Patents by Inventor Chang-Fung Yang
Chang-Fung Yang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11954203Abstract: Methods and devices for determining whether a mobile device has been compromised. The mobile device has a managed portion of memory and an unmanaged portion of memory, a managed profile and an unmanaged profile, and the managed profile includes files stored in the managed portion of memory and the unmanaged profile includes files stored in the unmanaged portion of memory. The managed profile is governed by a device policy set by a remote administrator. File tree structure information for the unmanaged profile of the mobile device is obtained that details at least a portion of a tree-based structure of folders and files in the unmanaged portion of memory. It is determined from the file tree structure information that the mobile device has been compromised and, based on that determination, an action is taken.Type: GrantFiled: February 1, 2023Date of Patent: April 9, 2024Assignee: BlackBerry LimitedInventors: Chang Fung Yang, Robert Joseph Lombardi, Chi Hing Ng, Johnathan George White
-
Publication number: 20240015186Abstract: A method of establishing a secure communication channel between a first communication device and a second communication device. The secure communication channel is defined by one or more algorithm options and the one or more algorithm options are associated with one of one or more option categories. The method includes receiving a signal representing one or more selections. The method further includes, for the respective option categories, generating a sorted list of algorithm options based on the received selections and generating a security association proposal including one or more of the algorithm options from the respective sorted lists of algorithm options. The security association proposal is generated based on an order in the sorted list of algorithm options. The method further includes transmitting the security association proposal to the second communication device for establishing the secure communication channel.Type: ApplicationFiled: July 12, 2023Publication date: January 11, 2024Applicant: MALIKIE INNOVATIONS LIMITEDInventors: Chang Fung YANG, Jason Songbo XU
-
Patent number: 11743300Abstract: A method of establishing a secure communication channel between a first communication device and a second communication device. The secure communication channel is defined by one or more algorithm options and the one or more algorithm options are associated with one of one or more option categories. The method includes receiving a signal representing one or more selections. The method further includes, for the respective option categories, generating a sorted list of algorithm options based on the received selections and generating a security association proposal including one or more of the algorithm options from the respective sorted lists of algorithm options. The security association proposal is generated based on an order in the sorted list of algorithm options. The method further includes transmitting the security association proposal to the second communication device for establishing the secure communication channel.Type: GrantFiled: October 14, 2021Date of Patent: August 29, 2023Assignee: BlackBerry LimitedInventors: Chang Fung Yang, Jason Songbo Xu
-
Publication number: 20230224307Abstract: Methods and devices for determining whether a mobile device has been compromised. File tree structure information for the mobile device is obtained that details at least a portion of a tree-based structure of folders and files in a portion of memory. The file tree structure information is analyzed to determine that the mobile device has been compromised, has not been compromised, or might be compromised. Based on determining that the mobile device might be compromised, the mobile device is instructed to execute a restricted action. If the restricted action occurs on the mobile device then it is determined that the mobile device has been compromised. Based on that determination, an action is taken.Type: ApplicationFiled: March 14, 2023Publication date: July 13, 2023Applicant: BlackBerry LimitedInventors: Chang Fung YANG, Robert Joseph LOMBARDI, Chi Hing NG, Johnathan George WHITE
-
Publication number: 20230185914Abstract: Methods and devices for determining whether a mobile device has been compromised. The mobile device has a managed portion of memory and an unmanaged portion of memory, a managed profile and an unmanaged profile, and the managed profile includes files stored in the managed portion of memory and the unmanaged profile includes files stored in the unmanaged portion of memory. The managed profile is governed by a device policy set by a remote administrator. File tree structure information for the unmanaged profile of the mobile device is obtained that details at least a portion of a tree-based structure of folders and files in the unmanaged portion of memory. It is determined from the file tree structure information that the mobile device has been compromised and, based on that determination, an action is taken.Type: ApplicationFiled: February 1, 2023Publication date: June 15, 2023Applicant: BlackBerry LimitedInventors: Chang Fung YANG, Robert Joseph LOMBARDI, Chi Hing NG, Johnathan George WHITE
-
Patent number: 11645402Abstract: Methods and devices for determining whether a computing device has been compromised. File tree structure information for the computing device is obtained that details at least a portion of a tree-based structure of folders and files in a memory on the computing device. It is then determined from the file tree structure information that the computing device is compromised and, based on the determination that the computing device has been compromised, an action is taken.Type: GrantFiled: August 15, 2019Date of Patent: May 9, 2023Assignee: BlackBerry LimitedInventors: Chang Fung Yang, Chi Hing Ng, Robert Joseph Lombardi, Johnathan George White
-
Patent number: 11632377Abstract: Methods and devices for determining whether a mobile device has been compromised. File tree structure information for the mobile device is obtained that details at least a portion of a tree-based structure of folders and files in a portion of memory. The file tree structure information is analyzed to determine that the mobile device has been compromised, has not been compromised, or might be compromised. Based on determining that the mobile device might be compromised, the mobile device is instructed to execute a restricted action. If the restricted action occurs on the mobile device then it is determined that the mobile device has been compromised. Based on that determination, an action is taken.Type: GrantFiled: August 15, 2019Date of Patent: April 18, 2023Assignee: BlackBerry LimitedInventors: Chang Fung Yang, Robert Joseph Lombardi, Chi Hing Ng, Johnathan George White
-
Patent number: 11599639Abstract: Methods and devices for determining whether a mobile device has been compromised. The mobile device has a managed portion of memory and an unmanaged portion of memory, a managed profile and an unmanaged profile, and the managed profile includes files stored in the managed portion of memory and the unmanaged profile includes files stored in the unmanaged portion of memory. The managed profile is governed by a device policy set by a remote administrator. File tree structure information for the unmanaged profile of the mobile device is obtained that details at least a portion of a tree-based structure of folders and files in the unmanaged portion of memory. It is determined from the file tree structure information that the mobile device has been compromised and, based on that determination, an action is taken.Type: GrantFiled: August 15, 2019Date of Patent: March 7, 2023Assignee: BlackBerry LimitedInventors: Chang Fung Yang, Robert Joseph Lombardi, Chi Hing Ng, Johnathan George White
-
Patent number: 11343258Abstract: Methods and devices for determining whether a mobile device has been compromised. The mobile device has a managed portion of memory and an unmanaged portion of memory, a managed profile and an unmanaged profile, and the managed profile includes files stored in the managed portion of memory and the unmanaged profile includes files stored in the unmanaged portion of memory. The managed profile is governed by a device policy set by a remote administrator. File tree structure information for the managed profile of the mobile device is obtained that details at least a portion of a tree-based structure of folders and files in the managed portion of memory. It is determined from the file tree structure information that the mobile device has been compromised and, based on that determination, an action is taken.Type: GrantFiled: August 15, 2019Date of Patent: May 24, 2022Assignee: BlackBerry LimitedInventors: Chang Fung Yang, Robert Joseph Lombardi, Chi Hing Ng, Johnathan George White
-
Publication number: 20220038508Abstract: A method of establishing a secure communication channel between a first communication device and a second communication device. The secure communication channel is defined by one or more algorithm options and the one or more algorithm options are associated with one of one or more option categories. The method includes receiving a signal representing one or more selections. The method further includes, for the respective option categories, generating a sorted list of algorithm options based on the received selections and generating a security association proposal including one or more of the algorithm options from the respective sorted lists of algorithm options. The security association proposal is generated based on an order in the sorted list of algorithm options. The method further includes transmitting the security association proposal to the second communication device for establishing the secure communication channel.Type: ApplicationFiled: October 14, 2021Publication date: February 3, 2022Applicant: BlackBerry LimitedInventors: Chang Fung YANG, Jason Songbo XU
-
Patent number: 11178190Abstract: A method of establishing a secure communication channel between a first communication device and a second communication device. The secure communication channel is defined by one or more algorithm options and the one or more algorithm options are associated with one of one or more option categories. The method includes receiving a signal representing one or more selections. The method further includes, for the respective option categories, generating a sorted list of algorithm options based on the received selections and generating a security association proposal including one or more of the algorithm options from the respective sorted lists of algorithm options. The security association proposal is generated based on an order in the sorted list of algorithm options. The method further includes transmitting the security association proposal to the second communication device for establishing the secure communication channel.Type: GrantFiled: November 6, 2018Date of Patent: November 16, 2021Assignee: BlackBerry LimitedInventors: Chang Fung Yang, Jason Songbo Xu
-
Publication number: 20210051158Abstract: Methods and devices for determining whether a mobile device has been compromised. File tree structure information for the mobile device is obtained that details at least a portion of a tree-based structure of folders and files in a portion of memory. The file tree structure information is analyzed to determine that the mobile device has been compromised, has not been compromised, or might be compromised. Based on determining that the mobile device might be compromised, the mobile device is instructed to execute a restricted action. If the restricted action occurs on the mobile device then it is determined that the mobile device has been compromised. Based on that determination, an action is taken.Type: ApplicationFiled: August 15, 2019Publication date: February 18, 2021Applicant: BlackBerry LimitedInventors: Chang Fung YANG, Robert Joseph LOMBARDI, Chi Hing NG, Johnathan George WHITE
-
Publication number: 20210049287Abstract: Methods and devices for determining whether a computing device has been compromised. File tree structure information for the computing device is obtained that details at least a portion of a tree-based structure of folders and files in a memory on the computing device. It is then determined from the file tree structure information that the computing device is compromised and, based on the determination that the computing device has been compromised, an action is taken.Type: ApplicationFiled: August 15, 2019Publication date: February 18, 2021Applicant: BlackBerry LimitedInventors: Chang Fung YANG, Chi Hing NG, Robert Joseph LOMBARDI, Johnathan George WHITE
-
Publication number: 20210049273Abstract: Methods and devices for determining whether a mobile device has been compromised. The mobile device has a managed portion of memory and an unmanaged portion of memory, a managed profile and an unmanaged profile, and the managed profile includes files stored in the managed portion of memory and the unmanaged profile includes files stored in the unmanaged portion of memory. The managed profile is governed by a device policy set by a remote administrator. File tree structure information for the unmanaged profile of the mobile device is obtained that details at least a portion of a tree-based structure of folders and files in the unmanaged portion of memory. It is determined from the file tree structure information that the mobile device has been compromised and, based on that determination, an action is taken.Type: ApplicationFiled: August 15, 2019Publication date: February 18, 2021Applicant: BlackBerry LimitedInventors: Chang Fung YANG, Robert Joseph LOMBARDI, Chi Hing NG, Johnathan George WHITE
-
Publication number: 20210051156Abstract: Methods and devices for determining whether a mobile device has been compromised. The mobile device has a managed portion of memory and an unmanaged portion of memory, a managed profile and an unmanaged profile, and the managed profile includes files stored in the managed portion of memory and the unmanaged profile includes files stored in the unmanaged portion of memory. The managed profile is governed by a device policy set by a remote administrator. File tree structure information for the managed profile of the mobile device is obtained that details at least a portion of a tree-based structure of folders and files in the managed portion of memory.Type: ApplicationFiled: August 15, 2019Publication date: February 18, 2021Applicant: BlackBerry LimitedInventors: Chang Fung YANG, Robert Joseph LOMBARDI, Chi Hing NG, Johnathan George WHITE
-
Publication number: 20200145464Abstract: A method of establishing a secure communication channel between a first communication device and a second communication device. The secure communication channel is defined by one or more algorithm options and the one or more algorithm options are associated with one of one or more option categories. The method includes receiving a signal representing one or more selections. The method further includes, for the respective option categories, generating a sorted list of algorithm options based on the received selections and generating a security association proposal including one or more of the algorithm options from the respective sorted lists of algorithm options. The security association proposal is generated based on an order in the sorted list of algorithm options. The method further includes transmitting the security association proposal to the second communication device for establishing the secure communication channel.Type: ApplicationFiled: November 6, 2018Publication date: May 7, 2020Applicant: BlackBerry LimitedInventors: Chang Fung YANG, Jason Songbo XU
-
Patent number: 10270603Abstract: Systems, methods, and software can be used to process certificate validation warnings. In some aspect, a connection to a Virtual Private Network (VPN) server is initiated at an electronic device. The VPN server is associated with a VPN profile. In response to initiating the connection, a certificate associated with the VPN server is received at the electronic device. A validation warning associated with the certificate is received. A fingerprint of the certificate is generated. A validation action is selected based on the validation warning, the fingerprint, and the VPN profile. The selected validation action is executed.Type: GrantFiled: March 17, 2016Date of Patent: April 23, 2019Assignee: BlackBerry LimitedInventors: Chang Fung Yang, Robert Marcel Dugal, Jason Songbo Xu
-
Patent number: 10149166Abstract: Systems, methods, and software can be used to verify a certificate. In some aspects, a request to connect to a Virtual Private Network (VPN) server is received from an application on a mobile device. A certificate of the VPN server is obtained at the mobile device. A device-level certificate verification for the certificate is performed. Whether an application-level certificate verification is provisioned for the application is determined. In response to determining that the application-level certification verification is provisioned, the application-level certificate verification for the certificate is performed. In response to verifying that the certificate passes the application-level certificate verification, the mobile device is connected to the VPN server.Type: GrantFiled: January 14, 2016Date of Patent: December 4, 2018Assignee: BlackBerry LimitedInventors: Elliott Michael Guy Mazzuca, Chang Fung Yang, Jason Songbo Xu, Chi Chiu Tse
-
Publication number: 20170272256Abstract: Systems, methods, and software can be used to process certificate validation warnings. In some aspect, a connection to a Virtual Private Network (VPN) server is initiated at an electronic device. The VPN server is associated with a VPN profile. In response to initiating the connection, a certificate associated with the VPN server is received at the electronic device. A validation warning associated with the certificate is received. A fingerprint of the certificate is generated. A validation action is selected based on the validation warning, the fingerprint, and the VPN profile. The selected validation action is executed.Type: ApplicationFiled: March 17, 2016Publication date: September 21, 2017Applicant: BlackBerry LimitedInventors: Chang Fung YANG, Robert Marcel DUGAL, Jason Songbo XU
-
Publication number: 20170208469Abstract: Systems, methods, and software can be used to verify a certificate. In some aspects, a request to connect to a Virtual Private Network (VPN) server is received from an application on a mobile device. A certificate of the VPN server is obtained at the mobile device. A device-level certificate verification for the certificate is performed. Whether an application-level certificate verification is provisioned for the application is determined. In response to determining that the application-level certification verification is provisioned, the application-level certificate verification for the certificate is performed. In response to verifying that the certificate passes the application-level certificate verification, the mobile device is connected to the VPN server.Type: ApplicationFiled: January 14, 2016Publication date: July 20, 2017Applicant: BlackBerry LimitedInventors: Elliott Michael Guy MAZZUCA, Chang Fung YANG, Jason Songbo XU, Chi Chiu TSE