Patents by Inventor Gregory Marc Zaverucha
Gregory Marc Zaverucha has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9083509Abstract: The present disclosure relates to systems and methods for secure communications. In some aspects, one or more values used to generate an encryption key used to encrypt a packet are stored in a header of the packet. The packet is transmitted with the encrypted data portion in a communication. In some aspects, one or more values used to generate an encryption key are received. The encryption key is regenerated using the one or more values.Type: GrantFiled: January 11, 2013Date of Patent: July 14, 2015Assignees: BlackBerry Limited, Certicom Corp.Inventors: Michael Eoin Buckley, Gregory Marc Zaverucha, Matthew John Campagna
-
Patent number: 9065642Abstract: In some implementations, a method for providing a session key to a third party includes identifying a private key associated with a public key certificate in response to an event. A session key for a communication session is based, at least in part, on the private key, an associated seed for a random number generator, and public keys assigned to user equipment participating in the communication session. The private key associated with the public key certificate is automatically transmitted to an interception authority. The interception authorities are configured to grant a third party access to the private key and the associated seed to in response to a request from a third party authorized to access the communication session.Type: GrantFiled: April 27, 2012Date of Patent: June 23, 2015Assignee: Certicom Corp.Inventors: Gregory Marc Zaverucha, Matthew John Campagna
-
Patent number: 9049022Abstract: Methods, systems, and computer programs for producing hash values are disclosed. A prefix-free value is obtained based on input data. The prefix-free value can be based on an implicit certificate, a message to be signed, a message to be verified, or other suitable information. A hash value is obtained by applying a hash function to the prefix-free value. The hash value is used in a cryptographic scheme. In some instances, a public key or a private key is generated based on the hash value. In some instances, a digital signature is generated based on the hash value, or a digital signature is verified based on the hash value, as appropriate.Type: GrantFiled: April 27, 2012Date of Patent: June 2, 2015Assignee: Certicom Corp.Inventors: Gregory Marc Zaverucha, David William Kravitz
-
Patent number: 8995656Abstract: Methods, systems, and computer programs for producing hash values are disclosed. A first hash value is obtained by applying a first hash function to a first input. The first input can be based on an implicit certificate, a message to be signed, a message to be verified, or other suitable information. A second hash value is obtained by applying a second hash function to a second input. The second input is based on the first hash value. The second hash value is used in a cryptographic scheme. In some instances, a public key or a private key is generated based on the second hash value. In some instances, a digital signature is generated based on the second hash value, or a digital signature is verified based on the second hash value, as appropriate.Type: GrantFiled: April 27, 2012Date of Patent: March 31, 2015Assignee: Certicom Corp.Inventors: Gregory Marc Zaverucha, David William Kravitz
-
Patent number: 8996855Abstract: A client application, when executed by a processor, is operative to create a HyperText Transfer Protocol (HTTP) request containing a target header that includes a confidential value. The HTTP request is to be sent over a Secure Sockets Layer (SSL) 3.0 connection or a Transport Layer Security (TLS) 1.0 connection to a web server. The client application implements at its HTTP layer a countermeasure to a blockwise chosen-boundary attack. The client application generates an additional header having a header name that is not recognizable by the web server and inserts the additional header into the HTTP request ahead of the target header, thus creating a modified HTTP request. The modified HTTP request is to be sent, instead of the unmodified HTTP request, over the SSL 3.0 connection or the TLS 1.0 connection to the web server.Type: GrantFiled: November 14, 2012Date of Patent: March 31, 2015Assignees: BlackBerry Limited, Certicom Corp.Inventors: Alexander Sherkin, Gregory Marc Zaverucha, Alexander Truskovsky, Michael Matovsky, Osman Zohaib Arfeen
-
Publication number: 20140372765Abstract: Methods, systems, and computer programs for producing hash values are disclosed. A prefix-free value is obtained based on input data. The prefix-free value can be based on an implicit certificate, a message to be signed, a message to be verified, or other suitable information. A hash value is obtained by applying a hash function to the prefix-free value. The hash value is used in a cryptographic scheme. In some instances, a public key or a private key is generated based on the hash value. In some instances, a digital signature is generated based on the hash value, or a digital signature is verified based on the hash value, as appropriate.Type: ApplicationFiled: September 4, 2014Publication date: December 18, 2014Inventors: Gregory Marc Zaverucha, David William Kravitz
-
Patent number: 8850199Abstract: Methods, systems, and computer programs for producing hash values are disclosed. A prefix-free value is obtained based on input data. The prefix-free value can be based on an implicit certificate, a message to be signed, a message to be verified, or other suitable information. A hash value is obtained by applying a hash function to the prefix-free value. The hash value is used in a cryptographic scheme. In some instances, a public key or a private key is generated based on the hash value. In some instances, a digital signature is generated based on the hash value, or a digital signature is verified based on the hash value, as appropriate.Type: GrantFiled: April 27, 2012Date of Patent: September 30, 2014Assignee: Certicom Corp.Inventors: Gregory Marc Zaverucha, David William Kravitz
-
Patent number: 8745376Abstract: Methods, systems, and computer programs for verifying a digital signature are disclosed. The verifier accesses an implicit certificate and a digital signature provided by the signer. The implicit certificate includes a first elliptic curve point representing a public key reconstruction value of the signer. The verifier accesses a second elliptic curve point representing a pre-computed multiple of the certificate authority's public key. The verifier uses the first elliptic curve point and the second elliptic curve point to verify the digital signature. The verifier may also use a third elliptic curve point representing a pre-computed multiple of a generator point. Verifying the digital signature may provide verification that the implicit certificate is valid.Type: GrantFiled: October 14, 2011Date of Patent: June 3, 2014Assignee: Certicom Corp.Inventor: Gregory Marc Zaverucha
-
Publication number: 20140146964Abstract: A computer-implemented authenticated encryption method for converting a plaintext message into a ciphertext message. The method includes dividing the plaintext message into at least two working blocks, each working block having a mathematical relationship to the plaintext message. For each working block, a working block ciphertext is computed as a function of such working block, a deterministic working block initialization vector, and a deterministic working block encryption key. For each working block, a message authentication tag is computed as a function of a deterministic working block message authentication key and at least one of (a) the working block ciphertext computed for such working block and an indication corresponding to the mathematical relationship of such working block to the plaintext message and (b) such working block.Type: ApplicationFiled: March 11, 2013Publication date: May 29, 2014Applicants: CERTICOM CORP., RESEARCH IN MOTION LIMITEDInventors: Atsushi Yamada, Gregory Marc Zaverucha
-
Publication number: 20140136834Abstract: A client application, when executed by a processor, is operative to create a HyperText Transfer Protocol (HTTP) request containing a target header that includes a confidential value. The HTTP request is to be sent over a Secure Sockets Layer (SSL) 3.0 connection or a Transport Layer Security (TLS) 1.0 connection to a web server. The client application implements at its HTTP layer a countermeasure to a blockwise chosen-boundary attack. The client application generates an additional header having a header name that is not recognizable by the web server and inserts the additional header into the HTTP request ahead of the target header, thus creating a modified HTTP request. The modified HTTP request is to be sent, instead of the unmodified HTTP request, over the SSL 3.0 connection or the TLS 1.0 connection to the web server.Type: ApplicationFiled: November 14, 2012Publication date: May 15, 2014Applicants: CERTICOM CORP., RESEARCH IN MOTION LIMITEDInventors: Alexander SHERKIN, Gregory Marc ZAVERUCHA, Alexander TRUSKOVSKY, Michael MATOVSKY, Osman Zohaib ARFEEN
-
Patent number: 8688977Abstract: Methods, systems, and computer programs for validating a batch of implicit certificates are described. Data for a batch of implicit certificates are received and validated. In some aspect, the data include key-pair-validation values that can be used to validate the public and private keys for each implicit certificate. For example, the key-pair-validation values can include a private key, a public key reconstruction value, a public key of the certificate authority, and a hash of the implicit certificate. The key-pair-validation values are either valid or invalid according to a key-pair-validation function. In some cases, modification values are obtained independent of the key-pair-validation values, and the modification values are combined with the key-pair-validation values in a batch-validation function. The batch-validation function is evaluated for the batch of implicit certificates.Type: GrantFiled: April 17, 2012Date of Patent: April 1, 2014Assignee: Certicom Corp.Inventor: Gregory Marc Zaverucha
-
Publication number: 20130343542Abstract: Methods and devices for establishing trust on first use for close proximity communications are disclosed. An example method includes receiving a public key from a device via a close proximity communications connection, obtaining, via a user interface, an indication that the device is trusted, and storing at least one of the public key or an identifier for the device.Type: ApplicationFiled: December 14, 2012Publication date: December 26, 2013Applicant: Certicom Corp.Inventors: Anthony Rosati, Matthew John Campagna, Gregory Marc Zaverucha
-
Publication number: 20130287207Abstract: Methods, systems, and computer programs for producing hash values are disclosed. A first hash value is obtained by applying a first hash function to a first input. The first input can be based on an implicit certificate, a message to be signed, a message to be verified, or other suitable information. A second hash value is obtained by applying a second hash function to a second input. The second input is based on the first hash value. The second hash value is used in a cryptographic scheme. In some instances, a public key or a private key is generated based on the second hash value. In some instances, a digital signature is generated based on the second hash value, or a digital signature is verified based on the second hash value, as appropriate.Type: ApplicationFiled: April 27, 2012Publication date: October 31, 2013Applicant: Certicom Corp.Inventors: Gregory Marc Zaverucha, David William Kravitz
-
Publication number: 20130290713Abstract: Methods, systems, and computer programs for producing hash values are disclosed. A prefix-free value is obtained based on input data. The prefix-free value can be based on an implicit certificate, a message to be signed, a message to be verified, or other suitable information. A hash value is obtained by applying a hash function to the prefix-free value. The hash value is used in a cryptographic scheme. In some instances, a public key or a private key is generated based on the hash value. In some instances, a digital signature is generated based on the hash value, or a digital signature is verified based on the hash value, as appropriate.Type: ApplicationFiled: April 27, 2012Publication date: October 31, 2013Applicant: Certicom Corp.Inventors: Gregory Marc Zaverucha, David William Kravitz
-
Publication number: 20130290712Abstract: Methods, systems, and computer programs for producing hash values are disclosed. A prefix-free value is obtained based on input data. The prefix-free value can be based on an implicit certificate, a message to be signed, a message to be verified, or other suitable information. A hash value is obtained by applying a hash function to the prefix-free value. The hash value is used in a cryptographic scheme. In some instances, a public key or a private key is generated based on the hash value. In some instances, a digital signature is generated based on the hash value, or a digital signature is verified based on the hash value, as appropriate.Type: ApplicationFiled: April 27, 2012Publication date: October 31, 2013Applicant: Certicom Corp.Inventors: Gregory Marc Zaverucha, David William Kravitz
-
Publication number: 20130246798Abstract: There is provided a method for secure communications. The method comprises receiving a transmission comprising a signature of a broadcast message at a communication device, and verifying the signature using a certificate.Type: ApplicationFiled: March 8, 2013Publication date: September 19, 2013Applicants: RESEARCH IN MOTION LIMITEDInventors: Michael Eoin Buckley, Matthew John Campagna, Gregory Marc Zaverucha
-
Publication number: 20130246785Abstract: There is provided a method for secure communications. The method comprises obtaining a broadcast message, computing a signature for said broadcast message using a private key, and sending a transmission to a communication device. The private key is associated with a certificate and the transmission comprises the signature.Type: ApplicationFiled: March 8, 2013Publication date: September 19, 2013Applicants: Research In Motion LimitedInventors: Michael Eoin Buckley, Matthew John Campagna, Gregory Marc Zaverucha
-
Publication number: 20130236019Abstract: In some implementations, a method for providing a session key to a third party includes identifying a private key associated with a public key certificate in response to an event. A session key for a communication session is based, at least in part, on the private key, an associated seed for a random number generator, and public keys assigned to user equipment participating in the communication session. The private key associated with the public key certificate is automatically transmitted to an interception authority. The interception authorities are configured to grant a third party access to the private key and the associated seed to in response to a request from a third party authorized to access the communication session.Type: ApplicationFiled: April 27, 2012Publication date: September 12, 2013Inventors: Gregory Marc Zaverucha, Matthew John Campagna
-
Publication number: 20130232554Abstract: A system and method are provided for enabling a client device to connect to a network. The method comprises: obtaining an authorization code via a communication channel different from the network, the authorization code corresponding to the client device; and after detecting initiation of a security negotiation protocol by the client device, using the authorization code in at least one security negotiation operation.Type: ApplicationFiled: January 15, 2013Publication date: September 5, 2013Applicant: CERTICOM CORP.Inventors: Matthew John CAMPAGNA, Daniel Richard L. BROWN, Gregory Marc ZAVERUCHA
-
Publication number: 20130097420Abstract: Methods, systems, and computer programs for verifying a digital signature are disclosed. The verifier accesses an implicit certificate and a digital signature provided by the signer. The implicit certificate includes a first elliptic curve point representing a public key reconstruction value of the signer. The verifier accesses a second elliptic curve point representing a pre-computed multiple of the certificate authority's public key. The verifier uses the first elliptic curve point and the second elliptic curve point to verify the digital signature. The verifier may also use a third elliptic curve point representing a pre-computed multiple of a generator point. Verifying the digital signature may provide verification that the implicit certificate is valid.Type: ApplicationFiled: October 14, 2011Publication date: April 18, 2013Applicant: Certicom Corp.Inventor: Gregory Marc Zaverucha