2014 IP Solutions Customer Conference

2014 IP Solutions Customer Conference: Unite with the brightest minds in IP across industries at our annual Thomson Reuters IP Solutions Customer Conference in Troy, Michigan—an idyllic Detroit suburb. Home to the Model T and the world’s first paved road and traffic light, innovation has fueled the Motor City for more than 100 years: www.signup4.net

Delaware Bankruptcy Venue, Procedure and Law

Topics include turf war: changing venue back to California, overview of Delaware procedure, including first day motions, “negative” notice, omnibus hearing calendars and evidence, a polite discussion of individual judges preferences’, and circuit-level differences in substantive law (for example, Montgomery Ward and administrative claims of landlords): www.sfbar.org

SVIPLA DINNER MEETING

SVIPLA (Silicon Valley Intellectual Property Law Association) DINNER MEETING: USPTO Commissioner for Patents, Former USPTO Commissioner for Patents & Patent Properties, Inc. CEO, Discuss NPEs/PAEs/Trolls Initiatives: www.svipla.org

IP in a World Without Scarcity

“More recently, new technologies promise to do for a variety of physical goods and even services what the Internet has already done for information… While none of these technologies are nearly as far along as the Internet, they share two essential characteristics with the Internet: they radically reduce the cost of production and distribution of things, and they separate the informational content of those things (the design) from their manufacture. Combine these four developments – the Internet, 3D printing, robotics, and synthetic biology – and it is entirely plausible to envision a not-too-distant world in which most things that people want can be downloaded and created on site for very little money. The role of IP in such a world is both controverted and critically important.”

Read full article..

New Erik Pelton Interview

Erik Pelton discusses certain positive and less positive aspects of trademark registration on the USPTO Supplemental Register.

An Interview with Jim Nieters of HP

Jim Nieters of HP talks about his upcoming presentation at SXSW, “Design-Driven Innovation, How Designers Facilitate the Dialog”. This session (12:30 P.M. March 13, 2011 @SXSW/Austin) will show how leading innovation workshops (i.e., collaborative design workshops) not only brings Human Experience Design to the strategy table, but it invents a new table at which strategic ideation and dialog can take place constructively. This Conversation will be held Salon E of the Hilton Hotel located at 500 East 4th Street, Austin, TX.

New research: Better wallet security for Bitcoin

New research: Better wallet security for Bitcoin
[Let’s welcome to Freedom to Tinker Steven Goldfeder, a first-year Ph.D. student in the Princeton computer security group. Today he will describe an exciting research project on Bitcoin security. — Arvind Narayanan]

The Bitcoin ecosystem has been plagued by thefts and losses that have affected both businesses and individuals. The security of a Bitcoin wallet rests entirely on the security of its associated private keys which can digitally sign transactions to irreversibly spend the coins in the wallet. In a new paper, we show how to use the cryptographic technique of threshold signatures to increase the security of both corporate and individual wallets.

Perhaps Bitcoin’s toughest security challenge is protecting Internet-connected wallets from insider threats. Such hot wallets cannot be kept in highly secure, offline cold storage. One good way for businesses to mitigate this vulnerability is to have hot wallets jointly controlled by multiple parties. This way, no party can independently steal corporate funds. In our paper, we show how to achieve joint control of wallets using threshold signatures.

The problem of implementing joint control is more important and more difficult for a Bitcoin wallet than it is for a traditional bank account. Whereas regular bank transactions have recovery mechanisms if fraud is detected, Bitcoin transactions are irreversible and their pseudonymity makes it difficult to identify thieves and attempt to recover stolen funds. Moreover, while large bank transactions typically require human action to complete, Bitcoin transactions–no matter how large–require only a cryptographic signature to authorize.

The threshold signature approach to joint control works like this: the private key controlling the wallet is split between devices belonging to n different participants such that any m of them can jointly produce a digital signature, while a group of less than m participants cannot. Crucially, in the process of producing a signature, the key is never reconstructed. As long as an attacker has compromised fewer than m devices, the key remains secure.

Our method for achieving joint control has significant benefits over Bitcoin’s “multi-signature” transactions. With multi-signatures, each party’s signature is published to the block chain, whereas threshold signatures allow participants to privately to create a single signature which is indistinguishable from ordinary Bitcoin signatures. You can think of our solution as “stealth multi-signatures.” This improves anonymity and confidentiality while keeping transactions a constant size, reducing fees and providing flexibility to scale to an arbitrary number of parties.

We implemented a threshold signature protocol and have used it to demonstrate joint control over a Bitcoin wallet. We produced this transaction using a 9-of-12 threshold signature. If you click on the link to see the transaction details, you won’t see anything special; it looks like any regular transaction. That’s exactly the point!

Joint control is one of several security measures that can be built using threshold signatures. In our paper, we show that threshold signatures can be used as a primitive to build schemes for secure bookkeeping and secure delegation. One application that we’re particularly excited about is using threshold signatures to achieve two-factor security for personal wallets. In a follow-up post, we will elaborate on this application and discuss our ongoing efforts to build a two-factor secure wallet.

The main lesson from our work is that a spectrum of traditional internal financial controls can be translated to the Bitcoin world by novel application of cryptography. We hope that the security measures we’ve proposed will become standard in Bitcoin usage, and we are looking forward to working with developers and others who want to adopt our solutions.

We’d like to thank Greg Maxwell and Andrew Miller for providing useful feedback.

@IP Society