Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Certicom Corp patents


Recent patent applications related to Certicom Corp. Certicom Corp is listed as an Agent/Assignee. Note: Certicom Corp may have other listings under different names/spellings. We're not affiliated with Certicom Corp, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "C" | Certicom Corp-related inventors


System and method for controlling features on a device

Trust between entities participating in an upgrade or enablement/disablement process is established and, to facilitate this remotely and securely, a highly tamper resistant point of trust in the system that is being produced is used. This point of trust enables a more efficient distribution system to be used. ... Certicom Corp

Method and system for selecting a secure prime for finite field diffie-hellman

A method for a diffie hellman key exchange, the method including selecting a field size p in the form p=hq+1, where q is a prime number that is one plus a factorial number b, such that q=(b!+1), and h is a cofactor, such that p=hq+1 is prime; selecting a generator integer g whose order modulo p is the prime q or is divisible by q; choosing a private key x; computing a public key gx mod p by raising said generator g to the power of said private key x, using arithmetic modulo said prime field size p; sending said public key gx mod p to a correspondent; receiving, from the correspondent, a second public key b comprising g raised to a second private key y selected by the correspondent, in the form gy; and creating a key bx from the received second public key b, by raising said second public key b to the power of said private key x, using arithmetic modulo said prime field size p.. . ... Certicom Corp

Method for validating messages

There is provided a method for secure communications. The method includes a computing device receiving a notification comprising a message, a counter value, a signature signed by a signer and based on the message and the counter value, and an indication of the signer. ... Certicom Corp

Key agreement for wireless communication

Methods, systems, and computer programs for performing key agreement operations in a communication system are described. In some aspects, a wireless network operator receives a mobile device identifier and accesses a secret key associated with the mobile device. ... Certicom Corp

In-vehicle networking

A system and method for securing communication across an in-vehicle bus, includes establishing a connection between a gateway in a vehicle and the in-vehicle bus; generating a session key at the gateway within the vehicle; transmitting a public key certificate and ephemeral key to the gateway and an electronic control unit of the vehicle; generating a shared secret at the gateway and the electronic control unit, respectively; encrypting the session key with the shared secret at the gateway; receiving the encrypted session key through the in-vehicle bus at the electronic control unit; and decrypting the encrypted session key based on the shared secret generated at the electronic control unit.. . ... Certicom Corp

Method and apparatus for providing an adaptable security level in an electronic communication

A method of communicating in a secure communication system, comprises the steps of assembling a message at a sender, then determining a security level, and including an indication of the security level in a header of the message. The message is then sent to a recipient.. ... Certicom Corp

Method and system for cheon resistant static diffie-hellman security

A method for providing cheon-resistance security for a static elliptic curve diffie-hellman cryptosystem (ecdh), the method including providing a system for message communication between a pair of correspondents, a message being exchanged in accordance with ecdh instructions executable on computer processors of the respective correspondents, the ecdh instructions using a curve selected from a plurality of curves, the selecting including choosing a range of curves; selecting, from the range of curves, curves matching a threshold efficiency; excluding, within the selected curves, curves which may include intentional vulnerabilities; and electing, from non-excluded selected curves, a curve with cheon resistance, the electing comprising a curve from an additive group of order q, wherein q is prime, such that q−1=cr and q+1=ds, where r and s are primes and c and d are integer cheon cofactors of the group, such that cd≦48.. . ... Certicom Corp

Method and apparatus for providing an adaptable security level in an electronic communication

A method of communicating in a secure communication system, comprises the steps of assembling a message at a sender, then determining a frame type, and including an indication of the frame type in a header of the message. The message is then sent to a recipient and the frame type used to perform a policy check.. ... Certicom Corp

Generating cryptographic function parameters based on an observed astronomical event

Methods, systems, and computer programs for generating cryptographic function parameters are described. In some examples, astronomical data from an observed astronomical event is obtained. ... Certicom Corp

Generating cryptographic function parameters from a puzzle

Methods, systems, and computer programs for generating cryptographic function parameters are described. In some examples, a solution to a puzzle is obtained. ... Certicom Corp

Generating cryptographic function parameters from compact source code

Methods, systems, and computer programs for generating cryptographic function parameters are described. In some examples, source code that defines seed information and a pseudorandom function is accessed. ... Certicom Corp

Securing method for lawful interception

A method is presented for secure communication, the method including generating a signature using a private key, a nonce, and at least one of an identifier and a key component; and transmitting the signature, the nonce, a security parameter, and the at least one of the identifier and the key component, wherein the security parameter associates a user identity with a public key, the public key being associated with the private key.. . ... Certicom Corp








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Certicom Corp in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Certicom Corp with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###