Patents by Inventor Augustin Farrugia

Augustin Farrugia has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8325913
    Abstract: Disclosed herein are systems, methods and computer readable media for performing authentication. The proposed scheme utilizes new algorithms that introduce randomness using a physical value for authentication. An exemplary method includes sharing an initial state value S(0) with a sender and a receiver, generating a sender S(t, v) based on a parameter t and an identifier v and based at least in part on the value S(0). The method includes generating a receiver S(t, v) from S(0) based on the parameter t and the identifier v wherein the parameter t is related to a physical value in authenticating the identifier v based on a comparison of the sender S(t, v) and the receiver S(t, v). The process of generating the sender S(t, v) and the receiver S(t, v) includes a random variable generated by a process such as by a random number generator, the Brownian Motion or Wiener Process. Other embodiments do not use the physical value for authentication.
    Type: Grant
    Filed: September 1, 2011
    Date of Patent: December 4, 2012
    Assignee: Apple Inc.
    Inventors: Mathieu Ciet, Augustin Farrugia, Jean-Francois Riendeau, Nicholas T. Sullivan
  • Patent number: 8175266
    Abstract: Disclosed herein are systems, method and computer readable medium for providing authentication of an entity B by an entity A. In the method, entity A selects a value p, a range [a, b] and a granularity epsilon. Entity A sends p, [a, b], and epsilon to entity B. Entity B initializes a value yB=0 and for each x in {a, a+epsilon, . . . , b?epsilon, b} and computes z=E(x)*x. The function E(x) is an encryption scheme and the multiplication is carried out mod p. Entity B updates yB=yB+z. After processing each x, entity B sends yB to entity A. Entity A performs the same calculation and generates a yA value and compares yA with yB. If yB=yA, Entity A authenticate entity B. In one aspect, a light HMAC scheme splits an input x into n blocks with key expansion.
    Type: Grant
    Filed: May 7, 2008
    Date of Patent: May 8, 2012
    Assignee: Apple Inc.
    Inventors: Mathieu Ciet, Augustin Farrugia, Jean-Francois Riendeau, Nicholas T. Sullivan
  • Publication number: 20110320814
    Abstract: Disclosed herein are systems, methods and computer readable media for performing authentication. The proposed scheme utilizes new algorithms that introduce randomness using a physical value for authentication. An exemplary method includes sharing an initial state value S(0) with a sender and a receiver, generating a sender S(t, v) based on a parameter t and an identifier v and based at least in part on the value S(0). The method includes generating a receiver S(t, v) from S(0) based on the parameter t and the identifier v wherein the parameter t is related to a physical value in authenticating the identifier v based on a comparison of the sender S(t, v) and the receiver S(t, v). The process of generating the sender S(t, v) and the receiver S(t, v) includes a random variable generated by a process such as by a random number generator, the Brownian Motion or Wiener Process. Other embodiments do not use the physical value for authentication.
    Type: Application
    Filed: September 1, 2011
    Publication date: December 29, 2011
    Applicant: Apple Inc.
    Inventors: Mathieu Ciet, Augustin Farrugia, Jean-Francois Riendeau, Nicholas T. Sullivan
  • Publication number: 20110317840
    Abstract: Disclosed herein are systems, method and computer readable medium for providing authentication of an entity B by an entity A. In the method, entity A selects a value p, a range [a, b] and a granularity epsilon. Entity A sends p, [a, b], and epsilon to entity B. Entity B initializes a value yB=0 and for each x in {a, a+epsilon, . . . , b?epsilon, b} and computes z=E(x)*x. The function E(x) is an encryption scheme and the multiplication is carried out mod p. Entity B updates yB=yB+z. After processing each x, entity B sends yB to entity A. Entity A performs the same calculation and generates a yA value and compares yA with yB. If yB=yA, Entity A authenticate entity B. In one aspect, a light HMAC scheme splits an input x into n blocks with key expansion.
    Type: Application
    Filed: September 1, 2011
    Publication date: December 29, 2011
    Applicant: Apple Inc.
    Inventors: Mathieu Ciet, Augustin Farrugia, Jean-Francois Riendeau, Nicholas T. Sullivan
  • Patent number: 8036378
    Abstract: Disclosed herein are systems, methods and computer readable media for performing authentication. The proposed scheme utilizes new algorithms that introduce randomness using a physical value for authentication. An exemplary method includes sharing an initial state value S(0) with a sender and a receiver, generating a sender S(t, v) based on a parameter t and an identifier v and based at least in part on the value S(0). The method includes generating a receiver S(t, v) from S(0) based on the parameter t and the identifier v wherein the parameter t is related to a physical value in authenticating the identifier v based on a comparison of the sender S(t, v) and the receiver S(t, v). The process of generating the sender S(t, v) and the receiver S(t, v) includes a random variable generated by a process such as by a random number generator, the Brownian Motion or Wiener Process. Other embodiments do not use the physical value for authentication.
    Type: Grant
    Filed: May 7, 2008
    Date of Patent: October 11, 2011
    Assignee: Apple Inc.
    Inventors: Mathieu Ciet, Augustin Farrugia, Jean-Francois Riendeau, Nicholas T. Sullivan
  • Publication number: 20100076778
    Abstract: Systems, graphical user interfaces and methods for upgrading from one or more digital media assets to a set of digital media assets over a network are described. A potential purchaser can be notified of available upgrade opportunities that are available for purchase. The potential purchaser can elect to pursue an upgrade opportunity so as to purchase a set of digital media assets. Upon upgrading to the set of digital media assets, the digital media assets within the set of digital media assets are made available to the purchaser. According to one aspect, a graphical user interface facilitates presenting and requesting upgrade opportunities. According to another aspect, equivalency rules and/or eligibility rules can be used to control which sets of digital media assets are available for upgrade by respective potential purchasers.
    Type: Application
    Filed: September 25, 2008
    Publication date: March 25, 2010
    Inventors: Robert H. Kondrk, Patrice Gautier, Jeffrey L. Robbin, David Heller, Augustin Farrugia
  • Patent number: 7684185
    Abstract: A docking station is disclosed. The docking station includes a display and a housing configured to hold the display in a manner that exposes a viewing surface of the display to view. The housing defines a docking area configured to receive a portable computer. The docking area is at least partly obscured by the display when viewed from the viewing surface side of the display at an angle substantially orthogonal to the viewing surface.
    Type: Grant
    Filed: July 3, 2006
    Date of Patent: March 23, 2010
    Assignee: Apple Inc.
    Inventor: Augustin Farrugia
  • Publication number: 20090279696
    Abstract: Disclosed herein are systems, method and computer readable medium for providing authentication of an entity B by an entity A. In the method, entity A selects a value p, a range [a, b] and a granularity epsilon. Entity A sends p, [a, b], and epsilon to entity B. Entity B initializes a value yB=0 and for each x in {a, a+epsilon, . . . , b?epsilon, b} and computes z=E(x)*x. The function E(x) is an encryption scheme and the multiplication is carried out mod p. Entity B updates yB=yB+z. After processing each x, entity B sends yB to entity A. Entity A performs the same calculation and generates a yA value and compares yA with yB. If yB=yA, Entity A authenticate entity B. In one aspect, a light HMAC scheme splits an input x into n blocks with key expansion.
    Type: Application
    Filed: May 7, 2008
    Publication date: November 12, 2009
    Applicant: Apple Inc.
    Inventors: Mathieu Ciet, Augustin Farrugia, Jean-Francois Riendeau, Nicholas T. Sullivan
  • Publication number: 20090279689
    Abstract: Disclosed herein are systems, methods and computer readable media for performing authentication. The proposed scheme utilizes new algorithms that introduce randomness using a physical value for authentication. An exemplary method includes sharing an initial state value S(0) with a sender and a receiver, generating a sender S(t, v) based on a parameter t and an identifier v and based at least in part on the value S(0). The method includes generating a receiver S(t, v) from S(0) based on the parameter t and the identifier v wherein the parameter t is related to a physical value in authenticating the identifier v based on a comparison of the sender S(t, v) and the receiver S(t, v). The process of generating the sender S(t, v) and the receiver S(t, v) includes a random variable generated by a process such as by a random number generator, the Brownian Motion or Wiener Process. Other embodiments do not use the physical value for authentication.
    Type: Application
    Filed: May 7, 2008
    Publication date: November 12, 2009
    Applicant: Apple Inc.
    Inventors: Mathieu Ciet, Augustin Farrugia, Jean-Francois Riendeau, Nicholas T. Sullivan
  • Publication number: 20080002350
    Abstract: A docking station is disclosed. The docking station includes a display and a housing configured to hold the display in a manner that exposes a viewing surface of the display to view. The housing defines a docking area configured to receive a portable computer; The docking area is at least partly obscured by the display when viewed from the viewing surface side of the display at an angle substantially orthogonal to the viewing surface.
    Type: Application
    Filed: July 3, 2006
    Publication date: January 3, 2008
    Inventor: Augustin Farrugia
  • Publication number: 20070265975
    Abstract: Some embodiments provide a method for determining whether a subscription for using digital content on a user device has elapsed. The method compares a first collision free image of a first set of entities in the user device with a second collision free image for a second set of entities in the user device at a second instance in time. Based on the comparison, the method determines whether the subscription has elapsed.
    Type: Application
    Filed: May 9, 2006
    Publication date: November 15, 2007
    Inventors: Augustin Farrugia, Gianpaolo Fasoli
  • Publication number: 20070260548
    Abstract: Some embodiments provide an account-based DRM system for distributing content. The system includes several devices that are associated with one particular account. The system also includes a set of DRM computers that receives a request to access a particular piece of content on the devices associated with the particular account. The DRM computer set then generates a several keys for the devices, where each particular key of each particular device allows the particular device to access the particular piece of content on the particular device. Through a network, the DRM computer set of some embodiments sends the particular piece of content and the generated keys to the devices associated with the particular account. The network is a local area network, a wide area network, or a network of networks, such as the Internet. In some of these embodiments, the DRM computer set sends the content and keys to one device (e.g.
    Type: Application
    Filed: May 3, 2006
    Publication date: November 8, 2007
    Applicant: Apple Computer, Inc.
    Inventors: Augustin Farrugia, Gianpaolo Fasoli, Jean-Francois Riendeau
  • Publication number: 20070220585
    Abstract: Some embodiments of the invention provide a digital rights management (DRM) method for distributing content to users over a network. Based on a first set of diversity indicia, the method identifies a first security element for distributing a set of content to a first computer. The set of content includes one or more pieces of content. Based on a second set of diversity indicia, the method identifies a second security element for distributing the set of content to a second computer. Based on the first security element, method protects the set of content for the first computer and sends the protected set of content to the first computer through the network. Based on the second security element, the method protects the set of content for the second computer and sends the protected set of content to the second computer through the network.
    Type: Application
    Filed: March 1, 2006
    Publication date: September 20, 2007
    Inventors: Augustin Farrugia, Gianpaolo Fasoli, Jean-Francois Riendeau
  • Publication number: 20070220261
    Abstract: Some embodiments of the invention provide a method of verifying the integrity of digital content. At a source of the digital content, the method generates a signature for the digital content by applying a hashing function to a particular portion of the digital content, where the particular portion is less than the entire digital content. The method supplies the signature and the digital content to a device. At the device, the method applies the hashing function to the particular portion of the digital content in order to verify the supplied signature, and thereby verifies the integrity of the supplied digital content.
    Type: Application
    Filed: March 15, 2006
    Publication date: September 20, 2007
    Inventors: Augustin Farrugia, Jean-Francois Riendeau
  • Publication number: 20070083473
    Abstract: Some embodiments of the invention provide a method for distributing content over a network. The method distributes a single media storage structure to a device (e.g., a computer, portable player, etc.) that connects to the network. The media storage structure includes first and second pieces of encrypted content. Based on whether the device is allowed to access the first piece of content, the second piece of content, or both, the method provides the device with a set of keys for decrypting the pieces of the content that the device is able to access. The provided set of keys might include one or more keys for decrypting only one of the two encrypted pieces of content. Alternatively, it might include one or more keys for decrypting both encrypted pieces of content. For instance, the selected set of keys might include a first key for decrypting the first encrypted piece and a second key for decrypting the second encrypted piece.
    Type: Application
    Filed: October 11, 2005
    Publication date: April 12, 2007
    Inventors: Augustin Farrugia, Thomas Dowdy, Gianpaolo Fasoli
  • Publication number: 20040040026
    Abstract: A linking engine providing a process of matching the logic of an application, described in a application logic unit, with the hardware specific description of the application for use with applications run on smart card terminals. The hardware specific description of the application is contained in dictionaries. The linking engine tests dictionaries for compatibility with the application logic unit by running a process that returns a predetermined response only when the dictionary describes the hardware implementation used in the test. A dictionary outputting the correct response is linked by the linking engine to provide the description of the hardware implemented in running the logic of the application.
    Type: Application
    Filed: June 8, 1999
    Publication date: February 26, 2004
    Applicant: ThinkPulse, Inc.
    Inventor: Augustin Farrugia
  • Publication number: 20020008147
    Abstract: The invention concerns a method for the making of chip cards, wherein the entire manufacturing method is carried out on a standard format card, and then a chip card with a smaller format than the standard format is cut out from this card.
    Type: Application
    Filed: December 11, 2000
    Publication date: January 24, 2002
    Applicant: Gemplus Card International
    Inventors: Gerard Coiton, Augustin Farrugia
  • Patent number: 5680353
    Abstract: Electrically programmable memories, in particular EPROMs, generally have an internal signature which can be read by the memory-programming device. This internal signature indicates the origin of the part (manufacturer's identification) and the appropriate programming mode for the part (fast programming, "intelligent" programming, etc.). Here, it is proposed that this information be recorded in a UPROM (unerasable programmable read-only) memory, i.e., in practice an EPROM memory masked by a layer of aluminium which prevents its erasure by ultraviolet rays.
    Type: Grant
    Filed: September 3, 1993
    Date of Patent: October 21, 1997
    Assignee: SGS-Thomson Microelectronics, S.A.
    Inventors: Jean-Marie Gaultier, Bertrand Conan, Augustin Farrugia
  • Patent number: 5625791
    Abstract: In chip cards comprising non-volatile electrically erasable and programmable memories, to avoid the risks due to an ageing of the EEPROM memories, there is provided a procedure for the automatic refreshing of the contents of certain zones of the memory. The refreshing can take place at predetermined time intervals or at the end of a predetermined number of uses or routinely, whenever the card is powered, when the refresh operation relates to only one part of a zone, the address of this part being obtained by means of a random generator.
    Type: Grant
    Filed: December 20, 1993
    Date of Patent: April 29, 1997
    Assignee: Gemplus Card International
    Inventors: Augustin Farrugia, Fran.cedilla.ois Geronimi
  • Patent number: 5138580
    Abstract: A method for erasure of EEPROM memory cells consists, at the start of each erasure operation, in opening a counter in a RAM memory, carrying out a cycle of erasure as stipulated by the manufacturer, and then a cycle for reading and for comparing the voltage read with an expected voltage corresponding to the "erased" state of the memory cell. Then, if the voltage read is not the expected voltage, in incrementing the counter and ordering a new cycle of erasure, reading and comparison. When the voltage read is the expected voltage, a return code characteristic of the content of the counter and, hence, of the number of erasure cycles that have been necessary for the erasure operation, is transmitted to the user. The method can be applied, notably, to EEPROM memory devices used chip cards.
    Type: Grant
    Filed: May 30, 1990
    Date of Patent: August 11, 1992
    Assignee: Gemplus Card International
    Inventors: Augustin Farrugia, Gerard Binguy