Patents by Inventor Dinah Davis

Dinah Davis has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20070006279
    Abstract: An active new password entry dialog provides a compact visual indication of adherence to password policies. A visual indication of progress towards meeting all applicable password policies is included in the display and updated as new password characters are being entered. A visual hint associated with at least one applicable password policy that has not yet been satisfied is also included in the display. An ability to obtain more detailed comprehensive password policy information is also permitted upon user command (e.g., including an indication whether each password policy has yet been met or unmet). Preferably the displayed hint and associated applicable password policy not yet satisfied is randomly changed during entry of a new password (e.g., upon the entry of each new password character).
    Type: Application
    Filed: July 1, 2005
    Publication date: January 4, 2007
    Applicant: Research in Motion Limited
    Inventors: Michael Brown, Michael Brown, Neil Adams, Herbert Little, Michael McCallum, Dinah Davis
  • Publication number: 20060224892
    Abstract: A cryptographic key is used to secure a communication link between a first device and a second device. Generating the cryptographic key is accomplished by a) generating a first cryptographic key, b) generating a second cryptographic key, c) applying a hash function to packets transmitted over the communication link to create a hash result, and d) applying the hash function to the first cryptographic key, the second cryptographic key and the hash result.
    Type: Application
    Filed: April 4, 2005
    Publication date: October 5, 2006
    Inventors: Michael Brown, Herb Little, Michael Brown, Neil Adams, Michael McCallum, Dinah Davis
  • Publication number: 20060218397
    Abstract: A system includes a server, a first client device to communicate in an authenticated and secured manner with the server over a first communication link, and a second client device to communicate in an authenticated and secured manner with the first client device over a second communication link. The first client device is to cause the server and the second client device to share cryptography information. The cryptography information may then be used to secure a third communication link between the server and the second client device that does not include the first client device.
    Type: Application
    Filed: March 22, 2005
    Publication date: September 28, 2006
    Inventors: Michael Brown, Michael Brown, Neil Adams, Herb Little, Dinah Davis
  • Publication number: 20050251680
    Abstract: A method for secure bidirectional communication between two systems is described. A first key pair and a second key pair are generated, the latter including a second public key that is generated based upon a shared secret. First and second public keys are sent to a second system, and third and fourth public keys are received from the second system. The fourth public key is generated based upon the shared secret. A master key for encrypting messages is calculated based upon a first private key, a second private key, the third public key and the fourth public key. For re-keying, a new second key pair having a new second public key and a new second private key is generated, and a new fourth public key is received. A new master key is calculated using elliptic curve calculations using the new second private key and the new fourth public key.
    Type: Application
    Filed: April 29, 2005
    Publication date: November 10, 2005
    Inventors: Michael Brown, Herbert Little, David MacFarlane, Michael Brown, Dinah Davis
  • Publication number: 20050243619
    Abstract: Authentication of two devices in communication with a third device is achieved where the first and second devices each possess a shared secret value. The authentication includes communication of authentication values from the first device to the second device using the third device. Similarly, there is communication of values from the second device to the first device using the third device. The third device retains the communicated values. The values are calculated to permit the third device to authenticate the first and second devices without the third device receiving the shared secret value. The authentication may be used to establish a communications channel between the first and the second devices.
    Type: Application
    Filed: April 30, 2004
    Publication date: November 3, 2005
    Inventors: Michael Brown, Herbert Little, Dinah Davis