Patents by Inventor CERTICOM CORP.

CERTICOM CORP. has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20130318342
    Abstract: The invention relates to a method of generating an implicit certificate and a method of generating a private key from a public key. The method involves a method generating an implicit certificate in three phases. The public key may be an entity's identity or derived from an entity's identify. Only the owner of the public key possesses complete information to generate the corresponding private key. No authority is required to nor able to generate an entity's private key.
    Type: Application
    Filed: May 3, 2013
    Publication date: November 28, 2013
    Applicant: Certicom Corp.
    Inventor: Certicom Corp.
  • Publication number: 20130227277
    Abstract: There are disclosed systems and methods for creating a self-signed implicit certificate. In one embodiment, the self-signed implicit certificate is generated and operated upon using transformations of a nature similar to the transformations used in the ECQV protocol. In such a system, a root CA or other computing device avoids having to generate an explicit self-signed certificate by instead generating a self-signed implicit certificate.
    Type: Application
    Filed: April 4, 2013
    Publication date: August 29, 2013
    Applicant: Certicom Corp.
    Inventor: Certicom Corp.
  • Publication number: 20130222160
    Abstract: An entropy decoder and method for decoding code words with an indication of associated probability for each code word. The decoder can be operable to receive code words and the indication of associated probability. A branch node block can be in communication with a leaf node block. The branch node block comprising one or more branch node lookup tables and branch node control logic. The branch node control logic operable to process a code word in the input buffer using a selected table from the one or more branch node lookup tables to obtain leaf node information and a bit count of a code word size, the branch control logic further operable to refresh the input buffer to replace the bit count of the code word size and to make the leaf node information and the table selection available to the leaf node block.
    Type: Application
    Filed: April 9, 2013
    Publication date: August 29, 2013
    Applicant: Certicom Corp.
    Inventor: Certicom Corp.
  • Publication number: 20130182843
    Abstract: The present disclosure relates to systems and methods for secure communications. In some aspects, one or more values used to generate an encryption key used to encrypt a packet are stored in a header of the packet. The packet is transmitted with the encrypted data portion in a communication. In some aspects, one or more values used to generate an encryption key are received. The encryption key is regenerated using the one or more values.
    Type: Application
    Filed: January 11, 2013
    Publication date: July 18, 2013
    Applicants: CERTICOM CORP., RESEARCH IN MOTION LIMITED
    Inventors: RESEARCH IN MOTION LIMITED, CERTICOM CORP.
  • Publication number: 20130182840
    Abstract: The present disclosure relates to systems and methods for secure communications. In some aspects, a method of signalling an interception time period is described. At least one keying information used by a KMF to regenerate a key is stored. A start_interception message is signaled from an ADMF to a CSCF. A halt_message is signaled from the ADMF to the CSCF.
    Type: Application
    Filed: January 11, 2013
    Publication date: July 18, 2013
    Applicants: Certicom Corp., Research In Motion Limited
    Inventors: Research In Motion Limited, Certicom Corp.
  • Publication number: 20130182841
    Abstract: The present disclosure relates to systems and methods for secure communications. In some aspects, an initiator KMS receives, from an initiator UE, one or more values used in generation of an encryption key, which includes obtaining at least one value associated with a RANDRi. The initiator KMS sends the at least one value associated with the RANDRi to a responder KMS. The responder KMS generates the encryption key using the one or more values.
    Type: Application
    Filed: January 11, 2013
    Publication date: July 18, 2013
    Applicants: CERTICOM CORP., RESEARCH IN MOTION LIMITED
    Inventors: Research In Motion Limited, Certicom Corp.
  • Publication number: 20130170642
    Abstract: An elliptic curve random number generator avoids escrow keys by choosing a point Q on the elliptic curve as verifiably random. An arbitrary string is chosen and a hash of that string computed. The hash is then converted to a field element of the desired field, the field element regarded as the x-coordinate of a point Q on the elliptic curve and the x-coordinate is tested for validity on the desired elliptic curve. If valid, the x-coordinate is decompressed to the point Q, wherein the choice of which is the two points is also derived from the hash value. Intentional use of escrow keys can provide for back up functionality. The relationship between P and Q is used as an escrow key and stored by for a security domain. The administrator logs the output of the generator to reconstruct the random number with the escrow key.
    Type: Application
    Filed: February 19, 2013
    Publication date: July 4, 2013
    Applicant: CERTICOM CORP.
    Inventor: CERTICOM CORP.
  • Publication number: 20130152213
    Abstract: A device and method are provided for a device that communicates security information to a user entering content into the device. In an aspect, the device may access content from a server over a connection through the network. The device displays the content on a user interface of the device. The device detects information entered into a field of the displayed content and evaluates a security state of the device. If the security state is below a security threshold and, if the entered information is identified as protected information based on stored criteria, the device displaying a visual indication on the user interface.
    Type: Application
    Filed: February 4, 2013
    Publication date: June 13, 2013
    Applicants: CERTICOM CORP., RESEARCH IN MOTION LIMITED
    Inventors: Research In Motion Limited, Certicom Corp.
  • Publication number: 20130145168
    Abstract: A method for creating and authenticating a digital signature is provided, including selecting a first session parameter k and generating a first short term public key derived from the session parameter k, computing a first signature component r derived from a first mathematical function using the short term public key, selecting a second session parameter t and computing a second signature component s derived from a second mathematical function using the second session parameter t and without using an inverse operation, computing a third signature component using the first and second session parameters and sending the signature components (s, r, c) as a masked digital signature to a receiver computer system. In the receiver computer system, a recovered second signature component s? is computed by combining a third signature component with the second signature component to derive signature components (s?, r) as an unmasked digital signature.
    Type: Application
    Filed: December 28, 2012
    Publication date: June 6, 2013
    Applicant: CERTICOM CORP.
    Inventor: CERTICOM CORP.