Patents by Inventor Marco Casassa Mont

Marco Casassa Mont has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20030145318
    Abstract: A software system for installation on computing apparatus (and a method of installing such a software system on computing apparatus), wherein the software system is provided in the form of a software package (10) including a plurality of software components (12), one or more of the software components (12) being provided as a plurality of different implementations (14), the apparatus including an installation engine (20) for installing the software system only a selected one implementation of the or each of the software components having multiple implementations, and a random selector module (22) for selecting one of the plurality of implementations of a software component for installation.
    Type: Application
    Filed: January 3, 2003
    Publication date: July 31, 2003
    Inventors: Marco Casassa Mont, Keith Alexander Harrison, Simon Shiu, Martin Sadler
  • Publication number: 20030145222
    Abstract: A computer system comprising a trust engine for determining a trust level associated with a computer node and a policy engine for setting access requirements to a personal profile, from the computer node, based upon the determined trust level of the computer node and respective sensitivity levels associated with sub-components of the personal profile.
    Type: Application
    Filed: December 6, 2002
    Publication date: July 31, 2003
    Applicant: HEWLETT-PACKARD COMPANY
    Inventors: Mihaela Gittler, Stephanie Riche, Marco Casassa Mont, Keith Alexander Harrison, Gavin Brebner
  • Publication number: 20030093674
    Abstract: A method for encrypting data comprising deriving a public key using a first data set provided by a second party; encrypting a second data set with the public key; providing the encrypted third data set to the second party; providing the public key to a third party to allow validation of the first data set such that on validation of the first data set the third party provides an associated private key to the second party to allow decryption of the encrypted second data set.
    Type: Application
    Filed: October 11, 2002
    Publication date: May 15, 2003
    Inventors: Keith Alexander Harrison, Martin Sadler, Marco Casassa Mont
  • Publication number: 20030084809
    Abstract: A method of printing a token by printer (5), in which the printer (5) includes a digital identification device (1) configured to generate a series of distinct print job counter numbers and to provide a public key of a cryptographic public key/private key pair. The method includes the steps of sending a printer generated print job counter number and an encryption key to a token issuer (4) the token issuer (4) sending to the printer (5) a message encrypted by the encryption key, the message including the print job counter number and information representative of the token (9) to be printed and the printer (5) decrypting the encrypted message and printing the token using the information representative of the token (9) if the print job counter number is valid.
    Type: Application
    Filed: October 15, 2002
    Publication date: May 8, 2003
    Inventors: Cheh Goh, Marco Casassa Mont
  • Publication number: 20030056108
    Abstract: A method and apparatus that allows renewal of encoded data in a long-term storage. Original user data 200 is encrypted to form encrypted data 211 which can be accessed using one or more encryption secrets 213 stored separately, and optionally validated using context data 212. At renewal, the encrypted data 211, the context data 212, and the or each encryption secret 213 are combined to form a first encryption layer 210 and the first encryption layer 210 is itself encrypted to form the encrypted data 221 of an immediately succeeding second encryption layer 220. The encrypted data 221 of this second encryption layer 220 is accessible with a renewed encryption secret 223, and optionally is validated by context data 222 such as a time stamp and trusted signature. The method may be repeated recursively, forming third and subsequent encryption layers 230 at each renewal.
    Type: Application
    Filed: September 17, 2002
    Publication date: March 20, 2003
    Inventors: Marco Casassa Mont, Keith Alexander Harrison
  • Publication number: 20030028496
    Abstract: A method for determining admittance to a negotiation comprises the steps of: defining admittance criteria from a superset of parameters; at least one potential negotiation participant making an admittance request to an admittance controller, which admittance request includes a set of information relating to the superset of parameters and forming a subset thereof; and the admittance controller determining whether the admittance request satisfies the admittance criteria.
    Type: Application
    Filed: July 15, 2002
    Publication date: February 6, 2003
    Inventors: Michael Yearworth, Marco Casassa Mont
  • Publication number: 20020120848
    Abstract: The present invention provides a digital certificate (2, 32) comprising a plurality of credential attribute properties (6, 36), and a trust function (8, 42) embedded within the certificate as an executable file, which trust function can determine as a function of data (12, 44) available to it a trust value (14, 46) attributable to at least a part of the certificate at least partly by execution of the executable file. A corresponding method of communication is also disclosed.
    Type: Application
    Filed: February 15, 2002
    Publication date: August 29, 2002
    Inventors: Marco Casassa Mont, Richard Brown, Brian Quentin Monahan
  • Publication number: 20020116367
    Abstract: Improvements In and Relating to Digital Certificates The present invention provides a digital certificate (2, 32), the certificate comprising a credential attribute function (6, 38) associated with a credential attribute property (5, 36), which credential attribute function is embedded in the certificate as an executable file, in which the credential attribute function can determine the value (12, 44) of the credential attribute property at least partly by execution of the executable file. A corresponding method is also disclosed.
    Type: Application
    Filed: February 15, 2002
    Publication date: August 22, 2002
    Inventors: Richard Brown, Marco Casassa Mont
  • Publication number: 20020116646
    Abstract: A computer system comprising a first computer node coupled to a second computer node via a communication network, the first node and second node being arranged to allow a secure connection to be established between the first and second nodes, the first node having a processor responsive to the interaction of a user for initiating the transfer of a digital credential over a secure connection established between the first node and second node.
    Type: Application
    Filed: February 20, 2002
    Publication date: August 22, 2002
    Applicant: HEWLETT PACKARD COMPANY
    Inventors: Marco Casassa Mont, Richard Brown
  • Publication number: 20020116647
    Abstract: A computer system comprising a first computer node coupled to a network, the first node being arranged to provide a service to a second computer node via a connection over the network; a controller for determining access to the service based upon a digital credential associated with the connection, the controller being arranged to vary access to the service over the connection in response to a change in status of the digital credential.
    Type: Application
    Filed: February 20, 2002
    Publication date: August 22, 2002
    Applicant: HEWLETT PACKARD COMPANY
    Inventors: Marco Casassa Mont, Richard Brown
  • Publication number: 20020108061
    Abstract: The present invention provides a method of communication, the method comprising the steps of a first party (30) communicating to a second party (32) a composite credential (54) across a distributed electronic network (44) which composite credential (54) comprises a plurality of credentials (46-52). A corresponding composite credential is also disclosed.
    Type: Application
    Filed: December 21, 2001
    Publication date: August 8, 2002
    Inventors: Keith Alexander Harrison, Brian Quentin Monahan, Marco Casassa Mont, Richard Brown
  • Publication number: 20010049786
    Abstract: A distributed storage system for storing at least one credential (46), provided by an issuing authority and relating to an identity (42, 44), is described. The system comprises: a plurality of unique identities (42, 44) each having a local store (40). Each local store (40) securely stores credentials (46) relating to the owner of the identity (42, 44). The system also comprises one or more security certificates (66) provided at each identity (42, 44) for ensuring the authenticity of the credentials (46). The security certificates (66) provide secure references to the issuers of the credentials (46) and this can be used in verifying the origin of each credential (46). The identity can be provided a website or a mobile phone for example.
    Type: Application
    Filed: May 10, 2001
    Publication date: December 6, 2001
    Applicant: HEWLETT-PACKARD COMPANY
    Inventors: Keith Alexander Harrison, Brian Quentin Monahan, Marco Casassa Mont