Patents Assigned to Becrypt Limited
-
Patent number: 9779245Abstract: An encryption system and method for a computing device having an encrypted operating system is disclosed. The encryption system includes a pre-operating system and an encrypted start-up module. The pre-operating system is executed on start-up of the computing device and is configured to receive user inputs for authenticating the user, the pre-operating system authenticating the user in dependence on the user inputs and, upon authentication, block-decrypting the encrypted start-up module into volatile memory for booting of the encrypted operating system on the computing device.Type: GrantFiled: March 20, 2013Date of Patent: October 3, 2017Assignee: BeCrypt LimitedInventors: Bernard Parsons, Nigel Lee, David Holoway
-
Patent number: 9710627Abstract: A computer implemented security system (10) and method are disclosed. A user interface (20) is displayed on a display device (30), the user interface including a positioning guide (100) and a marker. User inputs are received on a password comprising a plurality of symbols and a location for each symbol in the user interface (20) relative to said positioning guide (100). Authentication is performed in dependence on the received user inputs and on the marker, the marker being selected from a plurality of markers, each marker designating a different condition to be met by the received user inputs to be successfully authenticated.Type: GrantFiled: May 24, 2013Date of Patent: July 18, 2017Assignee: BeCrypt LimitedInventors: Bernard Parsons, Nigel Lee, Ben Sidle
-
Patent number: 9195830Abstract: A secure access system, method and patch management system for access to a remote computer system is disclosed. The remote computer system requires local authentication to boot an operating system. A client module is arranged to be executed on the remote computer system upon booting of the computer system and is arranged upon execution to obtain access data over a network from an authentication system for access to the computer system and to use said access data to perform said local authentication at the remote computer system and boot said operating system. The authentication system being arranged to said store access data for the remote computer system in a data repository and being responsive to provide said access data to said client module over the network upon authentication of a request from the client module.Type: GrantFiled: March 29, 2011Date of Patent: November 24, 2015Assignee: BeCrypt LimitedInventors: James Ben Sidle, Bernard Parsons, Nigel Lee, Gordon Parrott
-
Publication number: 20140289537Abstract: An encryption system (10) and method for a computing device (100) having an encrypted operating system (50) is disclosed. The encryption system (10) includes a pre-operating system (20) and an encrypted start-up module (40). The pre-operating system (20) is executed on start-up of the computing device (100) and is configured to receive user inputs for authenticating the user, the pre-operating system (20) authenticating the user in dependence on the user inputs and, upon authentication, block-decrypting the encrypted start-up module into volatile memory (102) for booting of the encrypted operating system (50) on the computing device (100).Type: ApplicationFiled: March 20, 2013Publication date: September 25, 2014Applicant: BeCrypt LimitedInventors: Bernard Parsons, Nigel Lee, David Holloway
-
Publication number: 20130318597Abstract: A computer implemented security system (10) and method are disclosed. A user interface (20) is displayed on a display device (30), the user interface including a positioning guide (100) and a marker. User inputs are received on a password comprising a plurality of symbols and a location for each symbol in the user interface (20) relative to said positioning guide (100). Authentication is performed in dependence on the received user inputs and on the marker, the marker being selected from a plurality of markers, each marker designating a different condition to be met by the received user inputs to be successfully authenticated.Type: ApplicationFiled: May 24, 2013Publication date: November 28, 2013Applicant: BeCrypt LimitedInventors: Bernard Parsons, Nigel Lee, Ben Sidle
-
Publication number: 20120303971Abstract: A dual environment computing system and method is disclosed. The dual computing system includes a first computing environment and a second computing environment. A data repository encodes, at any one time, at least one of the first and second computing environments in a hibernated state. The dual environment computing system is arranged, on demand, to operate one of the first and second computing environments in an active state, the dual environment computing system being further arranged, on demand, to transition the one of the first and second computing environments being operated in the active state into a hibernated state in the data repository and to transition the other of the first and second computing environments from the hibernated state into an active state.Type: ApplicationFiled: March 28, 2012Publication date: November 29, 2012Applicant: BeCrypt LimitedInventors: Andrew Palka, David Holloway, Nigel Lee, Bernard Parsons
-
Patent number: 8082434Abstract: A system and method for providing a secure computing environment to untrusted computer systems is described. A carrier media and an interface are provided, the interface being connectable to a computer to enable communication between the computer and the carrier media. The carrier media encodes a secure computing environment and a boot system, upon connection of the system via the interface to a computer system and booting of the computer system, the boot system is operative to take over the boot process of the computer system and to authenticate the user, wherein upon successful authentication, the boot system is arranged to load the secure computing environment on the computer system, the secure computing environment being configured to prevent predetermined interaction from outside the secure computing environment when it is running.Type: GrantFiled: April 3, 2008Date of Patent: December 20, 2011Assignee: Becrypt LimitedInventors: Marc Hocking, Nigel Lee, Andrew Palka
-
Publication number: 20110246773Abstract: A secure access system, method and patch management system for access to a remote computer system is disclosed. The remote computer system requires local authentication to boot an operating system. A client module is arranged to be executed on the remote computer system upon booting of the computer system and is arranged upon execution to obtain access data over a network from an authentication system for access to the computer system and to use said access data to perform said local authentication at the remote computer system and boot said operating system. The authentication system being arranged to said store access data for the remote computer system in a data repository and being responsive to provide said access data to said client module over the network upon authentication of a request from the client module.Type: ApplicationFiled: March 29, 2011Publication date: October 6, 2011Applicant: BeCrypt LimitedInventors: James Ben Sidle, Bernard Parsons, Nigel Lee, Gordon Parrott
-
Publication number: 20090070576Abstract: A system and method for providing a secure computing environment to untrusted computer systems is described. A carrier media and an interface are provided, the interface being connectable to a computer to enable communication between the computer and the carrier media. The carrier media encodes a secure computing environment and a boot system, upon connection of the system via the interface to a computer system and booting of the computer system, the boot system is operative to take over the boot process of the computer system and to authenticate the user, wherein upon successful authentication, the boot system is arranged to load the secure computing environment on the computer system, the secure computing environment being configured to prevent predetermined interaction from outside the secure computing environment when it is running.Type: ApplicationFiled: April 3, 2008Publication date: March 12, 2009Applicant: BECRYPT LIMITEDInventors: Marc Hocking, Nigel Lee, Andrew Palka
-
Publication number: 20060168212Abstract: A security system and method are disclosed that are particularly suitable for a portable electronic device having a memory. The security system interacts with the electronic device to acquire at least a portion of the memory of the electronic device, and controls access to the acquired memory independently of an operating system of the electronic device. The acquired protected memory may be used for storing encryption/decryption key or key(s) for an encryption system.Type: ApplicationFiled: December 22, 2003Publication date: July 27, 2006Applicant: BECRYPT LIMITEDInventors: Bernard Parsons, Gordon Parrott