Patents by Inventor Gregory Marc Zaverucha

Gregory Marc Zaverucha has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9083509
    Abstract: The present disclosure relates to systems and methods for secure communications. In some aspects, one or more values used to generate an encryption key used to encrypt a packet are stored in a header of the packet. The packet is transmitted with the encrypted data portion in a communication. In some aspects, one or more values used to generate an encryption key are received. The encryption key is regenerated using the one or more values.
    Type: Grant
    Filed: January 11, 2013
    Date of Patent: July 14, 2015
    Assignees: BlackBerry Limited, Certicom Corp.
    Inventors: Michael Eoin Buckley, Gregory Marc Zaverucha, Matthew John Campagna
  • Patent number: 9065642
    Abstract: In some implementations, a method for providing a session key to a third party includes identifying a private key associated with a public key certificate in response to an event. A session key for a communication session is based, at least in part, on the private key, an associated seed for a random number generator, and public keys assigned to user equipment participating in the communication session. The private key associated with the public key certificate is automatically transmitted to an interception authority. The interception authorities are configured to grant a third party access to the private key and the associated seed to in response to a request from a third party authorized to access the communication session.
    Type: Grant
    Filed: April 27, 2012
    Date of Patent: June 23, 2015
    Assignee: Certicom Corp.
    Inventors: Gregory Marc Zaverucha, Matthew John Campagna
  • Patent number: 9049022
    Abstract: Methods, systems, and computer programs for producing hash values are disclosed. A prefix-free value is obtained based on input data. The prefix-free value can be based on an implicit certificate, a message to be signed, a message to be verified, or other suitable information. A hash value is obtained by applying a hash function to the prefix-free value. The hash value is used in a cryptographic scheme. In some instances, a public key or a private key is generated based on the hash value. In some instances, a digital signature is generated based on the hash value, or a digital signature is verified based on the hash value, as appropriate.
    Type: Grant
    Filed: April 27, 2012
    Date of Patent: June 2, 2015
    Assignee: Certicom Corp.
    Inventors: Gregory Marc Zaverucha, David William Kravitz
  • Patent number: 8995656
    Abstract: Methods, systems, and computer programs for producing hash values are disclosed. A first hash value is obtained by applying a first hash function to a first input. The first input can be based on an implicit certificate, a message to be signed, a message to be verified, or other suitable information. A second hash value is obtained by applying a second hash function to a second input. The second input is based on the first hash value. The second hash value is used in a cryptographic scheme. In some instances, a public key or a private key is generated based on the second hash value. In some instances, a digital signature is generated based on the second hash value, or a digital signature is verified based on the second hash value, as appropriate.
    Type: Grant
    Filed: April 27, 2012
    Date of Patent: March 31, 2015
    Assignee: Certicom Corp.
    Inventors: Gregory Marc Zaverucha, David William Kravitz
  • Patent number: 8996855
    Abstract: A client application, when executed by a processor, is operative to create a HyperText Transfer Protocol (HTTP) request containing a target header that includes a confidential value. The HTTP request is to be sent over a Secure Sockets Layer (SSL) 3.0 connection or a Transport Layer Security (TLS) 1.0 connection to a web server. The client application implements at its HTTP layer a countermeasure to a blockwise chosen-boundary attack. The client application generates an additional header having a header name that is not recognizable by the web server and inserts the additional header into the HTTP request ahead of the target header, thus creating a modified HTTP request. The modified HTTP request is to be sent, instead of the unmodified HTTP request, over the SSL 3.0 connection or the TLS 1.0 connection to the web server.
    Type: Grant
    Filed: November 14, 2012
    Date of Patent: March 31, 2015
    Assignees: BlackBerry Limited, Certicom Corp.
    Inventors: Alexander Sherkin, Gregory Marc Zaverucha, Alexander Truskovsky, Michael Matovsky, Osman Zohaib Arfeen
  • Publication number: 20140372765
    Abstract: Methods, systems, and computer programs for producing hash values are disclosed. A prefix-free value is obtained based on input data. The prefix-free value can be based on an implicit certificate, a message to be signed, a message to be verified, or other suitable information. A hash value is obtained by applying a hash function to the prefix-free value. The hash value is used in a cryptographic scheme. In some instances, a public key or a private key is generated based on the hash value. In some instances, a digital signature is generated based on the hash value, or a digital signature is verified based on the hash value, as appropriate.
    Type: Application
    Filed: September 4, 2014
    Publication date: December 18, 2014
    Inventors: Gregory Marc Zaverucha, David William Kravitz
  • Patent number: 8850199
    Abstract: Methods, systems, and computer programs for producing hash values are disclosed. A prefix-free value is obtained based on input data. The prefix-free value can be based on an implicit certificate, a message to be signed, a message to be verified, or other suitable information. A hash value is obtained by applying a hash function to the prefix-free value. The hash value is used in a cryptographic scheme. In some instances, a public key or a private key is generated based on the hash value. In some instances, a digital signature is generated based on the hash value, or a digital signature is verified based on the hash value, as appropriate.
    Type: Grant
    Filed: April 27, 2012
    Date of Patent: September 30, 2014
    Assignee: Certicom Corp.
    Inventors: Gregory Marc Zaverucha, David William Kravitz
  • Patent number: 8745376
    Abstract: Methods, systems, and computer programs for verifying a digital signature are disclosed. The verifier accesses an implicit certificate and a digital signature provided by the signer. The implicit certificate includes a first elliptic curve point representing a public key reconstruction value of the signer. The verifier accesses a second elliptic curve point representing a pre-computed multiple of the certificate authority's public key. The verifier uses the first elliptic curve point and the second elliptic curve point to verify the digital signature. The verifier may also use a third elliptic curve point representing a pre-computed multiple of a generator point. Verifying the digital signature may provide verification that the implicit certificate is valid.
    Type: Grant
    Filed: October 14, 2011
    Date of Patent: June 3, 2014
    Assignee: Certicom Corp.
    Inventor: Gregory Marc Zaverucha
  • Publication number: 20140146964
    Abstract: A computer-implemented authenticated encryption method for converting a plaintext message into a ciphertext message. The method includes dividing the plaintext message into at least two working blocks, each working block having a mathematical relationship to the plaintext message. For each working block, a working block ciphertext is computed as a function of such working block, a deterministic working block initialization vector, and a deterministic working block encryption key. For each working block, a message authentication tag is computed as a function of a deterministic working block message authentication key and at least one of (a) the working block ciphertext computed for such working block and an indication corresponding to the mathematical relationship of such working block to the plaintext message and (b) such working block.
    Type: Application
    Filed: March 11, 2013
    Publication date: May 29, 2014
    Applicants: CERTICOM CORP., RESEARCH IN MOTION LIMITED
    Inventors: Atsushi Yamada, Gregory Marc Zaverucha
  • Publication number: 20140136834
    Abstract: A client application, when executed by a processor, is operative to create a HyperText Transfer Protocol (HTTP) request containing a target header that includes a confidential value. The HTTP request is to be sent over a Secure Sockets Layer (SSL) 3.0 connection or a Transport Layer Security (TLS) 1.0 connection to a web server. The client application implements at its HTTP layer a countermeasure to a blockwise chosen-boundary attack. The client application generates an additional header having a header name that is not recognizable by the web server and inserts the additional header into the HTTP request ahead of the target header, thus creating a modified HTTP request. The modified HTTP request is to be sent, instead of the unmodified HTTP request, over the SSL 3.0 connection or the TLS 1.0 connection to the web server.
    Type: Application
    Filed: November 14, 2012
    Publication date: May 15, 2014
    Applicants: CERTICOM CORP., RESEARCH IN MOTION LIMITED
    Inventors: Alexander SHERKIN, Gregory Marc ZAVERUCHA, Alexander TRUSKOVSKY, Michael MATOVSKY, Osman Zohaib ARFEEN
  • Patent number: 8688977
    Abstract: Methods, systems, and computer programs for validating a batch of implicit certificates are described. Data for a batch of implicit certificates are received and validated. In some aspect, the data include key-pair-validation values that can be used to validate the public and private keys for each implicit certificate. For example, the key-pair-validation values can include a private key, a public key reconstruction value, a public key of the certificate authority, and a hash of the implicit certificate. The key-pair-validation values are either valid or invalid according to a key-pair-validation function. In some cases, modification values are obtained independent of the key-pair-validation values, and the modification values are combined with the key-pair-validation values in a batch-validation function. The batch-validation function is evaluated for the batch of implicit certificates.
    Type: Grant
    Filed: April 17, 2012
    Date of Patent: April 1, 2014
    Assignee: Certicom Corp.
    Inventor: Gregory Marc Zaverucha
  • Publication number: 20130343542
    Abstract: Methods and devices for establishing trust on first use for close proximity communications are disclosed. An example method includes receiving a public key from a device via a close proximity communications connection, obtaining, via a user interface, an indication that the device is trusted, and storing at least one of the public key or an identifier for the device.
    Type: Application
    Filed: December 14, 2012
    Publication date: December 26, 2013
    Applicant: Certicom Corp.
    Inventors: Anthony Rosati, Matthew John Campagna, Gregory Marc Zaverucha
  • Publication number: 20130287207
    Abstract: Methods, systems, and computer programs for producing hash values are disclosed. A first hash value is obtained by applying a first hash function to a first input. The first input can be based on an implicit certificate, a message to be signed, a message to be verified, or other suitable information. A second hash value is obtained by applying a second hash function to a second input. The second input is based on the first hash value. The second hash value is used in a cryptographic scheme. In some instances, a public key or a private key is generated based on the second hash value. In some instances, a digital signature is generated based on the second hash value, or a digital signature is verified based on the second hash value, as appropriate.
    Type: Application
    Filed: April 27, 2012
    Publication date: October 31, 2013
    Applicant: Certicom Corp.
    Inventors: Gregory Marc Zaverucha, David William Kravitz
  • Publication number: 20130290713
    Abstract: Methods, systems, and computer programs for producing hash values are disclosed. A prefix-free value is obtained based on input data. The prefix-free value can be based on an implicit certificate, a message to be signed, a message to be verified, or other suitable information. A hash value is obtained by applying a hash function to the prefix-free value. The hash value is used in a cryptographic scheme. In some instances, a public key or a private key is generated based on the hash value. In some instances, a digital signature is generated based on the hash value, or a digital signature is verified based on the hash value, as appropriate.
    Type: Application
    Filed: April 27, 2012
    Publication date: October 31, 2013
    Applicant: Certicom Corp.
    Inventors: Gregory Marc Zaverucha, David William Kravitz
  • Publication number: 20130290712
    Abstract: Methods, systems, and computer programs for producing hash values are disclosed. A prefix-free value is obtained based on input data. The prefix-free value can be based on an implicit certificate, a message to be signed, a message to be verified, or other suitable information. A hash value is obtained by applying a hash function to the prefix-free value. The hash value is used in a cryptographic scheme. In some instances, a public key or a private key is generated based on the hash value. In some instances, a digital signature is generated based on the hash value, or a digital signature is verified based on the hash value, as appropriate.
    Type: Application
    Filed: April 27, 2012
    Publication date: October 31, 2013
    Applicant: Certicom Corp.
    Inventors: Gregory Marc Zaverucha, David William Kravitz
  • Publication number: 20130246798
    Abstract: There is provided a method for secure communications. The method comprises receiving a transmission comprising a signature of a broadcast message at a communication device, and verifying the signature using a certificate.
    Type: Application
    Filed: March 8, 2013
    Publication date: September 19, 2013
    Applicants: RESEARCH IN MOTION LIMITED
    Inventors: Michael Eoin Buckley, Matthew John Campagna, Gregory Marc Zaverucha
  • Publication number: 20130246785
    Abstract: There is provided a method for secure communications. The method comprises obtaining a broadcast message, computing a signature for said broadcast message using a private key, and sending a transmission to a communication device. The private key is associated with a certificate and the transmission comprises the signature.
    Type: Application
    Filed: March 8, 2013
    Publication date: September 19, 2013
    Applicants: Research In Motion Limited
    Inventors: Michael Eoin Buckley, Matthew John Campagna, Gregory Marc Zaverucha
  • Publication number: 20130236019
    Abstract: In some implementations, a method for providing a session key to a third party includes identifying a private key associated with a public key certificate in response to an event. A session key for a communication session is based, at least in part, on the private key, an associated seed for a random number generator, and public keys assigned to user equipment participating in the communication session. The private key associated with the public key certificate is automatically transmitted to an interception authority. The interception authorities are configured to grant a third party access to the private key and the associated seed to in response to a request from a third party authorized to access the communication session.
    Type: Application
    Filed: April 27, 2012
    Publication date: September 12, 2013
    Inventors: Gregory Marc Zaverucha, Matthew John Campagna
  • Publication number: 20130232554
    Abstract: A system and method are provided for enabling a client device to connect to a network. The method comprises: obtaining an authorization code via a communication channel different from the network, the authorization code corresponding to the client device; and after detecting initiation of a security negotiation protocol by the client device, using the authorization code in at least one security negotiation operation.
    Type: Application
    Filed: January 15, 2013
    Publication date: September 5, 2013
    Applicant: CERTICOM CORP.
    Inventors: Matthew John CAMPAGNA, Daniel Richard L. BROWN, Gregory Marc ZAVERUCHA
  • Publication number: 20130097420
    Abstract: Methods, systems, and computer programs for verifying a digital signature are disclosed. The verifier accesses an implicit certificate and a digital signature provided by the signer. The implicit certificate includes a first elliptic curve point representing a public key reconstruction value of the signer. The verifier accesses a second elliptic curve point representing a pre-computed multiple of the certificate authority's public key. The verifier uses the first elliptic curve point and the second elliptic curve point to verify the digital signature. The verifier may also use a third elliptic curve point representing a pre-computed multiple of a generator point. Verifying the digital signature may provide verification that the implicit certificate is valid.
    Type: Application
    Filed: October 14, 2011
    Publication date: April 18, 2013
    Applicant: Certicom Corp.
    Inventor: Gregory Marc Zaverucha