Education
I graduated in 2006 from the Illinois Institute of Technology school of Science and Letters with a B.S. in Computer Science with Specialization in Information Security, and a minor in Psychology.
I currently serve on the school’s Alumni Board Executive Committee and Chair the Alumni Awards Committee.
Patents
I currently hold 1,003 issued of 1,243 applications for US patents. This places among the top 50 inventors in history.
In 2014, the Institute of Electrical and Electronics Engineers (IEEE) ranked the value of the patent portfolio I helped build as the third most powerful among Internet Services companies, after Facebook and Google.
Press
- Meet Cleversafe’s Jason Resch, the kind of talent you build a company around, Crain’s Chicago Business, (2015)
- Another Day, Another Patent, IIT Magazine, (2014)
- Innovating Chicago-Style: How Local Innovators Are Building the National Economy, Book Ends Publishing, (2011)
Awards & Honors
- IBM Master Inventor (2016)
- Illinois Institute of Technology Outstanding Young Alumnus Award (2015)
- Crain’s Chicago Business Tech 50: Our annual list of Chicago’s top tech talent (2015)
- Open Source submission contest winner (2005)
- Computer Science student of the year (2002)
- Placed 3rd in a regional team programming competition (2001)
Presentations
- Updatable Oblivious Key Management for Storage Systems
- The 26th ACM Conference on Computer and Communications Security, London, United Kingdom (November 11, 2019)
- Platform for Robust Threshold Cryptography
- NIST Threshold Cryptography Workshop (March 11, 2019)
- A Decade of Innovation in Review
- Usenix File and Storage Technologies (March 1, 2017)
- Fun with Linearity: How Encryption and Erasure Codes are Intimately Related
- SNIA Storage Developer Conference, Santa Clara, CA, (September 20, 2016)
- Erasure Encoding—Practice and Principles
- Usenix File and Storage Technologies (February 22, 2016)
- Algorithms: Human Influence on the World of Data
- Illinois Institute of Technology, Lewis College Roundtable, (October 29, 2015)
- New Consistent Hashing Algorithms for Data Storage
- SNIA Storage Developer Conference, Santa Clara, CA, (September 20, 2015)
- New Techniques for Rebuilding Data Efficiently and Securely
- DIMACS Workshop on Coding Theoretic Methods for Network Security (April 1, 2015)
- Next Generation Erasure Coding Techniques
- SNIA Storage Developers Conference, Santa Clara, CA, (September 15, 2014)
- Getting the Most Out of Erasure Codes
- SNIA Storage Developers Conference, Santa Clara, CA, (September 16, 2013)
- How to Store Data to the Cloud without Giving the Cloud Anything
- SNIA Storage Developers Conference, Santa Clara, CA, (September 19, 2012)
- Authenticating Cloud Storage with Distributed Keys
- SNIA Storage Developers Conference, Santa Clara, CA, (September 19, 2011)
- Cloud Security Using Information Dispersal
- SNIA Storage Developers Conference, Santa Clara, CA, (September, 2010)
- Solving Data Loss in Massive Storage Systems
- SNIA Storage Developers Conference, Santa Clara, CA, (September, 2010)
Publications
Profiles: Google Scholar, ORCiD, DBLP, arXiv
Numbers: h-index: 51, Erdős number: 4
- Updatable Oblivious Key Management for Storage Systems
- ACM CCS ’19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, November 2019 Pages 379–393 https://doi.org/10.1145/3319535.3363196
- Reliability Models for Highly Fault-tolerant Storage Systems
- Cornell University Library (arXiv.org), (October 2, 2013)
- AONT-RS: Blending Security and Performance in Dispersed Storage Systems
- USENIX Conference on File and Storage Technologies, pp. 191-202, 2011 (February 2011)
Open Source
- bots: An experiment in artificial life, artificial neural nets, artificial sentience, simulated evolution, simulated consciousness, and genetic programming (2022)
- A framework to experiment with simulated evolution to evolve neural networks that drive the behavior of little creatures “bots”, which are responsive to elements within their virtual environments. This raises the question: are these bots conscious or sentient in any degree?
- PROTECT: A Platform for Robust Threshold Cryptography based on Asynchronous Publicly Verifiable Secret Sharing with Tunable Security (2019)
- PROTECT leverages mathematical relationships that exist between shares in a secret sharing scheme to perform secure and distributed function evaluations on the secret represented by those shares. These functions include distributed key generation, share refresh, share recovery, key derivation, public key decryption, and signature generation.
- pywallet: Offline Multicoin Wallet Generation in Python (2017)
- Implements offline wallet generation to support secure, manual, offline, and cold wallet generation. It supports multiple coin types, including Bitcoin (BTC), Bitcoin cash (BCH), and Litecoin (LTC). It conforms to the BIP 32, BIP 44, and BIP 39 standards for Hierarchical Deterministic (HD) wallets.
- A Secure Sockets Layer (SSLv2) Client (2005)
- The first open source implementation of SSL for the Visual Basic programming language. I wrote it using the RFC as the guide and integrated it into the communication service (GCN) to secure communications between clients and the server. This submission was the website’s winning submission for the month.
- A 3D Virtual Reality (2003)
- A simplistic ray casting renderer which can take a two-dimensional map input as a text file and render it as as a navigable three-dimensional space.
Professional Accomplishments
International Business Machines: Level 10 Engineer – (2016 – 2019)
- Chicago’s most prolific inventor with 969 patent applications
- Invented Oblivious Key Management System for secure storage of keys in the Cloud
- Implemented open source library for threshold cryptography
- Co-created a protocol that increases bounds for robust Byzantine fault tolerant systems
- Served on Invention Development Team to evaluate patent disclosures
- Collaborated with world renowned cryptographers in IBM Research
Cleversafe – Lead Software Architect (2005 – 2016)
- Designed technology from company’s start up phase to its $1.4 billion exit
- Invented an efficient secret sharing scheme, central to product
- Invented authentication system that tolerates multiple breaches and failures
- Responsible for security-related functionality in the system
- Developed and validated reliability models for the product
- Published papers and presented at conferences around the country
- Optimized software to reach full saturation of 10 Gbps NIC
Global Communications Network – Founder and President (2000 – Present)
- Created world’s first video chat service
- Programmed the entire client software, began at age of 14
- Obtained a registered copyright and released software at 16
- Founded company in July of 2000, became profitable in 2003
- Provide services to over 50,000 registered users