Patents by Inventor Scott MacDonald Ward

Scott MacDonald Ward has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230111457
    Abstract: The application discloses an electronic operating device (100) arranged to protect communication between a consumer application (125) and a network-connected consumer device (300). The operating device protects a command message by signing the command message with a private key obtained from a key storage of the operating device (optionally also encrypting the command message with an encryption key), and sends the protected command message to the network controller (200). The network controller performs the verification of the signature of the command message such that legacy consumer devices without cryptgraphic capability can be used. The signature ensures that only authorised devices (100) can send commands to the consumer device (300).
    Type: Application
    Filed: December 9, 2022
    Publication date: April 13, 2023
    Inventors: Kevin Wendell DOBBINS, Scott MacDonald WARD
  • Patent number: 11552934
    Abstract: The application discloses an electronic operating device (100) arranged to protect communication between a consumer application (125) and a network-connected consumer device (300). The operating device protects a command message by signing the command message with a private key obtained from a key storage of the operating device (optionally also encrypting the command message with an encryption key), and sends the protected command message to the network controller (200). The network controller performs the verification of the signature of the command message such that legacy consumer devices without cryptographic capability can be used. The signature ensures that only authorised devices (100) can send commands to the consumer device (300).
    Type: Grant
    Filed: December 11, 2018
    Date of Patent: January 10, 2023
    Assignee: DTS IOT B.V.
    Inventors: Kevin Wendell Dobbins, Scott MacDonald Ward
  • Publication number: 20210297266
    Abstract: A method for performing an electronic transaction is disclosed. The method provides authentication data and authentication software to an electronic device and preferably stored in a secure storage location or other location inaccessible to the user or the operating system of the device. The authentication software is activated to generate a digital signature from the authentication data. Next, the digital signature is provided to the other transaction party.
    Type: Application
    Filed: June 3, 2021
    Publication date: September 23, 2021
    Inventors: Scott MacDonald Ward, Teunis Tel
  • Patent number: 11063766
    Abstract: A method for performing an electronic transaction is disclosed. The method provides authentication data and authentication software to an electronic device and preferably stored in a secure storage location or other location inaccessible to the user or the operating system of the device. When digital data is requested from a transaction party that requests a digital signature, the authentication software is activated to generate said digital signature from the authentication data. Next, the digital signature is provided to the other transaction party, which then provides the requested digital data. The digital signature may be embedded in the requested and provided digital data. Further, a method for performing a verification of legitimate use of digital data is disclosed.
    Type: Grant
    Filed: June 14, 2004
    Date of Patent: July 13, 2021
    Assignee: WARD PARTICIPATIONS B.V.
    Inventors: Scott MacDonald Ward, Teunis Tel
  • Publication number: 20210211300
    Abstract: A method for performing an electronic transaction is disclosed. The method provides authentication data and authentication software to an electronic device and preferably stored in a secure storage location or other location inaccessible to the user or the operating system of the device. The authentication software is activated to generate a digital signature from the authentication data. Next, the digital signature is provided to the other transaction party.
    Type: Application
    Filed: March 4, 2021
    Publication date: July 8, 2021
    Inventors: Scott MacDonald WARD, Teunis TEL
  • Patent number: 10992480
    Abstract: A method for performing an electronic transaction is disclosed. The method provides authentication data and authentication software to an electronic device and preferably stored in a secure storage location or other location inaccessible to the user or the operating system of the device. The authentication software is activated to generate a digital signature from the authentication data. Next, the digital signature is provided to the other transaction party.
    Type: Grant
    Filed: October 9, 2019
    Date of Patent: April 27, 2021
    Assignee: WARD PARTICIPATIONS B.V.
    Inventors: Scott MacDonald Ward, Teunis Tel
  • Publication number: 20200396211
    Abstract: The application discloses an electronic operating device (100) arranged to protect communication between a consumer application (125) and a network-connected consumer device (300). The operating device protects a command message by signing the command message with a private key obtained from a key storage of the operating device (optionally also encrypting the command message with an encryption key), and sends the protected command message to the network controller (200). The network controller performs the verification of the signature of the command message such that legacy consumer devices without cryptographic capability can be used. The signature ensures that only authorised devices (100) can send commands to the consumer device (300).
    Type: Application
    Filed: December 11, 2018
    Publication date: December 17, 2020
    Inventors: Kevin Wendell DOBBINS, Scott MacDonald WARD
  • Publication number: 20200044865
    Abstract: A method for performing an electronic transaction is disclosed. The method provides authentication data and authentication software to an electronic device and preferably stored in a secure storage location or other location inaccessible to the user or the operating system of the device. The authentication software is activated to generate a digital signature from the authentication data. Next, the digital signature is provided to the other transaction party.
    Type: Application
    Filed: October 9, 2019
    Publication date: February 6, 2020
    Inventors: Scott MacDonald WARD, Teunis TEL
  • Publication number: 20090119505
    Abstract: In a method for performing an electronic transaction a first transaction part generates a digital signature and an encrypted digital signature. The second transaction party receives both signatures. The second party is enabled to verify the digital signature, but cannot verify or (re)generate the encrypted digital signature. A trusted third party is enabled to verify the encrypted digital signature if the digital signature is also provided, since the trusted third party cannot (re)generate the digital signature. Thus, no other party than the first transaction party can (re)generate both the digital signature and the encrypted digital signature. Therefore, no other party presenting himself as the first transaction party can be verified as being the first transaction party.
    Type: Application
    Filed: May 10, 2005
    Publication date: May 7, 2009
    Applicant: DTS Ltd.
    Inventors: Scott MacDonald Ward, Teunis Tel
  • Publication number: 20090031430
    Abstract: A software application installation method installs a software application on a device such that the installed application can only be activated on said device. Thereto, an authorization application is installed as well on the device. During installation, the authorization application generates a software release code that is stored in a first and a second memory location, of which at least one is a memory location not accessible to a user. When the software application is later activated on the device, the authorization application compares the software release codes stored in said two memory locations. The application is only started if the software release codes correspond. Further, an authorization verification method is disclosed. A second party may verify the legitimacy of the installed application by storing device specific identification data and application specific installation data when a first connection is established and later comparing said data if a second or further connection is established.
    Type: Application
    Filed: May 13, 2005
    Publication date: January 29, 2009
    Inventors: Scott MacDonald Ward, Teunis Tel
  • Patent number: 6889325
    Abstract: A method and a system for performing a transaction between at least one first party and at least one second party are disclosed. A data network connects data input/output terminals of the parties. In the data network, a secure and trusted transaction server is provided, in which a profile of the parties is registered, having a party identifier identifying a particular party, and authentication data for authenticating the party and data sent by the party. The parties communicate with each other through the transaction server by means of various transaction messages, which are digitally signed using a table of random numbers and a hashing operation, wherein the table of random numbers is generated by reading a token.
    Type: Grant
    Filed: April 28, 2000
    Date of Patent: May 3, 2005
    Assignee: Unicate BV
    Inventors: Wilhelmus H. M. Sipman, Scott MacDonald Ward