Patents by Inventor Scott Alexander Vanstone

Scott Alexander Vanstone has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9003182
    Abstract: A wireless communication system includes a pager or similar device that communicates to a home terminal. The home terminal confirms the identity of the pager and attaches a certificate to the message for ongoing transmission. Where the recipient is also a pager, an associated home terminal verifies the transmission and forwards it in a trusted manner without the certificate to the recipient.
    Type: Grant
    Filed: July 13, 2012
    Date of Patent: April 7, 2015
    Assignees: Certicom Corp., Motorola, Inc.
    Inventors: Walter Lee Davis, Douglas I. Ayerst, Scott Alexander Vanstone
  • Patent number: 9003181
    Abstract: During generation of an implicit certificate for a requestor, a certificate authority incorporates information in the public-key reconstruction data, where the public-key reconstruction data is to be used to compute the public key of the requestor. The information may be related to one or more of the requestor, the certificate authority, and the implicit certificate. The certificate authority reversibly encodes the public-key reconstruction data in the implicit certificate and sends it to the requestor. After receiving the implicit certificate from the certificate authority, the requestor can extract the incorporated information from the public-key reconstruction data. The implicit certificate can be made available to a recipient, and the recipient can also extract the incorporated information.
    Type: Grant
    Filed: March 23, 2011
    Date of Patent: April 7, 2015
    Assignees: Certicom Corp., BlackBerry Limited
    Inventors: Herbert Anthony Little, Matthew John Campagna, Scott Alexander Vanstone, Daniel Richard L. Brown
  • Patent number: 8972738
    Abstract: During generation of a signature on a message to create a signed message, a signer determines one of the signature components such that particular information can be extracted from the signature component. The particular information may be related to one or more of the signer and the message to be signed. After receiving a signed message purported to be signed by the signer, a verifier can extract the particular information from the signature component.
    Type: Grant
    Filed: March 18, 2014
    Date of Patent: March 3, 2015
    Assignees: Blackberry Limited, Certicom Corp.
    Inventors: Herbert Anthony Little, Scott Alexander Vanstone, Daniel Richard L. Brown, Matthew John Campagna
  • Patent number: 8948388
    Abstract: An elliptic curve random number generator avoids escrow keys by choosing a point Q on the elliptic curve as verifiably random. An arbitrary string is chosen and a hash of that string computed. The hash is then converted to a field element of the desired field, the field element regarded as the x-coordinate of a point Q on the elliptic curve and the x-coordinate is tested for validity on the desired elliptic curve. If valid, the x-coordinate is decompressed to the point Q, wherein the choice of which is the two points is also derived from the hash value. Intentional use of escrow keys can provide for back up functionality. The relationship between P and Q is used as an escrow key and stored by for a security domain. The administrator logs the output of the generator to reconstruct the random number with the escrow key.
    Type: Grant
    Filed: February 19, 2013
    Date of Patent: February 3, 2015
    Assignee: Certicom Corp.
    Inventors: Daniel Richard L. Brown, Scott Alexander Vanstone
  • Publication number: 20140344579
    Abstract: Accelerated computation of combinations of group operations in a finite field is provided by arranging for at least one of the operands to have a relatively small bit length. In a elliptic curve group, verification that a value representative of a point R corresponds the sum of two other points uG and vG is obtained by deriving integers w,z of reduced bit length and that v=w/z. The verification equality R=uG+vQ may then be computed as ?zR+(uz mod n)+wQ=O with z and w of reduced bit length This is beneficial in digital signature verification where increased verification can be attained.
    Type: Application
    Filed: June 27, 2014
    Publication date: November 20, 2014
    Inventors: Marinus STRUIK, Daniel Richard L. BROWN, Scott Alexander VANSTONE, Robert Philip GALLANT, Adrian ANTIPA, Robert John LAMBERT
  • Publication number: 20140298033
    Abstract: A signature scheme is provided in which a message is divided in to a first portion which is hidden and is recovered during verification, and a second portion which is visible and is required as input to the verification algorithm. A first signature component is generated by encrypting the first portion alone. An intermediate component is formed by combining the first component and the visible portion and cryptographically hashing them. A second signature component is then formed using the intermediate component and the signature comprises the first and second components with the visible portion. A verification of the signature combines a first component derived only from the hidden portion of the message with the visible portion and produces a hash of the combination. The computed hash is used together with publicly available information to generate a bit string corresponding to the hidden portion.
    Type: Application
    Filed: June 17, 2014
    Publication date: October 2, 2014
    Applicants: PITNEY BOWES INC., CERTICOM CORP.
    Inventors: Scott Alexander VANSTONE, Robert Philip GALLANT, Robert John LAMBERT, Leon A. PINTSOV, Frederick W. RYAN, JR., Ari SINGER
  • Patent number: 8793500
    Abstract: A signature scheme is provided in which a message is divided in to a first portion which is hidden and is recovered during verification, and a second portion which is visible and is required as input to the verification algorithm. A first signature component is generated by encrypting the first portion alone. An intermediate component is formed by combining the first component and the visible portion and cryptographically hashing them. A second signature component is then formed using the intermediate component and the signature comprises the first and second components with the visible portion. A verification of the signature combines a first component derived only from the hidden portion of the message with the visible portion and produces a hash of the combination.
    Type: Grant
    Filed: March 15, 2012
    Date of Patent: July 29, 2014
    Assignees: Certicom Corp., Pitney Bowes Inc.
    Inventors: Scott Alexander Vanstone, Robert Gallant, Robert J. Lambert, Leon A. Pintsov, Frederick W. Ryan, Jr., Ari Singer
  • Publication number: 20140201535
    Abstract: During generation of a signature on a message to create a signed message, a signer determines one of the signature components such that particular information can be extracted from the signature component. The particular information may be related to one or more of the signer and the message to be signed. After receiving a signed message purported to be signed by the signer, a verifier can extract the particular information from the signature component.
    Type: Application
    Filed: March 18, 2014
    Publication date: July 17, 2014
    Applicants: BLACKBERRY LIMITED, CERTICOM CORP.
    Inventors: Herbert Anthony Little, Scott Alexander Vanstone, Daniel Richard L. Brown, Matthew John Campagna
  • Publication number: 20140173704
    Abstract: A system, device and method for authenticating a user. The system, device and method may employ a computing device for providing credentials required for access to an on-line resource available over a network. The computing device may connect to the on-line resource to register a user. The computing device may receive from the on-line resource at least one request for a credential to identify the user. In response to the request, the computing device may generate a random credential, store the random credential in association with an on-line resource identifier and the request in a data store accessible to the computing device and, submit the random credential to the on-line resource to register the user.
    Type: Application
    Filed: July 28, 2011
    Publication date: June 19, 2014
    Applicants: CERTICOM CORP., BLACKBERRY LIMITED
    Inventors: Neil Patrick Adams, Scott Alexander Vanstone, Daniel Richard L. Brown, Dinah Lea Marie Davis, Christopher Labrador, Alfred John Menezes
  • Publication number: 20140173276
    Abstract: A method and system for distributed security for a plurality of devices in a communication network, each of the devices being responsible for generating, distributing and controlling its own keys for access to the communication network and using the keys to establish a trusted network, each device's membership to the communication network being checked periodically by other devices by using a challenge response protocol to establish which devices arc allowed access to the communication network and the trusted network.
    Type: Application
    Filed: February 10, 2014
    Publication date: June 19, 2014
    Applicant: Certicom Corp.
    Inventors: Scott Alexander Vanstone, Marinus Struik
  • Publication number: 20140141750
    Abstract: Methods, systems, and computer programs for trusted communication among mobile devices are described. In some aspects, information is wirelessly transmitted from a first mobile device to a second mobile device. The information permits the second mobile device to detect proximity of the first mobile device. In some implementations, the information can be wirelessly transmitted by a proximity-activated wireless interface, such as, for example, a Near Field Communication (NFC) interface. In response to the information, the first mobile device receives a message and a first authentication value wirelessly transmitted from the second mobile device to the first mobile device. A second authentication value is generated at the first mobile device based on the message and the shared secret value. Integrity of the message is verified based on comparing the first authentication value and the second authentication value.
    Type: Application
    Filed: July 11, 2011
    Publication date: May 22, 2014
    Applicants: CERTICOM CORP., BLACKBERRY LIMITED
    Inventors: Mihal Lazaridis, Mark E. Pecen, Scott Alexander Vanstone, Matthew John Campagna, Anthony Rosati
  • Patent number: 8732467
    Abstract: A method for creating and authenticating a digital signature is provided, including selecting a first session parameter k and generating a first short term public key derived from the session parameter k, computing a first signature component r derived from a first mathematical function using the short term public key, selecting a second session parameter t and computing a second signature component s derived from a second mathematical function using the second session parameter t and without using an inverse operation, computing a third signature component using the first and second session parameters and sending the signature components (s, r, c) as a masked digital signature to a receiver computer system. In the receiver computer system, a recovered second signature component s? is computed by combining a third signature component with the second signature component to derive signature components (s?, r) as an unmasked digital signature.
    Type: Grant
    Filed: December 28, 2012
    Date of Patent: May 20, 2014
    Assignee: Certicom Corp.
    Inventors: Scott Alexander Vanstone, Donald B. Johnson, Minghua Qu
  • Publication number: 20140137197
    Abstract: Methods, systems, and computer programs for trusted communication among mobile devices are described. In some aspects, an authentication value is generated at a first mobile device based on a message and a shared secret value stored on the first mobile device. In response to detecting proximity of a second mobile device, the message and the authentication value are wirelessly transmitted from the first mobile device to the second mobile device. In some implementations, the message and the authentication value can be wirelessly transmitted by a proximity-activated wireless interface, such as, for example, a Near Field Communication (NFC) interface.
    Type: Application
    Filed: July 11, 2011
    Publication date: May 15, 2014
    Applicants: CERTICOM CORP., BLACKBERRY LIMITED
    Inventors: Mihal Lazaridis, Mark E. Pecen, Scott Alexander VANSTONE, Matthew John Campagna, Anthony Rosati
  • Patent number: 8681993
    Abstract: A method and system for distributed security for a plurality of devices in a communication network, each of the devices being responsible for generating, distributing and controlling its own keys for access to the communication network and using the keys to establish a trusted network, each device's membership to the communication network being checked periodically by other devices by using a challenge response protocol to establish which devices are allowed access to the communication network and the trusted network.
    Type: Grant
    Filed: February 20, 2009
    Date of Patent: March 25, 2014
    Assignee: Certicom Corp.
    Inventors: Marinus Struik, Scott Alexander Vanstone
  • Patent number: 8675869
    Abstract: During generation of a signature on a message to create a signed message, a signer determines one of the signature components such that particular information can be extracted from the signature component. The particular information may be related to one or more of the signer and the message to be signed. After receiving a signed message purported to be signed by the signer, a verifier can extract the particular information from the signature component.
    Type: Grant
    Filed: March 23, 2011
    Date of Patent: March 18, 2014
    Assignees: BlackBerry Limited, Certicom Corp.
    Inventors: Herbert Anthony Little, Matthew John Campagna, Scott Alexander Vanstone, Daniel Richard L. Brown
  • Patent number: 8462944
    Abstract: A potential bias in the generation of a private key is avoided by selecting the key and comparing it against the system parameters. If a predetermined condition is attained it is accepted. If not it is rejected and a new key is generated.
    Type: Grant
    Filed: July 12, 2011
    Date of Patent: June 11, 2013
    Assignee: Certicom Corp.
    Inventors: Scott Alexander Vanstone, Ashok Vadekar, Robert John Lambert, Robert Philip Gallant, Daniel Richard L. Brown, Alfred John Menezes
  • Patent number: 8429408
    Abstract: To mitigate the effects of a weak random number generator (RNG) in a public key cryptosystem, a public key obtained from the RNG is encrypted using a deterministic cryptographic scheme before being made publicly available. A trusted party receiving the encrypted public key can recover the public key and combine it with other information so it is not subject to direct scrutiny. In one embodiment, the trusted party incorporates the public key in a certificate, such as an implicit certificate, for use by the correspondents in other communications.
    Type: Grant
    Filed: June 11, 2010
    Date of Patent: April 23, 2013
    Assignee: Certicom Corp.
    Inventor: Scott Alexander Vanstone
  • Patent number: 8397294
    Abstract: A device and method are provided for a device that communicates security information to a user entering content into the device. In an aspect, the device may access content from a server over a connection through the network. The device displays the content on a user interface of the device. The device detects information entered into a field of the displayed content and evaluates a security state of the device. If the security state is below a security threshold and, if the entered information is identified as protected information based on stored criteria, the device displaying a visual indication on the user interface.
    Type: Grant
    Filed: November 30, 2010
    Date of Patent: March 12, 2013
    Assignees: Research In Motion Limited, Certicom Corp.
    Inventors: Scott Alexander Vanstone, Neil Patrick Adams
  • Publication number: 20130046976
    Abstract: A system and method are provided for using a mobile device to authenticate access to a private network. The mobile device may operate to receive a challenge from an authentication server, the challenge having being generated according to a request to access a private network; obtain a private value; use the private value, the challenge, and a private key to generate a response to the challenge; and send the response to the authentication server. An authentication server may operate to generate a challenge; send the challenge to a mobile device; receive a response from the mobile device, the response having been generated by the mobile device using a private value, the challenge, and a private key; verify the response; and confirm verification of the response with a VPN gateway to permit a computing device to access a private network.
    Type: Application
    Filed: June 1, 2012
    Publication date: February 21, 2013
    Applicants: CERTICOM CORP., RESEARCH IN MOTION LIMITED
    Inventors: Anthony Rosati, Scott Alexander Vanstone, Mark E. Pecen
  • Patent number: 8359468
    Abstract: The present invention relates to digital signature operations using public key schemes in a secure communications system and in particular for use with processors having limited computing power such as ‘smart cards’. This invention describes a method for creating and authenticating a digital signature comprising the steps of selecting a first session parameter k and generating a first short term public key derived from the session parameter k, computing a first signature component r derived from a first mathematical function using the short term public key, selecting a second session parameter t and computing a second signature component s derived from a second mathematical function using the second session parameter t and without using an inverse operation, computing a third signature component using the first and second session parameters and sending the signature components (s, r, c) as a masked digital signature to a receiver computer system.
    Type: Grant
    Filed: June 29, 2011
    Date of Patent: January 22, 2013
    Assignee: Certicom Corp.
    Inventors: Scott Alexander Vanstone, Donald B. Johnson, Minghua Qu