It seems the intention is to bog people down in legal fees rather than having any legitimate claims. I have not seen him try to enforce patent rights, which I see he has got some US ones issued. I see he is trolling people with the copyright claims already on the White Paper.
Here are some method patent Craig now owns:
US1071533
Claim 1: A computer implemented method of encrypting data at an electronic device (S), the electronic device being associated with a key device (C), wherein the electronic device is further associated with a first asymmetric cryptography pair having a first electronic device private key (V1S) and a first electronic device public key (P1S), and the key device is associated with a second asymmetric cryptography pair having a first key device private key (V1C) and a first key device public key (P1C); the method comprising:
determining, at the electronic device, a deterministic key (DK);
receiving, at the electronic device, the first key device public key (P1C) from the key device;
determining, at the electronic device, a second electronic device private key (V2S) based on at least the first electronic device private key (V1S) and the deterministic key (DK), and
determining, at the electronic device, a second key device public key (P2C) based on at least the first key device public key (P1C) and the deterministic key (DK);
determining a secret based on at least the second electronic device private key (V2S) and the second key device public key (P2C);
encrypting the data at the electronic device using the determined secret or an encryption key that is based on the determined secret; and
sending information indicative of the deterministic key (DK) to the key device where the information can be stored.
US10659223
Claim 1:A computer-implemented method of controlling access to a resource, the method comprising:
splitting a verification element into a plurality of shares;
determining a common secret at two or more nodes in a network; and
using the common secret to transmit at least one share of the verification element between the two or more nodes, wherein: the common secret is determined by first (C) and second (S) nodes in the network, wherein the first node (C) is associated with a first asymmetric cryptography pair having a first node master private key (V1C) and a first node master public key (P1C), and the second node (S) is associated with a second asymmetric cryptography pair having a second node master private key (V1S) and a second node master public key (P1S); and wherein the method further comprises: determining a first node second private key (V2C) based on at least the first node master private key (V1C) and a Generator Value (GV); determining a second node second public key (P2S) based on at least the second node master public key (P1S) and the Generator Value (GV); and determining the common secret (CS) based on the first node second private key (V2C) and the second node second public key (P2S), wherein the second node (S) has the same common secret (S) based on a first node second public key (P2S) and a second node second private key (V2S), wherein: the first node second public key (P2C) is based on at least the first node master public key (P1C) and the Generator Value (GV); and the second node second private key (V2S) is based on at least the second node master private key (V1S) and the Generator Value (GV).
US10579779
Claim 1: A computer-implemented method of verifying integrity of a computer software for installation using a distributed hash table and a peer-to-peer distributed ledger, the method comprising:
determining a metadata (M) associated with a transaction record stored on the peer-to-peer distributed ledger;
determining an indication of an entry stored on the distributed hash table from the metadata (M);
determining a third hash value (H3) based on the computer software;
determining a fourth hash value (H4) from the entry on the distributed hash table;
comparing the third hash value (H3) and the fourth hash value (H4); and
verifying the integrity of the computer software based on the comparing of the third hash value (H3) and the fourth hash value (H4).
I am not sure on Copyrights, but in the case of Patents it is actually quite common to get them "thrown out". The simplest way probably, in this case, is to show prior art existed on any of the said subject matter. Likewise, something that is already in the public domain could also invalidate a patent. He has gotten quite a few granted.