Loading...
xail Patent Portfolio/Application 1
Sign out Back to Portfolio
PATENT PORTFOLIO · APPLICATION 1

Secure Electronic Communication via Threshold Secret Sharing Across Independent Communication Channels

The foundational patent covering Xail Mail: split-channel secure messaging, visual security tiers, progressive enrollment, enterprise compliance, deferred delivery, on-device AI, key-free P2P, and universal transport envelopes.

20 Claims Filed 5 Independent 15 Dependent 33 System 38 Method 7 CRM
20
filed claims
5
independent
15
dependent
26
figures
Filing Strategy: Claims are organized into filing groups. Group A (20 claims) files now. Groups B–D are reserved for continuation applications using the same specification. All claims are supported by the current specification.
GROUP A · FILING NOW · 20 claims · 5 independent Core split-channel system + visual indicator + CRM
Independent Claim

Claim 1 — Core Split-Channel Secure Communication SystemSYSTEM

Split plaintext into n shares via threshold secret sharing (k-of-n, fewer than k reveals nothing), transmit each via separate independent channel, reconstruct at recipient from k verified shares.

Use Case

Alice sends a sensitive email through Xail. The message is split into 3 shares — one goes via Gmail, one via Outlook, one via Yahoo. No single email provider can read the message.

CLAIM 1 System Split plaintext into n shares via threshold secret sharing (k-of-n). Transmit each via separate independent channel; reconstruct from k verified shares. C2XorIDAover GF(2) C3Shamir'sGF(p) alt C4Differentproviders C5Heterochannels C6Uniquemsg ID C7HMACintegrity C8Client-side only C9No cryptokeys C10Anti-spam C11CSPRNGrandom C12n > ktolerance C132-of-3default C14Configk-of-n C23Unifiedbyte stream C25P2Pcontacts C42Channelplugins C59Asymmrouting C61P2P +email C76Singleoperator
Independent Claim

Claim 15 — Secure Communication with Message ID + IntegritySYSTEM

Split + attach unique message ID + integrity check to each share + transmit via independent channels from different service providers.

Use Case

Each share carries a UUID and HMAC tag. The recipient's app matches shares by UUID and verifies each HMAC before reconstruction — tampered shares are rejected automatically.

CLAIM 15 System Attach unique message ID + integrity check to each share. Transmit via independent channels from different service providers. C16Monitor, match,verify, reconstruct C17AI retrievalsummaries, tags C19n > k fault-tolerant delivery C24Attachmentserialization C27Decentralizedcontacts C31Visual securityindicator C35Progressiveenrollment C41Channel adapterplugins C52Deferreddelivery C55On-deviceAI inference
Independent Claim

Claim 20 — Core Split-Channel (Computer-Readable Medium)CRM

Instructions to split, transmit via independent channels, collect k shares, verify integrity, reconstruct.

Use Case

The patent covers the software itself — the code running on any device that splits messages, sends shares through independent channels, and reconstructs at the other end.

CLAIM 20 CRM Computer-readable medium with instructions to split, transmit via independent channels, collect k shares, verify integrity, reconstruct. C21Configurabletiers (2/3/5) C222-of-3specific config C32Visual securityGUI indicator C53Deferreddelivery (CRM) C57On-device AI +encrypted search C70P2P +email
Independent Claim

Claim 28 — Visual Security-Level IndicatorMETHOD

Maintain channel count, determine k-of-n config, map to visual indicator state via deterministic function, render real-time updating graphical element. Communicates minimum compromises needed without user understanding threshold math.

Use Case

A user's inbox shows green borders on messages from contacts with 3+ channels and blue borders for 2-channel contacts. The colors instantly communicate security level — no crypto knowledge needed.

CLAIM 28 Method Deterministic mapping: channel count → k-of-n config → visual indicator state. Real-time updating graphical element communicates minimum compromises needed. C29Colored border per messagepredefined color mapping C30Conversation-level indicatormin(sender, recipient) channels
Independent Claim

Claim 33 — Progressive Security EnrollmentMETHOD

Start with 1 channel (single-channel, no threshold). Add 2nd → auto-activate k=2,n=2 + visual upgrade. Add 3rd → k=2,n=3 + visual upgrade to fault-tolerant.

Use Case

A new user connects only Gmail — they get basic email. They add Outlook — blue border appears, messages are now split-channel secure. They add Yahoo — green border, now fault-tolerant too.

CLAIM 33 Method 1 channel → no threshold. Add 2nd → k=2,n=2 + visual upgrade. Add 3rd → k=2,n=3 + visual upgrade to fault-tolerant tier. C34Prompt to addchannels C36Verified vsunverified sep. C38Visual transitionanimation C39Primary vssecondary view C40Feature gatingby channel ct C60Enrollnudge
GROUP B · CONTINUATION 1 · 18 claims Enterprise compliance + deferred delivery + anti-spam
Independent Claim

Claim 43 — Enterprise Compliance (Compliance Copy)METHODCONTINUATION 1

Split + transmit via threshold sharing. Simultaneously encrypt compliance copy with org public key. Store on compliance server (decryptable only by compliance officer). Channel operators cannot access.

Use Case

A hospital uses Xail for doctor-patient communication. Messages are threshold-shared for privacy, but an encrypted compliance copy goes to the hospital's compliance server for HIPAA audit — only the compliance officer can decrypt it.

CLAIM 43 Method Simultaneously encrypt compliance copy with org public key. Decryptable only by compliance officer. Channel operators cannot access. C44eDiscovery with tamper-evident audit trail C45DLP modulepre-split content inspection C46Consumer notificationenterprise recipient
Independent Claim

Claim 47 — Deferred Delivery to Non-Registered RecipientMETHODCONTINUATION 1

Detect recipient not registered. Send first share + "Join Xail" wrapper. Hold remaining share(s) in pending state on sender device. Auto-deliver when recipient registers.

Use Case

Bob sends a secure message to Carol, who is not on Xail yet. Carol gets a teaser email saying "You have a private message from Bob." When Carol joins Xail, the second share auto-delivers and the message appears.

CLAIM 47 Method Detect non-registered recipient. Send share 1 + "Join" wrapper. Hold remaining shares on sender device. Auto-deliver on registration. C48Human-readable wrapperwith install link C49Pending / deliveredstatus indicator C50Configurable expiryfor pending shares C51Encrypted pendingshare storage
Independent Claim

Claim 77 — Structural Anti-Spam Without Content FilteringMETHODCONTINUATION 1

Require any reconstructable message to be delivered as k shares to k of n registered addresses (disclosed only to authorized senders). Unauthorized sender without all n addresses = cannot deliver. No content analysis, no ML classification.

Use Case

Spammers cannot send Xail messages because they would need ALL of a user's registered email addresses AND deliver coordinated shares to each. It is structurally impossible — no AI spam filter needed.

CLAIM 77 Method k shares to k of n registered addresses (disclosed only to authorized senders). Unauthorized sender cannot deliver. No content analysis, no ML classification.

Standalone claim — no dependents

Independent Claim

Claim 78 — Universal Transport Envelope EncodingMETHODCONTINUATION 1

Binary header with 4-byte magic number (IDA5) + version byte + share index. Base45 encoding for email/QR/text protocols. Same format for message shares, file shares, key shares, code shares.

Use Case

Whether it is an email share, a QR code backup, or a code deployment package, every share starts with the IDA5 magic number and uses the same envelope format. One format to rule them all.

CLAIM 78 Method 4-byte magic (IDA5) + version byte + share index. Base45 for email/QR/text. Same format: message shares, file shares, key shares, code shares.

Standalone claim — no dependents

GROUP C · CONTINUATION 2 · 19 claims On-device AI + P2P + delivery acknowledgment
Independent Claim

Claim 54 — On-Device AI ProcessingMETHODCONTINUATION 2

Reconstruct exclusively on device. AI inference (summarize, extract entities/actions, suggest replies) entirely on device. Persist results in encrypted local index. Nothing transmitted to any server.

Use Case

Kaia AI reads a user's reconstructed messages to generate summaries and action items — but everything happens on-device. No message content ever leaves the laptop, not even to Anthropic or OpenAI.

CLAIM 54 Method On-device AI inference: summarize, extract entities, suggest replies. Persist to encrypted local index. Nothing transmitted to any server. C56Offline / air-gapped AI inferenceno network required
Independent Claim

Claim 58 — Contact Auto-EnrichmentMETHODCONTINUATION 2

A method of automatically enriching contact address records in a split-channel secure messaging system. As shares traverse independent channels, the system passively discovers additional email addresses associated with known contacts and updates their CRM records without user intervention.

Use Case

Bob sends a secure message to Alice via Xail. When Alice's device reconstructs shares arriving from Gmail, Outlook, and Yahoo, the system learns that Alice controls all three addresses — enriching Bob's contact record automatically. Next time, Bob's client can route shares across all three channels for maximum resilience.

CLAIM 58 Method Passively discover additional addresses from share metadata. Auto-enrich contact CRM records without user intervention.

Standalone claim — no dependents

Independent Claim

Claim 63 — Key-Free P2P CommunicationMETHODCONTINUATION 2

Split into n shares, establish P2P channels WITHOUT any key exchange/generation/storage/rotation. Security derives entirely from threshold sharing properties. Each share = indistinguishable from random noise.

Use Case

Two Xail users on the same office WiFi communicate via direct P2P. There is no Diffie-Hellman, no TLS handshake for content security — the XorIDA split IS the security. Shares look like random noise on the wire.

CLAIM 63 Method P2P channels WITHOUT key exchange/generation/storage/rotation. Security from threshold sharing. Each share indistinguishable from random noise.

Standalone claim — no dependents

Independent Claim

Claim 68 — Delivery Acknowledgment Proving ReconstructionMETHODCONTINUATION 2

Recipient sends acknowledgment only after successful reconstruction (not just share delivery). Tamper-evident receipt with message ID + timestamp + cryptographic signature. Exportable as documentary evidence.

Use Case

A lawyer sends a legally binding notice via Xail. The delivery receipt proves the recipient's device reconstructed the full message — not just that an email was delivered to a server. Admissible in court.

CLAIM 68 Method Tamper-evident receipt: message ID + timestamp + cryptographic signature. Acknowledgment only after successful reconstruction. Exportable as evidence.

Standalone claim — no dependents

Independent Claim

Claim 72 — Secure AI Tool Call Result DeliveryMETHODCONTINUATION 2

Tool call result from external tool server split into n shares via threshold IDA. Each share in transport envelope (sender DID, recipient DID, nonce, timestamp, scope, signature). Transmit to independent endpoints. Reconstruct at recipient agent. No single operator sees reconstructable result.

Use Case

An AI agent queries a medical database. The results (containing PHI) are XorIDA-split across 3 relay endpoints. The AI processes the results locally — no single relay ever sees the complete patient data.

CLAIM 72 Method Tool call results split via threshold IDA. Transport envelope per share: sender DID, recipient DID, nonce, timestamp, scope, signature. C73Sensitivity-based thresholdPHI/legal/financial = higher k C74On-device AI inference onreconstructed tool results
Independent Claim

Claim 75 — Secure Structured Data Payload Delivery SystemSYSTEMCONTINUATION 2

Protocol-agnostic transport adapter layer + universal transport envelope format + n independent channels + threshold reconstruction. Works with any structured invocation protocol. Adding new protocol = new adapter only.

Use Case

The same split-channel system secures REST API calls, gRPC streams, and MCP tool results — the transport envelope is protocol-agnostic. Adding a new protocol just means writing a new adapter.

CLAIM 75 System Protocol-agnostic transport adapter layer + universal envelope format. Works with any structured invocation protocol. New protocol = new adapter only.

Standalone claim — no dependents

GROUP D · CONTINUATION 3 · 21 claims Remaining system + method claims