-
公开(公告)号:US12112373B2
公开(公告)日:2024-10-08
申请号:US17887319
申请日:2022-08-12
Applicant: Enclave Markets Inc.
Inventor: Yuqun Chen , Xander Dunn , Michael Edmond Kaplan , Bernard Wong , Emin Gun Sirer , David Wells , Phil Wirtjes , Oliver Hopcroft , Stephen Bezek
IPC: G06Q40/04
CPC classification number: G06Q40/04 , G06Q2220/00
Abstract: In one implementation, a system to provide a secure crossing network for trading digital blockchain assets outside of an exchange can include a crossing network program that is configured to provide a crossing network for the digital blockchain assets and a computer system with a secure enclave that is configured to provide the trusted execution environment within which processing of programs is secure from observation and manipulation by other operations outside of the secure enclave. The execution of the crossing network program in the secure enclave receiving, from client devices, crossing network orders to trade assets within the crossing network; matching at least a portion of the crossing network orders in an order book; obtaining, using a pricing oracle, pricing information for transactions in the exchange; and determining a reference price for the matched orders within the crossing network based on the pricing information from the exchange.
-
2.
公开(公告)号:US20240243905A1
公开(公告)日:2024-07-18
申请号:US18492372
申请日:2023-10-23
Applicant: Enclave Markets Inc.
Inventor: Michael Edmond Kaplan , Bernard Wong
CPC classification number: H04L9/0825 , H04L9/0866 , H04L9/3263
Abstract: A secure module can be configured to: provide the trusted execution environment; and load secure-software for processing in the trusted execution environment to perform operations. The operations can include generating a private key and a corresponding public key; maintaining the private key in the trusted execution environment; receiving at least one attestation request from at least one attestation server; responding to the received attestation requests with attestation responses generated with the private key; initiating encrypted connections with client devices using the private key, the encrypted connections having an endpoint within the trusted execution environment such that contents of the encrypted connections are secure from observation and manipulation by other operations outside of the secure module and outside of the client devices; and communicating data with the client devices through the encrypted connections.
-