Patents by Inventor Marco Casassa Mont

Marco Casassa Mont has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7308707
    Abstract: A method of communication is such that a first party (30) communicates a composite credential (54) across a distributed electronic network (44) to a second Party (32). The composite credential (54) includes a plurality of credentials (46-52).
    Type: Grant
    Filed: December 21, 2001
    Date of Patent: December 11, 2007
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Keith Alexander Harrison, Brian Quentin Monahan, Marco Casassa Mont, Richard Brown
  • Patent number: 7246379
    Abstract: A method and system is provided for validating software code provided to a user entity by a software provider. In general terms, the user entity encrypts first data, provides it to the software provider, and receives back an indication that the code is valid only if the software provider has been able to correctly decrypt the encrypted first data, such decryption only being possible using an appropriate decryption key provided by a party with rights in the software code. More particularly, the user entity encrypts the first data using, as encryption parameters, both an encryption key string comprising said software code or a representation thereof, and public data of the aforesaid party. A decryption key appropriate for correctly decrypting the encrypted first data is generated from the encryption key string and provided to the software provider only if the software code provided to the user entity is valid.
    Type: Grant
    Filed: July 9, 2003
    Date of Patent: July 17, 2007
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventor: Marco Casassa Mont
  • Patent number: 7143286
    Abstract: The present invention provides a digital certificate (2, 32), the certificate comprising a credential attribute function (6, 38) associated with a credential attribute property (5, 36), which credential attribute function is embedded in the certificate as an executable file, in which the credential attribute function can determine the value (12, 44) of the credential attribute property at least partly by execution of the executable file. A corresponding method is also disclosed.
    Type: Grant
    Filed: February 15, 2002
    Date of Patent: November 28, 2006
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Richard Brown, Marco Casassa Mont
  • Publication number: 20060212270
    Abstract: A method of auditing a communications session by using a secure device comprises: operating a communications protocol in said secure device; and producing an audit record of at least one transaction carried out by said secure device.
    Type: Application
    Filed: March 17, 2003
    Publication date: September 21, 2006
    Inventors: Simon Shiu, Adrian Baldwin, Marco Casassa Mont
  • Patent number: 7107449
    Abstract: The present invention provides a digital certificate (2, 32) comprising a plurality of credential attribute properties (6, 36), and a trust function (8, 42) embedded within the certificate as an executable file, which trust function can determine as a function of data (12, 44) available to it a trust value (14, 46) attributable to at least a part of the certificate at least partly by execution of the executable file. A corresponding method of communication is also disclosed.
    Type: Grant
    Filed: February 15, 2002
    Date of Patent: September 12, 2006
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Marco Casassa Mont, Richard Brown, Brian Quentin Monahan
  • Patent number: 7086052
    Abstract: A software system for installation on computing apparatus (and a method of installing such a software system on computing apparatus), wherein the software system is provided in the form of a software package including a plurality of software components, one or more of the software components being provided as a plurality of different implementations, the apparatus including an installation engine for installing the software system only a selected one implementation of the or each of the software components having multiple implementations, and a random selector module for selecting one of the plurality of implementations of a software component for installation.
    Type: Grant
    Filed: January 3, 2003
    Date of Patent: August 1, 2006
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Marco Casassa Mont, Keith Alexander Harrison, Simon Shiu, Martin Sadler
  • Patent number: 6941476
    Abstract: A distributed storage system for storing at least one credential (46), provided by an issuing authority and relating to an identity (42, 44), is described. The system comprises: a plurality of unique identities (42, 44) each having a local store (40). Each local store (40) securely stores credentials (46) relating to the owner of the identity (42, 44). The system also comprises one or more security certificates (66) provided at each identity (42, 44) for ensuring the authenticity of the credentials (46). The security certificates (66) provide secure references to the issuers of the credentials (46) and this can be used in verifying the origin of each credential (46). The identity can be provided a website or a mobile phone for example.
    Type: Grant
    Filed: May 10, 2001
    Date of Patent: September 6, 2005
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Keith Alexander Harrison, Brian Quentin Monahan, Marco Casassa Mont
  • Publication number: 20040143533
    Abstract: There is provided computerised apparatus and a method of converting a financial portfolio strategy into a set of tactics.
    Type: Application
    Filed: September 30, 2003
    Publication date: July 22, 2004
    Inventors: Christopher William Preist, Michael Child, Marco Casassa Mont
  • Publication number: 20040031035
    Abstract: An operating system for processing multiple tasks, the operating system comprising means for generating the multiple tasks including data indicating a time at which or by which (and/or a frequency at which and/or one or more events in response to which) the task should be processed, means for associating time stamp data with the tasks, said time stamp data being indicative of the date and/or time at which the respective tasks were generated, and means for receiving said tasks for processing at a particular time, determining from the associated time stamp for each task the date and/or time at which said task was generated, determining whether or not the processing of said task at said particular time is consistent with one or more predetermined operating system policies, and causing said task to be processed at said particular time only if such processing is determined to be consistent with said operating system policies.
    Type: Application
    Filed: April 17, 2003
    Publication date: February 12, 2004
    Inventors: Simon Shiu, Marco Casassa Mont, Adrian Baldwin, Andrew Patrick Norman
  • Patent number: 6688230
    Abstract: A method of printing a token by printer (5), in which the printer (5) includes a digital identification device (1) configured to generate a series of distinct print job counter numbers and to provide a public key of a cryptographic public key/private key pair. The method includes the steps of sending a printer generated print job counter number and an encryption key to a token issuer (4) the token issuer (4) sending to the printer (5) a message encrypted by the encryption key, the message including the print job counter number and information representative of the token (9) to be printed and the printer (5) decrypting the encrypted message and printing the token using the information representative of the token (9) if the print job counter number is valid.
    Type: Grant
    Filed: October 15, 2002
    Date of Patent: February 10, 2004
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Cheh Goh, Marco Casassa Mont
  • Publication number: 20040010700
    Abstract: A method and system is provided for validating software code provided to a user entity by a software provider. In general terms, the user entity encrypts first data, provides it to the software provider, and receives back an indication that the code is valid only if the software provider has been able to correctly decrypt the encrypted first data, such decryption only being possible using an appropriate decryption key provided by a party with rights in the software code. More particularly, the user entity encrypts the first data using, as encryption parameters, both an encryption key string comprising said software code or a representation thereof, and public data of the aforesaid party. A decryption key appropriate for correctly decrypting the encrypted first data is provided to the software provider by the party with rights in the software code, only if the software code provided to the user entity is valid.
    Type: Application
    Filed: July 9, 2003
    Publication date: January 15, 2004
    Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
    Inventor: Marco Casassa Mont
  • Publication number: 20040010686
    Abstract: A computer system comprises a computer apparatus that requests a first computer arrangement to provide data to a second computer arrangement in response to the computer apparatus determining that the second computer arrangement has a trusted device.
    Type: Application
    Filed: April 18, 2003
    Publication date: January 15, 2004
    Inventors: Cheh Goh, Marco Casassa Mont
  • Publication number: 20030229792
    Abstract: Computer apparatus for accessing by a user an electronic service provided by a remote service provider comprising a receiver for receiving an authorisation policy, wherein the authorisation policy defines access requirements to the electronic service; and a trusted device for determining the users authorisation to access the electronic service based upon the authorisation policy and at least one attribute associated with the user, wherein the trusted device is arranged to inhibit the user accessing the authorisation policy.
    Type: Application
    Filed: March 21, 2003
    Publication date: December 11, 2003
    Inventors: Adrian Baldwin, Marco Casassa Mont, Joseph N. Pato
  • Publication number: 20030220903
    Abstract: A long-term digital document storage system, comprising means for receiving one or more digital documents for storage in a storage means, one or more storage sites for storing, in association with the one or more digital documents, metadata defining a data management strategy or “agreement” with respect to the one or more digital documents, the “agreement including one or more “clauses” defining respective constraints to be applied by the storage system to the one or more digital documents, the system further comprising means for configuring the data management strategy or agreement by defining or specifying at least some of the constraints individually according to specific requirements related to said one or more pieces of digital data. As such, the invention is concerned with the fine-grained management of documents within a storage system by the flexible definition and association with a document of a number of clauses (i.e.
    Type: Application
    Filed: April 16, 2003
    Publication date: November 27, 2003
    Inventors: Marco Casassa Mont, Andrew Patrick Norman, Simon Shiu, Adrian Baldwin, Keith Alexander Harrison
  • Publication number: 20030198348
    Abstract: A computer system comprises a first computer entity arranged to encrypt data using an encryption key comprising a time value, and a second computer entity arranged to generate, at intervals, a decryption key using a current time value. The encryption and decryption processes are such that the decryption key generated using a current time value corresponding to that used for the encryption key, is apt to decrypt the encrypted s data.
    Type: Application
    Filed: March 3, 2003
    Publication date: October 23, 2003
    Inventors: Marco Casassa Mont, Keith Alexander Harrison, Martin Sadler
  • Publication number: 20030177083
    Abstract: There is provided an automated negotiation agent 1 and method of evaluating risk and trust from different contractual viewpoints during electronic negotiation of contracts, preferably e-contracts, in a business to business environment. The negotiation agent 1 on receiving a contract proposal from another agent 15, analyses the contract proposal from different viewpoints to determine measures of the risk and trust involved. A response 20 is formulated from the measures of risk and trust, and is returned to the other agent 15. The negotiation agent 1 has an evaluation engine 9 which evaluates the risk and viewpoints for the contract proposal by accessing a risk and trust functions and viewpoints database 4, a contract template database 2, a contract context database 13 and contract history repository 10. The negotiation agent also has a negotiation engine 8 that evaluates the effect of the contract proposal from different levels using the risk and trust viewpoints received from the evaluation engine 9.
    Type: Application
    Filed: November 19, 2002
    Publication date: September 18, 2003
    Inventors: Marco Casassa Mont, Claudio Bartolini, Andrew Robert Byde, David Trevor Cliff
  • Publication number: 20030149872
    Abstract: A method of certifying by a certification authority that two or more first digitally signed certificates or identities are held by the same authorised signatory, the method comprising the steps of determining that said two or more identities or digitally signed certificates refer to the same authorised signatory, creating a digital verification certificate including data relating to said two or more identities or first digitally signed certificates and data representative of evidence or facts used to determine that said two or more identities or digitally signed certificates relate to the same authorised signatory, applying a digital signature of the certification authority to said verification certificate, and linking or otherwise associating said verification certificate to said two or more identities or first digitally signed certificates.
    Type: Application
    Filed: November 18, 2002
    Publication date: August 7, 2003
    Inventors: Keith Alexander Harrison, Marco Casassa Mont
  • Publication number: 20030145318
    Abstract: A software system for installation on computing apparatus (and a method of installing such a software system on computing apparatus), wherein the software system is provided in the form of a software package (10) including a plurality of software components (12), one or more of the software components (12) being provided as a plurality of different implementations (14), the apparatus including an installation engine (20) for installing the software system only a selected one implementation of the or each of the software components having multiple implementations, and a random selector module (22) for selecting one of the plurality of implementations of a software component for installation.
    Type: Application
    Filed: January 3, 2003
    Publication date: July 31, 2003
    Inventors: Marco Casassa Mont, Keith Alexander Harrison, Simon Shiu, Martin Sadler
  • Publication number: 20030145222
    Abstract: A computer system comprising a trust engine for determining a trust level associated with a computer node and a policy engine for setting access requirements to a personal profile, from the computer node, based upon the determined trust level of the computer node and respective sensitivity levels associated with sub-components of the personal profile.
    Type: Application
    Filed: December 6, 2002
    Publication date: July 31, 2003
    Applicant: HEWLETT-PACKARD COMPANY
    Inventors: Mihaela Gittler, Stephanie Riche, Marco Casassa Mont, Keith Alexander Harrison, Gavin Brebner
  • Publication number: 20030093674
    Abstract: A method for encrypting data comprising deriving a public key using a first data set provided by a second party; encrypting a second data set with the public key; providing the encrypted third data set to the second party; providing the public key to a third party to allow validation of the first data set such that on validation of the first data set the third party provides an associated private key to the second party to allow decryption of the encrypted second data set.
    Type: Application
    Filed: October 11, 2002
    Publication date: May 15, 2003
    Inventors: Keith Alexander Harrison, Martin Sadler, Marco Casassa Mont