The present disclosure relates generally to data security and data sharing, more specifically to a collaborative architecture for secure data sharing.
An entity, such as a company, may receive requests from clients or customers to render a service. In some cases, the requests should be validated before a corresponding service is rendered by the entity. Often the entity lacks sufficient information for performing such validation and therefore contacts external parties or request further information from clients or customers to proceed with validation.
In one embodiment, a device configured to participate in a cyclical collaboration system includes a network interface. The network interface is configured to communicate with a multiple party encryption subsystem, a downstream device, and an upstream device. The device includes a processor configured to receive a request from a third party. A first request value is determined that is associated with the request. A first random number is determined based on the first request value. The first random number is provided to the downstream device. A second random number is received that is generated by the upstream device. A first encrypted request value is determined based on the first request value, the first random number, and the second random number. The first encrypted request value is provided to the multiple party encryption subsystem. Encrypted request values generated by other participants of the cyclical collaboration system are received from the multiple party encryption subsystem. A validation score is determined based on the first encrypted request values and the encrypted request values received from the multiple party encryption subsystem.
As described above, a service-providing entity may lack access to sufficient information for validating a request received form a third party. For instance, before a party is granted access to protected information, the service-providing entity may wish to validate the identity of the party and the access rights of the party. As another example, before a requested financial transaction is rendered (e.g., such an approval of requested financing), an entity may wish to review financial records of the third party, such as a record of financing already provided to this third party. Obtaining the requisite information to validate such requests using previous technology can be an inefficient and laborious process for the both the service-providing entity and the requesting third party. As such, previous technology may result in delayed and unreliable validation decisions.
This disclosure recognizes that such validations may be improved by allowing multiple service-providing entities to operate collaboratively, such that information for a given third party that may interact with multiple entities can be shared. However, previous technology fails to provide secure and efficient tools for such collaboration.
For example, previous technology may reveal protected information associated with the collaborating entities and/or the requesting third party. For instance, if multiple entities share financial information associated with a request for financing from a third party, previous technology may reveal the amount of financing provided to the third party by each entity. This disclosure recognizes a need for improved technology for collaboration without revealing protected information from each entity.
Certain embodiments of this disclosure solve technical problems of previous technology used for multi-entity collaboration by providing a collaboration architecture that facilitates the efficient determination of validation decisions without having protected information revealed to other participating entities. For example, the disclosed system provides several technical advantages over previous technology, which include: (1) the ability to determine validation decisions with fewer communications between collaborating devices than was possible using previous technology (e.g., with a number of network calls that scales linearly, or approximately linearly, with the number of collaborating devices); (2) the implementation of multiparty encryption such that results of multi-entity validation assessments are only available to participating entities; and (3) the ability to adjust communications used for multi-entity collaboration and/or validation assessments to further improve information security in cases where one or more of the participating entities is determined to be a less trusted entity (e.g., if one entity determines that further security measures should be implemented to further obscure information from another participating entity).
As such, this disclosure may improve the function of computer systems used to share data and/or validate requests. The collaborative validation system described in this disclosure may help ensure requests are validated (or denied if appropriate) in a timely manner, thereby reducing or eliminating delays or bottlenecks imposed by previous technology. This disclosure may particularly be integrated into a practical application of a collaborative validation system which includes a plurality of service provider devices, where each service provider device is configured to participate in the collaboration architecture. The rapid and secure validation of requests, which is uniquely facilitated by this disclosure, may be particularly beneficial for entities receiving large numbers of requests in a relatively short span of time, such that services can be rendered in a timely manner. Since each service provider device is configured to communicate with devices directly upstream and downstream in the unique cyclical collaboration network of this disclosure, the number of communications transmitted for collaborative validation decisions scales approximately linearly with the number of service provider devices in the system. In some situations, a small number of additional communications may be transmitted in cases where a less trusted entity is included in the collaborative validation system, thus providing a significant further increase in security at a relatively small cost in terms of the additional network communication and processing resources consumed.
Certain embodiments of this disclosure may include some, all, or none of these advantages. These advantages and other features will be more clearly understood from the following detailed description taken in conjunction with the accompanying drawings and claims.
For a more complete understanding of this disclosure, reference is now made to the following brief description, taken in connection with the accompanying drawings and detailed description, wherein like reference numerals represent like parts.
As described above, previous technology lacks tools for efficiently and reliably allowing multiple entities to collaborate to make decisions whether a third party should be validated to obtain a requested service. For instance, if a third party, such as a company or person, requests financing, a number of finance-providing entities may already have relevant information (e.g., financial records of the third party, knowledge of existing financing) for determining whether a request for financing should be validated. The multi-entity collaboration system of this disclosure uniquely facilitates the secure determination of validation decisions for such scenarios without revealing protected information from each entity to the other entities. The multi-entity collaboration system includes a plurality of devices that communicate in a unique circular sequence that facilitates the efficient and reliable determination of validation decisions with minimal communication amongst entities and without revealing information from the participating entities. As such, this disclosure facilitates more secure, efficient, and rapid validation (or denial, if appropriate) of requests (e.g., for information access, financing, or the like) than was possible using previous technology.
The user device 102 may be any device operable to receive an input from a third party 104 corresponding to the request 106. For example, a user device 102 may be a personal computer or a mobile device operated by the third party 104. Each user device 102 may include the processor, memory, and/or interface of the device 300 described below with respect to
Each of the entity devices 108a-e is generally any device or collection of devices (e.g., a collection of devices implemented as a server, a virtual server, or the like) operable to participate in the collaboration system 100. Each entity device 108a-e is operable to communicate with at least two other entity devices 108a-e (i.e., an entity device 108a-e upstream and another entity device 108a-e downstream from a given entity device 108a-e) and the encryption subsystem 132. Each entity device 108a-e may include the processor, memory, and/or interface of the device 300 described below with respect to
Each entity device 108a-e includes a random number generator 110a-e, network node sequencer 116a-e, a trusted node identifier 118a-e, and a message composer 120a-e. The random number generator 110a-e generally determines a random number 114a-e for a protected value 112a-e associated with a request 106 received by at least one of the entity devices 108a-e. For example, the first entity device 108a, upon receiving the request 106, may determine a value 112a-e that is associated with this request 106. For instance, if the request 106 is for financing, the determined value 112a-e may be an amount of financing already provided to the third party 104 by the entity operating device 108a, or an “exposure” of the entity to financing to the third party 104. In this example, the random number generator 110a generates random number 114a based on this exposure value 112a. The random number 114a-e may be the sum of a randomly generated number and the protected value 112a-e. The randomly generated number used to generate random number 114a-e may be generated using any approach, including, for example, a pseudo random number generator.
The network node sequencer 116a-e generally monitors information received from the other entity devices 108a-e and determines the next entity device 108a-e (e.g., node in the collaboration network) to which the random number 114a-e should be transmitted. The network node sequencer 116a-e ensures that the entity devices 108a-e communicate in a linear network, as illustrated in
The trusted node identifier 118a-e generally determines whether the next entity device 108a-e identified by the network node sequencer 116a-e is trusted to be the recipient of information from the entity device 108a-e. This approach may significantly reduce the number of network calls sent to achieve the validation score 136, as described further below. For instance, rather than sending a network call to send a message 122a-e to every participating entity device 108a-e, such calls are limited to the next entity device 108a-e in the collaboration network. As described in greater detail below, in some cases, additional random numbers 138, 142 may be determined and transmitted (e.g., via corresponding additional messages 140, 144) to additional entity devices 108a-e to further improve information security, as described in greater detail below. For instance, in the example of
The message composer 120a-e then generates a message 122a-e that is provided to the next entity device 108a-e in the collaboration system 100. The message 122a includes at least the request 106 (e.g., or information extracted from the request 106, such as an invoice identifier), an identifier 124 of the requesting party 104 (e.g., an identifying name or number of the third party 104), and the random number 114a-e. The message 122a-e may also include information about the entity devices 108a-e participating in the collaboration network. A request repository 126a-e may store a record of requests 106 received by the entity devices 108a,e and other corresponding information, such as received messages 122a-e, 140, 144, transmitted messages 122a-e, 140, 144, validation scores 136, and the like.
The cryptographic broadcaster 128a-e determines an encrypted validation value 130a-e for the entity device 108a-e. The encrypted validation value 130a-e may be determined as the protected value 112a-e plus the sum of all input random numbers 114a-e, 138, 142 for the entity device 108a-e minus the sum of output random numbers 114a-e, 138, 142 for the entity device 108a-e, as illustrated in the example of
The encrypted value 130a-e is provided to the multiparty encryption subsystem 132. For example, the encrypted value 130a-e may be published using a gossip protocol and secured by the multiparty encryption subsystem 132 to prevent non-participating entities or other unauthorized users from accessing the individual values 130a-e. The multiparty encryption subsystem 132 is described in greater detail below.
A validation evaluator 134a-e receives information from the encryption subsystem 132 and determines a validation score 136 from this information. In the example of
The multiparty encryption subsystem 132 is generally any device or collection of devices (e.g., a collection of devices implemented as a server, a virtual server, or the like) operable to receive encrypted values 130a-e and store these values in a secure, encrypted format. As an example, the multiparty encryption subsystem 132 may employ a blockchain to ensure data security among the collaborating entities. An example of such an encryption subsystem 132 is described in U.S. patent application Ser. No. 15/869,513 filed Jan. 12, 2018, by Prabakar Rangarajan et al., and titled “System for executing, securing, and non-repudiation of pooled conditional smart contracts over distributed blockchain network,” now U.S. Pat. No. 10,817,852 issued Oct. 27, 2020, the entirety of which is incorporated herein by reference.
As described above, in some cases, the trusted node identifier 118a-e determines that an additional random number 138, 142 should be used in the collaborative determination of the validation score 136 in order to further improve information security. For example, the trusted node identifier 118a-e may determine that one or both of the entity devices 108a-e that are sending or receiving information (e.g., messages 122a-e) to the entity device 108a-e is a less trusted device. In such cases, the trusted node identifier 118a-e identifies an additional trusted entity device 108a-e and returns to the random number generator 110a-e to generate an additional random number 138, 142 to provide to an additional device 108a-e. A supplemental message 140, 144 containing the supplemental random number 138, 142 is then provided to another of the entity devices 108a-e.
For example,
In an example operation of the system 100, the request 106 is an invoice requesting that financing be provided to the third party 104. In some cases, an individual or company may inappropriately provide the same invoice to multiple finance-providing entities in an attempt to obtain the same financing from multiple entities. To protect against such cases, the entity device 108a receiving the request 106 may need to determine whether the same invoice was already financed by another entity before financing is approved. Previous technology relies heavily on disclosures of such actions from the third party 104 providing the request 106 and a lengthy back-and-forth between the entity, the third party 104, and other institutions to obtain all information to determine if the request 106 is valid. This disclosure recognizes that this validation may be performed more rapidly and reliably if information were shared between entities that would receive such requests 106. However, previous technology used for information sharing would reveal protected information 112a-e (e.g., the amount financed to the third party 104 by each entity in this example) to each entity participating in the sharing. The system 100 described in this disclosure overcomes this and other technical problems of previous technology by facilitating information sharing in a manner that allows the validation score 136 to be determined without revealing the individual protected values 112a-e.
In this example operation, the first entity device 108a receives the request 106 and determines the protected value 112a associated with the request 106. For example, for the request 106 for financing, the protected value 112a may be an amount already financed to the third party 104 by the entity operating device 108a. In order to determine whether the request 106 for financing should be validated, the entity device needs to calculate a validation score 136 that corresponds to a total amount of financing being provided to the third party 104 (e.g., to the cumulative exposure of the participating entities associated with devices 108a-e). This validation score 136 can be used to access whether financing should be provided to the third party 104.
The first entity device 108a generates a first random number 114a based on the protected value 112a, as described above with respect to the random number generator 110a and provides this random number 114a to the downstream device 108b (e.g., as part of message 122a). The first entity device 108a also receives a fifth random number 114e generated by the fifth entity device 108e (generated as described below). The first entity device 108a determines a first encrypted request value 130a based on the protected value 112a, the first random number 114a, and the fifth random number 114e, as shown in
The second entity device 108b receives the message 122a that includes random number 114a from device 108a. The second entity device 108b identifies the protected value 112b associated with the request 106. For example, the protected value 112b may be an exposure of the entity operating the second entity device 108b to financing provided to the third party 104. The second entity device 108b generates a second random number 114b based on the protected value 112b, as described above with respect to the random number generator 110b. The second random number 114b is provided to the next device 108c downstream of the second entity device 108b (e.g., as part of message 122b). In this example, the second entity device 108b also receives a random number 142 generated by the fourth entity device 108d (e.g., as part of message 144). The second entity device 108b determines a second encrypted request value 130b based on the protected value 112b, the first random number 114a, the second random number 114b, and the supplemental random number 142, as shown in
The third entity device 108c receives the message 122b that includes random number 114b from device 108b. The third entity device 108c identifies the protected value 112c associated with the request 106. For example, the protected value 112c may be an exposure of the entity operating the third entity device 108c to financing provided to the third party 104. The third entity device 108c generates a third random number 114c based on the protected value 112c, as described above with respect to the random number generator 110c. The third random number 114c is provided to the next device 108d downstream of the third entity device 108c (e.g., as part of message 122c). In this example, the third entity device 108c also determines a supplemental random number 138 (e.g., because the downstream device 108d is associated with a less trusted entity). In this example, the supplemental random number 138 is provided to the fifth entity device 108e as part of message 140. The third entity device 108c determines a third encrypted request value 130c based on the protected value 112c, the second random number 114b, the third random number 114c, and the supplemental random number 138, as shown in
The fourth entity device 108d receives the message 122c that includes random number 114c from device 108c. The fourth entity device 108d identifies the protected value 112d associated with the request 106. For example, the protected value 112d may be an exposure of the entity operating the fourth entity device 108d to financing provided to the third party 104. The fourth entity device 108d generates a fourth random number 114d based on the protected value 112d, as described above with respect to the random number generator 110d. The fourth random number 114d is provided to the next device 108e downstream of the fourth entity device 108d (e.g., as part of message 122d). In this example, the fourth entity device 108d also determines a supplemental random number 142 (e.g., because the upstream device 108c is associated with a less trusted entity). In this example, the supplemental random number 142 is provided to the second entity device 108b as part of message 144). The fourth entity device 108d determines a fourth encrypted request value 130d based on the protected value 112d, the third random number 114c, the fourth random number 114d, and the supplemental random number 142, as shown in
The fifth entity device 108e receives the message 122d that includes random number 114d from device 108d. The fifth entity device 108e identifies the protected value 112e associated with the request 106. For example, the protected value 112e may be an exposure of the entity operating the fifth entity device 108e to financing provided to the third party 104. The fifth entity device 108e generates a fifth random number 114e based on the protected value 112e, as described above with respect to the random number generator 110e. The fifth random number 114e is provided to the next device 108a downstream of the fifth entity device 108e (e.g., as part of message 122e). In this example, the fifth entity device 108e also receives a random number 138 generated by the third entity device 108c (e.g., as part of message 140). The fifth entity device 108e determines a fifth encrypted request value 130e based on the protected value 112e, the fifth random number 114e, the fourth random number 114d, and the supplemental random number 138, as shown in
At step 204, the entity device 108a-e determines a value 112a-e associated with the request 106. For example, the determined value 112a-e may be private or protected information that the operator of the entity device 108a-e does not wish to expose to others. For instance, the protected value 112a-e may be an amount of money already provided through financing to the third party 104 that submitted the request 106 received at step 202, and the entity operating the device 108a-e may be barred from sharing this information with others.
At step 206, the entity device 108a-e determines a random number 114a-e using the value 112a-e determined at step 204. For example, the random number 114a-e may be determined by summing the value 112a-e from step 204 with a randomly generated value, as described with respect to the random number generator 110a-e of
At step 208, the entity device 108a-e provides the random number 114a-e to the next device 108a-e in the cyclical collaboration network illustrated in
At step 210, the entity device 108a-e determines whether the downstream device receiving the random number 114a-e is a trusted device. For example, the entity device 108a-e (e.g., using the trusted node identifier 118a-e) may determine that the entity operating the downstream entity device 108a-e is an entity on a list of less trusted entities (e.g., using the trusted node record 312 of
At step 212, the entity device 108a-e generates a supplemental random number 138, 142. The supplemental random number 138, 142 may be generated using the same approach described above with respect to step 206. For instance, the supplemental random number 138, 142 may be the protected value 112a-e plus a randomly generated value. At step 214, the supplemental random number 138, 142 is provide to another device 108a-e (i.e., in addition to the device 108a-e downstream of the current entity device 108a-e). For example, as shown in the example of
At step 216, the entity device 108a-e receives the random number 114a-e generated by the upstream device 108a-e. For example, in the example of
At step 220, the entity device 108a-e determines an encrypted value 130a-e using the protected value 112a-e (see step 204), the generated random number 114a-e (see step 206), and all received random numbers 114a-e, 138, 142 (see steps 216, 218).
For example, as illustrated in the example of
At step 222, the entity device 108a-e provides the encrypted value 130a-e to the multiparty encryption subsystem 132. For example, the entity device 108a-e may provide the encrypted value 130a-e along with any other appropriate encryption information (e.g., a key or the like) in a network call to the encryption subsystem 132. At step 224, the entity device 108a-e receives the encrypted values 130a-e determined by other participating entity devices 108a-e. At step 226, the entity device 108a-e determines the validation score 136 based on the received encrypted values 136. In the example of
The processor 302 comprises one or more processors operably coupled to the memory 304. The processor 302 is any electronic circuitry including, but not limited to, state machines, one or more central processing unit (CPU) chips, logic units, cores (e.g. a multi-core processor), field-programmable gate array (FPGAs), application specific integrated circuits (ASICs), or digital signal processors (DSPs). The processor 302 may be a programmable logic device, a microcontroller, a microprocessor, or any suitable combination of the preceding. The processor 302 is communicatively coupled to and in signal communication with the memory 304 and the network interface 306. The one or more processors are configured to process data and may be implemented in hardware or software. For example, the processor 302 may be 8-bit, 16-bit, 32-bit, 64-bit or of any other suitable architecture. The processor 302 may include an arithmetic logic unit (ALU) for performing arithmetic and logic operations, processor registers that supply operands to the ALU and store the results of ALU operations, and a control unit that fetches instructions from memory and executes them by directing the coordinated operations of the ALU, registers and other components. The one or more processors are configured to implement various instructions. For example, the one or more processors are configured to execute instructions to implement the function disclosed herein, such as some or all of those described with respect to
The memory 304 is operable to store any of the information described above with respect to
The network interface 306 is configured to enable wired and/or wireless communications. The network interface 306 is configured to communicate data between the device 300 and other network devices, systems, or domain(s). For example, the network interface 306 may comprise a WIFI interface, a local area network (LAN) interface, a wide area network (WAN) interface, a modem, a switch, or a router. The processor 302 is configured to send and receive data using the network interface 306.
The network interface 306 may be configured to use any suitable type of communication protocol as would be appreciated by one of ordinary skill in the art.
While several embodiments have been provided in this disclosure, it should be understood that the disclosed systems and methods might be embodied in many other specific forms without departing from the spirit or scope of this disclosure. The present examples are to be considered as illustrative and not restrictive, and the intention is not to be limited to the details given herein. For example, the various elements or components may be combined or integrated in another system or certain features may be omitted, or not implemented.
In addition, techniques, systems, subsystems, and methods described and illustrated in the various embodiments as discrete or separate may be combined or integrated with other systems, modules, techniques, or methods without departing from the scope of this disclosure. Other items shown or discussed as coupled or directly coupled or communicating with each other may be indirectly coupled or communicating through some interface, device, or intermediate component whether electrically, mechanically, or otherwise. Other examples of changes, substitutions, and alterations are ascertainable by one skilled in the art and could be made without departing from the spirit and scope disclosed herein.
To aid the Patent Office, and any readers of any patent issued on this application in interpreting the claims appended hereto, applicants note that they do not intend any of the appended claims to invoke 35 U.S.C. § 112(f) as it exists on the date of filing hereof unless the words “means for” or “step for” are explicitly used in the particular claim.
Number | Name | Date | Kind |
---|---|---|---|
7039192 | Whelan | May 2006 | B1 |
7370350 | Salowey | May 2008 | B1 |
8312518 | Ezell | Nov 2012 | B1 |
8688973 | Kerschbaum | Apr 2014 | B2 |
8700906 | Kamara et al. | Apr 2014 | B2 |
9288039 | Monet | Mar 2016 | B1 |
9450938 | Lampkins et al. | Sep 2016 | B1 |
9536114 | El Defrawy et al. | Jan 2017 | B1 |
9736128 | Premnath et al. | Aug 2017 | B2 |
9813234 | Clark et al. | Nov 2017 | B2 |
10083310 | Lampkins | Sep 2018 | B1 |
10396984 | French | Aug 2019 | B2 |
10567156 | Castinado et al. | Feb 2020 | B2 |
10601585 | Robinson et al. | Mar 2020 | B1 |
10630486 | Lindell | Apr 2020 | B2 |
10686597 | Lampkins et al. | Jun 2020 | B1 |
10831903 | Li et al. | Nov 2020 | B2 |
11081017 | Isozu | Aug 2021 | B2 |
11201745 | Barham | Dec 2021 | B2 |
11625490 | Li | Apr 2023 | B2 |
20020052757 | Lewis | May 2002 | A1 |
20080304657 | Tuyls | Dec 2008 | A1 |
20100146299 | Swaminathan | Jun 2010 | A1 |
20120002811 | Smart | Jan 2012 | A1 |
20120179916 | Staker | Jul 2012 | A1 |
20120198241 | O'Hare | Aug 2012 | A1 |
20120331088 | O'Hare | Dec 2012 | A1 |
20130013931 | O'Hare | Jan 2013 | A1 |
20140108558 | Borzycki et al. | Apr 2014 | A1 |
20140173702 | Wong et al. | Jun 2014 | A1 |
20140181524 | Itoh | Jun 2014 | A1 |
20140279067 | Lei | Sep 2014 | A1 |
20140355756 | Iwamura | Dec 2014 | A1 |
20150006895 | Irvine | Jan 2015 | A1 |
20170310652 | Campagna | Oct 2017 | A1 |
20180123800 | Kim | May 2018 | A1 |
20180198601 | Laine | Jul 2018 | A1 |
20180218173 | Perkins et al. | Aug 2018 | A1 |
20190020482 | Gupta | Jan 2019 | A1 |
20190116032 | Pogmore | Apr 2019 | A1 |
20190220831 | Rangarajan et al. | Jul 2019 | A1 |
20190266354 | Banerjee et al. | Aug 2019 | A1 |
20190268400 | Gaikwad et al. | Aug 2019 | A1 |
20190273620 | Wu et al. | Sep 2019 | A1 |
20190294805 | Taylor | Sep 2019 | A1 |
20190296852 | Lazzaro | Sep 2019 | A1 |
20190296991 | Burnette et al. | Sep 2019 | A1 |
20190312734 | Wentz | Oct 2019 | A1 |
20190319932 | Kandregula | Oct 2019 | A1 |
20190342083 | LeSaint | Nov 2019 | A1 |
20190372760 | Zheng | Dec 2019 | A1 |
20190394039 | Higo | Dec 2019 | A1 |
20200005253 | Rangarajan et al. | Jan 2020 | A1 |
20200042742 | Bailey | Feb 2020 | A1 |
20200043018 | Mossoba et al. | Feb 2020 | A1 |
20200065571 | Desai et al. | Feb 2020 | A1 |
20200067699 | Resch | Feb 2020 | A1 |
20200089509 | Arya | Mar 2020 | A1 |
20200117818 | Latka | Apr 2020 | A1 |
20200118004 | Chen et al. | Apr 2020 | A1 |
20200136797 | Yu | Apr 2020 | A1 |
20200167497 | Dageville et al. | May 2020 | A1 |
20200175198 | Moffat | Jun 2020 | A1 |
20200186528 | Fan | Jun 2020 | A1 |
20200228339 | Barham | Jul 2020 | A1 |
20200233968 | Sun et al. | Jul 2020 | A1 |
20200242234 | Furukawa et al. | Jul 2020 | A1 |
20200252214 | Cheng et al. | Aug 2020 | A1 |
20200259800 | Masny | Aug 2020 | A1 |
20200295937 | Haider et al. | Sep 2020 | A1 |
20200311307 | Levy | Oct 2020 | A1 |
20200349261 | Koorella | Nov 2020 | A1 |
20200356082 | Wang et al. | Nov 2020 | A1 |
20200380091 | Bansal et al. | Dec 2020 | A1 |
20200380509 | Billman | Dec 2020 | A1 |
20200387620 | Kuzin et al. | Dec 2020 | A1 |
20200387624 | Dunjic et al. | Dec 2020 | A1 |
20210091929 | Veeningen | Mar 2021 | A1 |
20210135837 | Cheung | May 2021 | A1 |
20210135850 | Hoang | May 2021 | A1 |
20210160050 | Moon | May 2021 | A1 |
20210194666 | Georgieva | Jun 2021 | A1 |
20210328762 | Becher | Oct 2021 | A1 |
20210344477 | Aharoni | Nov 2021 | A1 |
20210377031 | Aharoni | Dec 2021 | A1 |
20220069980 | Ohara | Mar 2022 | A1 |
20220075878 | Begg | Mar 2022 | A1 |
20220231847 | Rangarajan | Jul 2022 | A1 |
20220239487 | Seraj | Jul 2022 | A1 |
Number | Date | Country | |
---|---|---|---|
20220231847 A1 | Jul 2022 | US |