Patents by Inventor Richard L. Brown

Richard L. Brown has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180280147
    Abstract: A spinal implant system includes a spinal implant template configured to provide three dimensional coordinates of a selected implant configuration. An implant bending device includes work surfaces engageable with a spinal implant to manipulate the spinal implant to the selected implant configuration and an implant contact sensor. Surgical instruments, spinal constructs, implants and methods are disclosed.
    Type: Application
    Filed: April 4, 2017
    Publication date: October 4, 2018
    Inventors: THOMAS V. MCGAHAN, MATTHEW M. MORRISON, RICHARD L. BROWN, VICTOR D. SNYDER, ROBERT A. TILL, JR., JOHN HENGESBACH
  • Patent number: 10079675
    Abstract: Methods, systems, and computer programs for generating cryptographic function parameters are described. In some examples, a solution to a puzzle is obtained. A pseudorandom generator is seeded based on the solution. After seeding the pseudorandom generator, an output from the pseudorandom generator is obtained. A parameter for a cryptographic function is generated. The parameter is generated from the output from the pseudorandom generator.
    Type: Grant
    Filed: April 20, 2015
    Date of Patent: September 18, 2018
    Assignee: Certicom Corp.
    Inventor: Daniel Richard L. Brown
  • Patent number: 10079673
    Abstract: Systems, methods, software, and combinations thereof for evaluating entropy in a cryptography system are described. In some aspects, sample values are produced by an entropy source system. A typicality can be determined for each of the sample values. A grading is determined for preselected distributions based on the typicalities of the sample values. A subset of the preselected distributions are selected based on the gradings. An entropy of the entropy source system is calculated based on the subset of the plurality of distributions.
    Type: Grant
    Filed: June 27, 2014
    Date of Patent: September 18, 2018
    Assignee: Certicom Corp.
    Inventor: Daniel Richard L. Brown
  • Publication number: 20180248695
    Abstract: Systems, methods, and software can be used to generate elliptic curve points. In some aspect, the method includes: selecting a field size of 8?91+5; selecting a curve equation that is compatible to the field size; using, by a hardware processor, the selected field size to generate an elliptic curve point; and using, by the hardware processor, the elliptic curve point in an Elliptic Curve Cryptography (ECC) operation.
    Type: Application
    Filed: February 28, 2017
    Publication date: August 30, 2018
    Applicant: Certicom Corp.
    Inventor: Daniel Richard L. BROWN
  • Patent number: 10057053
    Abstract: Methods, systems, and computer programs for performing key agreement operations in a communication system are described. In some aspects, a wireless network operator receives a mobile device identifier and accesses a secret key associated with the mobile device. A message authentication code function is evaluated based on the secret key to produce an output value. A session key and a challenge value are obtained based on the output value. In some aspects, a mobile device accesses a secret key in response to receiving the challenge value from the wireless network operator. A message authentication code function is evaluated based on the secret key to produce an output value. A response value and a session key are obtained based on the output value. The response value is transmitted to the wireless network operator.
    Type: Grant
    Filed: January 23, 2015
    Date of Patent: August 21, 2018
    Assignee: Certicom Corp.
    Inventors: Matthew John Campagna, Daniel Richard L. Brown, Nevine Maurice Nassif Ebeid
  • Publication number: 20180160962
    Abstract: A nerve integrity monitoring device includes a control module and a physical layer module. The control module is configured to generate a payload request. The payload request (i) requests a data payload from a sensor in a wireless nerve integrity monitoring network, and (ii) indicates whether a stimulation probe device is to generate a stimulation pulse. The physical layer module is configured to (i) wirelessly transmit the payload request to the sensor and the stimulation probe device, or (ii) transmit the payload request to a console interface module. The physical layer module is also configured to, in response to the payload request, (i) receive the data payload from the sensor, and (ii) receive stimulation pulse information from the stimulation probe device. The data payload includes data corresponding to an evoked response of a patient. The evoked response is generated based on the stimulation pulse.
    Type: Application
    Filed: January 30, 2018
    Publication date: June 14, 2018
    Inventors: Richard L. BROWN, John G. Pollock, Kevin L/ McFarlin, Randal C. Schulhauser
  • Publication number: 20180109374
    Abstract: Methods, systems, and computer programs for performing key agreement operations in a communication system are described. In some aspects, a wireless network operator receives a mobile device identifier and accesses a secret key associated with the mobile device. A message authentication code function is evaluated based on the secret key to produce an output value. A session key and a challenge value are obtained based on the output value. In some aspects, a mobile device accesses a secret key in response to receiving the challenge value from the wireless network operator. A message authentication code function is evaluated based on the secret key to produce an output value. A response value and a session key are obtained based on the output value. The response value is transmitted to the wireless network operator.
    Type: Application
    Filed: October 20, 2017
    Publication date: April 19, 2018
    Inventors: Matthew John Campagna, Daniel Richard L. Brown, Nevine Maurice Nassif Ebeid
  • Patent number: 9918669
    Abstract: A nerve integrity monitoring device includes a control module and a physical layer module. The control module is configured to generate a payload request. The payload request (i) requests a data payload from a sensor in a wireless nerve integrity monitoring network, and (ii) indicates whether a stimulation probe device is to generate a stimulation pulse. The physical layer module is configured to (i) wirelessly transmit the payload request to the sensor and the stimulation probe device, or (ii) transmit the payload request to a console interface module. The physical layer module is also configured to, in response to the payload request, (i) receive the data payload from the sensor, and (ii) receive stimulation pulse information from the stimulation probe device. The data payload includes data corresponding to an evoked response of a patient. The evoked response is generated based on the stimulation pulse.
    Type: Grant
    Filed: August 8, 2014
    Date of Patent: March 20, 2018
    Assignee: MEDTRONIC XOMED, INC.
    Inventors: Richard L. Brown, John G. Pollock, Kevin L. McFarlin, Randal C. Schulhauser
  • Patent number: 9917693
    Abstract: Systems, methods, and software can be used to provide security assurance information. In some aspects, a certificate request for a client process on a mobile device is received. A security assurance character for the client process is determined. Whether to grant the certificate request is determined based on the determined security assurance character. In response to determining to grant the certificate request, a certificate is generated.
    Type: Grant
    Filed: November 6, 2015
    Date of Patent: March 13, 2018
    Assignees: BlackBerry Limited, Certicom Corp.
    Inventors: Roger Paul Bowman, Catalin Visinescu, Ming Chee Tsang, Daniel Richard L. Brown, Ravi Singh, Thomas Stiemerling
  • Patent number: 9900861
    Abstract: A method for a device to determine that it has been lost is provided. The method comprises the device determining its current location, the device comparing its current location to a plurality of stored locations, and the device determining that it has been lost when its current location is a stored location that has been designated as a location where the device is unlikely to be located or is not a stored location that has been designated as a location where the device is likely to be located.
    Type: Grant
    Filed: July 14, 2016
    Date of Patent: February 20, 2018
    Assignee: Certicom Corp.
    Inventor: Daniel Richard L. Brown
  • Patent number: 9864851
    Abstract: A system, device and method for authenticating a user. The system, device and method may employ a computing device for providing credentials required for access to an on-line resource available over a network. The computing device may connect to the on-line resource to register a user. The computing device may receive from the on-line resource at least one request for a credential to identify the user. In response to the request, the computing device may generate a random credential, store the random credential in association with an on-line resource identifier and the request in a data store accessible to the computing device and, submit the random credential to the on-line resource to register the user.
    Type: Grant
    Filed: July 28, 2011
    Date of Patent: January 9, 2018
    Assignees: BlackBerry Limited, Certicom Corp.
    Inventors: Neil Patrick Adams, Scott Alexander Vanstone, Daniel Richard L. Brown, Dinah Lea Marie Davis, Christopher Labrador, Alfred John Menezes
  • Patent number: 9825919
    Abstract: In some aspects, an encryption method comprises encrypting a first portion of a message using a first secret key. The first secret key is generated based on the public key of an entity. A one-way function is used to generate a second secret key from the first secret key, and the first secret key is subsequently discarded. A second portion of the message is encrypted using the second secret key. The encrypted first portion of the message and the encrypted second portion of the message are provided to the entity.
    Type: Grant
    Filed: November 2, 2015
    Date of Patent: November 21, 2017
    Assignees: BlackBerry Limited, Certicom Corp.
    Inventors: Robert John Lambert, Daniel Richard L. Brown, Atsushi Yamada
  • Publication number: 20170324556
    Abstract: A method for providing Cheon-resistance security for a static elliptic curve Diffie-Hellman cryptosystem (ECDH), the method including providing a system for message communication between a pair of correspondents, a message being exchanged in accordance with ECDH instructions executable on computer processors of the respective correspondents, the ECDH instructions using a curve selected from a plurality of curves, the selecting including choosing a range of curves; selecting, from the range of curves, curves matching a threshold efficiency; excluding, within the selected curves, curves which may include intentional vulnerabilities; and electing, from non-excluded selected curves, a curve with Cheon resistance, the electing comprising a curve from an additive group of order q, wherein q is prime, such that q?1=cr and q+1=ds, where r and s are primes and c and d are integer Cheon cofactors of the group, such that cd?48.
    Type: Application
    Filed: May 3, 2016
    Publication date: November 9, 2017
    Inventor: Daniel Richard L. BROWN
  • Publication number: 20170281943
    Abstract: A bone growth simulator system. A bioabsorbable electric circuit is encapsulated in a modified alginate known-time dissolving capsule having a rate of dissolving proportional to the thickness of the capsule. The electronic circuit is powered by a power source. The power source can be inside the capsule or outside the capsule, and can be bioabsorbable or at least biocompatible. An operational amplifier maintains constant current through the circuit. The current stimulates bone growth in bones adjacent to the circuit. The capsule and electric circuit dissolve after completion of the therapy.
    Type: Application
    Filed: March 29, 2016
    Publication date: October 5, 2017
    Inventors: Tyler S. Stevenson, Richard L. Brown, Todd A. Kallmyer, Matthew M. Morrison, Sneha Saikia, Randal Schulhauser
  • Patent number: 9734322
    Abstract: A system and method of providing authenticity to a radio frequency identification (RFID) tag are provided. The method comprises generating a plurality of digital signatures, wherein each digital signature is generated using an index value unique to that digital signature and using information associated with the RFID tag; and storing the plurality of digital signatures on the RFID tag in association with respective index values to enable a desired digital signature to be selected according to a provided index value. Also provided are a system and method of enabling an RFID reader to authenticate an RFID tag, which utilize a challenge comprising an index value to request one of the stored signature and authenticating same. Also provided is an RFID tag that is configured to participate in the challenge-response protocol.
    Type: Grant
    Filed: June 30, 2014
    Date of Patent: August 15, 2017
    Assignee: Certicom Corp.
    Inventor: Daniel Richard L. Brown
  • Publication number: 20170140121
    Abstract: A system including a range of motion module, a quality of sleep module, an overall module, and a control module. The range of motion module, subsequent to performing a procedure on a patient, determines a first range of motion score of the patient based on a signal generated by a sensor. The quality of sleep module, subsequent to performing the procedure on the patient, determines a first quality of sleep score or a first pain score based on the signal generated by the sensor. The overall module determines a combined score based on (i) the first range of motion score, and (ii) the first sleep score or the first pain score. The control module (i) determines whether an outcome of the procedure is positive based on the combined score, and (ii) stores the determined outcome and the combined score in a memory.
    Type: Application
    Filed: November 18, 2015
    Publication date: May 18, 2017
    Inventors: Randal Schulhauser, Richard L. Brown, Jeff R. Justis, Matthew M. Morrison, Jeff M. Cherry
  • Publication number: 20170140127
    Abstract: A system including a range of motion, quality of sleep, overall, and control modules. The range of motion module, prior to a procedure being performed on a patient, determines a first range of motion score of the patient based on a first signal generated by a sensor. The quality of sleep module, prior to the procedure being performed on the patient, determines a first quality of sleep score or a first pain score based on the first signal. The overall module determines a combined score based on the first range of motion score and the first quality of sleep score or the first pain score. The control module compares the combined score to a predetermined threshold and predicts an outcome of the procedure based on the comparison. The control module, based on the combined score, determines whether to perform the procedure, adjust the procedure or refrain from performing the procedure.
    Type: Application
    Filed: November 18, 2015
    Publication date: May 18, 2017
    Inventors: Randal Schulhauser, Richard L. Brown, Matthew M. Morrison, Patrick W. Kinzie, Jeffrey R. VanRaaphorst, Emily C. Byrne
  • Publication number: 20170118014
    Abstract: Systems, methods, and software can be used to provide security assurance information. In some aspects, a certificate request for a client process on a mobile device is received. A security assurance character for the client process is determined. Whether to grant the certificate request is determined based on the determined security assurance character. In response to determining to grant the certificate request, a certificate is generated.
    Type: Application
    Filed: November 6, 2015
    Publication date: April 27, 2017
    Applicants: Certicom Corp., BlackBerry Limited
    Inventors: Roger Paul Bowman, Catalin Visinescu, Ming Chee Tsang, Daniel Richard L. Brown, Ravi Singh, Thomas Stiemerling
  • Patent number: 9621545
    Abstract: A system and method are provided for enabling a client device to connect to a network. The method comprises: obtaining an authorization code via a communication channel different from the network, the authorization code corresponding to the client device; and after detecting initiation of a security negotiation protocol by the client device, using the authorization code in at least one security negotiation operation.
    Type: Grant
    Filed: July 14, 2015
    Date of Patent: April 11, 2017
    Assignee: Certicom Corp.
    Inventors: Matthew John Campagna, Daniel Richard L. Brown, Gregory Marc Zaverucha
  • Publication number: 20170063534
    Abstract: Methods, systems, and computer programs for generating cryptographic function parameters are described. In some examples, source code that defines seed information and a pseudorandom function is accessed. A parameter for a cryptographic function by operation of one or more data processors is generated. The parameter is generated from the seed information and the pseudorandom function. The parameter has a larger size in memory than the source code that defines the seed information and the pseudorandom function.
    Type: Application
    Filed: April 20, 2015
    Publication date: March 2, 2017
    Applicant: Certicom Corp.
    Inventor: Daniel Richard L. Brown