Patents Assigned to Certicom Corp.
  • Publication number: 20170118014
    Abstract: Systems, methods, and software can be used to provide security assurance information. In some aspects, a certificate request for a client process on a mobile device is received. A security assurance character for the client process is determined. Whether to grant the certificate request is determined based on the determined security assurance character. In response to determining to grant the certificate request, a certificate is generated.
    Type: Application
    Filed: November 6, 2015
    Publication date: April 27, 2017
    Applicants: Certicom Corp., BlackBerry Limited
    Inventors: Roger Paul Bowman, Catalin Visinescu, Ming Chee Tsang, Daniel Richard L. Brown, Ravi Singh, Thomas Stiemerling
  • Patent number: 9629024
    Abstract: A system and method for disabling header compression during an establishment and configuration of a communication protocol and communication channel between a pair of correspondents. The system comprises an initiating correspondent transmitting at least one PPP negotiation packet having at least one acceptable TCP/IP header compression option type. A software module of a responding correspondent intercepts and examines said at least one PPP negotiation packet before said at least one PPP negotiation packet reaches a PPP layer of the responding correspondent and modifies said acceptable TCP/IP header compression option type to an unacceptable TCP/IP header compression option type and transmits same to said PPP layer of the responding correspondent. The responding correspondent rejects said unacceptable TCP/IP header compression option type.
    Type: Grant
    Filed: August 27, 2014
    Date of Patent: April 18, 2017
    Assignee: Certicom Corp.
    Inventors: Yuri Poeluev, Ronald G. Mercer
  • Patent number: 9621545
    Abstract: A system and method are provided for enabling a client device to connect to a network. The method comprises: obtaining an authorization code via a communication channel different from the network, the authorization code corresponding to the client device; and after detecting initiation of a security negotiation protocol by the client device, using the authorization code in at least one security negotiation operation.
    Type: Grant
    Filed: July 14, 2015
    Date of Patent: April 11, 2017
    Assignee: Certicom Corp.
    Inventors: Matthew John Campagna, Daniel Richard L. Brown, Gregory Marc Zaverucha
  • Patent number: 9615257
    Abstract: Methods, systems, and computer programs for trusted communication among mobile devices are described. In some aspects, an authentication value is generated at a first mobile device based on a message and a shared secret value stored on the first mobile device. In response to detecting proximity of a second mobile device, the message and the authentication value are wirelessly transmitted from the first mobile device to the second mobile device. In some implementations, the message and the authentication value can be wirelessly transmitted by a proximity-activated wireless interface, such as, for example, a Near Field Communication (NFC) interface.
    Type: Grant
    Filed: July 11, 2011
    Date of Patent: April 4, 2017
    Assignees: BlackBerry Limited, Certicom Corp.
    Inventors: Mihal Lazaridis, Mark E. Pecen, Scott Alexander Vanstone, Matthew John Campagna, Anthony Rosati
  • Publication number: 20170063534
    Abstract: Methods, systems, and computer programs for generating cryptographic function parameters are described. In some examples, source code that defines seed information and a pseudorandom function is accessed. A parameter for a cryptographic function by operation of one or more data processors is generated. The parameter is generated from the seed information and the pseudorandom function. The parameter has a larger size in memory than the source code that defines the seed information and the pseudorandom function.
    Type: Application
    Filed: April 20, 2015
    Publication date: March 2, 2017
    Applicant: Certicom Corp.
    Inventor: Daniel Richard L. Brown
  • Publication number: 20170063536
    Abstract: Methods, systems, and computer programs for generating cryptographic function parameters are described. In some examples, astronomical data from an observed astronomical event is obtained. A pseudorandom generator is seeded based on the astronomical data. After seeding the pseudorandom generator, an output from the pseudorandom generator is obtained. A parameter for a cryptographic function is generated by operation of one or more data processors. The parameter is generated from the output from the pseudorandom generator.
    Type: Application
    Filed: April 20, 2015
    Publication date: March 2, 2017
    Applicant: CERTICOM CORP.
    Inventor: Daniel Richard L. Brown
  • Publication number: 20170063535
    Abstract: Methods, systems, and computer programs for generating cryptographic function parameters are described. In some examples, a solution to a puzzle is obtained. A pseudorandom generator is seeded based on the solution. After seeding the pseudorandom generator, an output from the pseudorandom generator is obtained. A parameter for a cryptographic function is generated. The parameter is generated from the output from the pseudorandom generator.
    Type: Application
    Filed: April 20, 2015
    Publication date: March 2, 2017
    Applicant: CERTICOM CORP.
    Inventor: Daniel Richard L. Brown
  • Patent number: 9572016
    Abstract: Techniques for use in transferring an assignment of a secure chip of a wireless device from a current subscription manager (SM) of a current mobile network operator (MNO) to a new SM of a new MNO are described. In one illustrative example, the current SM receives a request for transferring the assignment and produces transfer permission data in response. The transfer permission data includes an identifier of the secure chip, an identifier of the current SM, and a digital signature of the current SM. The current SM then sends to the secure chip a transfer permission message which includes the transfer permission data. The transfer permission data indicates a permission for the secure chip to transfer the assignment from the current SM to the new SM. Additional techniques are performed by the secure chip, and the new SM, as described.
    Type: Grant
    Filed: October 23, 2015
    Date of Patent: February 14, 2017
    Assignees: BlackBerry Limited, Certicom Corp.
    Inventors: Jean-Philippe Paul Cormier, David Philip Hole, Nicholas James Russell, Daniel Francis O'Loughlin
  • Publication number: 20170012946
    Abstract: In some aspects, an encryption method comprises encrypting a first portion of a message using a first secret key. The first secret key is generated based on the public key of an entity. A one-way function is used to generate a second secret key from the first secret key, and the first secret key is subsequently discarded. A second portion of the message is encrypted using the second secret key. The encrypted first portion of the message and the encrypted second portion of the message are provided to the entity.
    Type: Application
    Filed: November 2, 2015
    Publication date: January 12, 2017
    Applicants: CERTICOM CORP., BLACKBERRY LIMITED
    Inventors: Robert John Lambert, Daniel Richard L. Brown, Atsushi Yamada
  • Patent number: 9503267
    Abstract: Methods, systems, and computer programs for generating a digital signature are disclosed. In some aspects, a symmetric key is accessed. The symmetric key is based on an ephemeral public key. The ephemeral public key is associated with an ephemeral private key. A ciphertext is generated based on the symmetric key and a message. An input value is obtained based on the ciphertext independent of a hash function. A digital signature is generated from the ephemeral private key, the input value, and a long term private key.
    Type: Grant
    Filed: December 28, 2011
    Date of Patent: November 22, 2016
    Assignee: Certicom Corp.
    Inventors: Daniel Richard L. Brown, Adrian Antipa
  • Patent number: 9497688
    Abstract: Methods, systems, and computer programs for managing mobile device applications are described. In some aspects, a mobile device application is prevented from accessing resources of a wireless network. For example, a wireless network operator system can determine that one or more mobile device applications are disapproved for use in the wireless network. In some implementations, the wireless network operator denies the disapproved mobile device applications access to the wireless network resources. In some implementations, mobile devices disable access to the wireless network by the disapproved mobile device applications.
    Type: Grant
    Filed: September 23, 2011
    Date of Patent: November 15, 2016
    Assignees: Certicom Corp., BlackBerry Limited
    Inventors: Mark Pecen, Niels Peter Skov Andersen, Shalini Suresh Periyalwar, Matthew Campagna
  • Patent number: 9490974
    Abstract: Devices and methods are provided for managing identity-based decryption of digital content. A message sender (“Alice”) uses a random key (Krand) to encrypt message content for a message recipient (“Bob”). Then Alice uses the public key of a message decryption service provider (“Carmen”) to generate a wrapped key ciphertext comprising the Krand and authentication information associated with Bob. Alice then sends a message text containing the encrypted message content and the wrapped key ciphertext to Bob, who in turn sends the wrapped key ciphertext to Carmen along with his authentication information. Carmen then uses her private key to process the wrapped key ciphertext to decrypt the Krand and Bob's authentication information. If the authentication information provided by Bob matches the decrypted authentication information, then Carmen sends the decrypted Krand to Bob, who uses it to decrypt the encrypted message content.
    Type: Grant
    Filed: March 29, 2012
    Date of Patent: November 8, 2016
    Assignee: Certicom Corp.
    Inventor: Daniel R. L. Brown
  • Patent number: 9485223
    Abstract: Trust between entities participating in an upgrade or enablement/disablement process is established and, to facilitate this remotely and securely, a highly tamper resistant point of trust in the system that is being produced is used. This point of trust enables a more efficient distribution system to be used. Through either a provisioning process or at later stages, i.e. subsequent to installation, manufacture, assembly, sale, etc.; the point of trust embodied as a feature controller on the device or system being modified is given a feature set (or updated feature set) that, when validated, is used to enable or disable entire features or to activate portions of the feature.
    Type: Grant
    Filed: December 12, 2008
    Date of Patent: November 1, 2016
    Assignee: Certicom Corp.
    Inventors: Michael Daskalopoulos, Ashok Vadekar, David Wong, William Lattin, Daniel O'Loughlin, David R. Sequino
  • Patent number: 9473309
    Abstract: A system for providing security services to a mobile device where the mobile device is in communication with a public network through a first network path that is subject to interference by a third party. The system includes a security server and a private network. The security server is operative to communicate with the mobile device through the private network. The security server is also operative to communicate with the public network through a second network path that is less susceptible to the interference by the third party than is the first network path. The security server communicates with the public network through the second network path to provide security services to the mobile device that are delivered over the private network.
    Type: Grant
    Filed: March 11, 2013
    Date of Patent: October 18, 2016
    Assignees: BlackBerry Limited, Certicom Corp.
    Inventors: Sean Alexander Courtney, Matthew John Campagna, George Ross Staikos, Alexander Truskovsky
  • Patent number: 9455832
    Abstract: A portion of the signed message in an ECPVS is kept truly confidential by dividing the message being signed into at least three parts, wherein one portion is visible, another portion is recoverable by any entity and carries the necessary redundancy for verification, and at least one additional portion is kept confidential. The additional portion is kept confidential by encrypting such portion using a key generated from information specific to that verifying entity. In this way, any entity with access to the signer's public key can verify the signature by checking for a specific characteristic, such as a certain amount of redundancy in the one recovered portion, but cannot recover the confidential portion, only the specific entity can do so. Message recovery is also provided in an elliptic curve signature using a modification of the well analyzed ECDSA signing equation instead of, e.g. the Schnorr equation used in traditional PV signature schemes.
    Type: Grant
    Filed: September 4, 2008
    Date of Patent: September 27, 2016
    Assignee: Certicom Corp.
    Inventors: Daniel R. Brown, Matthew J. Campagna, Marinus Struik, Scott A. Vanstone
  • Patent number: 9455830
    Abstract: A method of securing user credentials in a remote repository is provided. In accordance with one embodiment, there is provided a method comprising generating a first private key and a first public key pair from a registered password; generating a second private key and a second public key pair; generating a storage key from the second private key and the first public key; encrypting a set of credentials using the storage key; creating a encrypted credential signature from the encrypted set of credentials and the first private key; and storing the encrypted set of credentials, the encrypted credential signature, and the second public key in the remote repository.
    Type: Grant
    Filed: June 13, 2014
    Date of Patent: September 27, 2016
    Assignees: BlackBerry Limited, Certicom Corp.
    Inventors: Avinash Chidambaram, Matthew John Campagna
  • Publication number: 20160261417
    Abstract: Challenge-response authentication protocols are disclosed herein, including systems and methods for a first device to authenticate a second device. In one embodiment, the following operations are performed by the first device: (a) sending to the second device: (i) a challenge value corresponding to an expected response value known by the first device, and (ii) a hiding value; (b) receiving from the second device a masked response value; (c) obtaining an expected masked response value from the expected response value and the hiding value; and (d) determining whether the expected masked response value matches the masked response value received from the second device. The operations from the perspective of the second device are also disclosed, which in some embodiments include computing the masked response value using the challenge value, the hiding value, and secret information known to the second device.
    Type: Application
    Filed: May 18, 2016
    Publication date: September 8, 2016
    Applicant: Certicom Corp.
    Inventor: Robert John LAMBERT
  • Publication number: 20160248735
    Abstract: The invention provides a method of verifiable generation of public keys. According to the method, a self-signed signature is first generated and then used as input to the generation of a pair of private and public keys. Verification of the signature proves that the keys are generated from a key generation process utilizing the signature. A certification authority can validate and verify a public key generated from a verifiable key generation process.
    Type: Application
    Filed: January 11, 2016
    Publication date: August 25, 2016
    Applicant: Certicom Corp.
    Inventor: Daniel Richard L. Brown
  • Patent number: 9419983
    Abstract: A method of communicating in a secure communication system, comprises the steps of assembling a message at a sender, then determining a security level, and including an indication of the security level in a header of the message. The message is then sent to a recipient.
    Type: Grant
    Filed: October 7, 2015
    Date of Patent: August 16, 2016
    Assignee: Certicom Corp.
    Inventor: Marinus Struik
  • Patent number: 9413530
    Abstract: Systems and methods for secure communications are provided. In some aspects, a method of signalling an interception time period is described. At least one keying information used by a key management service (KMS) to regenerate a key is stored. A start_interception message is signaled from an administration function (ADMF) to a call session control function (CSCF). A halt_message is signaled from the ADMF to the CSCF.
    Type: Grant
    Filed: January 11, 2013
    Date of Patent: August 9, 2016
    Assignees: BlackBerry Limited, Certicom Corp.
    Inventors: Michael Eoin Buckley, Gregory Marc Zaverucha, Matthew John Campagna