scispace - formally typeset
Search or ask a question
Author

Ryan Conrad Brander

Bio: Ryan Conrad Brander is an academic researcher from BlackBerry Limited. The author has contributed to research in topics: Encryption & Security policy. The author has an hindex of 5, co-authored 5 publications receiving 102 citations.

Papers
More filters
Patent
29 Jan 2013
TL;DR: In this paper, a method, transmitting device, and computer-readable storage medium are provided for sharing image data between a source device and at least one receiving device, where the method also receives a request associated with activating a user interface component involving confidential information, suspends updating of the image data responsive to the received request, and periodically sends suspended image data to a receiving device while updating is suspended.
Abstract: A method, transmitting device, and computer-readable storage medium are provided for sharing image data between a source device and at least one receiving device. In one implementation, a method is provided for periodically sending image data of a shared screen to the at least one receiving device using a sharing connection. The method also receives a request associated with activating a user interface component involving confidential information, suspends updating of the image data responsive to the received request, and periodically sends suspended image data to the at least one receiving device while updating is suspended.

47 citations

Patent
02 Jun 2015
TL;DR: In this article, a wireless communication device, computer program product and method of establishing secure communications between a first wireless communications device and a second wireless communication devices for instant messaging application is provided.
Abstract: A wireless communication device, computer program product and method of establishing secure communications between a first wireless communication device and a second wireless communication device for an instant messaging application is provided. Contact information representing a contact associated with a second wireless communication device is received at the first device. The contact information includes capability information. The first device determines from the capability information whether the second device is capable of communicating using an enhanced encryption scheme, and if so, establishes a protected communication session by sending a pass phrase to the second device via an out of band channel and receiving the pass phrase back from the second device via the instant messaging application. Communication between the devices is performed using an enhanced encryption scheme.

27 citations

Patent
10 Mar 2015
TL;DR: In this paper, the authors present a method, communication device and computer program product communicate between the communication devices and a second communication device using an instant messaging application, where a third party has access and control over the second partition.
Abstract: A method, communication device and computer program product communicate between the communication device and a second communication device using an instant messaging application. The first device receives contact information identifying the second communication device and determines a contact type for the second communication device from the contact information. If the contact type is a first contact type, the contact information is stored in a first partition of a memory of the communication device. If the contact type is a second contact type, the contact information is stored in a second partition of the memory. The partitions may employ different encryption schemes or one partition may be is unencrypted. A third party has access and control over the second partition. The device communicates with the second communication device using a security policy associated with the contact type.

14 citations

Patent
02 Jun 2015
TL;DR: In this article, a system and method for initiating protected instant messaging conversations is described, enabling a shared secret to be sent to a contact to initiate a key exchange to protect messages exchanged in an instant messaging conversation, the shared secret being sent using a communication medium other than instant messaging.
Abstract: A system and method are provided for initiating protected instant messaging conversations. The method includes enabling a shared secret to be sent to a contact to initiate a key exchange to protect messages exchanged in an instant messaging conversation, the shared secret being sent using a communication medium other than instant messaging. After the shared secret has been sent, the method includes displaying a pending protected instant messaging conversation user interface prior to receiving a confirmation associated with receipt of the shared secret by the contact, the pending protected instant messaging conversation user interface comprising an option to resend the shared secret.

7 citations

Patent
02 Jun 2014
TL;DR: In this paper, a system and method for switching between messaging security policies is presented, which includes determining that a messaging security policy for the electronic device has been downgraded to a lower security level, and removing protected content from a messaging application on the electronic devices that is subjected to the security policy.
Abstract: A system and method are provided for switching between messaging security policies. The method includes determining that a messaging security policy for the electronic device has been downgraded to a lower security level, and removing protected content from a messaging application on the electronic device that is subjected to the security policy. Removing protected content can include any one or more of removing access to at least one protected instant messaging group, removing at least one multi-participant instant messaging conversation, and removing at least a portion of protected content from within a one-to-one conversation with an instant messaging contact.

7 citations


Cited by
More filters
Patent
18 Nov 2014
TL;DR: In this article, a threshold range for generating a panorama image is indicated in accordance with a bending angle of a bending portion provided between a first area of a body provided with a first camera and a second area of another body provided by a second camera.
Abstract: A display device and a method for controlling the same are disclosed in which a threshold range for generating a panorama image is indicated in accordance with a bending angle of a bending portion provided between a first area of a body provided with a first camera and a second area of a body provided with a second camera, whereby the panorama image may be generated using the first camera and the second camera.

409 citations

Patent
09 Aug 2016
TL;DR: In this article, various technologies pertaining to an extensible, cloud-based service for creating and executing applications (e.g., business or industry-specific workflows) are described, where a user knowledgeable about a particular field can utilize a client-hosted design studio or a web-based portal to create an application ("app") relevant to the particular field.
Abstract: Described herein are various technologies pertaining an extensible, cloud-based service for creating and executing applications (e.g., business or industry-specific workflows). A user knowledgeable about a particular field can utilize a client-hosted design studio or a web-based portal to create an application ("app") (e.g., data transform) relevant to the particular field. The system thus enables users to build mobile applications across platforms without having to write computer code to communicate with backend services such as data sources and/or workflow management systems.

55 citations

Patent
29 Feb 2016
TL;DR: In this article, a secure chat client is described that allows users to exchange encrypted communications via secure chat rooms, as well as one-to-one communications, and provides users with the ability to recover secure messages when they obtain a new device or otherwise lose communications.
Abstract: A secure chat client is described that allows users to exchange encrypted communications via secure chat rooms, as well as one-to-one communications. In particular, the secure chat client allows users to create, configure, and manage secure chat rooms. Furthermore, the secure chat client provides users with the ability to recover secure messages when they obtain a new device or otherwise lose communications.

28 citations

Patent
15 Jul 2013
TL;DR: In this article, a digital security bubble encapsulation (DSB) scheme was proposed, in which a first key and a device identifier of at least one recipient is requested from a first server.
Abstract: A digital security bubble encapsulation is disclosed. A first key and a device identifier of at least one recipient is requested from a first server. A message containing one or more components is encrypted using a second key. The second key is encrypted using the first key. The encrypted message, the encrypted second key, and the device identifier are encapsulated in a digital security bubble encapsulation. The digital security bubble encapsulation is transmitted to a second server.

26 citations

Patent
Justin Pike1
17 Jul 2013
TL;DR: In this paper, the authors proposed a computer-implemented authentication method comprising the step of enabling a user to input an identifier (e.g. a PIN) into an electronic device having a screen and a keypad operable within the keypad zone of the screen.
Abstract: The invention provides a computer-implemented authentication method comprising the step of enabling a user to input an identifier (e.g. a PIN) into an electronic device having a screen and a keypad operable within a keypad zone of the screen; by operating at least one key of the keypad via an image of at least part of a scrambled keypad which is displayed at least partially within the keypad zone. The user's operation of the keypad key via the image generates an encoded version of the user's intended input. In one sense the invention can be perceived as superimposing a non-functional image of a scrambled keyboard over an underlying, functional keypad. The image may be any type of electronic image, and may include a video image. The invention is particularly suited for use with, but not limited to, mobile phones, tablet computer, PCs etc. It can be implemented in any system wherein a user's identity must be verified before access is granted to a controlled resource.

25 citations