Patents by Inventor Martin Sadler

Martin Sadler has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10027481
    Abstract: An electronic device for management of cryptographic keys, and a corresponding method implemented in a computing device comprising a physical processor, transmit feature data of the device to a key generation module, wherein the feature data comprises information corresponding to an identifier or an attribute of the device, and receive, by the device from the key generation module, a digital signature of the transmitted feature data. The device installs the received digital signature as a cryptographic private key for communication, and performs a cryptographic operation using the installed digital signature as the cryptographic private key.
    Type: Grant
    Filed: June 30, 2015
    Date of Patent: July 17, 2018
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Liqun Chen, Fraser John Dickin, Martin Sadler, Chris I Dalton, Nigel Edwards, Simon Kai-Ying Shiu, Boris Balacheff
  • Publication number: 20160127128
    Abstract: An electronic device for management of cryptographic keys, and a corresponding method implemented in a computing device comprising a physical processor, transmit feature data of the device to a key generation module, wherein the feature data comprises information corresponding to an identifier or an attribute of the device, and receive, by the device from the key generation module, a digital signature of the transmitted feature data. The device installs the received digital signature as a cryptographic private key for communication, and performs a cryptographic operation using the installed digital signature as the cryptographic private key.
    Type: Application
    Filed: June 30, 2015
    Publication date: May 5, 2016
    Inventors: Liqun Chen, Fraser John Dickin, Martin Sadler, Chris I. Dalton, Nigel Edwards, Simon Kai-Ying Shiu, Boris Balacheff
  • Patent number: 8250363
    Abstract: Secret random data is distributed to a plurality of devices to provision them with new one-time pad data for use in interacting with apparatus holding the same one-time pad data. This distribution is effected by provisioning a first device with a block of secret random data that is, or will become, available to the apparatus. Part of the secret random data is then distributed from the first device to one or more other devices in a hierarchical distribution pattern headed by the first device. Each device, other than those at the bottom of the distribution hierarchy, retains part of the secret random data it receives and passes on the remainder. Each device uses that part of the secret random data it has retained to provide the device with new one-time pad data. A method is also provided for tracking service usage based on the distributed one-time pad data.
    Type: Grant
    Filed: July 21, 2006
    Date of Patent: August 21, 2012
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Christopher Tofts, Timothy Paul Spiller, William John Munro, Martin Sadler, Keith Alexander Harrison
  • Patent number: 8050411
    Abstract: A device stores one-time pad data for use in carrying out various tasks. In order to preserve the ability to carry out important tasks that require the use of one-time data, use of the one-time pad data held by the device is controlled such that an amount of this one-time pad data is only usable by a predetermined set of important tasks comprising at least a replenishment task for replenishing the device with one-time pad data.
    Type: Grant
    Filed: July 17, 2006
    Date of Patent: November 1, 2011
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: William John Munro, Timothy Paul Spiller, Martin Sadler, Christopher Tofts, Keith Alexander Harrison
  • Patent number: 7789307
    Abstract: A memory tag has a memory. Associated with the memory tag there is a readable structure. The readable structure can be read to generate an identifier. However, the readable structure cannot be provided so as to encode a predetermined identifier.
    Type: Grant
    Filed: February 27, 2006
    Date of Patent: September 7, 2010
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Martin Sadler, James Thomas Edward McDonnell, Robert Francis Squibbs
  • Patent number: 7574596
    Abstract: First data to be sent by a first party to a second party is encrypted using an encryption key string formed using at least a hash value generated using second data and a secret, shared with a trusted party, that serves as identification of the first party. The second data comprises, for example, one or more conditions that serve as identifiers of the second party, and a hash-value element generated by hashing the first data. The encrypted first data and the encryption key string is made available to the second party which forwards the encryption key string to the trusted party with a request for the corresponding decryption key. The trusted party carries out at least one check on the basis of data contained in the encryption key string and, if this at least one check is satisfactory, provides a decryption key to the second party.
    Type: Grant
    Filed: April 22, 2004
    Date of Patent: August 11, 2009
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Liqun Chen, Martin Sadler, Keith Alexander Harrison
  • Patent number: 7398393
    Abstract: When sending personal data to a recipient, the data owner encrypts the data using both a public data item provided by a trusted party and an encryption key string formed using at least policy data indicative of conditions to be satisfied before access is given to the personal data. The encryption key string is typically also provided to the recipient along with the encrypted personal data. To decrypt the personal data, the recipient sends the encryption key string to the trusted party with a request for the decryption key. The trusted party determines the required decryption key using the encryption key string and private data used in deriving its public data, and provides it to the requesting recipient. However, the decryption key is either not determined or not made available until the trusted party is satisfied that the associated policy conditions have been met by the recipient.
    Type: Grant
    Filed: January 28, 2004
    Date of Patent: July 8, 2008
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Marco Casassa Mont, Keith Alexander Harrison, Martin Sadler, Siani Lynne Pearson
  • Patent number: 7330969
    Abstract: A method for encrypting data comprising deriving a public key using a first data set provided by a second party; encrypting a second data set with the public key; providing the encrypted third data set to the second party; providing the public key to a third party to allow validation of the first data set such that on validation of the first data set the third party provides an associated private key to the second party to allow decryption of the encrypted second data set.
    Type: Grant
    Filed: October 11, 2002
    Date of Patent: February 12, 2008
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Keith Alexander Harrison, Martin Sadler, Marco Casassa Mont
  • Patent number: 7321660
    Abstract: A computer system comprises a first computer entity arranged to encrypt data using an encryption key comprising a time value, and a second computer entity arranged to generate, at intervals, a decryption key using a current time value. The encryption and decryption processes are such that the decryption key generated using a current time value corresponding to that used for the encryption key, is apt to decrypt the encrypted s data.
    Type: Grant
    Filed: March 3, 2003
    Date of Patent: January 22, 2008
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Marco Casassa Mont, Keith Alexander Harrison, Martin Sadler
  • Publication number: 20070177424
    Abstract: Data from an n-time pad is used in security-related tasks. To accommodate use of the pad with security-related tasks of different security ratings, the maximum number of times any particular data from the pad is used is determined by the security rating of the highest-security application using that data.
    Type: Application
    Filed: July 17, 2006
    Publication date: August 2, 2007
    Inventor: Martin Sadler
  • Publication number: 20070172054
    Abstract: A device stores one-time pad data for use in carrying out various tasks. In order to preserve the ability to carry out important tasks that require the use of one-time data, use of the one-time pad data held by the device is controlled such that an amount of this one-time pad data is only usable by a predetermined set of important tasks comprising at least a replenishment task for replenishing the device with one-time pad data.
    Type: Application
    Filed: July 17, 2006
    Publication date: July 26, 2007
    Inventors: William Munro, Timothy Spiller, Martin Sadler, Christopher Tofts, Keith Harrison
  • Publication number: 20070101410
    Abstract: A method and system are provided for evidencing to a first entity, such as a visa-checking authority, that a second entity, such as a traveller, possesses a particular attribute, such as right of entry to a specific country. The method involves a preliminary phase of verifying that the second entity has the attribute of interest; associating that attribute with a first one-time pad held by the first entity; and arranging for the second entity to possess a second one-time pad that is at least a subset of the first one-time pad. Thereafter, when the second entity wishes to prove to the first entity that it has the attribute of interest, it passes evidence data derived from the second one-time pad to the first entity. The first entity can then check for the presence, in the first one-time pad, of data matching, or usable to produce, the evidence data.
    Type: Application
    Filed: September 19, 2006
    Publication date: May 3, 2007
    Inventors: Keith Harrison, William Munro, Martin Sadler
  • Publication number: 20070074276
    Abstract: A system is disclosed in which a plurality of devices are arranged to use one-time pad data to interact with apparatus holding the same one-time pad data. Each of the devices and the apparatus has its own one-time pad and the pads are all provisioned with the same new one-time pad data. Upon any one of the devices wishing to effect an interaction with the apparatus using one-time pad data, an alignment operation is carried out between a set of entities comprising at least the apparatus and the device wishing to carry out the interaction. The alignment operation serves to reduce the level of the one-time pad of at least the device wishing to carry out the interaction, to the level of the lowest one-time pad of the set of entities involved in the alignment operation.
    Type: Application
    Filed: July 19, 2006
    Publication date: March 29, 2007
    Inventors: Keith Harrison, Christopher Tofts, Timothy Spiller, Martin Sadler, William Munro
  • Publication number: 20070074277
    Abstract: Secret random data is distributed to a plurality of devices to provision them with new one-time pad data for use in interacting with apparatus holding the same one-time pad data. This distribution is effected by provisioning a first device with a block of secret random data that is, or will become, available to the apparatus. Part of the secret random data is then distributed from the first device to one or more other devices in a hierarchical distribution pattern headed by the first device. Each device, other than those at the bottom of the distribution hierarchy, retains part of the secret random data it receives and passes on the remainder. Each device uses that part of the secret random data it has retained to provide the device with new one-time pad data. A method is also provided for tracking service usage based on the. distributed one-time pad data.
    Type: Application
    Filed: July 21, 2006
    Publication date: March 29, 2007
    Inventors: Christopher Tofts, Timothy Spiller, William Munro, Martin Sadler, Keith Harrison
  • Publication number: 20060208089
    Abstract: A memory tag has a memory. Associated with the memory tag there is a readable structure. The readable structure can be read to generate an identifier. However, the readable structure cannot be provided so as to encode a predetermined identifier.
    Type: Application
    Filed: February 27, 2006
    Publication date: September 21, 2006
    Inventors: Martin Sadler, James Thomas Edward McDonnell, Robert Francis Squibbs
  • Patent number: 7086052
    Abstract: A software system for installation on computing apparatus (and a method of installing such a software system on computing apparatus), wherein the software system is provided in the form of a software package including a plurality of software components, one or more of the software components being provided as a plurality of different implementations, the apparatus including an installation engine for installing the software system only a selected one implementation of the or each of the software components having multiple implementations, and a random selector module for selecting one of the plurality of implementations of a software component for installation.
    Type: Grant
    Filed: January 3, 2003
    Date of Patent: August 1, 2006
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Marco Casassa Mont, Keith Alexander Harrison, Simon Shiu, Martin Sadler
  • Patent number: 6909999
    Abstract: A browser with a sound input receives a sound passage associated with a content site. The browser sends a representation of the sound passage to a service system where it is compared with stored representations of sound passages that each have an associated URI. On finding a match, the service system sends back the URI associated with the matched stored sound-passage representation. The browser uses this URI to access the content site.
    Type: Grant
    Filed: December 4, 2001
    Date of Patent: June 21, 2005
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Andrew Thomas, Stephen John Hinde, Martin Sadler, Simon Edwin Crouch
  • Publication number: 20050039031
    Abstract: When sending personal data to a recipient, the data owner encrypts the data using both a public data item provided by a trusted party and an encryption key string formed using at least policy data indicative of conditions to be satisfied before access is given to the personal data. The encryption key string is typically also provided to the recipient along with the encrypted personal data. To decrypt the personal data, the recipient sends the encryption key string to the trusted party with a request for the decryption key. The trusted party determines the required decryption key using the encryption key string and private data used in deriving its public data, and provides it to the requesting recipient. However, the decryption key is either not determined or not made available until the trusted party is satisfied that the associated policy conditions have been met by the recipient.
    Type: Application
    Filed: January 28, 2004
    Publication date: February 17, 2005
    Inventors: Marco Mont, Keith Harrison, Martin Sadler, Siani Pearson
  • Publication number: 20050021973
    Abstract: First data is encrypted by a first party using an encryption key string formed using at least a hash value of the first data, this hash value being either in clear or in an encrypted form enabling its recovery in clear by a trusted party. The encrypted first data and the encryption key string are made available to a second party which forwards the encryption key string to the trusted party. The trusted party carries out at least one check on the basis of data contained in the encryption key string and, if the checks are satisfactory, provides a decryption key to the second party. Where the encryption key string comprises the hash value of the first data in encrypted form, the trusted party will typically decrypt the hash value and pass it to the second party to enable the latter to check the integrity of the first data.
    Type: Application
    Filed: April 22, 2004
    Publication date: January 27, 2005
    Inventors: Liqun Chen, Martin Sadler, Keith Harrison
  • Publication number: 20050005121
    Abstract: First data to be sent by a first party to a second party is encrypted using an encryption key string formed using at least a hash value generated using second data and a secret, shared with a trusted party, that serves as identification of the first party. The second data comprises, for example, one or more conditions that serve as identifiers of the second party, and a hash-value element generated by hashing the first data. The encrypted first data and the encryption key string is made available to the second party which forwards the encryption key string to the trusted party with a request for the corresponding decryption key. The trusted party carries out at least one check on the basis of data contained in the encryption key string and, if this at least one check is satisfactory, provides a decryption key to the second party.
    Type: Application
    Filed: April 22, 2004
    Publication date: January 6, 2005
    Inventors: Liqun Chen, Martin Sadler, Keith Harrison