Patents Represented by Attorney Dimock Stratton LLP
-
Patent number: 8347025Abstract: A memory controller interface, mobile device and method are provided. The memory controller interface can allow a processor designed and configured to operate with NOR flash and static random access memory SRAM devices to instead operate using NAND flash and synchronous dynamic random access memory SDRAM. The system accomplishes this by caching sectors out of NAND flash into SDRAM, where the data can be randomly accessed by the processor as though it were accessing data from NOR flash/SRAM. Sectors containing data required by the processor are read out of NAND flash and written into SDRAM, where the data can be randomly accessed by the processor. Boot code is stored in memory accessible to the processor and is read out of the memory for execution. The boot code is scanned for a predetermined signature, and if the predetermined signature is found, a portion of the memory is write-protected.Type: GrantFiled: November 22, 2011Date of Patent: January 1, 2013Assignee: Research In Motion LimitedInventors: Jerrold Richard Randell, Richard C. Madter, Karin Werder
-
Patent number: 8343310Abstract: A vessel-based system and method for disposing of wastewater including bilge water from a bilge of the vessel. The system including a treatment unit for receiving and treating the wastewater to produce a substantially oil-free treated water and, an evaporator for receiving the treated water from the treatment unit. In an embodiment, the evaporator having an evaporation element for transferring heat to the treated water to evaporate the treated water.Type: GrantFiled: October 3, 2007Date of Patent: January 1, 2013Inventors: Ian Fielding, John Moriarty
-
Patent number: 8335317Abstract: Improper re-use of a static Diffie-Hellman (DH) private key may leak information about the key. The leakage is prevented by a key derivation function (KDF), but standards do not agree on key derivation functions. The module for performing a DH private key operation must somehow support multiple different KDF standards. The present invention provides an intermediate approach that neither attempts to implement all possible KDF operations, nor provide unprotected access to the raw DH private key operation. Instead, the module performs parts of the KDF operation, as indicated by the application using the module. This saves the module from implementing the entire KDF for each KDF needed. Instead, the module implements only re-usable parts that are common to most KDFs. Furthermore, when new KDFs are required, the module may be able to support them if they built on the parts that the module has implemented.Type: GrantFiled: November 14, 2005Date of Patent: December 18, 2012Assignee: Certicom Corp.Inventors: Scott A. Vanstone, Robert P. Gallant, Daniel R. L. Brown
-
Patent number: 8332935Abstract: A smart card, system, and method for securely authorizing a user or user device using the smart card is provided. The smart card is configured to provide, upon initialization or a request for authentication, a public key to the user input device such that the PIN or password entered by the user is encrypted before transmission to the smart card via a smart card reader. The smart card then decrypts the PIN or password to authorize the user. Preferably, the smart card is configured to provide both a public key and a nonce to the user input device, which then encrypts a concatenation or other combination of the nonce and the user-input PIN or password before transmission to the smart card. The smart card reader thus never receives a copy of the PIN or password in the clear, allowing the smart card to be used with untrusted smart card readers.Type: GrantFiled: June 7, 2010Date of Patent: December 11, 2012Assignee: Research In Motion LimitedInventors: Michael K. Brown, Neil P. Adams, Herbert A. Little
-
Patent number: 8280048Abstract: A method of inhibiting the disclosure of confidential information through power analysis attacks on processors in cryptographic systems. The method masks a cryptographic operation using a generator G. A secret value, which may be combined with the generator G to form a secret generator is generated. The secret value is divided into a plurality of parts. A random value is generated for association with the plurality of parts. Each of the plurality of parts is combined with the random value to derive a plurality of new values such that the new values when combined are equivalent to the secret value. Each of the new values is used in the cryptographic operation, thereby using the secret generator in place of the generator G in the cryptographic operation. The introduction of randomness facilitates the introduction of noise into algorithms used by cryptographic systems so as to mask the secret value and provide protection against power analysis attacks.Type: GrantFiled: June 30, 2009Date of Patent: October 2, 2012Assignee: Certicom Corp.Inventor: Robert J. Lambert
-
Patent number: 8280047Abstract: A data processing device and method adapted for key management are provided. A first encryption key associated with a first password is generated, and at least a further encryption key associated with a further password is generated. Generation of the encryption key may use the associated password, a key seed, and a current key. The first encryption key and further encryption key or keys are stored in memory, and are used to encrypt and decrypt separate sets of data. Different keys and potentially different levels of encryption are thus used to protect different sets of data at the device.Type: GrantFiled: January 25, 2010Date of Patent: October 2, 2012Assignee: Research In Motion LimitedInventor: Jerrold R. Randell
-
Patent number: 8244818Abstract: There is disclosed a system and method for visually representing the probability of SPAM messages on a mobile communication device. In an embodiment, the method comprises: obtaining a probability that a message is SPAM; and for each of one or more messages in a message list, visually representing the probability that a message is SPAM such that any differences in the probabilities as between messages are discernable from the visual representation. In another embodiment, the method further comprises: determining the percentage of the message downloaded to the mobile communication device; and displaying for each of one or more messages appearing in the message list an object or icon visually representing at least one of the probability that the message is SPAM, or the percentage of the message downloaded to the mobile communication device.Type: GrantFiled: May 28, 2010Date of Patent: August 14, 2012Assignee: Research In Motion LimitedInventors: Daryl Martin, John F. Wilson, Christopher D. O'Keefe
-
Patent number: 8230025Abstract: There is disclosed a system and method for delivering a message to a communication device. In an embodiment, the method comprises obtaining a probability that the message is spam; in dependence upon the probability that the message is spam, determining a variable message size; and sending the message to the communication device in dependence upon the determined variable message size. In an embodiment, the method further comprises receiving a user response whether the message is spam; and if the message is verified as being spam, then filtering the message from the communication device.Type: GrantFiled: September 20, 2007Date of Patent: July 24, 2012Assignee: Research In Motion LimitedInventors: Daryl Martin, John F. Wilson, Christopher O'Keefe
-
Patent number: 8204521Abstract: A system and method are provided for communicating calendar appointment acknowledgements to a sender from a recipient device, in particular a mobile communication device capable of receiving SMS messages. The sender creates a calendar object comprising calendar event data, designates a recipient, and selects a transport method for delivering the calendar event data. If the transport method is SMS, then a calendar object message in plaintext SMS format is prepared, comprising a unique identifier, and transmitted to the recipient. The recipient's mobile communication device receives the SMS message and parses the message to extract the calendar event data, and transmits an acknowledgement to the sender including the unique identifier.Type: GrantFiled: July 27, 2007Date of Patent: June 19, 2012Inventors: Michael Thomas Hardy, Darrell May, Catherine Michelle Coode
-
Patent number: 8189772Abstract: A method of performing a cryptographic operation on a point in an elliptic curve cryptosystem using an elliptic curve. The method comprises the steps of obtaining information that uniquely identifies the elliptic curve and performing computations on the point to obtain the result of the cryptographic operation. The computations use the information. The computations produce an incorrect result if the point is not on the elliptic curve.Type: GrantFiled: July 14, 2010Date of Patent: May 29, 2012Assignee: Certicom Corp.Inventors: Scott Alexander Vanstone, Daniel Richard L. Brown
-
Patent number: 8191105Abstract: A system and method for handling secure-format messages includes a message server that receives secure-format messages from senders and operates in conjunction with a secure message handler to detect and prevent the delivery of invalid secure-format messages. When a secure-format message is determined to be invalid, the secure message handler may take one or more of the following actions: replace the body of the invalid message with a template message, send a message to the sender of the invalid message indicating the message was rejected, delete the invalid message from the recipient's mailbox, or log the message on the message server and mark it for review. Additionally, the handling of invalid messages is configurable. In particular, the actions to take and the conditions under which those actions are to be taken may be specified by an administrator.Type: GrantFiled: November 18, 2005Date of Patent: May 29, 2012Assignee: Research In Motion LimitedInventors: Neil P. Adams, David V. MacFarlane, Ian Robertson
-
Patent number: 8186128Abstract: Multi-storey ICF building having concrete walls poured into insulated concrete forms with adjustments mounted between floors and an outside foam layer and guides for an inside for layer. ICF buildings can be constructed with greater than three stories and masonry or stucco exteriors without the use of supplementary forms.Type: GrantFiled: March 9, 2005Date of Patent: May 29, 2012Inventor: Alven J. Way
-
Patent number: 8184806Abstract: Tables are defined to permit output masking for table look-ups to be carried out to resist power analysis attacks on cryptographic operations. A set of individually defined random values is used to mask each entry in a substitution table, defining a masked substitution table. A mask table is also defined such that the values of each entry, masked with the corresponding random value, is the value of a fixed mask. The masked substitution tables and the mask tables may be used in cryptographic operations to permit the output of table look-ups to be masked, without directly using the fixed mask value in the computations of the cryptographic operations.Type: GrantFiled: October 25, 2010Date of Patent: May 22, 2012Assignee: Research In Motion LimitedInventor: Catherine Helen Gebotys
-
Patent number: 8180841Abstract: To perform thread-based message prioritization, metadata may be extracted from a received electronic message. Based on the extracted message metadata and accumulated metadata extracted from previously received messages, a message thread to which the received electronic message belongs may be identified. Based on a set of thread priority assessment criteria, a priority level for the message thread may be determined. At least part of the message thread may be processed according to the priority level. The processing may be altering a notification behavior of an electronic messaging client for electronic messages of the message thread. Thread priority assessment may be based on user-configurable criteria that may be set via a graphical user interface. Message thread identification may also be based on user-configurable criteria that may be set via a graphical user interface.Type: GrantFiled: June 23, 2010Date of Patent: May 15, 2012Assignee: Research In Motion LimitedInventors: Michael Thomas Hardy, Piotr Konrad Tysowski, Atif Khan
-
Patent number: 8169324Abstract: A system is provided of tracking objects loaded into a receptacle, where the receptacle defines a chamber having an open side for receiving the objects and has a perimeter about the open side. The system comprises a radio frequency identification antenna spaced from the receptacle and attached to the perimeter about the open side, and a radio frequency identification reader attached to the receptacle for receiving a signal from the antenna. The system further comprises a control unit attached to the receptacle communicating with the reader for processing the signal from the antenna.Type: GrantFiled: May 20, 2009Date of Patent: May 1, 2012Inventors: James Kuzniar, Malcolm Cole
-
Patent number: 8151309Abstract: A system for redistributing a multiple input audio/video and data signals having a redistributing device equipped to receive signals in a multiple formats and redistribute a selected signal to a user's premises over conductors, preferably existing twisted-pair telephone wire. The redistributing device is in interactive communication with a communications interface located in the user's premises which receives user-input control signals and contains switching circuitry which routes the selected signal to the user's premises where it is received by the receiving unit such as a television receiver. A single redistributing device services an entire multi-user network from a common distribution point, and services multiple users independently. The system of the invention does not interfere with normal use of the telephone network, so users can interactively access services provided by the system and use the telephone at the same time.Type: GrantFiled: October 30, 2007Date of Patent: April 3, 2012Assignee: North Vu Inc.Inventor: Ross A. Jeffery
-
Patent number: 8144866Abstract: A system and method which protects a data processing system against encryption key errors by providing redundant encryption keys stored in different locations, and providing the software with the ability to select an alternate redundant key if there is any possibility that the encryption key being used may be corrupted. In the preferred embodiment, a memory control module in the data processing device is configured to accommodate the storage of multiple (for example up to four or more) independent password/key pairs, and the control module duplicates a password key at the time of creation. The redundant passwords and encryption keys are forced into different memory slots for later retrieval if necessary. The probability of redundant keys being corrupted simultaneously is infinitesimal, so the system and method of the invention ensures that there is always an uncorrupted encryption key available.Type: GrantFiled: January 25, 2010Date of Patent: March 27, 2012Assignee: Research In Motion LimitedInventor: Jerrold R. Randell
-
Patent number: D656205Type: GrantFiled: September 20, 2010Date of Patent: March 20, 2012Inventor: Brad Scott
-
Patent number: D664741Type: GrantFiled: October 18, 2010Date of Patent: August 7, 2012Inventor: Brad Scott
-
Patent number: D673534Type: GrantFiled: March 5, 2012Date of Patent: January 1, 2013Assignee: NorthVu Systems Inc.Inventors: Kevin Bailey, Patrick Williams