Patents by Inventor Richard Kettlewell

Richard Kettlewell has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240073003
    Abstract: A method of data transfer from a tenant to a service provider comprises encrypting the data with a public key of a key pair generated by a secure device within the service provider system. The data thus cannot be accessed by the service provider during transmission. The data is generated with a corresponding access control list, which specifies that a valid certificate must be presented in order to grant a particular use of the data once stored. The tenant can thus retain control of the use of the data even though it has been transferred out of the tenant system. A method of controlling use of data securely stored in the service provider system comprises issuing a use certificate having an expiry time to the party requesting use of the data. The use certificate must be validated before use of the stored data is granted. This enables the tenant to grant use of the stored data for a limited time period.
    Type: Application
    Filed: November 8, 2023
    Publication date: February 29, 2024
    Applicant: NCIPHER SECURITY LIMITED
    Inventors: Ian BYGRAVE, Alec EDGINGTON, Richard KETTLEWELL, David O'DOHERTY, Nicholas SMITH, Neil WALKER
  • Patent number: 11849029
    Abstract: A method of data transfer from a tenant to a service provider comprises encrypting the data with a public key of a key pair generated by a secure device within the service provider system. The data thus cannot be accessed by the service provider during transmission. The data is generated with a corresponding access control list, which specifies that a valid certificate must be presented in order to grant a particular use of the data once stored. The tenant can thus retain control of the use of the data even though it has been transferred out of the tenant system. A method of controlling use of data securely stored in the service provider system comprises issuing a use certificate having an expiry time to the party requesting use of the data. The use certificate must be validated before use of the stored data is granted. This enables the tenant to grant use of the stored data for a limited time period.
    Type: Grant
    Filed: July 15, 2021
    Date of Patent: December 19, 2023
    Assignee: NCIPHER SECURITY LIMITED
    Inventors: Ian Bygrave, Alec Edgington, Richard Kettlewell, David O'Doherty, Nicholas Smith, Neil Walker
  • Publication number: 20230131348
    Abstract: Systems and methods for managing cryptographic tokens within a hardware security module are disclosed. A parent cryptographic token contains a plurality of parent cryptographic objects, and a child cryptographic token contains a plurality of child cryptographic objects. The child cryptographic token is associated with the parent cryptographic token. A session established with the child token provides access to at least some of the plurality of child cryptographic objects and at least some the plurality of parent cryptographic objects.
    Type: Application
    Filed: October 25, 2022
    Publication date: April 27, 2023
    Applicant: Entrust Corporation
    Inventors: KENT LANDERHOLM, EVAN VAALA, RICHARD KETTLEWELL
  • Publication number: 20210344482
    Abstract: A method of data transfer from a tenant to a service provider comprises encrypting the data with a public key of a key pair generated by a secure device within the service provider system. The data thus cannot be accessed by the service provider during transmission. The data is generated with a corresponding access control list, which specifies that a valid certificate must be presented in order to grant a particular use of the data once stored. The tenant can thus retain control of the use of the data even though it has been transferred out of the tenant system. A method of controlling use of data securely stored in the service provider system comprises issuing a use certificate having an expiry time to the party requesting use of the data. The use certificate must be validated before use of the stored data is granted. This enables the tenant to grant use of the stored data for a limited time period.
    Type: Application
    Filed: July 15, 2021
    Publication date: November 4, 2021
    Applicant: NCIPHER SECURITY LIMITED
    Inventors: Ian BYGRAVE, Alec EDGINGTON, Richard KETTLEWELL, David O'DOHERTY, Nicholas SMITH, Neil WALKER
  • Patent number: 11101983
    Abstract: A method of data transfer from a tenant to a service provider comprises encrypting the data with a public key of a key pair generated by a secure device within the service provider system. The data thus cannot be accessed by the service provider during transmission. The data is generated with a corresponding access control list, which specifies that a valid certificate must be presented in order to grant a particular use of the data once stored. The tenant can thus retain control of the use of the data even though it has been transferred out of the tenant system. A method of controlling use of data securely stored in the service provider system comprises issuing a use certificate having an expiry time to the party requesting use of the data. The use certificate must be validated before use of the stored data is granted. This enables the tenant to grant use of the stored data for a limited time period.
    Type: Grant
    Filed: February 3, 2017
    Date of Patent: August 24, 2021
    Assignee: NCIPHER SECURITY LIMITED
    Inventors: Ian Bygrave, Alec Edgington, Richard Kettlewell, David O'Doherty, Nicholas Smith, Neil Walker
  • Patent number: 10547598
    Abstract: A method for cryptographic material management is provided. The method includes receiving into a computing device, through an API of the computing device, a designation of which of a plurality of key-producing cloud services sources each of a plurality of keys and which of a plurality of key-consuming cloud service providers uses each of the plurality of keys for encrypting or decrypting data. The method includes directing, from the computing device through a first plurality of end modules each interfaced to a specific API of a specific one of the plurality of key-producing cloud services, production of one or more of the plurality of keys. The method includes directing, from the computing device through a second plurality of end modules each interfaced to a specific API of a specific one of the plurality of key-consuming cloud service providers usage of one or more of the plurality of keys.
    Type: Grant
    Filed: March 28, 2017
    Date of Patent: January 28, 2020
    Assignee: THALES ESECURITY, INC.
    Inventors: Solomon Cates, Richard Kettlewell, Nicholas Smith
  • Publication number: 20190052456
    Abstract: A method of data transfer from a tenant to a service provider comprises encrypting the data with a public key of a key pair generated by a secure device within the service provider system. The data thus cannot be accessed by the service provider during transmission. The data is generated with a corresponding access control list, which specifies that a valid certificate must be presented N in order to grant a particular use of the data once stored. The tenant can thus retain control of the use of the data even though it has been transferred out of the tenant system. A method of controlling use of data securely stored in the service provider system comprises issuing a use certificate having an expiry time to the party requesting use of the data. The use certificate must be validated before use of the stored data is granted. This enables the tenant to grant use of the stored data for a limited time period.
    Type: Application
    Filed: February 3, 2017
    Publication date: February 14, 2019
    Inventors: Ian BYGRAVE, Alec EDGINGTON, Richard KETTLEWELL, David O'DOHERTY, Nicholas SMITH, Neil WALKER
  • Publication number: 20180234401
    Abstract: A method for cryptographic material management is provided. The method includes receiving into a computing device, through an API of the computing device, a designation of which of a plurality of key-producing cloud services sources each of a plurality of keys and which of a plurality of key-consuming cloud service providers uses each of the plurality of keys for encrypting or decrypting data. The method includes directing, from the computing device through a first plurality of end modules each interfaced to a specific API of a specific one of the plurality of key-producing cloud services, production of one or more of the plurality of keys. The method includes directing, from the computing device through a second plurality of end modules each interfaced to a specific API of a specific one of the plurality of key-consuming cloud service providers usage of one or more of the plurality of keys.
    Type: Application
    Filed: March 28, 2017
    Publication date: August 16, 2018
    Inventors: Solomon Cates, Richard Kettlewell, Nicholas Smith