Patents by Inventor Marco Mont

Marco Mont has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20060190986
    Abstract: A computer network has a number of resources. One or more trusted localisation provider certifies the location of the resources. Encrypted data is closely associated with a policy package defining privacy policies for the data and metapolicies for their selection. A trusted privacy service enforces the privacy policies. The trusted privacy service is arranged to supply a key to a resource to allow that resource to process data if the trusted privacy service determines from the trusted localisation provider certifying the location and other contextual information of the resource that the privacy policy allows processing of the data on that resource in that location.
    Type: Application
    Filed: January 20, 2006
    Publication date: August 24, 2006
    Inventors: Marco Mont, Siani Pearson
  • Publication number: 20050251865
    Abstract: A data privacy management system includes a data repository, a private data mediating system and a privacy manager. The data repository stores private data items in an obfuscated form. Each private data item has associated privacy policy data a defining conditions to be met to ensure the privacy of the data item. A private data mediating system communicates with the privacy manager to obtain de-obfuscated private data items that are extracted from the data repository 10. De-obfuscation of the data 51, 53 is subject to satisfaction of the privacy manager that the respective conditions ensuring privacy of the data item are met.
    Type: Application
    Filed: October 25, 2004
    Publication date: November 10, 2005
    Inventors: Marco Mont, Siani Pearson, Peter Bramhall
  • Publication number: 20050237397
    Abstract: Method and apparatus for enabling an imaging function of a mobile device in areas where use of such imaging functions is prohibited, including registering image data in the device in order to determine if such data relates to the image of a face of a user of the device, and on the basis of the determination, enabling an imaging function of the device proper.
    Type: Application
    Filed: April 26, 2005
    Publication date: October 27, 2005
    Inventors: Maurizio Pilu, Marco Mont
  • Publication number: 20050102523
    Abstract: A smartcard is provided that stores a secret associated with the user of the card. The smartcard is arranged to map an input string to a first element of an algebraic group according to a known mapping function, to multiply the first element by the stored secret to form a second element of the same algebraic group such that there exists a computable bilinear map for the first and second elements, and to output this second element. This selection of the limited functionality of the smartcard enables it to be employed in the provision of a range of cryptographic services such as encryption, decryption and signature generation. The smartcard is therefore suitable for use in an organisation where multiple cryptographic services are required.
    Type: Application
    Filed: November 5, 2004
    Publication date: May 12, 2005
    Inventors: Keith Harrison, Liqun Chen, Marco Mont
  • Publication number: 20050102512
    Abstract: Data to be output to a removable storage medium is encrypted for sending to an output device by an encryption process based on encryption parameters comprising public data of a trusted party and an encryption key string comprising a policy for allowing the output of the data. The trusted party provides a decryption key to the output device but only after being satisfied that the policy has been met. The decryption key is generated in dependence on the encryption key string and private data of the trusted party. The output device uses the decryption key in decrypting the data to be output. Embodiments are provided that involve multiple policies and trusted parties.
    Type: Application
    Filed: September 16, 2003
    Publication date: May 12, 2005
    Inventors: Cheh Goh, Liqun Chen, Stephen Crane, Marco Mont, Keith Harrison
  • Publication number: 20050060545
    Abstract: A method and apparatus are provided for the secure provision of payload data that comprises image data representing an image. The payload data is encrypted using encryption parameters comprising public data of a trusted party and an encryption key string. The encryption key string comprises thumbnail data that represents a low-resolution version of the image represented by the image data. The encryption key string preferably also comprises at least one condition to be met before the trusted party releases a decryption key for decrypting the encrypted payload data; advantageously, the apparatus enables a user to select, via a user interface, one or more conditions for incorporation into the encryption key string. The functionality for generating the thumbnail data, for choosing the conditions to be used for the encryption key string, and for encrypting the payload data is preferably incorporated into a physical add-in module such as a PCMCIA card.
    Type: Application
    Filed: September 14, 2004
    Publication date: March 17, 2005
    Inventors: Marco Mont, Keith Harrison
  • Publication number: 20050039031
    Abstract: When sending personal data to a recipient, the data owner encrypts the data using both a public data item provided by a trusted party and an encryption key string formed using at least policy data indicative of conditions to be satisfied before access is given to the personal data. The encryption key string is typically also provided to the recipient along with the encrypted personal data. To decrypt the personal data, the recipient sends the encryption key string to the trusted party with a request for the decryption key. The trusted party determines the required decryption key using the encryption key string and private data used in deriving its public data, and provides it to the requesting recipient. However, the decryption key is either not determined or not made available until the trusted party is satisfied that the associated policy conditions have been met by the recipient.
    Type: Application
    Filed: January 28, 2004
    Publication date: February 17, 2005
    Inventors: Marco Mont, Keith Harrison, Martin Sadler, Siani Pearson