About
I’m a practical physicist which is someone with a sharp intuition for the physical world…
Articles by Kenneth
Activity
-
Signed our first Joint Venture today. It's enabling AI economically and to increase Enterprise Value. Built on top of the @GnusAi infrastructure…
Signed our first Joint Venture today. It's enabling AI economically and to increase Enterprise Value. Built on top of the @GnusAi infrastructure…
Shared by Kenneth Hurley
-
Ok, here it is. This is game-changing, and what we are about to build and release on top of the @gnusai Operating System. https://lnkd.in/gzNsGRJ8…
Ok, here it is. This is game-changing, and what we are about to build and release on top of the @gnusai Operating System. https://lnkd.in/gzNsGRJ8…
Shared by Kenneth Hurley
-
Silicon Valley’s Monoculture Myopia is directionally right — but incomplete. The critique that LLMs are “frozen prediction engines” that don’t truly…
Silicon Valley’s Monoculture Myopia is directionally right — but incomplete. The critique that LLMs are “frozen prediction engines” that don’t truly…
Shared by Kenneth Hurley
Experience
Education
Licenses & Certifications
Patents
-
System and method for distributed general-purpose computing with cryptotoken payment system
Issued US 11,451,393 B2
See patentA system and method for distributed general-purpose computing with cryptotoken payment system provides a full system that integrates a slow Blockchain Cryptotoken with a fast Directed Acyclic Graph Blockchain Cryptotoken. The instant invention provides: (1) a hybrid Cryptocurrency/Cryptotoken system that allows for very fast transactions to happen decoupled from the slow transactions of normal Cryptocurrencies (2) a mechanism to verify the processing of data and payments to the End User's…
A system and method for distributed general-purpose computing with cryptotoken payment system provides a full system that integrates a slow Blockchain Cryptotoken with a fast Directed Acyclic Graph Blockchain Cryptotoken. The instant invention provides: (1) a hybrid Cryptocurrency/Cryptotoken system that allows for very fast transactions to happen decoupled from the slow transactions of normal Cryptocurrencies (2) a mechanism to verify the processing of data and payments to the End User's wallet for the processing of that data that can, in turn, be used for In-App purchases or in-game purchases of items and (3) mechanisms for the transfer of unprocessed and processed data to the client or customer.
-
Method and apparatus for content-based rendering of user interfaces
Issued US 7516412 B1
Method and apparatus for content based dynamic rendering of user interfaces. The present invention provides a system that receives an unformatted stream of content, and then considers the physical dimensions of its controlled screen area and dynamically lays out the content to fit in this screen area.
Other inventors -
-
System and Method for Verifying Multiparty Computations in Decentralized Environment Using Cryptographic Procedures
Filed 63/831,201
A system and a method for verifying multiparty computations (MPCs) based on one or more cryptographic procedures are disclosed. The system comprises a cryptographic parameters generating subsystem, an interaction management subsystem, a MultiParty Computation (MPC) verifying subsystem, and a cryptographic proof validating subsystem. The cryptographic parameters generating subsystem is configured to generate one or more cryptographic parameters. The interaction management subsystem is configured…
A system and a method for verifying multiparty computations (MPCs) based on one or more cryptographic procedures are disclosed. The system comprises a cryptographic parameters generating subsystem, an interaction management subsystem, a MultiParty Computation (MPC) verifying subsystem, and a cryptographic proof validating subsystem. The cryptographic parameters generating subsystem is configured to generate one or more cryptographic parameters. The interaction management subsystem is configured to coordinate and manage exchange of cryptographic proofs between one or more users. The MPC verifying subsystem is configured to generate the cryptographic proofs for each computation using a circuit-based approach. The cryptographic proof validating subsystem is configured to verify the cryptographic proofs to confirm that the computations were executed correctly.
Other inventors -
System and Method for Authenticating Crypto-Token Transactions Using Cryptographic Protocols
Filed 63/743,665
A computer-implemented system and a computer-implemented method for authenticating crypto-token transactions using cryptographic protocols is disclosed. The system comprises an Elliptic Curve Digital Signature Algorithm (ECDSA) identity verification subsystem, a crypto-token wallet generating subsystem, an El Gamal key generation subsystem, an El Gamal encryption subsystem, a privacy-preserving subsystem, a Key Derivation Function (KDF) key regeneration subsystem, and a zk-SNARK integration…
A computer-implemented system and a computer-implemented method for authenticating crypto-token transactions using cryptographic protocols is disclosed. The system comprises an Elliptic Curve Digital Signature Algorithm (ECDSA) identity verification subsystem, a crypto-token wallet generating subsystem, an El Gamal key generation subsystem, an El Gamal encryption subsystem, a privacy-preserving subsystem, a Key Derivation Function (KDF) key regeneration subsystem, and a zk-SNARK integration subsystem. The ECDSA identity verification subsystem links user identities securely to existing crypto-token wallets using ECDSA keys. The crypto-token wallet generating subsystem generates new crypto-token wallets based on El Gamal public keys. The El Gamal key generation subsystem generates El Gamal encryption keys. The El Gamal encryption subsystem employs the El Gamal encryption keys to encrypt an original signature. The privacy-preserving subsystem employs proxy addresses for transaction anonymity. The KDF key regeneration subsystem regenerates keys (public and private). The zk-SNARK integration subsystem integrates zk-SNARKs for the cryptographic protocols.
Other inventors -
System and Method for Managing Digital Transaction Based On Cryptographic Procedures
Filed 63/645,261
A system and method for managing digital transactions by using cryptographic procedures are disclosed. The system comprises a security initialization subsystem, a transaction initiating subsystem, a proof generating subsystem, a transaction submission subsystem, and a transaction verifying subsystem. The security initialization subsystem sets up initial security parameters and mechanisms, ensuring each user is configured with cryptographic keys and two-factor authentication (2FA) mechanisms for…
A system and method for managing digital transactions by using cryptographic procedures are disclosed. The system comprises a security initialization subsystem, a transaction initiating subsystem, a proof generating subsystem, a transaction submission subsystem, and a transaction verifying subsystem. The security initialization subsystem sets up initial security parameters and mechanisms, ensuring each user is configured with cryptographic keys and two-factor authentication (2FA) mechanisms for managing digital transactions. The system encrypts secret seeds, utilizes append-only databases, and employs hardware security modules (HSMs) for enhanced security. The system ensures authentication and protection without revealing sensitive information, enhancing security across the digital transactions.
Other inventors
Projects
-
Rampage for PC, Apple ][ and Amiga
-
All programming was done in assembly language for original PC/DOS version that was the first version ported from the arcade game. Then I ported the PC version to Apple ][ and Amiga computers. The code base was used as the basis for most other versions.
Computer Gaming World approved of the DOS adaptation of Rampage, especially for those with computers faster than the original IBM PC and an EGA video card. It stated that "Rampage is proof that IBM games can compete with other machines…All programming was done in assembly language for original PC/DOS version that was the first version ported from the arcade game. Then I ported the PC version to Apple ][ and Amiga computers. The code base was used as the basis for most other versions.
Computer Gaming World approved of the DOS adaptation of Rampage, especially for those with computers faster than the original IBM PC and an EGA video card. It stated that "Rampage is proof that IBM games can compete with other machines in running entertainment software".Other creators -
Honors & Awards
-
Electronic Arts - Most Tenacious (1991)
Electronic Arts
Electronic Arts gave awards and I received "Most Tenacious" which was an alligator. This was for my ability to continually drive and complete projects in a timely and efficient manner.
-
Electronic Arts - Rookie of the Year (1990)
Electronic Arts
1st year at Electronic Arts, given small award of "Rookie of the Year". It was a baseball player hitting a home run.
Languages
-
Assembly (6502, 68000, 8086, MMX, SSE)
Professional working proficiency
-
Java
Professional working proficiency
-
Javascript (TypeScript)
Professional working proficiency
-
Dart
Full professional proficiency
-
C#
Professional working proficiency
-
C++
Professional working proficiency
-
English
Native or bilingual proficiency
-
Scripting (Python, Perl, Bash)
Professional working proficiency
Recommendations received
12 people have recommended Kenneth
Join now to viewMore activity by Kenneth
-
NVIDIA just destroyed its last moat. And I don’t think the market understands what just happened. Over the last 3 weeks, something shifted for me…
NVIDIA just destroyed its last moat. And I don’t think the market understands what just happened. Over the last 3 weeks, something shifted for me…
Shared by Kenneth Hurley
-
It's like they were reading my mind, or maybe just my proposals I've been sending out for the last couple of months. "The summit posed a challenge…
It's like they were reading my mind, or maybe just my proposals I've been sending out for the last couple of months. "The summit posed a challenge…
Shared by Kenneth Hurley
-
VCs are panicking as AI obliterates software moats overnight. But LPs rushing to throw billions at Big AI pre-IPO? They should be in full meltdown…
VCs are panicking as AI obliterates software moats overnight. But LPs rushing to throw billions at Big AI pre-IPO? They should be in full meltdown…
Shared by Kenneth Hurley
-
AI Just Triggered the Demise of SaaS. Most of the Industry Is Still in Denial For the last 20 years the tech industry has been built around one…
AI Just Triggered the Demise of SaaS. Most of the Industry Is Still in Denial For the last 20 years the tech industry has been built around one…
Shared by Kenneth Hurley
Other similar profiles
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content