Patents by Inventor Kealan MCCUSKER
Kealan MCCUSKER has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20190354969Abstract: The present invention generally relates to the field of data encryption processes for crypto-currency or other digital asset transactions between a principal and beneficiary utilizing a custodian. Cryptographic protocols protect the asset from the custodian. It can also protect the asset from the principal. It can also protect the asset against the beneficiary until such time as the beneficiary can prove certain logical conditions that give it exclusive control over the digital asset.Type: ApplicationFiled: May 13, 2019Publication date: November 21, 2019Applicant: Qredo Ltd.Inventors: Brian Spector, Christopher Steven Morris, Howard Kitto, Kealan McCusker
-
Publication number: 20190356481Abstract: The present invention generally relates to the field of data encryption processes for crypto-currency or other digital asset transactions between a principal and beneficiary utilizing a custodian. Cryptographic protocols protect the asset from the custodian. It can also protect the asset from the principal. It can also protect the asset against the beneficiary until such time as the beneficiary can prove certain logical conditions that give it exclusive control over the digital asset.Type: ApplicationFiled: May 13, 2019Publication date: November 21, 2019Applicant: Qredo Ltd.Inventors: Brian Spector, Chrstopher Steven Morris, Howard Kitto, Kealan McCusker
-
Patent number: 9698985Abstract: A method in a first entity for authenticating itself to a second entity by proving to the second entity that it is in possession of a full secret without sending the full secret to the second entity, the method comprising: receiving in the first entity an input from a user, the full secret having been divided into at least a first factor and a second factor and the input relating to the second factor of the full secret; reconstructing in the first entity the full secret from at least the first factor and the input; and carrying out a calculation in the first entity using the reconstructed full secret and sending the results of the calculation to the second entity, wherein the results provide an input to a pairing calculation in the second entity.Type: GrantFiled: May 30, 2014Date of Patent: July 4, 2017Assignee: MIRACL LIMITEDInventors: Kealan McCusker, Brian Spector, Michael Scott
-
Publication number: 20150244525Abstract: A method in a first entity for authenticating itself to a second entity by proving to the second entity that it is in possession of a full secret without sending the full secret to the second entity, the method comprising: receiving in the first entity an input from a user, the full secret having been divided into at least a first factor and a second factor and the input relating to the second factor of the full secret; reconstructing in the first entity the full secret from at least the first factor and the input; and carrying out a calculation in the first entity using the reconstructed full secret and sending the results of the calculation to the second entity, wherein the results provide an input to a pairing calculation in the second entity.Type: ApplicationFiled: May 30, 2014Publication date: August 27, 2015Inventors: Kealan McCusker, Brian Spector, Michael Scott
-
Patent number: 9106644Abstract: A method in a first entity for authenticating itself to a second entity by proving to the second entity that it is in possession of a full secret without sending the full secret to the second entity, the method comprising: receiving in the first entity an input from a user, the full secret having been divided into at least a first factor and a second factor and the input relating to the second factor of the full secret; reconstructing in the first entity the full secret from at least the first factor and the input; and carrying out a calculation in the first entity using the reconstructed full secret and sending the results of the calculation to the second entity, wherein the results provide an input to a pairing calculation in the second entity. The second entity carries out the pairing calculation to determine whether the client is in possession of the secret. The first entity may be a client and the second entity may be a server.Type: GrantFiled: January 13, 2015Date of Patent: August 11, 2015Assignee: CERTIVOX LTD.Inventors: Kealan McCusker, Brian Spector, Michael Scott
-
Publication number: 20150124963Abstract: A method in a first entity for authenticating itself to a second entity by proving to the second entity that it is in possession of a full secret without sending the full secret to the second entity, the method comprising: receiving in the first entity an input from a user, the full secret having been divided into at least a first factor and a second factor and the input relating to the second factor of the full secret; reconstructing in the first entity the full secret from at least the first factor and the input; and carrying out a calculation in the first entity using the reconstructed full secret and sending the results of the calculation to the second entity, wherein the results provide an input to a pairing calculation in the second entity. The second entity carries out the pairing calculation to determine whether the client is in possession of the secret. The first entity may be a client and the second entity may be a server.Type: ApplicationFiled: January 13, 2015Publication date: May 7, 2015Inventors: Kealan MCCUSKER, Brian SPECTOR, Michael SCOTT
-
Patent number: 8971540Abstract: A method in a first entity for authenticating itself to a second entity by proving to the second entity that it is in possession of a full secret without sending the full secret to the second entity, the method comprising: receiving in the first entity an input from a user, the full secret having been divided into at least a first factor and a second factor and the input relating to the second factor of the full secret; reconstructing in the first entity the full secret from at least the first factor and the input; and carrying out a calculation in the first entity using the reconstructed full secret and sending the results of the calculation to the second entity, wherein the results provide an input to a pairing calculation in the second entity.Type: GrantFiled: July 23, 2014Date of Patent: March 3, 2015Assignee: Certivox Ltd.Inventors: Kealan McCusker, Brian Spector, Michael Scott
-
Publication number: 20140359290Abstract: A method in a first entity for authenticating itself to a second entity by proving to the second entity that it is in possession of a full secret without sending the full secret to the second entity, the method comprising: receiving in the first entity an input from a user, the full secret having been divided into at least a first factor and a second factor and the input relating to the second factor of the full secret; reconstructing in the first entity the full secret from at least the first factor and the input; and carrying out a calculation in the first entity using the reconstructed full secret and sending the results of the calculation to the second entity, wherein the results provide an input to a pairing calculation in the second entity.Type: ApplicationFiled: July 23, 2014Publication date: December 4, 2014Inventors: Kealan MCCUSKER, Brian SPECTOR, Michael SCOTT