Patents by Inventor Kealan MCCUSKER

Kealan MCCUSKER has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190354969
    Abstract: The present invention generally relates to the field of data encryption processes for crypto-currency or other digital asset transactions between a principal and beneficiary utilizing a custodian. Cryptographic protocols protect the asset from the custodian. It can also protect the asset from the principal. It can also protect the asset against the beneficiary until such time as the beneficiary can prove certain logical conditions that give it exclusive control over the digital asset.
    Type: Application
    Filed: May 13, 2019
    Publication date: November 21, 2019
    Applicant: Qredo Ltd.
    Inventors: Brian Spector, Christopher Steven Morris, Howard Kitto, Kealan McCusker
  • Publication number: 20190356481
    Abstract: The present invention generally relates to the field of data encryption processes for crypto-currency or other digital asset transactions between a principal and beneficiary utilizing a custodian. Cryptographic protocols protect the asset from the custodian. It can also protect the asset from the principal. It can also protect the asset against the beneficiary until such time as the beneficiary can prove certain logical conditions that give it exclusive control over the digital asset.
    Type: Application
    Filed: May 13, 2019
    Publication date: November 21, 2019
    Applicant: Qredo Ltd.
    Inventors: Brian Spector, Chrstopher Steven Morris, Howard Kitto, Kealan McCusker
  • Patent number: 9698985
    Abstract: A method in a first entity for authenticating itself to a second entity by proving to the second entity that it is in possession of a full secret without sending the full secret to the second entity, the method comprising: receiving in the first entity an input from a user, the full secret having been divided into at least a first factor and a second factor and the input relating to the second factor of the full secret; reconstructing in the first entity the full secret from at least the first factor and the input; and carrying out a calculation in the first entity using the reconstructed full secret and sending the results of the calculation to the second entity, wherein the results provide an input to a pairing calculation in the second entity.
    Type: Grant
    Filed: May 30, 2014
    Date of Patent: July 4, 2017
    Assignee: MIRACL LIMITED
    Inventors: Kealan McCusker, Brian Spector, Michael Scott
  • Publication number: 20150244525
    Abstract: A method in a first entity for authenticating itself to a second entity by proving to the second entity that it is in possession of a full secret without sending the full secret to the second entity, the method comprising: receiving in the first entity an input from a user, the full secret having been divided into at least a first factor and a second factor and the input relating to the second factor of the full secret; reconstructing in the first entity the full secret from at least the first factor and the input; and carrying out a calculation in the first entity using the reconstructed full secret and sending the results of the calculation to the second entity, wherein the results provide an input to a pairing calculation in the second entity.
    Type: Application
    Filed: May 30, 2014
    Publication date: August 27, 2015
    Inventors: Kealan McCusker, Brian Spector, Michael Scott
  • Patent number: 9106644
    Abstract: A method in a first entity for authenticating itself to a second entity by proving to the second entity that it is in possession of a full secret without sending the full secret to the second entity, the method comprising: receiving in the first entity an input from a user, the full secret having been divided into at least a first factor and a second factor and the input relating to the second factor of the full secret; reconstructing in the first entity the full secret from at least the first factor and the input; and carrying out a calculation in the first entity using the reconstructed full secret and sending the results of the calculation to the second entity, wherein the results provide an input to a pairing calculation in the second entity. The second entity carries out the pairing calculation to determine whether the client is in possession of the secret. The first entity may be a client and the second entity may be a server.
    Type: Grant
    Filed: January 13, 2015
    Date of Patent: August 11, 2015
    Assignee: CERTIVOX LTD.
    Inventors: Kealan McCusker, Brian Spector, Michael Scott
  • Publication number: 20150124963
    Abstract: A method in a first entity for authenticating itself to a second entity by proving to the second entity that it is in possession of a full secret without sending the full secret to the second entity, the method comprising: receiving in the first entity an input from a user, the full secret having been divided into at least a first factor and a second factor and the input relating to the second factor of the full secret; reconstructing in the first entity the full secret from at least the first factor and the input; and carrying out a calculation in the first entity using the reconstructed full secret and sending the results of the calculation to the second entity, wherein the results provide an input to a pairing calculation in the second entity. The second entity carries out the pairing calculation to determine whether the client is in possession of the secret. The first entity may be a client and the second entity may be a server.
    Type: Application
    Filed: January 13, 2015
    Publication date: May 7, 2015
    Inventors: Kealan MCCUSKER, Brian SPECTOR, Michael SCOTT
  • Patent number: 8971540
    Abstract: A method in a first entity for authenticating itself to a second entity by proving to the second entity that it is in possession of a full secret without sending the full secret to the second entity, the method comprising: receiving in the first entity an input from a user, the full secret having been divided into at least a first factor and a second factor and the input relating to the second factor of the full secret; reconstructing in the first entity the full secret from at least the first factor and the input; and carrying out a calculation in the first entity using the reconstructed full secret and sending the results of the calculation to the second entity, wherein the results provide an input to a pairing calculation in the second entity.
    Type: Grant
    Filed: July 23, 2014
    Date of Patent: March 3, 2015
    Assignee: Certivox Ltd.
    Inventors: Kealan McCusker, Brian Spector, Michael Scott
  • Publication number: 20140359290
    Abstract: A method in a first entity for authenticating itself to a second entity by proving to the second entity that it is in possession of a full secret without sending the full secret to the second entity, the method comprising: receiving in the first entity an input from a user, the full secret having been divided into at least a first factor and a second factor and the input relating to the second factor of the full secret; reconstructing in the first entity the full secret from at least the first factor and the input; and carrying out a calculation in the first entity using the reconstructed full secret and sending the results of the calculation to the second entity, wherein the results provide an input to a pairing calculation in the second entity.
    Type: Application
    Filed: July 23, 2014
    Publication date: December 4, 2014
    Inventors: Kealan MCCUSKER, Brian SPECTOR, Michael SCOTT