Patents by Inventor Augustin Farrugia
Augustin Farrugia has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8325913Abstract: Disclosed herein are systems, methods and computer readable media for performing authentication. The proposed scheme utilizes new algorithms that introduce randomness using a physical value for authentication. An exemplary method includes sharing an initial state value S(0) with a sender and a receiver, generating a sender S(t, v) based on a parameter t and an identifier v and based at least in part on the value S(0). The method includes generating a receiver S(t, v) from S(0) based on the parameter t and the identifier v wherein the parameter t is related to a physical value in authenticating the identifier v based on a comparison of the sender S(t, v) and the receiver S(t, v). The process of generating the sender S(t, v) and the receiver S(t, v) includes a random variable generated by a process such as by a random number generator, the Brownian Motion or Wiener Process. Other embodiments do not use the physical value for authentication.Type: GrantFiled: September 1, 2011Date of Patent: December 4, 2012Assignee: Apple Inc.Inventors: Mathieu Ciet, Augustin Farrugia, Jean-Francois Riendeau, Nicholas T. Sullivan
-
Patent number: 8175266Abstract: Disclosed herein are systems, method and computer readable medium for providing authentication of an entity B by an entity A. In the method, entity A selects a value p, a range [a, b] and a granularity epsilon. Entity A sends p, [a, b], and epsilon to entity B. Entity B initializes a value yB=0 and for each x in {a, a+epsilon, . . . , b?epsilon, b} and computes z=E(x)*x. The function E(x) is an encryption scheme and the multiplication is carried out mod p. Entity B updates yB=yB+z. After processing each x, entity B sends yB to entity A. Entity A performs the same calculation and generates a yA value and compares yA with yB. If yB=yA, Entity A authenticate entity B. In one aspect, a light HMAC scheme splits an input x into n blocks with key expansion.Type: GrantFiled: May 7, 2008Date of Patent: May 8, 2012Assignee: Apple Inc.Inventors: Mathieu Ciet, Augustin Farrugia, Jean-Francois Riendeau, Nicholas T. Sullivan
-
Publication number: 20110320814Abstract: Disclosed herein are systems, methods and computer readable media for performing authentication. The proposed scheme utilizes new algorithms that introduce randomness using a physical value for authentication. An exemplary method includes sharing an initial state value S(0) with a sender and a receiver, generating a sender S(t, v) based on a parameter t and an identifier v and based at least in part on the value S(0). The method includes generating a receiver S(t, v) from S(0) based on the parameter t and the identifier v wherein the parameter t is related to a physical value in authenticating the identifier v based on a comparison of the sender S(t, v) and the receiver S(t, v). The process of generating the sender S(t, v) and the receiver S(t, v) includes a random variable generated by a process such as by a random number generator, the Brownian Motion or Wiener Process. Other embodiments do not use the physical value for authentication.Type: ApplicationFiled: September 1, 2011Publication date: December 29, 2011Applicant: Apple Inc.Inventors: Mathieu Ciet, Augustin Farrugia, Jean-Francois Riendeau, Nicholas T. Sullivan
-
Publication number: 20110317840Abstract: Disclosed herein are systems, method and computer readable medium for providing authentication of an entity B by an entity A. In the method, entity A selects a value p, a range [a, b] and a granularity epsilon. Entity A sends p, [a, b], and epsilon to entity B. Entity B initializes a value yB=0 and for each x in {a, a+epsilon, . . . , b?epsilon, b} and computes z=E(x)*x. The function E(x) is an encryption scheme and the multiplication is carried out mod p. Entity B updates yB=yB+z. After processing each x, entity B sends yB to entity A. Entity A performs the same calculation and generates a yA value and compares yA with yB. If yB=yA, Entity A authenticate entity B. In one aspect, a light HMAC scheme splits an input x into n blocks with key expansion.Type: ApplicationFiled: September 1, 2011Publication date: December 29, 2011Applicant: Apple Inc.Inventors: Mathieu Ciet, Augustin Farrugia, Jean-Francois Riendeau, Nicholas T. Sullivan
-
Patent number: 8036378Abstract: Disclosed herein are systems, methods and computer readable media for performing authentication. The proposed scheme utilizes new algorithms that introduce randomness using a physical value for authentication. An exemplary method includes sharing an initial state value S(0) with a sender and a receiver, generating a sender S(t, v) based on a parameter t and an identifier v and based at least in part on the value S(0). The method includes generating a receiver S(t, v) from S(0) based on the parameter t and the identifier v wherein the parameter t is related to a physical value in authenticating the identifier v based on a comparison of the sender S(t, v) and the receiver S(t, v). The process of generating the sender S(t, v) and the receiver S(t, v) includes a random variable generated by a process such as by a random number generator, the Brownian Motion or Wiener Process. Other embodiments do not use the physical value for authentication.Type: GrantFiled: May 7, 2008Date of Patent: October 11, 2011Assignee: Apple Inc.Inventors: Mathieu Ciet, Augustin Farrugia, Jean-Francois Riendeau, Nicholas T. Sullivan
-
Publication number: 20100076778Abstract: Systems, graphical user interfaces and methods for upgrading from one or more digital media assets to a set of digital media assets over a network are described. A potential purchaser can be notified of available upgrade opportunities that are available for purchase. The potential purchaser can elect to pursue an upgrade opportunity so as to purchase a set of digital media assets. Upon upgrading to the set of digital media assets, the digital media assets within the set of digital media assets are made available to the purchaser. According to one aspect, a graphical user interface facilitates presenting and requesting upgrade opportunities. According to another aspect, equivalency rules and/or eligibility rules can be used to control which sets of digital media assets are available for upgrade by respective potential purchasers.Type: ApplicationFiled: September 25, 2008Publication date: March 25, 2010Inventors: Robert H. Kondrk, Patrice Gautier, Jeffrey L. Robbin, David Heller, Augustin Farrugia
-
Patent number: 7684185Abstract: A docking station is disclosed. The docking station includes a display and a housing configured to hold the display in a manner that exposes a viewing surface of the display to view. The housing defines a docking area configured to receive a portable computer. The docking area is at least partly obscured by the display when viewed from the viewing surface side of the display at an angle substantially orthogonal to the viewing surface.Type: GrantFiled: July 3, 2006Date of Patent: March 23, 2010Assignee: Apple Inc.Inventor: Augustin Farrugia
-
Publication number: 20090279696Abstract: Disclosed herein are systems, method and computer readable medium for providing authentication of an entity B by an entity A. In the method, entity A selects a value p, a range [a, b] and a granularity epsilon. Entity A sends p, [a, b], and epsilon to entity B. Entity B initializes a value yB=0 and for each x in {a, a+epsilon, . . . , b?epsilon, b} and computes z=E(x)*x. The function E(x) is an encryption scheme and the multiplication is carried out mod p. Entity B updates yB=yB+z. After processing each x, entity B sends yB to entity A. Entity A performs the same calculation and generates a yA value and compares yA with yB. If yB=yA, Entity A authenticate entity B. In one aspect, a light HMAC scheme splits an input x into n blocks with key expansion.Type: ApplicationFiled: May 7, 2008Publication date: November 12, 2009Applicant: Apple Inc.Inventors: Mathieu Ciet, Augustin Farrugia, Jean-Francois Riendeau, Nicholas T. Sullivan
-
Publication number: 20090279689Abstract: Disclosed herein are systems, methods and computer readable media for performing authentication. The proposed scheme utilizes new algorithms that introduce randomness using a physical value for authentication. An exemplary method includes sharing an initial state value S(0) with a sender and a receiver, generating a sender S(t, v) based on a parameter t and an identifier v and based at least in part on the value S(0). The method includes generating a receiver S(t, v) from S(0) based on the parameter t and the identifier v wherein the parameter t is related to a physical value in authenticating the identifier v based on a comparison of the sender S(t, v) and the receiver S(t, v). The process of generating the sender S(t, v) and the receiver S(t, v) includes a random variable generated by a process such as by a random number generator, the Brownian Motion or Wiener Process. Other embodiments do not use the physical value for authentication.Type: ApplicationFiled: May 7, 2008Publication date: November 12, 2009Applicant: Apple Inc.Inventors: Mathieu Ciet, Augustin Farrugia, Jean-Francois Riendeau, Nicholas T. Sullivan
-
Publication number: 20080002350Abstract: A docking station is disclosed. The docking station includes a display and a housing configured to hold the display in a manner that exposes a viewing surface of the display to view. The housing defines a docking area configured to receive a portable computer; The docking area is at least partly obscured by the display when viewed from the viewing surface side of the display at an angle substantially orthogonal to the viewing surface.Type: ApplicationFiled: July 3, 2006Publication date: January 3, 2008Inventor: Augustin Farrugia
-
Publication number: 20070265975Abstract: Some embodiments provide a method for determining whether a subscription for using digital content on a user device has elapsed. The method compares a first collision free image of a first set of entities in the user device with a second collision free image for a second set of entities in the user device at a second instance in time. Based on the comparison, the method determines whether the subscription has elapsed.Type: ApplicationFiled: May 9, 2006Publication date: November 15, 2007Inventors: Augustin Farrugia, Gianpaolo Fasoli
-
Publication number: 20070260548Abstract: Some embodiments provide an account-based DRM system for distributing content. The system includes several devices that are associated with one particular account. The system also includes a set of DRM computers that receives a request to access a particular piece of content on the devices associated with the particular account. The DRM computer set then generates a several keys for the devices, where each particular key of each particular device allows the particular device to access the particular piece of content on the particular device. Through a network, the DRM computer set of some embodiments sends the particular piece of content and the generated keys to the devices associated with the particular account. The network is a local area network, a wide area network, or a network of networks, such as the Internet. In some of these embodiments, the DRM computer set sends the content and keys to one device (e.g.Type: ApplicationFiled: May 3, 2006Publication date: November 8, 2007Applicant: Apple Computer, Inc.Inventors: Augustin Farrugia, Gianpaolo Fasoli, Jean-Francois Riendeau
-
Publication number: 20070220585Abstract: Some embodiments of the invention provide a digital rights management (DRM) method for distributing content to users over a network. Based on a first set of diversity indicia, the method identifies a first security element for distributing a set of content to a first computer. The set of content includes one or more pieces of content. Based on a second set of diversity indicia, the method identifies a second security element for distributing the set of content to a second computer. Based on the first security element, method protects the set of content for the first computer and sends the protected set of content to the first computer through the network. Based on the second security element, the method protects the set of content for the second computer and sends the protected set of content to the second computer through the network.Type: ApplicationFiled: March 1, 2006Publication date: September 20, 2007Inventors: Augustin Farrugia, Gianpaolo Fasoli, Jean-Francois Riendeau
-
Publication number: 20070220261Abstract: Some embodiments of the invention provide a method of verifying the integrity of digital content. At a source of the digital content, the method generates a signature for the digital content by applying a hashing function to a particular portion of the digital content, where the particular portion is less than the entire digital content. The method supplies the signature and the digital content to a device. At the device, the method applies the hashing function to the particular portion of the digital content in order to verify the supplied signature, and thereby verifies the integrity of the supplied digital content.Type: ApplicationFiled: March 15, 2006Publication date: September 20, 2007Inventors: Augustin Farrugia, Jean-Francois Riendeau
-
Publication number: 20070083473Abstract: Some embodiments of the invention provide a method for distributing content over a network. The method distributes a single media storage structure to a device (e.g., a computer, portable player, etc.) that connects to the network. The media storage structure includes first and second pieces of encrypted content. Based on whether the device is allowed to access the first piece of content, the second piece of content, or both, the method provides the device with a set of keys for decrypting the pieces of the content that the device is able to access. The provided set of keys might include one or more keys for decrypting only one of the two encrypted pieces of content. Alternatively, it might include one or more keys for decrypting both encrypted pieces of content. For instance, the selected set of keys might include a first key for decrypting the first encrypted piece and a second key for decrypting the second encrypted piece.Type: ApplicationFiled: October 11, 2005Publication date: April 12, 2007Inventors: Augustin Farrugia, Thomas Dowdy, Gianpaolo Fasoli
-
Publication number: 20040040026Abstract: A linking engine providing a process of matching the logic of an application, described in a application logic unit, with the hardware specific description of the application for use with applications run on smart card terminals. The hardware specific description of the application is contained in dictionaries. The linking engine tests dictionaries for compatibility with the application logic unit by running a process that returns a predetermined response only when the dictionary describes the hardware implementation used in the test. A dictionary outputting the correct response is linked by the linking engine to provide the description of the hardware implemented in running the logic of the application.Type: ApplicationFiled: June 8, 1999Publication date: February 26, 2004Applicant: ThinkPulse, Inc.Inventor: Augustin Farrugia
-
Publication number: 20020008147Abstract: The invention concerns a method for the making of chip cards, wherein the entire manufacturing method is carried out on a standard format card, and then a chip card with a smaller format than the standard format is cut out from this card.Type: ApplicationFiled: December 11, 2000Publication date: January 24, 2002Applicant: Gemplus Card InternationalInventors: Gerard Coiton, Augustin Farrugia
-
Patent number: 5680353Abstract: Electrically programmable memories, in particular EPROMs, generally have an internal signature which can be read by the memory-programming device. This internal signature indicates the origin of the part (manufacturer's identification) and the appropriate programming mode for the part (fast programming, "intelligent" programming, etc.). Here, it is proposed that this information be recorded in a UPROM (unerasable programmable read-only) memory, i.e., in practice an EPROM memory masked by a layer of aluminium which prevents its erasure by ultraviolet rays.Type: GrantFiled: September 3, 1993Date of Patent: October 21, 1997Assignee: SGS-Thomson Microelectronics, S.A.Inventors: Jean-Marie Gaultier, Bertrand Conan, Augustin Farrugia
-
Patent number: 5625791Abstract: In chip cards comprising non-volatile electrically erasable and programmable memories, to avoid the risks due to an ageing of the EEPROM memories, there is provided a procedure for the automatic refreshing of the contents of certain zones of the memory. The refreshing can take place at predetermined time intervals or at the end of a predetermined number of uses or routinely, whenever the card is powered, when the refresh operation relates to only one part of a zone, the address of this part being obtained by means of a random generator.Type: GrantFiled: December 20, 1993Date of Patent: April 29, 1997Assignee: Gemplus Card InternationalInventors: Augustin Farrugia, Fran.cedilla.ois Geronimi
-
Patent number: 5138580Abstract: A method for erasure of EEPROM memory cells consists, at the start of each erasure operation, in opening a counter in a RAM memory, carrying out a cycle of erasure as stipulated by the manufacturer, and then a cycle for reading and for comparing the voltage read with an expected voltage corresponding to the "erased" state of the memory cell. Then, if the voltage read is not the expected voltage, in incrementing the counter and ordering a new cycle of erasure, reading and comparison. When the voltage read is the expected voltage, a return code characteristic of the content of the counter and, hence, of the number of erasure cycles that have been necessary for the erasure operation, is transmitted to the user. The method can be applied, notably, to EEPROM memory devices used chip cards.Type: GrantFiled: May 30, 1990Date of Patent: August 11, 1992Assignee: Gemplus Card InternationalInventors: Augustin Farrugia, Gerard Binguy