Patents Assigned to Becrypt Limited
  • Patent number: 9779245
    Abstract: An encryption system and method for a computing device having an encrypted operating system is disclosed. The encryption system includes a pre-operating system and an encrypted start-up module. The pre-operating system is executed on start-up of the computing device and is configured to receive user inputs for authenticating the user, the pre-operating system authenticating the user in dependence on the user inputs and, upon authentication, block-decrypting the encrypted start-up module into volatile memory for booting of the encrypted operating system on the computing device.
    Type: Grant
    Filed: March 20, 2013
    Date of Patent: October 3, 2017
    Assignee: BeCrypt Limited
    Inventors: Bernard Parsons, Nigel Lee, David Holoway
  • Patent number: 9710627
    Abstract: A computer implemented security system (10) and method are disclosed. A user interface (20) is displayed on a display device (30), the user interface including a positioning guide (100) and a marker. User inputs are received on a password comprising a plurality of symbols and a location for each symbol in the user interface (20) relative to said positioning guide (100). Authentication is performed in dependence on the received user inputs and on the marker, the marker being selected from a plurality of markers, each marker designating a different condition to be met by the received user inputs to be successfully authenticated.
    Type: Grant
    Filed: May 24, 2013
    Date of Patent: July 18, 2017
    Assignee: BeCrypt Limited
    Inventors: Bernard Parsons, Nigel Lee, Ben Sidle
  • Patent number: 9195830
    Abstract: A secure access system, method and patch management system for access to a remote computer system is disclosed. The remote computer system requires local authentication to boot an operating system. A client module is arranged to be executed on the remote computer system upon booting of the computer system and is arranged upon execution to obtain access data over a network from an authentication system for access to the computer system and to use said access data to perform said local authentication at the remote computer system and boot said operating system. The authentication system being arranged to said store access data for the remote computer system in a data repository and being responsive to provide said access data to said client module over the network upon authentication of a request from the client module.
    Type: Grant
    Filed: March 29, 2011
    Date of Patent: November 24, 2015
    Assignee: BeCrypt Limited
    Inventors: James Ben Sidle, Bernard Parsons, Nigel Lee, Gordon Parrott
  • Publication number: 20140289537
    Abstract: An encryption system (10) and method for a computing device (100) having an encrypted operating system (50) is disclosed. The encryption system (10) includes a pre-operating system (20) and an encrypted start-up module (40). The pre-operating system (20) is executed on start-up of the computing device (100) and is configured to receive user inputs for authenticating the user, the pre-operating system (20) authenticating the user in dependence on the user inputs and, upon authentication, block-decrypting the encrypted start-up module into volatile memory (102) for booting of the encrypted operating system (50) on the computing device (100).
    Type: Application
    Filed: March 20, 2013
    Publication date: September 25, 2014
    Applicant: BeCrypt Limited
    Inventors: Bernard Parsons, Nigel Lee, David Holloway
  • Publication number: 20130318597
    Abstract: A computer implemented security system (10) and method are disclosed. A user interface (20) is displayed on a display device (30), the user interface including a positioning guide (100) and a marker. User inputs are received on a password comprising a plurality of symbols and a location for each symbol in the user interface (20) relative to said positioning guide (100). Authentication is performed in dependence on the received user inputs and on the marker, the marker being selected from a plurality of markers, each marker designating a different condition to be met by the received user inputs to be successfully authenticated.
    Type: Application
    Filed: May 24, 2013
    Publication date: November 28, 2013
    Applicant: BeCrypt Limited
    Inventors: Bernard Parsons, Nigel Lee, Ben Sidle
  • Publication number: 20120303971
    Abstract: A dual environment computing system and method is disclosed. The dual computing system includes a first computing environment and a second computing environment. A data repository encodes, at any one time, at least one of the first and second computing environments in a hibernated state. The dual environment computing system is arranged, on demand, to operate one of the first and second computing environments in an active state, the dual environment computing system being further arranged, on demand, to transition the one of the first and second computing environments being operated in the active state into a hibernated state in the data repository and to transition the other of the first and second computing environments from the hibernated state into an active state.
    Type: Application
    Filed: March 28, 2012
    Publication date: November 29, 2012
    Applicant: BeCrypt Limited
    Inventors: Andrew Palka, David Holloway, Nigel Lee, Bernard Parsons
  • Patent number: 8082434
    Abstract: A system and method for providing a secure computing environment to untrusted computer systems is described. A carrier media and an interface are provided, the interface being connectable to a computer to enable communication between the computer and the carrier media. The carrier media encodes a secure computing environment and a boot system, upon connection of the system via the interface to a computer system and booting of the computer system, the boot system is operative to take over the boot process of the computer system and to authenticate the user, wherein upon successful authentication, the boot system is arranged to load the secure computing environment on the computer system, the secure computing environment being configured to prevent predetermined interaction from outside the secure computing environment when it is running.
    Type: Grant
    Filed: April 3, 2008
    Date of Patent: December 20, 2011
    Assignee: Becrypt Limited
    Inventors: Marc Hocking, Nigel Lee, Andrew Palka
  • Publication number: 20110246773
    Abstract: A secure access system, method and patch management system for access to a remote computer system is disclosed. The remote computer system requires local authentication to boot an operating system. A client module is arranged to be executed on the remote computer system upon booting of the computer system and is arranged upon execution to obtain access data over a network from an authentication system for access to the computer system and to use said access data to perform said local authentication at the remote computer system and boot said operating system. The authentication system being arranged to said store access data for the remote computer system in a data repository and being responsive to provide said access data to said client module over the network upon authentication of a request from the client module.
    Type: Application
    Filed: March 29, 2011
    Publication date: October 6, 2011
    Applicant: BeCrypt Limited
    Inventors: James Ben Sidle, Bernard Parsons, Nigel Lee, Gordon Parrott
  • Publication number: 20090070576
    Abstract: A system and method for providing a secure computing environment to untrusted computer systems is described. A carrier media and an interface are provided, the interface being connectable to a computer to enable communication between the computer and the carrier media. The carrier media encodes a secure computing environment and a boot system, upon connection of the system via the interface to a computer system and booting of the computer system, the boot system is operative to take over the boot process of the computer system and to authenticate the user, wherein upon successful authentication, the boot system is arranged to load the secure computing environment on the computer system, the secure computing environment being configured to prevent predetermined interaction from outside the secure computing environment when it is running.
    Type: Application
    Filed: April 3, 2008
    Publication date: March 12, 2009
    Applicant: BECRYPT LIMITED
    Inventors: Marc Hocking, Nigel Lee, Andrew Palka
  • Publication number: 20060168212
    Abstract: A security system and method are disclosed that are particularly suitable for a portable electronic device having a memory. The security system interacts with the electronic device to acquire at least a portion of the memory of the electronic device, and controls access to the acquired memory independently of an operating system of the electronic device. The acquired protected memory may be used for storing encryption/decryption key or key(s) for an encryption system.
    Type: Application
    Filed: December 22, 2003
    Publication date: July 27, 2006
    Applicant: BECRYPT LIMITED
    Inventors: Bernard Parsons, Gordon Parrott