | Published |
20080262969 | Bit currency: transactional trust tools - Bit-currency Transactional Trust Tools (T3) is a set of tools and procedures based on expressing value through a bit string where the size of the string (bit count) reflects its value, and the identity of the bits is used to distinguish one such digital coin from the other, and for enabling an authentication hierarchy that alleviates the bottleneck of having a single source coin authentication for all transactions in coins issued (minted) by that mint; also enabling an instant split of a coin by simply splitting off a portion of the string of the coin, such that the bit count of the split-off string reflects its value. Each coin is comprised of that body string as described above, and a header that contains information regarding coin identifier, payment conditions, and suchlike. Such bit currency can be carried around everywhere bits are handled, and may be encrypted as necessary. Two online strangers could transact and make a payment by using the PINprivate procedure where by the strangers create a temporary secret which is sufficient for the payee to access the online location with the payment, and empty it before any third party can steal it; the temporary secret is based on the payer pre-calculating several computational tasks allowing the payee to randomly choose a task to compute, and communicating the identity of the chosen task (the temporary secret) by sending back the result, the task being a one-way function, it's unfeasible for any third party to find the secret before computing all the presented tasks. The bit currency can be exchanged between software applets carrying out rules of exchange and thereby allowing peer-to-peer networks to work more efficiently, and also allow for peer-to-peer distribution of digital goods to be carried out while honoring the digital rights of the digital file owner, so doing by allowing the mint to cut a portion of the payment digitally paid by the receiving node and allocate such cut to the digital rights owner. | 10-23-2008 |
20130054471 | Bit Currency: Transactional Trust Tools - Systems and methods are provided for utilizing a digital coin. A bit string is received. The number of bits in the bit string represents a coin value of the digital coin. The individual bit values of the bits of the bit string are used to determine an identity of the digital coin. The identity of the digital coin is validated by a node of an authentication hierarchy. The validation includes comparing bit values of at least a portion of the bits of the bit string to bit values of corresponding bits of known bit strings that represent known issued digital coins. The validation also includes checking that a matching known issued digital coin was not previously redeemed. A digital coin can also be split into multiple digital coins that are each a continuous sequence of bits of the bit string of the original digital coin. | 02-28-2013 |
20130311348 | Fitting digital currency into modern transactional ecosystems - This application described methods and means to construct a viable trading ecosystem for digital currency, gradually rising to local, and global prominence as the modern way to represent money. The application regards various media options to express the digital bit sequence which reflects the monetary value and the identity of the digital coin, including hard copies, and electronic variety. It Describes the ways to fuse a digital coin with any well defined terms of payments, and how to manage such coins as they are forwarded for redemption. The application describes various security means to insure the integrity of the digital mint. It also describes how to construct a hierarchy of authentication nodes such that each node has sufficient information to authenticate a digital coin, but not sufficient information to defraud a higher-up node. The application also describes how to inter-relate any number of independent digital mints so as to mutually honor each others' coins and thereby appear to the trader as a single mint. | 11-21-2013 |
20140279551 | Minting and Use of Digital Money - Systems and methods are provided for constructing a digital money from concatenated or otherwise linked bit strings. Several applications of digital coins include (i) means to secure the use of money according to the prevailing understanding between payer and payee, (ii) a method by which a mint entity that mints and redeems digital money collaborates with traders to jointly earn interest, or jointly gamble in the stock market, or other markets, (iii) a method by which a mint entity that mints and redeems digital money collaborates with merchants, their customers, and credit-extending entities (CEE) to allow the CEE to extend credit to selected group of customers, so that these customers can shop with any participating merchant, and (iv) a method for utility consumption on a real-time basis by splitting digital coins at a rate that pays exactly for the utility measure being consumed. | 09-18-2014 |
20150036820 | Probability Durable Entropic Advantage - A method used by two strangers subject to comprehensive eavesdropping, and in need for establishing privacy and secrecy, or more generally, an entropic advantage. Unlike the prevailing one-way functions, like RSA, and ECC which are subject to a breach via advanced mathematical insight, the method herein is based on durable probability considerations which is vulnerable to faster computing, but not to new mathematical insight, and as such provide more security against powerful eavesdropping adversaries. The method includes an equivocation-based one-way function Y=f(X) where X and Y are any positive integers and where there are infinite values X | 02-05-2015 |
20150088721 | DIGITAL TRANSACTIONAL PROCEDURES & IMPLEMENTS - This invention describes a set of related procedures designed to co-operate with mints of digital money in order to allow for said money to be properly, securely, and conveniently traded by, various size and various type of trading crowds. The procedures refer mainly to distribution of responsibility. This invention also specifies the construction of digital coins encapsulated in a physical housing to amount to off-line tradable digital coins. | 03-26-2015 |
Patent application number | Description | Published |
20080293369 | SIGNAL PROCESSING DEVICE AND SIGNAL PROCESSING METHOD - A signal processing device and signal processing method is provided that includes a detection unit for detecting a signal strength of a signal, whereby the detection unit is configured to output a detection value that represents the signal strength of the signal; a settable digital filter connected upstream of the detection unit, whereby filter coefficients for setting a transfer characteristic of the filter are assigned to an amplification or attenuation of the signal by the filter; a digital multiplication unit, which is connected upstream of the detection unit for amplification or attenuation of the signal, whereby the multiplication unit is configured to compensate partially for the amplification or attenuation of the filter, whereby the compensation is encumbered with a residual error; and a correction unit to apply to the detection value a correction value at least partially compensating for the residual error. | 11-27-2008 |
20120075135 | Analog-Digital Conversion - In one embodiment, a method includes receiving a first analog signal at a first input; receiving a second analog signal at a second input; mixing the first analog signal with a first oscillator signal having a first frequency; mixing the second analog signal with a second oscillator signal having a second frequency; converting a sum signal to a digital signal; generating a first control signal based on a first digital value of a first function and the digital signal; and generating a second control signal based on a second digital value of a second function and the digital signal. | 03-29-2012 |
20130063103 | Leakage-Current Compensation For A Voltage Regulator - In one embodiment, a method includes generating a drive current. Generation of the drive current results in a first leakage current, and the drive current and first leakage current each flow into a first node. The method also includes generating a second leakage current and amplifying the second leakage current to generate a leakage-compensation current. The leakage-compensation current flows away from the first node. | 03-14-2013 |