Patents by Inventor Christopher L. Bender

Christopher L. Bender has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9015486
    Abstract: Systems, devices, and methods for outputting an alert on a mobile device to indicate the use of a weak hash function are disclosed herein. In one example embodiment, the method comprises receiving data (e.g. from a server) that identifies at least one first hash function, identifying a hash digest generated using a second hash function, determining if the second hash function is weak using the received data, and outputting an alert indicating that the second hash function is weak if it is determined that the second hash function is weak.
    Type: Grant
    Filed: September 10, 2012
    Date of Patent: April 21, 2015
    Assignee: BlackBerry Limited
    Inventors: Christopher L. Bender, Michael K. Brown, Michael S. Brown
  • Patent number: 8561083
    Abstract: As each application is loaded for use by an operating system, a message handling application within the operating system associates the applications with relativity metrics for later use in handling interprocess messages. A cryptographic identifier associated with each application is verified and, based on the verifying, each application is associated with a relativity metric. The message handling application receives a message from an origin process. The message handling application then determines a destination process for the message, a relativity metric for the origin process, and a relativity metric for the destination process. Based on an analysis of the relativity metrics of the origin process and the destination process, the message handling application determines whether to forward the message to the destination process.
    Type: Grant
    Filed: April 4, 2012
    Date of Patent: October 15, 2013
    Assignee: Blackberry Limited
    Inventors: Christopher L. Bender, Andrew Robert Turi
  • Publication number: 20130007454
    Abstract: Systems, devices, and methods for outputting an alert on a mobile device to indicate the use of a weak hash function are disclosed herein. In one example embodiment, the method comprises receiving data (e.g. from a server) that identifies at least one first hash function, identifying a hash digest generated using a second hash function, determining if the second hash function is weak using the received data, and outputting an alert indicating that the second hash function is weak if it is determined that the second hash function is weak.
    Type: Application
    Filed: September 10, 2012
    Publication date: January 3, 2013
    Applicant: RESEARCH IN MOTION LIMITED
    Inventors: Christopher L. Bender, Michael K. Brown, Michael S. Brown
  • Patent number: 8295486
    Abstract: Systems, devices, and methods for outputting an alert on a mobile device to indicate the use of a weak hash function are disclosed herein. In one example embodiment, the method comprises receiving data (e.g. from a server) that identifies at least one first hash function, identifying a hash digest generated using a second hash function, determining if the second hash function is weak using the received data, and outputting an alert indicating that the second hash function is weak if it is determined that the second hash function is weak.
    Type: Grant
    Filed: September 28, 2007
    Date of Patent: October 23, 2012
    Assignee: Research In Motion Limited
    Inventors: Christopher L. Bender, Michael K. Brown, Michael S. Brown
  • Publication number: 20120198474
    Abstract: As each application is loaded for use by an operating system, a message handling application within the operating system associates the applications with relativity metrics for later use in handling interprocess messages. A cryptographic identifier associated with each application is verified and, based on the verifying, each application is associated with a relativity metric. The message handling application receives a message from an origin process. The message handling application then determines a destination process for the message, a relativity metric for the origin process, and a relativity metric for the destination process. Based on an analysis of the relativity metrics of the origin process and the destination process, the message handling application determines whether to forward the message to the destination process.
    Type: Application
    Filed: April 4, 2012
    Publication date: August 2, 2012
    Applicant: RESEARCH IN MOTION LIMITED
    Inventors: Christopher L. Bender, Andrew Robert Turi
  • Patent number: 8166487
    Abstract: As each application is loaded for use by an operating system, a message handling application within the operating system associates the applications with relativity metrics for later use in handling interprocess messages. A cryptographic identifier associated with each application is verified and, based on the verifying, each application is associated with a relativity metric. The message handling application receives a message from an origin process. The message handling application then determines a destination process for the message, a relativity metric for the origin process, and a relativity metric for the destination process. Based on an analysis of the relativity metrics of the origin process and the destination process, the message handling application determines whether to forward the message to the destination process.
    Type: Grant
    Filed: October 1, 2007
    Date of Patent: April 24, 2012
    Assignee: Research In Motion Limited
    Inventors: Christopher L. Bender, Andrew Robert Turi
  • Publication number: 20090089584
    Abstract: Systems, devices, and methods for outputting an alert on a mobile device to indicate the use of a weak hash function are disclosed herein. In one example embodiment, the method comprises receiving data (e.g. from a server) that identifies at least one first hash function, identifying a hash digest generated using a second hash function, determining if the second hash function is weak using the received data, and outputting an alert indicating that the second hash function is weak if it is determined that the second hash function is weak.
    Type: Application
    Filed: September 28, 2007
    Publication date: April 2, 2009
    Applicant: RESEARCH IN MOTION LIMITED
    Inventors: Christopher L. Bender, Michael K. Brown, Michael S. Brown
  • Publication number: 20090089796
    Abstract: As each application is loaded for use by an operating system, a message handling application within the operating system associates the applications with relativity metrics for later use in handling interprocess messages. A cryptographic identifier associated with each application is verified and, based on the verifying, each application is associated with a relativity metric. The message handling application receives a message from an origin process. The message handling application then determines a destination process for the message, a relativity metric for the origin process, and a relativity metric for the destination process. Based on an analysis of the relativity metrics of the origin process and the destination process, the message handling application determines whether to forward the message to the destination process.
    Type: Application
    Filed: October 1, 2007
    Publication date: April 2, 2009
    Applicant: RESEARCH IN MOTION LIMITED
    Inventors: Christopher L. Bender, Andrew Robert Turi