Patents by Inventor John Menezes
John Menezes has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230397882Abstract: Methods, systems, and apparatuses are described for determining and outputting pressure and force data associated with one or more locations of a fabric configured to be flexibly warn underneath a compression garment.Type: ApplicationFiled: August 9, 2022Publication date: December 14, 2023Inventors: James Skelly, Francisco Mata Carlos, John Menezes, R. Jacob Baker
-
Publication number: 20220014367Abstract: A distributed computing system is used to form a login network to perform an action for a user, using private data. The login network executes the verification using blockchain computing architecture, which is decentralized. The private data is stored on the blockchain in an obfuscated form. In order to compute the private data from the obfuscated form, multiple distributed private key shares are required to generate multiple decryption shares, which are combined to compute a One Time Pad (OTP). In turn, the OTP is used to obtain the private data from the obfuscated form.Type: ApplicationFiled: December 13, 2019Publication date: January 13, 2022Inventors: SIMON LAW, ALFRED JOHN MENEZES
-
Publication number: 20210392003Abstract: It is typically difficult for a user to have any awareness of which private data is being used by a third party and to control the flow of the private data to the third party. A computing system is provided with a trusted node that stores encrypted private data. When the third party wishes to obtain information types from the user, the trusted node generates a scope document that specifies the requested information types. This scope document is sent to the user device as a challenge. The user device uses the scope document to display the requested information types, and the user provides input to permit providing the information types to the third party. The user device returns a signed challenge response, which includes the scope document. The trusted node then decrypts the encrypted private data, which corresponds to the requested information types, for the third party.Type: ApplicationFiled: June 11, 2021Publication date: December 16, 2021Inventors: SIMON LAW, ALFRED JOHN MENEZES, PASAN CHANKAMA HAPUARACHCHI
-
Patent number: 9864851Abstract: A system, device and method for authenticating a user. The system, device and method may employ a computing device for providing credentials required for access to an on-line resource available over a network. The computing device may connect to the on-line resource to register a user. The computing device may receive from the on-line resource at least one request for a credential to identify the user. In response to the request, the computing device may generate a random credential, store the random credential in association with an on-line resource identifier and the request in a data store accessible to the computing device and, submit the random credential to the on-line resource to register the user.Type: GrantFiled: July 28, 2011Date of Patent: January 9, 2018Assignees: BlackBerry Limited, Certicom Corp.Inventors: Neil Patrick Adams, Scott Alexander Vanstone, Daniel Richard L. Brown, Dinah Lea Marie Davis, Christopher Labrador, Alfred John Menezes
-
Patent number: 8983064Abstract: A method of determining the integrity of a message exchanged between a pair of correspondents. The message is secured by embodying the message in a function of a public key derived from a private key selected by one of the correspondents. The method comprises first obtaining the public key. The public key is then subjected to at least one mathematical test to determine whether the public key satisfies predefined mathematical characteristics. Messages utilizing the public key are accepted if the public key satisfies the predefined mathematical characteristics.Type: GrantFiled: September 15, 2012Date of Patent: March 17, 2015Assignee: Certicom Corp.Inventors: Scott A. Vanstone, Alfred John Menezes, Minghua Qu, Donald B. Johnson
-
Patent number: 8953787Abstract: A method of determining the integrity of a message exchanged between a pair of correspondents. The message is secured by embodying the message in a function of a public key derived from a private key selected by one of the correspondents. The method comprises first obtaining the public key. The public key is then subjected to at least one mathematical test to determine whether the public key satisfies predefined mathematical characteristics. Messages utilizing the public key are accepted if the public key satisfies the predefined mathematical characteristics.Type: GrantFiled: June 20, 2012Date of Patent: February 10, 2015Assignee: Certicom Corp.Inventors: Scott A. Vanstone, Alfred John Menezes, Minghua Qu, Donald B. Johnson
-
Publication number: 20140173704Abstract: A system, device and method for authenticating a user. The system, device and method may employ a computing device for providing credentials required for access to an on-line resource available over a network. The computing device may connect to the on-line resource to register a user. The computing device may receive from the on-line resource at least one request for a credential to identify the user. In response to the request, the computing device may generate a random credential, store the random credential in association with an on-line resource identifier and the request in a data store accessible to the computing device and, submit the random credential to the on-line resource to register the user.Type: ApplicationFiled: July 28, 2011Publication date: June 19, 2014Applicants: CERTICOM CORP., BLACKBERRY LIMITEDInventors: Neil Patrick Adams, Scott Alexander Vanstone, Daniel Richard L. Brown, Dinah Lea Marie Davis, Christopher Labrador, Alfred John Menezes
-
Patent number: 8650639Abstract: A method for hindering a cold boot attack on a user equipment (UE) is provided. The method includes, in response to detection of the cold boot attack, executing prioritized security procedures. A user equipment (UE) is also provided that includes a processor configured to execute prioritized security procedures responsive to detection of a cold boot attack.Type: GrantFiled: September 29, 2010Date of Patent: February 11, 2014Assignee: BlackBerry LimitedInventors: Neil Patrick Adams, Michael Stephen Brown, Robert John Lambert, Alfred John Menezes
-
Patent number: 8462944Abstract: A potential bias in the generation of a private key is avoided by selecting the key and comparing it against the system parameters. If a predetermined condition is attained it is accepted. If not it is rejected and a new key is generated.Type: GrantFiled: July 12, 2011Date of Patent: June 11, 2013Assignee: Certicom Corp.Inventors: Scott Alexander Vanstone, Ashok Vadekar, Robert John Lambert, Robert Philip Gallant, Daniel Richard L. Brown, Alfred John Menezes
-
Publication number: 20130019099Abstract: A method of determining the integrity of a message exchanged between a pair of correspondents. The message is secured by embodying the message in a function of a public key derived from a private key selected by one of the correspondents. The method comprises first obtaining the public key. The public key is then subjected to at least one mathematical test to determine whether the public key satisfies predefined mathematical characteristics. Messages utilizing the public key are accepted if the public key satisfies the predefined mathematical characteristics.Type: ApplicationFiled: September 15, 2012Publication date: January 17, 2013Inventors: Scott A. Vanstone, Alfred John Menezes, Minghua Qu, Donald B. Johnson
-
Publication number: 20120257758Abstract: A method of determining the integrity of a message exchanged between a pair of correspondents. The message is secured by embodying the message in a function of a public key derived from a private key selected by one of the correspondents. The method comprises first obtaining the public key. The public key is then subjected to at least one mathematical test to determine whether the public key satisfies predefined mathematical characteristics. Messages utilizing the public key are accepted if the public key satisfies the predefined mathematical characteristics.Type: ApplicationFiled: June 20, 2012Publication date: October 11, 2012Inventors: Scott A. VANSTONE, Alfred John MENEZES, Minghua QU, Donald B. JOHNSON
-
Patent number: 8229113Abstract: A method of determining the integrity of a message exchanged between a pair of correspondents. The message is secured by embodying the message in a function of a public key derived from a private key selected by one of the correspondents. The method comprises first obtaining the public key. The public key is then subjected to at least one mathematical test to determine whether the public key satisfies predefined mathematical characteristics. Messages utilizing the public key are accepted if the public key satisfies the predefined mathematical characteristics.Type: GrantFiled: July 13, 2009Date of Patent: July 24, 2012Assignee: Certicom Corp.Inventors: Scott A. Vanstone, Alfred John Menezes, Minghua Qu, Donald B. Johnson
-
Publication number: 20120079593Abstract: A method for hindering a cold boot attack on a user equipment (UE) is provided. The method includes, in response to detection of the cold boot attack, executing prioritized security procedures. A user equipment (UE) is also provided that includes a processor configured to execute prioritized security procedures responsive to detection of a cold boot attack.Type: ApplicationFiled: September 29, 2010Publication date: March 29, 2012Applicants: Certicom Corp., RESEARCH IN MOTION LIMITEDInventors: Neil Patrick Adams, Michael Stephen Brown, Robert John Lambert, Alfred John Menezes
-
Publication number: 20120079274Abstract: A key establishment protocol between a pair of correspondents includes the generation by each correspondent of respective signatures. The signatures are derived from information that is private to the correspondent and information that is public. After exchange of signatures, the integrity of exchange messages can be verified by extracting the public information contained in the signature and comparing it with information used to generate the signature. A common session key may then be generated from the public and private information of respective ones of the correspondents.Type: ApplicationFiled: December 2, 2011Publication date: March 29, 2012Applicant: CERTICOM CORP.Inventors: Scott Vanstone, Alfred John Menezes, Minghua Qu
-
Patent number: 8090947Abstract: A key establishment protocol between a pair of correspondents includes the generation by each correspondent of respective signatures. The signatures are derived from information that is private to the correspondent and information that is public. After exchange of signatures, the integrity of exchange messages can be verified by extracting the public information contained in the signature and comparing it with information used to generate the signature. A common session key may then be generated from the public and private information of respective ones of the correspondents.Type: GrantFiled: July 15, 2010Date of Patent: January 3, 2012Assignee: Certicom Corp.Inventors: Scott Alexander Vanstone, Alfred John Menezes, Minghua Qu
-
Patent number: 8000470Abstract: A potential bias in the generation of a private key is avoided by selecting the key and comparing it against the system parameters. If a predetermined condition is attained it is accepted. If not it is rejected and a new key is generated.Type: GrantFiled: May 12, 2008Date of Patent: August 16, 2011Assignee: Certicom Corp.Inventors: Scott Alexander Vanstone, Ashok Vadekar, Robert John Lambert, Robert Philip Gallant, Daniel Richard L. Brown, Alfred John Menezes
-
Publication number: 20100281259Abstract: A key establishment protocol between a pair of correspondents includes the generation by each correspondent of respective signatures. The signatures are derived from information that is private to the correspondent and information that is public. After exchange of signatures, the integrity of exchange messages can be verified by extracting the public information contained in the signature and comparing it with information used to generate the signature. A common session key may then be generated from the public and private information of respective ones of the correspondents.Type: ApplicationFiled: July 15, 2010Publication date: November 4, 2010Applicant: CERTICOM CORP.Inventors: Scott Vanstone, Alfred John Menezes, Minghua Qu
-
Patent number: 7779259Abstract: A key establishment protocol between a pair of correspondents includes the generation by each correspondent of respective signatures. The signatures are derived from information that is private to the correspondent and information that is public. After exchange of signatures, the integrity of exchange messages can be verified by extracting the public information contained in the signature and comparing it with information used to generate the signature. A common session key may then be generated from the public and private information of respective ones of the correspondents.Type: GrantFiled: October 11, 2007Date of Patent: August 17, 2010Assignee: Certicom Corp.Inventors: Scott Vanstone, Alfred John Menezes, Minghua Qu
-
Publication number: 20100014663Abstract: A method of determining the integrity of a message exchanged between a pair of correspondents. The message is secured by embodying the message in a function of a public key derived from a private key selected by one of the correspondents. The method comprises first obtaining the public key. The public key is then subjected to at least one mathematical test to determine whether the public key satisfies predefined mathematical characteristics. Messages utilizing the public key are accepted if the public key satisfies the predefined mathematical characteristics.Type: ApplicationFiled: July 13, 2009Publication date: January 21, 2010Applicant: CERTICOM CORP.Inventors: Scott A. Vanstone, Alfred John Menezes, Minghua Qu, Donald B. Johnson
-
Patent number: 7567669Abstract: A method of determining the integrity of a message exchanged between a pair of correspondents. The message is secured by embodying the message in a function of a public key derived from a private key selected by one of the correspondents. The method comprises first obtaining the public key. The public key is then subjected to at least one mathematical test to determine whether the public key satisfies predefined mathematical characteristics. Messages utilizing the public key are accepted if the public key satisfies the predefined mathematical characteristics.Type: GrantFiled: July 1, 2002Date of Patent: July 28, 2009Assignee: Certicom Corp.Inventors: Scott A. Vanstone, Alfred John Menezes, Minghua Qu, Donald B. Johnson