Patents by Inventor Scott Totzke
Scott Totzke has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9503992Abstract: Different target transmit powers are determined for different wireless transmissions from a wireless device. The target transmit power of a wireless transmission may depend upon whether any transmitters other than the device to which the wireless transmission is to be sent are within range of the sending wireless device. The target transmit power of a wireless transmission may be based, at least in part, on a current location of a device to which one or more frames carried by the wireless transmission are addressed. The target transmit power of a wireless transmission may be based, at least in part, on confidentiality of data carried by the wireless transmission.Type: GrantFiled: January 12, 2009Date of Patent: November 22, 2016Assignee: BlackBerry LimitedInventors: Michael K. Brown, Scott Totzke, Herb Little, Neil Adams, Michael S. Brown
-
Patent number: 8484464Abstract: A method and devices for providing secure data backup from a mobile communication device to an external computing device is described. In accordance with one example embodiment, there is provided a method of backing up data from a mobile communication device to an external computing device, the mobile communication device being connected to the external computing device for exchanging data with each other, the method comprising: receiving a request to backup one or more data items in a plurality of data items stored on the mobile communication device; encrypting a data item using an encryption key stored in memory of the mobile communication device; transferring the encrypted data item to the external computing device; and storing a backup file comprising the encrypted data item in the memory of the external computing device.Type: GrantFiled: June 15, 2007Date of Patent: July 9, 2013Assignee: Research In Motion LimitedInventors: Michael K. Brown, Andrew Bocking, Scott Totzke, David Tapuska, Scotte Zinn, Maxime Matton, Michael Hardy, George Dos Santos, Christopher Runstedler
-
Publication number: 20110321171Abstract: A system includes a first wireless-enabled device that transparently stores confidential information and a second wireless-enabled device that stores the same confidential information. The confidential information is to be used to secure a wireless communication link between the first device and the second device. One or both of the first device and the second device is to delete the confidential information upon fulfillment of one or more conditions related to the communication link.Type: ApplicationFiled: September 10, 2011Publication date: December 29, 2011Applicant: RESEARCH IN MOTION LIMITEDInventors: Neil Adams, Michael S. Brown, Michael K. Brown, Herbert Little, Scott Totzke
-
Patent number: 8024809Abstract: A system includes a first wireless-enabled device that transparently stores confidential information and a second wireless-enabled device that stores the same confidential information. The confidential information is to be used to secure a wireless communication link between the first device and the second device. One or both of the first device and the second device is to delete the confidential information upon fulfillment of one or more conditions related to the communication link.Type: GrantFiled: April 4, 2005Date of Patent: September 20, 2011Assignee: Research In Motion LimitedInventors: Neil Adams, Michael S. Brown, Michael K. Brown, Herb Little, Scott Totzke
-
Publication number: 20090276626Abstract: A reader device includes a housing for receiving a smart card, a processor in electronic communication with an integrated circuit chip of the smart card when the smart card is received in the housing, a wireless communications device in electronic communication with the processor for enabling the reader device to transmit first encrypted information wirelessly and to receive second encrypted information wirelessly, and a memory in electronic communication with the processor that includes one or more routines executable by the processor. The one or more routines include a cryptographic module adapted to encrypt first information to create the first encrypted information and decrypt the second encrypted information to obtain second information. In addition, a communication system that includes the reader device and a computing device, wherein the reader device and computing device are able to wirelessly exchange information in a secure manner.Type: ApplicationFiled: July 13, 2009Publication date: November 5, 2009Applicant: RESEARCH IN MOTION LIMITEDInventors: Mihal Lazaridis, Scott D. Rose, Scott Totzke, Herb Little, Chris K.C. Leung, Benjamin W. Boomhour, Ryan Bayne
-
Patent number: 7562219Abstract: A reader device includes a housing for receiving a smart card, a processor in electronic communication with an integrated circuit chip of the smart card when the smart card is received in the housing, a wireless communications device in electronic communication with the processor for enabling the reader device to transmit first encrypted information wirelessly and to receive second encrypted information wirelessly, and a memory in electronic communication with the processor that includes one or more routines executable by the processor. The one or more routines include a cryptographic module adapted to encrypt first information to create the first encrypted information and decrypt the second encrypted information to obtain second information. In addition, a communication system that includes the reader device and a computing device, wherein the reader device and computing device are able to wirelessly exchange information in a secure manner.Type: GrantFiled: April 4, 2005Date of Patent: July 14, 2009Assignee: Research In Motion LimitedInventors: Mihal Lazaridis, Scott D. Rose, Scott Totzke, Herb Little, Chris K. C. Leung, Benjamin W. Boomhour, Ryan Bayne
-
Publication number: 20090111504Abstract: Different target transmit powers are determined for different wireless transmissions from a wireless device. The target transmit power of a wireless transmission may depend upon whether any transmitters other than the device to which the wireless transmission is to be sent are within range of the sending wireless device. The target transmit power of a wireless transmission may be based, at least in part, on a current location of a device to which one or more frames carried by the wireless transmission are addressed. The target transmit power of a wireless transmission may be based, at least in part, on confidentiality of data carried by the wireless transmission.Type: ApplicationFiled: January 12, 2009Publication date: April 30, 2009Applicant: Research In Motion LimitedInventors: Michael K. Brown, Scott Totzke, Herb Little, Neil Adams, Michael S. Brown
-
Patent number: 7477913Abstract: Different target transmit powers are determined for different wireless transmissions from a wireless device, the different transmissions having different security requirements. For example, the security requirements of a particular transmission may include a security ranking of a device to which one or more frames carried by the particular transmission are addressed. In another example, the security requirements of a particular transmission may include the confidentiality of data carried by the particular transmission.Type: GrantFiled: April 4, 2005Date of Patent: January 13, 2009Assignee: Research In Motion LimitedInventors: Michael K. Brown, Scott Totzke, Herb Little, Neil Adams, Michael S. Brown
-
Publication number: 20080310633Abstract: A method and devices for providing secure data backup from a mobile communication device to an external computing device is described. In accordance with one example embodiment, there is provided a method of backing up data from a mobile communication device to an external computing device, the mobile communication device being connected to the external computing device for exchanging data with each other, the method comprising: receiving a request to backup one or more data items in a plurality of data items stored on the mobile communication device; encrypting a data item using an encryption key stored in memory of the mobile communication device; transferring the encrypted data item to the external computing device; and storing a backup file comprising the encrypted data item in the memory of the external computing device.Type: ApplicationFiled: June 15, 2007Publication date: December 18, 2008Applicant: RESEARCH IN MOTION LIMITEDInventors: Michael K. Brown, Andrew Bocking, Scott Totzke, David Tapuska, Scotte Zinn, Maxime Matton, Michael Hardy, George Dos Santos, Christopher Runstedler
-
Publication number: 20070167194Abstract: A portable wireless user communication device is wirelessly coupled to a second device over a monitored link. If the link is lost or endangered, then a user alarm is activated at the portable wireless user device and/or at the second device to which it is linked (which may also be a portable electronic device). The type of monitoring and/or the type of alarming may be user selectable.Type: ApplicationFiled: January 13, 2006Publication date: July 19, 2007Applicant: RESEARCH IN MOTION LIMITEDInventors: Michael Brown, Neil Adams, Herbert Little, Scott Totzke
-
Publication number: 20060288207Abstract: A communication system is provided with program logic for enforcing an IT Policy specifying suitable encryption encoding levels for corresponding security classification levels (and/or encryption strengths).Type: ApplicationFiled: June 17, 2005Publication date: December 21, 2006Applicant: Research In Motion LimitedInventors: Michael Brown, Herbert Little, Michael Brown, Michael McCallum, Scott Totzke, Neil Adams
-
Publication number: 20060236126Abstract: A system includes a first wireless-enabled device that transparently stores confidential information and a second wireless-enabled device that stores the same confidential information. The confidential information is to be used to secure a wireless communication link between the first device and the second device. One or both of the first device and the second device is to delete the confidential information upon fulfillment of one or more conditions related to the communication link.Type: ApplicationFiled: April 4, 2005Publication date: October 19, 2006Inventors: Neil Adams, Michael Brown, Michael Brown, Herb Little, Scott Totzke
-
Publication number: 20060236117Abstract: A reader device includes a housing for receiving a smart card, a processor in electronic communication with an integrated circuit chip of the smart card when the smart card is received in the housing, a wireless communications device in electronic communication with the processor for enabling the reader device to transmit first encrypted information wirelessly and to receive second encrypted information wirelessly, and a memory in electronic communication with the processor that includes one or more routines executable by the processor. The one or more routines include a cryptographic module adapted to encrypt first information to create the first encrypted information and decrypt the second encrypted information to obtain second information. In addition, a communication system that includes the reader device and a computing device, wherein the reader device and computing device are able to wirelessly exchange information in a secure manner.Type: ApplicationFiled: April 4, 2005Publication date: October 19, 2006Inventors: Mihal Lazaridis, Scott Rose, Scott Totzke, Herb Little, Chris Leung, Benjamin Boomhour
-
Publication number: 20060223566Abstract: Different target transmit powers are determined for different wireless transmissions from a wireless device, the different transmissions having different security requirements. For example, the security requirements of a particular transmission may include a security ranking of a device to which one or more frames carried by the particular transmission are addressed. In another example, the security requirements of a particular transmission may include the confidentiality of data carried by the particular transmission.Type: ApplicationFiled: April 4, 2005Publication date: October 5, 2006Inventors: Michael Brown, Scott Totzke, Herb Little, Neil Adams, Michael Brown
-
Publication number: 20060165236Abstract: A wireless personal area network (WPAN) system includes a plurality of WPAN devices using encrypted wireless communication therebetween when in an enabled state and not wirelessly communicating when in a disabled state. At least one of the WPAN devices includes a WPAN identity reader for reading at least one identifying parameter of a user, for confirming that the user is an authorized user based upon reading the at least one identifying parameter, and for wirelessly communicating with at least one other WPAN device to switch the at least one other WPAN device from the disabled state to the enabled state based upon confirming the user is an authorized user.Type: ApplicationFiled: January 27, 2005Publication date: July 27, 2006Applicant: Research In Motion Limited, a Canadian corporationInventors: Herbert Little, Scott Rose, Scott Totzke, Mihal Lazaridis