Patents by Inventor Michael Eoin Buckley
Michael Eoin Buckley has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20180198600Abstract: A method for encryption in a wireless communication system includes encrypting, at a base station, data of a physical layer control channel using at least one of a control channel type, a radio resource aggregation level of the control channel, a radio resource index of the control channel, or a subcarrier frequency of the control channel; and transmitting the encrypted data to a user equipment (UE), where the UE is in a cell of the base station.Type: ApplicationFiled: January 6, 2017Publication date: July 12, 2018Applicant: BlackBerry LimitedInventors: Michael Eoin BUCKLEY, Shu-Lin CHEN, Claude Jean-Frederic ARZELIER
-
Publication number: 20180109389Abstract: There is provided a method for secure communications. The method includes a computing device receiving a notification comprising a message, a counter value, a signature signed by a signer and based on the message and the counter value, and an indication of the signer. The device obtains a current counter value based on an identity of the signer, checks the signature and compares the counter value with the current counter value; and, if the counter comparison and the signature checking is successful, accepting the message.Type: ApplicationFiled: December 14, 2017Publication date: April 19, 2018Applicants: BlackBerry Limited, Certicom Corp.Inventors: Michael Eoin BUCKLEY, Robert John LAMBERT, Nevine Maurice Nassif EBEID
-
Patent number: 9913236Abstract: A method and UE for registering with a third network node using IMS, the method creating a tunnel; authenticating a first public identity associated with the UE to the first network node; receiving configuration information with a second private identifier and a second public user identifier, and registering with a third network node using the second private identifier and the second public user identifier. Further, a method and first network node configured for authentication between a UE and a third network node using IMS, the method establishing a tunnel; authenticating a first public identity of the UE; receiving a configuration information message from the UE including a network identifier for a network the UE is registered on; obtaining, from a second network node, a second private identifier and second public user identifier; and providing the second private identifier and second public user identifier to the UE.Type: GrantFiled: August 25, 2016Date of Patent: March 6, 2018Assignee: BlackBerry LimitedInventors: Andrew Michael Allen, Adrian Buckley, Michael Eoin Buckley
-
Patent number: 9876618Abstract: A system and method for transmitting uplink channels for a plurality of uplink component carriers(UL CCs). Based upon a total transmit power exceeding a maximum allowed power, a transmit power is reduced for uplink channel transmissions that comprise Uplink Channel Information (UCI); and transmit power is not reduced for one or more other uplink channels that do not include comprise Uplink Channel Information (UCI). The uplink channel transmissions and the one or more other uplink channels are simultaneously transmitted in multiple uplink (UL) component carriers (CCs).Type: GrantFiled: February 8, 2016Date of Patent: January 23, 2018Assignee: BlackBerry LimitedInventors: Youn Hyoung Heo, Mo-Han Fong, Michael Eoin Buckley, Andrew Mark Earnshaw, Zhijun Cai
-
Patent number: 9871827Abstract: The present disclosure relates to systems and methods for secure communications. In some aspects, a method of signalling an interception time period is described. At least one keying information used by a KMF to regenerate a key is stored. A start_interception message is signaled from an ADMF to a CSCF. A halt_message is signaled from the ADMF to the CSCF.Type: GrantFiled: August 1, 2016Date of Patent: January 16, 2018Assignees: BlackBerry Limited, Certicom Corp.Inventors: Matthew John Campagnan, Gregory Marc Zaverucha, Michael Eoin Buckley
-
Patent number: 9866396Abstract: There is provided a method for secure communications. The method includes a computing device receiving a notification comprising a message, a counter value, a signature signed by a signer and based on the message and the counter value, and an indication of the signer. The device obtains a current counter value based on an identity of the signer, checks the signature and compares the counter value with the current counter value; and, if the counter comparison and the signature checking is successful, accepting the message.Type: GrantFiled: July 29, 2016Date of Patent: January 9, 2018Assignee: BlackBerry Limited and Certicom Corp.Inventors: Michael Eoin Buckley, Robert John Lambert, Nevine Maurice Nassif Ebeid
-
Patent number: 9860266Abstract: Systems, methods, and software can be used to prevent messaging attacks. In some aspects, a scanning short message is sent to a UICC associated with a mobile device. A response short message is received in response to the scanning short message. The UICC is determined to be at risk to attacks based on the response short message. In response to determining that the UICC is at risk to attacks, a notification is generated. In some cases, the notification is sent to a DMS. Alternatively or in combination, the notification is displayed on the mobile device. In response to determining that the UICC is at risk to attacks, a firewall application is installed on the mobile device. The firewall application is configured to process an incoming short message addressed to the UICC.Type: GrantFiled: October 26, 2015Date of Patent: January 2, 2018Assignee: BlackBerry LimitedInventors: Shu-Lin Chen, Michael Eoin Buckley, Shirook M. Ali, Paritosh Anthwal
-
Publication number: 20170302639Abstract: Systems, methods, and software can be used to share content. In some aspects, a message is received at an electronic device from a sender. A first type 0 short message service (SMS) message is sent, from the electronic device to the sender. The first type 0 SMS message indicates an authentication request for the message. A second type 0 SMS message is received at the electronic device. The second type 0 SMS message indicates that the message is authenticated.Type: ApplicationFiled: April 18, 2016Publication date: October 19, 2017Applicant: BlackBerry LimitedInventors: Shu-Lin CHEN, Reguina BOUIANOVSKAIA, Michael Eoin BUCKLEY
-
Publication number: 20170303133Abstract: Systems, methods, and software can be used to share content. In some aspect, an electronic device selects a base station to camp on. A first message is sent from the electronic device to the base station. The first message is addressed to a server and requests the server to send a second message to the electronic device. Whether the electronic device receives the second message from the base station within a threshold time period after the first message is sent is determined. The electronic device determines that the base station has a security risk based at least in part on whether the second message is received within the threshold time period.Type: ApplicationFiled: April 18, 2016Publication date: October 19, 2017Applicant: BlackBerry LimitedInventors: Michael Eoin BUCKLEY, Shu-Lin CHEN
-
Patent number: 9749031Abstract: A system that incorporates teachings of the subject disclosure may include, for example, accessing a group of de-coupling data stored in a memory of a communication device where the group of de-coupling data is mapped to corresponding use cases associated with the communication device, selecting de-coupling data from among the group of de-coupling data according to a determined use case of the communication device, generating a pre-distortion signal according to the selected de-coupling data, combining the pre-distortion signal with RF signals to generate pre-distorted RF signals, and transmitting the pre-distorted RF signals via a multi-port antenna of the communication device. Other embodiments are disclosed.Type: GrantFiled: April 8, 2015Date of Patent: August 29, 2017Assignee: BLACKBERRY LIMITEDInventors: Shirook M. H. Ali, Michael Eoin Buckley, Anmol Bhardwaj
-
Publication number: 20170134444Abstract: The present disclosure describes methods and systems for establishing a Session Initiation Protocol Session. One method includes transmitting a first message requesting authentication configuration information; in response to the first message, receiving a second message that includes the authentication configuration information; transmitting a third message that includes authentication information based upon the received authentication configuration information; receiving an authentication challenge request that is formatted according to the second protocol; and in response to receiving the authentication challenge request, transmitting an authentication response to the second network node.Type: ApplicationFiled: January 25, 2017Publication date: May 11, 2017Applicant: BlackBerry LimitedInventors: Adrian BUCKLEY, Andrew Michael ALLEN, Michael Eoin BUCKLEY
-
Publication number: 20170118238Abstract: Systems, methods, and software can be used to prevent messaging attacks. In some aspects, a scanning short message is sent to a UICC associated with a mobile device. A response short message is received in response to the scanning short message. The UICC is determined to be at risk to attacks based on the response short message. In response to determining that the UICC is at risk to attacks, a notification is generated. In some cases, the notification is sent to a DMS. Alternatively or in combination, the notification is displayed on the mobile device. In response to determining that the UICC is at risk to attacks, a firewall application is installed on the mobile device. The firewall application is configured to process an incoming short message addressed to the UICC.Type: ApplicationFiled: October 26, 2015Publication date: April 27, 2017Applicant: BlackBerry LimitedInventors: Shu-Lin Chen, Michael Eoin Buckley, Shirook M. Ali, Paritosh Anthwal
-
Publication number: 20170118229Abstract: Systems, methods, and software can be used to detect malicious applications. In some aspects, an outgoing short message sent from a mobile device is monitored. Based on the monitoring, whether a UICC associated with the mobile device is infected is determined. In response to determining that the UICC is infected, a notification is generated.Type: ApplicationFiled: October 26, 2015Publication date: April 27, 2017Applicant: BLACKBERRY LIMITEDInventors: Shu-Lin Chen, Michael Eoin Buckley
-
Patent number: 9622160Abstract: Some aspects of what is described here relate to systems, devices, and computer-implemented methods for capturing data related to a mobile device in a wireless network. In one example, a method may include receiving, at a first mobile device, data capture configuration information from a wireless network. The data capture configuration information indicates a target mobile device from which data is to be captured during group communication between the first mobile device and the target mobile device. Thereafter, in response to detecting a group communication between the first mobile device and the target mobile device, a data element is stored in a local memory of the first mobile device. The data element includes information from the group communication between the first mobile device and the target mobile device. The data element is sent to the wireless network.Type: GrantFiled: September 30, 2015Date of Patent: April 11, 2017Assignee: BlackBerry LimitedInventors: Claude Jean-Frederic Arzelier, Michael Eoin Buckley, Takashi Suzuki
-
Publication number: 20170086047Abstract: A method for receiving public warning system (PWS) data includes receiving, at a user equipment (UE), a public warning system (PWS) message. The UE determines that the PWS message is a type 2 PWS message. The type 2 PWS message indicates that type 2 PWS data is delivered using a type 2 PWS data delivery mechanism. The type 2 PWS data is received using the type 2 PWS data delivery mechanism.Type: ApplicationFiled: September 22, 2015Publication date: March 23, 2017Applicant: BlackBerry LimitedInventors: Adrian Buckley, Michael Eoin Buckley, Shu-Lin Chen
-
Publication number: 20170034681Abstract: A method, device and a computer program product operable in a communications network to provide enhanced public warning system (PWS+) messages to a communication device over the current PWS system is disclosed. The method includes generating, at a server or network device, at least one public warning system (PWS) message and at least one enhanced PWS (PWS+) message, and associating the PWS+ message with the at least one PWS message. The at least one PWS+ message and the PWS message are transmitted via a communications network to the communication device.Type: ApplicationFiled: July 29, 2015Publication date: February 2, 2017Inventors: John David NETTO, Shu-Lin CHEN, Michael Eoin BUCKLEY
-
Publication number: 20170013022Abstract: A method is presented for secure communication, the method including generating a signature using a private key, a nonce, and at least one of an identifier and a key component; and transmitting the signature, the nonce, a security parameter, and the at least one of the identifier and the key component, wherein the security parameter associates a user identity with a public key, the public key being associated with the private key.Type: ApplicationFiled: September 22, 2016Publication date: January 12, 2017Inventors: Michael Eoin BUCKLEY, Michael Charles HOLLATZ, Robert John LAMBERT, Nevine Maurice Nassif EBEID
-
Publication number: 20170006571Abstract: A method and UE for registering with a third network node using IMS, the method creating a tunnel; authenticating a first public identity associated with the UE to the first network node; receiving configuration information with a second private identifier and a second public user identifier, and registering with a third network node using the second private identifier and the second public user identifier. Further, a method and first network node configured for authentication between a UE and a third network node using IMS, the method establishing a tunnel; authenticating a first public identity of the UE; receiving a configuration information message from the UE including a network identifier for a network the UE is registered on; obtaining, from a second network node, a second private identifier and second public user identifier; and providing the second private identifier and second public user identifier to the UE.Type: ApplicationFiled: August 25, 2016Publication date: January 5, 2017Applicant: BlackBerry LimitedInventors: Andrew Michael ALLEN, Adrian BUCKLEY, Michael Eoin BUCKLEY
-
Publication number: 20160360474Abstract: Some aspects of what is described here relate to systems, devices, and computer-implemented methods for capturing data related to a mobile device in a wireless network. In one example, a method may include receiving, at a first mobile device, data capture configuration information from a wireless network. The data capture configuration information indicates a target mobile device from which data is to be captured during group communication between the first mobile device and the target mobile device. Thereafter, in response to detecting a group communication between the first mobile device and the target mobile device, a data element is stored in a local memory of the first mobile device. The data element includes information from the group communication between the first mobile device and the target mobile device. The data element is sent to the wireless network.Type: ApplicationFiled: September 30, 2015Publication date: December 8, 2016Applicant: BlackBerry LimitedInventors: Claude Jean-Frederic Arzelier, Michael Eoin Buckley, Takashi Suzuki
-
Publication number: 20160344775Abstract: The present disclosure relates to systems and methods for secure communications. In some aspects, a method of signalling an interception time period is described. At least one keying information used by a KMF to regenerate a key is stored. A start_interception message is signaled from an ADMF to a CSCF. A halt_message is signaled from the ADMF to the CSCF.Type: ApplicationFiled: August 1, 2016Publication date: November 24, 2016Inventors: Matthew John Campagna, Gregory Marc Zaverucha, Michael Eoin Buckley