Evgen Verzunš”ļø
San Francisco, California, United States
8K followers
500+ connections
About
I spent the last 20 years constantly collaborating with tech-savvy professionalsā¦
Services
Articles by Evgen
Activity
-
Todayās crypto market proves an important point: #Bitcoin staying just under $100K and moving slowly is actually better for #altcoinsš When Bitcoinā¦
Todayās crypto market proves an important point: #Bitcoin staying just under $100K and moving slowly is actually better for #altcoinsš When Bitcoinā¦
Posted by Evgen Verzunš”ļø
-
Why Bitcoin at $100K Could Crash the Party for Altcoins? Tomorrow, I'll publish the full article, but to answer all your questions, let me explainā¦
Why Bitcoin at $100K Could Crash the Party for Altcoins? Tomorrow, I'll publish the full article, but to answer all your questions, let me explainā¦
Posted by Evgen Verzunš”ļø
-
You can endlessly watch three things: how water flowsš how fire burnsš„ and how #Bitcoin grows š
You can endlessly watch three things: how water flowsš how fire burnsš„ and how #Bitcoin grows š
Shared by Evgen Verzunš”ļø
Patents
-
Decentralized cybersecure privacy network for cloud communication, computing and global e-commerce
Issued US 11277390B2
Decentralized cybersecure privacy network for cloud communication, computing and global e-commerce
Abstract
Software installed in the nodes in a communication network allows them to perform a āname serverā function, which entails the management of a dynamic list of the client devices that are connected to the cloud, a ātaskā function, which entails the receipt and transmission of the packets, and an āauthorityā function, which entails the determination of the routes of the packetsā¦Decentralized cybersecure privacy network for cloud communication, computing and global e-commerce
Abstract
Software installed in the nodes in a communication network allows them to perform a āname serverā function, which entails the management of a dynamic list of the client devices that are connected to the cloud, a ātaskā function, which entails the receipt and transmission of the packets, and an āauthorityā function, which entails the determination of the routes of the packets through the cloud. Each node is capable of performing only one function at a time. After completing a job, a node reverts to an undifferentiated, state awaiting its next performance request.Other inventorsSee patent -
Decentralized cybersecure privacy network for cloud communication and global e-commerce
Issued WO2020014399A1
Decentralized cybersecure privacy network for cloud communication and global e-commerce
Abstract
Software installed in the nodes in a communication network allows them to perform a ''name server'' function, which entails the management of a dynamic list of the client devices that are connected to the cloud, a ''task'' function, which entails the receipt and transmission of the packets, and an ''authority'' function, which entails the determination of the routes of the packets through theā¦Decentralized cybersecure privacy network for cloud communication and global e-commerce
Abstract
Software installed in the nodes in a communication network allows them to perform a ''name server'' function, which entails the management of a dynamic list of the client devices that are connected to the cloud, a ''task'' function, which entails the receipt and transmission of the packets, and an ''authority'' function, which entails the determination of the routes of the packets through the cloud. Each node is capable of performing only one function at a time. After completing a job, a node reverts to an undifferentiated, state awaiting its next performance request.
DECENTRALIZED CYBERSECURE PRIVACY NETWORK FOR CLOUD
COMMUNICATION AND GLOBAL E-COMMERCE
CROSS-REFERENCE TO RELATED APPLICATIONS
This application claims the priority of U.S. Provisional Application No.
62/696,160, filed July 10, 2018.
This application is a continuation-in-part of U.S. Application No. 15/946,863, filed April 6, 2018, which is a division of U.S. Application No. 14/803,869, filed July 20, 2015, now U.S. Patent No. 9,998,434, issued June 12, 2018, which claimed the priority of U.S. Provisional Application No. 62/107,650, filed January 26, 2015.
This application is also a continuation-in-part of U.S. Application No.
15/943,418, filed April 2, 2018, which is a continuation-in-part of the above-referenced U.S. Application No. 14/803,869, filed July 20, 2015, now U.S. Patent No. 9,998,434, issued June 12, 2018, and which claimed the priority of U.S. Provisional Application No. 62/480,696, filed April 3, 2017. -
METHODS AND APPARATUS FOR HYPERSECURE LAST MILE COMMUNICATION
Filed
(EN) A variety of techniques for concealing the content of a communication between a client device, such as a cell phone or laptop, and a network or cloud of media nodes are disclosed. Among the techniques are routing data packets in the communication to different gateway nodes in the cloud, sending the packets over different physical media, such as an Ethernet cable or WiFi channel, and disguising the packets by giving them different source addressees. Also disclosed are a technique for mutingā¦
(EN) A variety of techniques for concealing the content of a communication between a client device, such as a cell phone or laptop, and a network or cloud of media nodes are disclosed. Among the techniques are routing data packets in the communication to different gateway nodes in the cloud, sending the packets over different physical media, such as an Ethernet cable or WiFi channel, and disguising the packets by giving them different source addressees. Also disclosed are a technique for muting certain participants in a conference call and a highly secure method of storing data files.
(FR) La prĆ©sente invention concerne diffĆ©rentes techniques pour dissimuler le contenu dāune communication entre un dispositif client, tel quāun tĆ©lĆ©phone cellulaire ou un ordinateur portable, et un rĆ©seau ou un cloud de nÅuds multimĆ©dias. Les techniques comprennent lāacheminement de paquets de donnĆ©es de routage dans la communication vers diffĆ©rents nÅuds de passerelle dans le cloud, lāenvoi des paquets sur diffĆ©rents supports physiques, tels quāun cĆ¢ble Ethernet ou un canal WiFi, et la dissimulation des paquets en leur donnant diffĆ©rentes adresses de source. Lāinvention concerne en outre une technique de blocage de certains participants dans un appel de confĆ©rence et un procĆ©dĆ© hautement sĆ©curisĆ© de stockage de fichiers de donnĆ©es.Other inventorsSee patent -
ė³“ģ ėģ ķµģ ė¤ķøģķ¬ ė° ķė”ķ ģ½
Issued
ėģ§ķø ė°ģ“ķ°ģ ķØķ·ģ ģ ģ”ķźø° ģķ ė³“ģ ķ“ė¼ģ°ėģģ, ģźø° ķØķ·ģ ģ“ė¤ģ“ ķ“ė¼ģ°ėģ ėÆøėģ“ ė øėė„¼ ķµź³¼ķ ė ė°ė³µģ ģ¼ė” ģ¤ķ¬ėØėøėź³ (ģ¦, ź·ø ė°ģ“ķ° ģøź·øėؼķøź° ģ¬ģ§ģ ėź³ ) ź·ø ķ ģøģ¤ķ¬ėØėøėė©°, ė¶ķ ėź³ , ź·ø ķ ķ¼ķ©ėė©°, ė°/ėė ģķøķėź³ , ź·ø ķ ķ“ė ėė¤.
ģźø° ķØķ·ģ ģ¤ķ¬ėØėøė§ķź³ , ė¶ķ ķź³ , ķ¼ķ©ķź³ , ė° ģķøķķė ė° ģ¬ģ©ėė ė°©ė²ģ ģź°ź³¼ ź°ģ ģķģ ė°ė¼ ė³ķė ģ ģģ¼ė©°, ģ“ģ ė°ė¼ ķ“ģ»¤ź° ķØķ·ģ ėØķøė§ ė³¼ ģ ģė¤ė ģ ģ ź³ ė ¤ķė©“ ģ¬ģ¤ģ ķ“ģ»¤ģ ėģģ ė¶ź°ė„ķź² ķė©°, ė°ģ“ķ°ė„¼ ģģ„ķė ė° ģ¬ģ©ė ė°©ė²ģ ėģģģ“ ė³ķź³ ģė¤.Other inventorsSee patent -
(EN) SECURE DYNAMIC COMMUNICATION NETWORK AND PROTOCOL (FR) RĆSEAU ET PROTOCOLE DE COMMUNICATION DYNAMIQUE SĆCURISĆE
Issued
Abstract:
(EN)In a secure cloud for transmitting packets of digital data, the packets may be repeatedly scrambled (i.e., their data segments reordered) and then unscrambled, split and then mixed, and/or encrypted and then decrypted as they pass through media nodes in the cloud. The methods used to scramble, split, mix and encrypt the packets may be varied in accordance with a state such as time, thereby making the task of a hacker virtually impossible inasmuch as he or she may be viewingā¦Abstract:
(EN)In a secure cloud for transmitting packets of digital data, the packets may be repeatedly scrambled (i.e., their data segments reordered) and then unscrambled, split and then mixed, and/or encrypted and then decrypted as they pass through media nodes in the cloud. The methods used to scramble, split, mix and encrypt the packets may be varied in accordance with a state such as time, thereby making the task of a hacker virtually impossible inasmuch as he or she may be viewing only a fragment of a packet and the methods used to disguise the data are constantly changing.
(FR)Dans un nuage informatique sĆ©curisĆ© pour transmettre des paquets de donnĆ©es numĆ©riques, les paquets peuvent ĆŖtre embrouillĆ©s Ć maintes reprises (c'est-Ć -dire, leurs segments de donnĆ©es sont remis dans un ordre diffĆ©rent) et ensuite dĆ©sembrouillĆ©s, sĆ©parĆ©s et ensuite mixĆ©s, et/ou chiffrĆ©s et ensuite dĆ©chiffrĆ©s et ensuite chiffrĆ©s lorsqu'ils traversent des nÅuds de support dans le nuage informatique.
Designated States: AE, AG, AL, AM, AO, AT, AU, AZ, BA, BB, BG, BH, BN, BR, BW, BY, BZ, CA, CH, CL, CN, CO, CR, CU, CZ, DE, DK, DM, DO, DZ, EC, EE, EG, ES, FI, GB, GD, GE, GH, GM, GT, HN, HR, HU, ID, IL, IN, IR, IS, JP, KE, KG, KN, KP, KR, KZ, LA, LC, LK, LR, LS, LU, LY, MA, MD, ME, MG, MK, MN, MW, MX, MY, MZ, NA, NG, NI, NO, NZ, OM, PA, PE, PG, PH, PL, PT, QA, RO, RS, RU, RW, SA, SC, SD, SE, SG, SK, SL, SM, ST, SV, SY, TH, TJ, TM, TN, TR, TT, TZ, UA, UG, US, UZ, VC, VN, ZA, ZM, ZW.
African Regional Intellectual Property Organization (BW, GH, GM, KE, LR, LS, MW, MZ, NA, RW, SD, SL, ST, SZ, TZ, UG, ZM, ZW)
Eurasian Patent Organization (AM, AZ, BY, KG, KZ, RU, TJ, TM)
European Patent Office (AL, AT, BE, BG, CH, CY, CZ, DE, DK, EE, ES, FI, FR, GB, GR, HR, HU, IE, IS, IT, LT, LU, LV, MC, MK, MT, NL, NO, PL, PT, RO, RS, SE, SI, SK, SM, TR)
African Intellectual Property Organization (BF, BJ, CF, CG, CI, CM, GA, GN, GQ, GW, KM, ML, MR, NE, SN, TD, TG).Other inventorsSee patent -
Secure Dynamic Communication Network And Protocol
Issued
In a secure cloud for transmitting packets of digital data, the packets may be repeatedly scrambled (i.e., their data segments reordered) and then unscrambled, split and then mixed, and/or encrypted and then decrypted as they pass through media nodes in the cloud. The methods used to scramble, split, mix and encrypt the packets may be varied in accordance with a state such as time, thereby making the task of a hacker virtually impossible inasmuch as he or she may be viewing only a fragment of aā¦
In a secure cloud for transmitting packets of digital data, the packets may be repeatedly scrambled (i.e., their data segments reordered) and then unscrambled, split and then mixed, and/or encrypted and then decrypted as they pass through media nodes in the cloud. The methods used to scramble, split, mix and encrypt the packets may be varied in accordance with a state such as time, thereby making the task of a hacker virtually impossible inasmuch as he or she may be viewing only a fragment of a packet and the methods used to disguise the data are constantly changing.
Other inventorsSee patent -
Advanced Transactional Protocol and Ecosystem for Smart Contract Authoring and Deployment
Filed WO2022212801A2
A method of automated smart contract authoring and token generation
for a multi-tranche fungible or non-fungible token offering comprising the steps:
Compiling the offering tokenomics stipulating the price, quantity, availability, and timing of
token released in each tranche of the offering;
Compiling a network protocol library containing the token and smart contract specifications for
one or more blockchain networks including the programming language and theā¦A method of automated smart contract authoring and token generation
for a multi-tranche fungible or non-fungible token offering comprising the steps:
Compiling the offering tokenomics stipulating the price, quantity, availability, and timing of
token released in each tranche of the offering;
Compiling a network protocol library containing the token and smart contract specifications for
one or more blockchain networks including the programming language and the defined
variables for the token type to be generated;
Submitting blockchain protocols selected from the network protocol library along with the
offering tokenomics as inputs to a smart contract authoring bot program;
Executing the smart contract authoring bot program to produce one or more decentralized
application programs comprising a smart contract dApp for generating the new token offering
on one or more blockchain networks, where each blockchain network requires its own unique
smart contract dApp;
Checking the integrity of all of the bot authored smart contract dApps for accuracy or software
bugs;
Executing each bot smart contract dApp by uploading and registering it on its respective
blockchain, where the process of executing the smart contract dApp requires transactional
validation by a jury of peers in accordance with the operation of the blockchainās virtual
machine, and where participating jurors are remunerated by gas fees paid in cryptocurrency
specific to the blockchainās operation;
Where the generated tokens are either retained as an undistributed digital asset within the
smart contract dApp or alternatively transferred in total or in part to one or more digital
wallets or DeFi pools;
Courses
-
MBA
-
Projects
-
QGlobe Games
-
Bullieverse
- Present
-
HOFA Gallery
- Present
House of Fine Art - HOFA Gallery represents an exclusive portfolio of leading international contemporary artists across its locations in London, Los Angeles, and Mykonos.
Their program consists of leading original works of art featuring a multitude of genres with a focus on unique, distinctive and rare artworks of appreciative value, showcased in monthly exhibitions and documentaries. -
Scotty Beam
- Present
-
CyberWallet
-
HyperID
Founded by a team of cybersecurity experts with 15 years of experience developing software security solutions for mission-critical real-time telecommunications systems, HyperID is part of the HyperSphere decentralized trust ecosystem.
Operating in information security, we learned that the challenges faced in these areas resemble those of the crypto industry. To address these concerns, we embarked on a journey to bring a professional approach to data and privacy protection to theā¦Founded by a team of cybersecurity experts with 15 years of experience developing software security solutions for mission-critical real-time telecommunications systems, HyperID is part of the HyperSphere decentralized trust ecosystem.
Operating in information security, we learned that the challenges faced in these areas resemble those of the crypto industry. To address these concerns, we embarked on a journey to bring a professional approach to data and privacy protection to the blockchain community, leveraging cutting-edge cryptographic practices.
Over the past 5 years, the team has developed a fully operational automated service platform to manage and secure crypto token launches, successfully issued tokens for several high-profile projects, and developed secure transaction technologies for blockchain applications.
HyperID's mission is to help organizations and their users seamlessly transit to the world of secure, decentralized digital identity and drive the rapid and limitless potential of blockchain technology.
Languages
-
English
Professional working proficiency
-
Ukrainian
Native or bilingual proficiency
-
Russian
Native or bilingual proficiency
Recommendations received
4 people have recommended Evgen
Join now to viewMore activity by Evgen
-
āThank you for your kindness and patience while we resolved the issue. Your understanding and positive attitude made a big difference, and it means aā¦
āThank you for your kindness and patience while we resolved the issue. Your understanding and positive attitude made a big difference, and it means aā¦
Posted by Evgen Verzunš”ļø
-
Understanding how different age groups engage with content is essential for effective communication. Each generation has its preferred formats: -ā¦
Understanding how different age groups engage with content is essential for effective communication. Each generation has its preferred formats: -ā¦
Shared by Evgen Verzunš”ļø
Other similar profiles
Explore collaborative articles
Weāre unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More