Patents by Inventor Andrew Crichton
Andrew Crichton has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10069820Abstract: Secure registration of a new application with a server system is provided. An old application has been registered with the system. A first link between the new application and the system establishes a first key and first check data is communicated from the system to the new application and passed to the old application. A second link between the old application and the system establishes a second key based on input of a credential to the old application; the first check data is communicated from the old application to the system. Enciphered second check data is communicated from the system to the old application over the second link and further encrypted by the old application using a third key. This generates doubly-enciphered check data which is passed to the new application and decrypted using the first key and a fourth key, generated at the new application based on the first check data and input of the credential to the new application.Type: GrantFiled: August 24, 2017Date of Patent: September 4, 2018Assignee: Barclays Bank PLCInventors: Steven Bradley, Conall O'Brien, Jeremy Goldstone, Andrew Crichton, James Sellwood, Anthony Ryan
-
Publication number: 20180204192Abstract: Method and system for creating an amount of digital currency comprising generating a currency create signature by cryptographically signing currency data using at least a currency creator secret key. generating verifiable create data suitable for addition to a digital currency ledger, wherein the create data comprises the currency data and the currency create signature, the currency data comprising a value of the amount of new digital currency and currency key data based at least in part on a currency public key, wherein the currency public key corresponds to the amount of digital currency.Type: ApplicationFiled: July 8, 2016Publication date: July 19, 2018Inventors: Andrew Whaley, Andrew Crichton
-
Publication number: 20170374054Abstract: Secure registration of a new application with a server system is provided. An old application has been registered with the system. A first link between the new application and the system establishes a first key and first check data is communicated from the system to the new application and passed to the old application. A second link between the old application and the system establishes a second key based on input of a credential to the old application; the first check data is communicated from the old application to the system. Enciphered second check data is communicated from the system to the old application over the second link and further encrypted by the old application using a third key. This generates doubly-enciphered check data which is passed to the new application and decrypted using the first key and a fourth key, generated at the new application based on the first check data and input of the credential to the new application.Type: ApplicationFiled: August 24, 2017Publication date: December 28, 2017Inventors: Steven Bradley, Conall O'Brien, Jeremy Goldstone, Andrew Crichton, James Sellwood
-
Publication number: 20160127348Abstract: Secure registration of a new application with a server system is provided. An old application has been registered with the system. A first link between the new application and the system establishes a first key and first check data is communicated from the system to the new application and passed to the old application. A second link between the old application and the system establishes a second key based on input of a credential to the old application; the first check data is communicated from the old application to the system. Enciphered second check data is communicated from the system to the old application over the second link and further encrypted by the old application using a third key. This generates doubly-enciphered check data which is passed to the new application and decrypted using the first key and a fourth key, generated at the new application based on the first check data and input of the credential to the new application.Type: ApplicationFiled: May 29, 2014Publication date: May 5, 2016Applicant: Barclays Bank PLCInventors: Steven Bradley, Conall O'Brien, Jeremy Goldstone, Andrew Crichton, James Philip Sellwood
-
Patent number: 9152797Abstract: In a secure computing environment, a method, system and device are provided for loading stored encryption key data from a protected non-volatile memory of a portable device. A boot loader program is initiated after the portable device is powered on, encryption key data is loaded from the protected non-volatile memory of the portable device, and access to the protected non-volatile memory is disabled after a predetermined time after the portable device is powered on. In this way, the encryption key data is loaded from the protected non-volatile memory of a portable device before the boot operating system is loaded.Type: GrantFiled: December 18, 2012Date of Patent: October 6, 2015Assignee: BARCLAYS BANK PLCInventors: Paul Bilke, Steven Bradley, Andrew Crichton, George French, Arthur Leung, Michael Naggar, Ashutosh Sureka
-
Publication number: 20140122344Abstract: A portable electronic device having a memory storing application software for initiating a payment transaction with a remote system, a data interface for coupling the device to a host computer, a contactless interface for receiving payment token data from a contactless payment token, and a cellular network interface for communication of data over a cellular network. The application software is executed from the device when the device is connected to the host computer and configures the portable electronic device to initiate a payment transaction by receiving payment token data via the contactless interface means and transmitting said payment token data to the remote system via the mobile network interface means.Type: ApplicationFiled: December 18, 2012Publication date: May 1, 2014Applicant: BARCLAYS BANK PLCInventors: Darren Foulds, Steven Bradley, Andrew Crichton, George French, Arthur Leung, Michael Naggar, Ashutosh Sureka
-
Publication number: 20140122901Abstract: In a secure computing environment, a method, system and device are provided for loading stored encryption key data from a protected non-volatile memory of a portable device. A boot loader program is initiated after the portable device is powered on, encryption key data is loaded from the protected non-volatile memory of the portable device, and access to the protected non-volatile memory is disabled after a predetermined time after the portable device is powered on. In this way, the encryption key data is loaded from the protected non-volatile memory of a portable device before the boot operating system is loaded.Type: ApplicationFiled: December 18, 2012Publication date: May 1, 2014Applicant: BARCLAYS BANK PLCInventors: Paul Bilke, Steven Bradley, Andrew Crichton, George French, Arthur Leung, Michael Naggar, Ashutosh Sureka