Patents by Inventor Martin Sadler
Martin Sadler has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10027481Abstract: An electronic device for management of cryptographic keys, and a corresponding method implemented in a computing device comprising a physical processor, transmit feature data of the device to a key generation module, wherein the feature data comprises information corresponding to an identifier or an attribute of the device, and receive, by the device from the key generation module, a digital signature of the transmitted feature data. The device installs the received digital signature as a cryptographic private key for communication, and performs a cryptographic operation using the installed digital signature as the cryptographic private key.Type: GrantFiled: June 30, 2015Date of Patent: July 17, 2018Assignee: Hewlett Packard Enterprise Development LPInventors: Liqun Chen, Fraser John Dickin, Martin Sadler, Chris I Dalton, Nigel Edwards, Simon Kai-Ying Shiu, Boris Balacheff
-
Publication number: 20160127128Abstract: An electronic device for management of cryptographic keys, and a corresponding method implemented in a computing device comprising a physical processor, transmit feature data of the device to a key generation module, wherein the feature data comprises information corresponding to an identifier or an attribute of the device, and receive, by the device from the key generation module, a digital signature of the transmitted feature data. The device installs the received digital signature as a cryptographic private key for communication, and performs a cryptographic operation using the installed digital signature as the cryptographic private key.Type: ApplicationFiled: June 30, 2015Publication date: May 5, 2016Inventors: Liqun Chen, Fraser John Dickin, Martin Sadler, Chris I. Dalton, Nigel Edwards, Simon Kai-Ying Shiu, Boris Balacheff
-
Patent number: 8250363Abstract: Secret random data is distributed to a plurality of devices to provision them with new one-time pad data for use in interacting with apparatus holding the same one-time pad data. This distribution is effected by provisioning a first device with a block of secret random data that is, or will become, available to the apparatus. Part of the secret random data is then distributed from the first device to one or more other devices in a hierarchical distribution pattern headed by the first device. Each device, other than those at the bottom of the distribution hierarchy, retains part of the secret random data it receives and passes on the remainder. Each device uses that part of the secret random data it has retained to provide the device with new one-time pad data. A method is also provided for tracking service usage based on the distributed one-time pad data.Type: GrantFiled: July 21, 2006Date of Patent: August 21, 2012Assignee: Hewlett-Packard Development Company, L.P.Inventors: Christopher Tofts, Timothy Paul Spiller, William John Munro, Martin Sadler, Keith Alexander Harrison
-
Patent number: 8050411Abstract: A device stores one-time pad data for use in carrying out various tasks. In order to preserve the ability to carry out important tasks that require the use of one-time data, use of the one-time pad data held by the device is controlled such that an amount of this one-time pad data is only usable by a predetermined set of important tasks comprising at least a replenishment task for replenishing the device with one-time pad data.Type: GrantFiled: July 17, 2006Date of Patent: November 1, 2011Assignee: Hewlett-Packard Development Company, L.P.Inventors: William John Munro, Timothy Paul Spiller, Martin Sadler, Christopher Tofts, Keith Alexander Harrison
-
Patent number: 7789307Abstract: A memory tag has a memory. Associated with the memory tag there is a readable structure. The readable structure can be read to generate an identifier. However, the readable structure cannot be provided so as to encode a predetermined identifier.Type: GrantFiled: February 27, 2006Date of Patent: September 7, 2010Assignee: Hewlett-Packard Development Company, L.P.Inventors: Martin Sadler, James Thomas Edward McDonnell, Robert Francis Squibbs
-
Patent number: 7574596Abstract: First data to be sent by a first party to a second party is encrypted using an encryption key string formed using at least a hash value generated using second data and a secret, shared with a trusted party, that serves as identification of the first party. The second data comprises, for example, one or more conditions that serve as identifiers of the second party, and a hash-value element generated by hashing the first data. The encrypted first data and the encryption key string is made available to the second party which forwards the encryption key string to the trusted party with a request for the corresponding decryption key. The trusted party carries out at least one check on the basis of data contained in the encryption key string and, if this at least one check is satisfactory, provides a decryption key to the second party.Type: GrantFiled: April 22, 2004Date of Patent: August 11, 2009Assignee: Hewlett-Packard Development Company, L.P.Inventors: Liqun Chen, Martin Sadler, Keith Alexander Harrison
-
Patent number: 7398393Abstract: When sending personal data to a recipient, the data owner encrypts the data using both a public data item provided by a trusted party and an encryption key string formed using at least policy data indicative of conditions to be satisfied before access is given to the personal data. The encryption key string is typically also provided to the recipient along with the encrypted personal data. To decrypt the personal data, the recipient sends the encryption key string to the trusted party with a request for the decryption key. The trusted party determines the required decryption key using the encryption key string and private data used in deriving its public data, and provides it to the requesting recipient. However, the decryption key is either not determined or not made available until the trusted party is satisfied that the associated policy conditions have been met by the recipient.Type: GrantFiled: January 28, 2004Date of Patent: July 8, 2008Assignee: Hewlett-Packard Development Company, L.P.Inventors: Marco Casassa Mont, Keith Alexander Harrison, Martin Sadler, Siani Lynne Pearson
-
Patent number: 7330969Abstract: A method for encrypting data comprising deriving a public key using a first data set provided by a second party; encrypting a second data set with the public key; providing the encrypted third data set to the second party; providing the public key to a third party to allow validation of the first data set such that on validation of the first data set the third party provides an associated private key to the second party to allow decryption of the encrypted second data set.Type: GrantFiled: October 11, 2002Date of Patent: February 12, 2008Assignee: Hewlett-Packard Development Company, L.P.Inventors: Keith Alexander Harrison, Martin Sadler, Marco Casassa Mont
-
Patent number: 7321660Abstract: A computer system comprises a first computer entity arranged to encrypt data using an encryption key comprising a time value, and a second computer entity arranged to generate, at intervals, a decryption key using a current time value. The encryption and decryption processes are such that the decryption key generated using a current time value corresponding to that used for the encryption key, is apt to decrypt the encrypted s data.Type: GrantFiled: March 3, 2003Date of Patent: January 22, 2008Assignee: Hewlett-Packard Development Company, L.P.Inventors: Marco Casassa Mont, Keith Alexander Harrison, Martin Sadler
-
Publication number: 20070177424Abstract: Data from an n-time pad is used in security-related tasks. To accommodate use of the pad with security-related tasks of different security ratings, the maximum number of times any particular data from the pad is used is determined by the security rating of the highest-security application using that data.Type: ApplicationFiled: July 17, 2006Publication date: August 2, 2007Inventor: Martin Sadler
-
Publication number: 20070172054Abstract: A device stores one-time pad data for use in carrying out various tasks. In order to preserve the ability to carry out important tasks that require the use of one-time data, use of the one-time pad data held by the device is controlled such that an amount of this one-time pad data is only usable by a predetermined set of important tasks comprising at least a replenishment task for replenishing the device with one-time pad data.Type: ApplicationFiled: July 17, 2006Publication date: July 26, 2007Inventors: William Munro, Timothy Spiller, Martin Sadler, Christopher Tofts, Keith Harrison
-
Publication number: 20070101410Abstract: A method and system are provided for evidencing to a first entity, such as a visa-checking authority, that a second entity, such as a traveller, possesses a particular attribute, such as right of entry to a specific country. The method involves a preliminary phase of verifying that the second entity has the attribute of interest; associating that attribute with a first one-time pad held by the first entity; and arranging for the second entity to possess a second one-time pad that is at least a subset of the first one-time pad. Thereafter, when the second entity wishes to prove to the first entity that it has the attribute of interest, it passes evidence data derived from the second one-time pad to the first entity. The first entity can then check for the presence, in the first one-time pad, of data matching, or usable to produce, the evidence data.Type: ApplicationFiled: September 19, 2006Publication date: May 3, 2007Inventors: Keith Harrison, William Munro, Martin Sadler
-
Publication number: 20070074276Abstract: A system is disclosed in which a plurality of devices are arranged to use one-time pad data to interact with apparatus holding the same one-time pad data. Each of the devices and the apparatus has its own one-time pad and the pads are all provisioned with the same new one-time pad data. Upon any one of the devices wishing to effect an interaction with the apparatus using one-time pad data, an alignment operation is carried out between a set of entities comprising at least the apparatus and the device wishing to carry out the interaction. The alignment operation serves to reduce the level of the one-time pad of at least the device wishing to carry out the interaction, to the level of the lowest one-time pad of the set of entities involved in the alignment operation.Type: ApplicationFiled: July 19, 2006Publication date: March 29, 2007Inventors: Keith Harrison, Christopher Tofts, Timothy Spiller, Martin Sadler, William Munro
-
Publication number: 20070074277Abstract: Secret random data is distributed to a plurality of devices to provision them with new one-time pad data for use in interacting with apparatus holding the same one-time pad data. This distribution is effected by provisioning a first device with a block of secret random data that is, or will become, available to the apparatus. Part of the secret random data is then distributed from the first device to one or more other devices in a hierarchical distribution pattern headed by the first device. Each device, other than those at the bottom of the distribution hierarchy, retains part of the secret random data it receives and passes on the remainder. Each device uses that part of the secret random data it has retained to provide the device with new one-time pad data. A method is also provided for tracking service usage based on the. distributed one-time pad data.Type: ApplicationFiled: July 21, 2006Publication date: March 29, 2007Inventors: Christopher Tofts, Timothy Spiller, William Munro, Martin Sadler, Keith Harrison
-
Publication number: 20060208089Abstract: A memory tag has a memory. Associated with the memory tag there is a readable structure. The readable structure can be read to generate an identifier. However, the readable structure cannot be provided so as to encode a predetermined identifier.Type: ApplicationFiled: February 27, 2006Publication date: September 21, 2006Inventors: Martin Sadler, James Thomas Edward McDonnell, Robert Francis Squibbs
-
Patent number: 7086052Abstract: A software system for installation on computing apparatus (and a method of installing such a software system on computing apparatus), wherein the software system is provided in the form of a software package including a plurality of software components, one or more of the software components being provided as a plurality of different implementations, the apparatus including an installation engine for installing the software system only a selected one implementation of the or each of the software components having multiple implementations, and a random selector module for selecting one of the plurality of implementations of a software component for installation.Type: GrantFiled: January 3, 2003Date of Patent: August 1, 2006Assignee: Hewlett-Packard Development Company, L.P.Inventors: Marco Casassa Mont, Keith Alexander Harrison, Simon Shiu, Martin Sadler
-
Patent number: 6909999Abstract: A browser with a sound input receives a sound passage associated with a content site. The browser sends a representation of the sound passage to a service system where it is compared with stored representations of sound passages that each have an associated URI. On finding a match, the service system sends back the URI associated with the matched stored sound-passage representation. The browser uses this URI to access the content site.Type: GrantFiled: December 4, 2001Date of Patent: June 21, 2005Assignee: Hewlett-Packard Development Company, L.P.Inventors: Andrew Thomas, Stephen John Hinde, Martin Sadler, Simon Edwin Crouch
-
Publication number: 20050039031Abstract: When sending personal data to a recipient, the data owner encrypts the data using both a public data item provided by a trusted party and an encryption key string formed using at least policy data indicative of conditions to be satisfied before access is given to the personal data. The encryption key string is typically also provided to the recipient along with the encrypted personal data. To decrypt the personal data, the recipient sends the encryption key string to the trusted party with a request for the decryption key. The trusted party determines the required decryption key using the encryption key string and private data used in deriving its public data, and provides it to the requesting recipient. However, the decryption key is either not determined or not made available until the trusted party is satisfied that the associated policy conditions have been met by the recipient.Type: ApplicationFiled: January 28, 2004Publication date: February 17, 2005Inventors: Marco Mont, Keith Harrison, Martin Sadler, Siani Pearson
-
Publication number: 20050021973Abstract: First data is encrypted by a first party using an encryption key string formed using at least a hash value of the first data, this hash value being either in clear or in an encrypted form enabling its recovery in clear by a trusted party. The encrypted first data and the encryption key string are made available to a second party which forwards the encryption key string to the trusted party. The trusted party carries out at least one check on the basis of data contained in the encryption key string and, if the checks are satisfactory, provides a decryption key to the second party. Where the encryption key string comprises the hash value of the first data in encrypted form, the trusted party will typically decrypt the hash value and pass it to the second party to enable the latter to check the integrity of the first data.Type: ApplicationFiled: April 22, 2004Publication date: January 27, 2005Inventors: Liqun Chen, Martin Sadler, Keith Harrison
-
Publication number: 20050005121Abstract: First data to be sent by a first party to a second party is encrypted using an encryption key string formed using at least a hash value generated using second data and a secret, shared with a trusted party, that serves as identification of the first party. The second data comprises, for example, one or more conditions that serve as identifiers of the second party, and a hash-value element generated by hashing the first data. The encrypted first data and the encryption key string is made available to the second party which forwards the encryption key string to the trusted party with a request for the corresponding decryption key. The trusted party carries out at least one check on the basis of data contained in the encryption key string and, if this at least one check is satisfactory, provides a decryption key to the second party.Type: ApplicationFiled: April 22, 2004Publication date: January 6, 2005Inventors: Liqun Chen, Martin Sadler, Keith Harrison