Patents by Inventor William Reid Carlisle

William Reid Carlisle has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230388115
    Abstract: A method for non-custodial backup of a secret (1021) by the owner of said secret, assisted by a multiplicity n of recovery agents, each having individual public keys and private keys, and the owner having a first value (1013), comprising providing the owner with a first computer program, which at rest will reside on a computer readable medium, configured to enroll the secret by computing a public data set (1023), as a function of the owner's first value, each of the n recovery agents' public keys (1011), and a nonce (1015). A method for recovery of the secret (1021) is also disclosed.
    Type: Application
    Filed: May 31, 2023
    Publication date: November 30, 2023
    Applicant: LokBlok, Inc.
    Inventor: William Reid Carlisle
  • Patent number: 10447486
    Abstract: A method by which a hardware security module can attest remotely to its measure of trust as determined by its security certifications and the Level of Assurance it can be relied on to support without the human witnessing elements that are currently used to validate this trust. In a further embodiment the Level of Assurance can be transported to a second hardware security module.
    Type: Grant
    Filed: July 19, 2018
    Date of Patent: October 15, 2019
    Assignee: SPYRUS, Inc.
    Inventors: Daniel Elvio Turissini, William Reid Carlisle, Burton George Tregub
  • Publication number: 20190028281
    Abstract: A method by which a hardware security module can attest remotely to its measure of trust as determined by its security certifications and the Level of Assurance it can be relied on to support without the human witnessing elements that are currently used to validate this trust. In a further embodiment the Level of Assurance can be transported to a second hardware security module.
    Type: Application
    Filed: July 19, 2018
    Publication date: January 24, 2019
    Applicant: SPYRUS, Inc.
    Inventors: Daniel Elvio Turissini, William Reid Carlisle, Burton George Tregub
  • Patent number: 9521123
    Abstract: A method for encryption and sealing of a plaintext file by hashing the plaintext file to produce a plaintext hash, encrypting the plaintext file to produce ciphertext, hashing the ciphertext to produce a ciphertext hash, hashing the plaintext hash and the ciphertext hash to produce a result hash, and sealing the ciphertext together with the result hash. This provides verification for non-repudiation and protects against undetected malware corrupting the plaintext or ciphertext files.
    Type: Grant
    Filed: April 28, 2015
    Date of Patent: December 13, 2016
    Assignee: Spyrus, Inc.
    Inventors: Robert R. Jueneman, Duane J. Linsenbardt, John N. Young, William Reid Carlisle, Burton George Tregub
  • Publication number: 20160021068
    Abstract: A device and method for file encryption and decryption with a cryptographic processor reconstituting a file encryption key from a version of the key which has been shrouded with a network authorization code. This meets a need for restricted communication and data containment by limiting access to a pre-defined community-of-interest, so that no one outside of that community can decrypt encrypted content.
    Type: Application
    Filed: April 28, 2015
    Publication date: January 21, 2016
    Applicant: SPYRUS, INC.
    Inventors: Robert R. JUENEMAN, Duane J. LINSENBARDT, John N. YOUNG, William Reid CARLISLE, Burton George TREGUB
  • Publication number: 20160021109
    Abstract: A method for encryption and sealing of a plaintext file by hashing the plaintext file to produce a plaintext hash, encrypting the plaintext file to produce ciphertext, hashing the ciphertext to produce a ciphertext hash, hashing the plaintext hash and the ciphertext hash to produce a result hash, and sealing the ciphertext together with the result hash. This provides verification for non-repudiation and protects against undetected malware corrupting the plaintext or ciphertext files.
    Type: Application
    Filed: April 28, 2015
    Publication date: January 21, 2016
    Applicant: SPYRUS, INC.
    Inventors: Robert R. JUENEMAN, Duane J. LINSENBARDT, John N. YOUNG, William Reid CARLISLE, Burton George TREGUB
  • Patent number: 9049010
    Abstract: A portable encryption device with logon access controlled by an encryption key, with an on board cryptographic processor for reconstituting the encryption key from a plurality of secrets generated by a secret sharing algorithm, optionally shrouded with external secrets using an invertible transform resistant to quantum computing attacks. Another embodiment provides file decryption controlled by a file encryption key, with the on board cryptographic processor reconstituting the file encryption key from a version of the file encryption key which has been shrouded with a network authorization code. A method for encryption of a plaintext file by hashing, compressing, and encrypting the plaintext file, hashing the ciphertext, hashing the plaintext hash and the ciphertext hash, and sealing the ciphertext together with the resulting hash. A portable encryption device for performing the method is also disclosed.
    Type: Grant
    Filed: October 12, 2012
    Date of Patent: June 2, 2015
    Assignee: Spyrus, Inc.
    Inventors: Robert R. Jueneman, Duane J. Linsenbardt, John N. Young, William Reid Carlisle, Burton George Tregub
  • Patent number: 8009829
    Abstract: A method and system for deploying a suite of advanced cryptographic algorithms that includes: providing a legacy cryptographic interface that is associated with a legacy operating system and a legacy application, and supports a suite of legacy cryptographic algorithms; providing a suite of advanced cryptographic algorithms that includes one or more of an advanced asymmetric key algorithm, an advanced symmetric key algorithm, and/or an advanced hash function; providing an advanced cryptographic interface that is independent of the legacy operating system and the legacy application, backwards compatible with the legacy cryptographic interface, and capable of supporting the suite of advanced cryptographic algorithms; and transparently and automatically substituting the suite of advanced cryptographic algorithms for the legacy cryptographic algorithms through the invocation of the advanced cryptographic interface at the time of an initial performance of encrypting, hashing, digitally signing the hash of, decrypti
    Type: Grant
    Filed: October 25, 2007
    Date of Patent: August 30, 2011
    Assignee: Spyrus, Inc.
    Inventors: Robert R. Jueneman, Duane J. Linsenbardt, John N. Young, William Reid Carlisle
  • Publication number: 20080263363
    Abstract: A portable encryption device with logon access controlled by an encryption key, with an on board cryptographic processor for reconstituting the encryption key from a plurality of secrets generated by a secret sharing algorithm, optionally shrouded with external secrets using an invertible transform resistant to quantum computing attacks. Another embodiment provides file decryption controlled by a file encryption key, with the on board cryptographic processor reconstituting the file encryption key from a version of the file encryption key which has been shrouded with a network authorization code. A method for encryption of a plaintext file by hashing, compressing, and encrypting the plaintext file, hashing the ciphertext, hashing the plaintext hash and the ciphertext hash, and sealing the ciphertext together with the resulting hash. A portable encryption device for performing the method is also disclosed.
    Type: Application
    Filed: January 22, 2008
    Publication date: October 23, 2008
    Applicant: SPYRUS, INC.
    Inventors: Robert R. Jueneman, Duane J. Linsenbardt, John N. Young, William Reid Carlisle, Burton George Tregub
  • Publication number: 20080130895
    Abstract: A method and system for deploying a suite of advanced cryptographic algorithms that includes: providing a legacy cryptographic interface that is associated with a legacy operating system and a legacy application, and supports a suite of legacy cryptographic algorithms; providing a suite of advanced cryptographic algorithms that includes one or more of an advanced asymmetric key algorithm, an advanced symmetric key algorithm, and/or an advanced hash function; providing an advanced cryptographic interface that is independent of the legacy operating system and the legacy application, backwards compatible with the legacy cryptographic interface, and capable of supporting the suite of advanced cryptographic algorithms; and transparently and automatically substituting the suite of advanced cryptographic algorithms for the legacy cryptographic algorithms through the invocation of the advanced cryptographic interface at the time of an initial performance of encrypting, hashing, digitally signing the hash of, decrypti
    Type: Application
    Filed: October 25, 2007
    Publication date: June 5, 2008
    Applicant: SPYRUS, INC.
    Inventors: Robert R. JUENEMAN, Duane J. LINSENBARDT, John N. YOUNG, William Reid CARLISLE
  • Patent number: 5649118
    Abstract: Systems and methods are disclosed wherein a single set of consumer items may be purchased by debiting any of a plurality of accounts stored on a smart card. According to an embodiment disclosed herein, a point-of-sale terminal includes a terminal processor, an item identification device, a terminal memory, and a smart card reader. The item identification device may include a conventional UPC bar code reader adapted to read UPC bar codes on consumer items. A cost table and a plurality of item tables are electronically stored in terminal memory. The cost table associates each item identifier (UPC bar code) with a corresponding cost. Each item table contains a list of item identifiers, and may optionally associate specific item identifiers with corresponding accounts. Each item table is uniquely identified using an item table identifier. The terminal memory, item identification device, and smart card reader are all coupled to the terminal processor.
    Type: Grant
    Filed: May 27, 1994
    Date of Patent: July 15, 1997
    Assignee: Lucent Technologies Inc.
    Inventors: William Reid Carlisle, Lydia Anne Curtis, Kathleen M. Murphy, Richard John Skibo