The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Feb. 13, 2024

Filed:

Jun. 27, 2021
Applicant:

Mark Lawrence, Monrovia, CA (US);

Inventor:

Mark Lawrence, Monrovia, CA (US);

Assignee:
Attorney:
Primary Examiner:
Int. Cl.
CPC ...
G06Q 40/04 (2012.01); G06Q 20/40 (2012.01); G06Q 20/38 (2012.01); G06Q 10/20 (2023.01); G06Q 50/18 (2012.01); G06Q 10/10 (2023.01); H04L 9/40 (2022.01); H04L 9/32 (2006.01); G06F 16/182 (2019.01); G06N 5/02 (2023.01); G06N 3/08 (2023.01); G06F 21/60 (2013.01); G06Q 50/20 (2012.01);
U.S. Cl.
CPC ...
G06Q 40/04 (2013.01); G06F 16/182 (2019.01); G06N 3/08 (2013.01); G06N 5/02 (2013.01); G06Q 10/10 (2013.01); G06Q 10/20 (2013.01); G06Q 20/381 (2013.01); G06Q 20/389 (2013.01); G06Q 20/3829 (2013.01); G06Q 20/40145 (2013.01); G06Q 50/182 (2013.01); H04L 9/3231 (2013.01); H04L 63/0435 (2013.01); H04L 63/126 (2013.01); G06F 21/602 (2013.01); G06Q 50/205 (2013.01); G06Q 2230/00 (2013.01); H04L 63/0272 (2013.01);
Abstract

A method, a system, and a computer program product provide a method for managing a decentralized venture capital ('VC') fund in a decentralized autonomous organization (“DAO”) configured to use a secure communication environment. The method includes securing authentication information, including user authentication information. The securing of the authentication information includes using a public key in the process to encrypt the authentication information and then decomposing the authentication information into subcomponents that are distributed randomly across a plurality of member computers. The method further includes recovering the authentication information by recombining the authentication information from its subcomponents then using a private key in the process to decrypt the authentication information.


Find Patent Forward Citations

Loading…