Patents by Inventor Dolores F. Howry

Dolores F. Howry has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20140226562
    Abstract: A method and apparatus are described for maintaining communications connectivity for client applications that send keep-alive messages and network applications that send client-alive (i.e., “are you there?”) messages. The client applications may register with a client proxy provided in an operating system (OS) of a wireless transmit/receive unit (WTRU) and indicate a respective keep-alive message signaling rate. The network applications may register with a network proxy provided in an OS of a network node and indicate a respective client-alive message signaling rate. The client proxy and/or the network proxy may, respectively, register and prioritize keep-alive and/or client-alive message requirements, determine an optimal signaling rate based on the respective keep-alive and/or client-alive message signaling rates, and generate proxy messages, (i.e., an application layer proxy keep-alive message and/or a network layer proxy client-alive message), associated with the keep-alive and/or client-alive messages.
    Type: Application
    Filed: June 12, 2012
    Publication date: August 14, 2014
    Applicant: INTERDIGITAL PATENT HOLDINGS, INC.
    Inventors: Yogendra C. Shah, Dolores F. Howry, Peter S. Wang, Ulises Olvera-Hernandez
  • Publication number: 20140082352
    Abstract: A certification provenance tree (CPT) structure may provide information concerning a layered certification of a device that comprises a hierarchy of components. The CPT structure may include a hierarchy of secure certification provenance document (SCPD) structures. Each SCPD structure in the hierarchy may represent a given component at a given level of the hierarchy of components of the device. Each SCPD structure may include a field that stores a certification proof indicating that security properties of the given component have been certified by a certification authority. An SCPD structure may further include accreditation information fields that store a pointer to an SCPD structure of a component at a next layer of the hierarchy of components of the device. The pointer may provide an indication of assurance that the component at that next layer will perform securely within this component at said given layer.
    Type: Application
    Filed: September 19, 2013
    Publication date: March 20, 2014
    Inventors: Dolores F. Howry, Yogendra C. Shah, Alec Brusilovsky, Joseph Gredone
  • Publication number: 20140050320
    Abstract: WTRUs, ARSs, APs, WLG/AAA proxies, networks, and methods thereon are disclosed for fast security setup on a multi-RAT WTRU. Methods of sharing security associations between RATs on a multi-RAT WTRU are disclosed. Methods of caching security associations are disclosed. Methods are disclosed for alerting an ANDSF server of an AP that should be considered for association. Enhancements to advertisements from an AP are disclosed where the advertisements may include SSID with a FQDN, a HESSID type information, or TAI type information. Methods of resolving AP identities to a reachable address are disclosed. An address resolution protocol is disclosed for resolving AP identities. ARSs are disclosed that may resolve a BSSID to a network routable address. Protocols for carrying AP identities and security parameters are disclosed. Methods are disclosed of using ANDSF to provide the WTRU with security information and parameters of an AP. An RSN may indicate security capabilities.
    Type: Application
    Filed: August 15, 2013
    Publication date: February 20, 2014
    Applicant: INTERDIGITAL PATENT HOLDINGS, INC.
    Inventors: Vinod K. Choyi, Yogendra C. Shah, Dolores F. Howry, Alpaslan Demir, Amith V. Chincholi, Sanjay Goyal, Yousif Targali
  • Patent number: 8533803
    Abstract: A trusted computing environment, such as a smartcard, UICC, Java card, global platform, or the like may be used as a local host trust center and a proxy for a single-sign on (SSO) provider. This may be referred to as a local SSO provider (OP). This may be done, for example, to keep authentication traffic local and to prevent over the air communications, which may burden an operator network. To establish the OP proxy in the trusted environment, the trusted environment may bind to the SSO provider in a number of ways. For example, the SSO provider may interoperate with UICC-based UE authentication or GBA. In this way, user equipment may leverage the trusted environment in order to provide increased security and reduce over the air communications and authentication burden on the OP or operator network.
    Type: Grant
    Filed: February 9, 2011
    Date of Patent: September 10, 2013
    Assignee: InterDigital Patent Holdings, Inc.
    Inventors: Inhyok Cha, Andreas Schmidt, Andreas Leicher, Yogendra C. Shah, Louis J. Guccione, Dolores F. Howry
  • Publication number: 20130155948
    Abstract: Disclosed herein are methods and devices for sharing a packet data protocol (PDP) context among a plurality of devices. For example, a method or sharing a PDP context among a plurality of devices may include a wireless transmit/receive unit (WTRU) sending a request to establish or modify a PDP context. The request to establish or modify the PDP context may include an indication that the WTRU is a member of shared context group. The method may also include the WTRU receiving a response indicating that the request to establish or modify the PDP context was accepted. The method may also include the WTRU acting as a gateway for at least one other device in the shared context group. The request to establish or modify the PDP context may be an attach request. The indication that the WTRU is a member of shared context group may be a group identifier (ID).
    Type: Application
    Filed: March 30, 2012
    Publication date: June 20, 2013
    Applicant: INTERDIGITAL PATENT HOLDINGS, INC.
    Inventors: Ana Lucia A. Pinheiro, Samian J. Kaur, Dolores F. Howry, Michael F. Starsinic, Debjani Majumder, Dale N. Seed, Chonggang Wang, Lijun Dong, Guang Lu, Zongrui Ding
  • Publication number: 20120290870
    Abstract: A wireless communications device may be configured to perform integrity checking and interrogation with a network entity to isolate a portion of a failed component on the wireless network device for remediation. Once an integrity failure is determined on a component of the device, the device may identify a functionality associated with the component and indicate the failed functionality to the network entity. Both the wireless network device and the network entity may identify the failed functionality and/or failed component using a component-to-functionality map. After receiving an indication of an integrity failure at the device, the network entity may determine that one or more additional iterations of integrity checking may be performed at the device to narrow the scope of the integrity failure on the failed component. Once the integrity failure is isolated, the network entity may remediate a portion of the failed component on the wireless communications device.
    Type: Application
    Filed: November 4, 2011
    Publication date: November 15, 2012
    Applicant: InterDigital Patent Holdings, Inc.
    Inventors: Yogendra C. Shah, Lawrence Case, Dolores F. Howry, Inhyok Cha, Andreas Leicher, Andreas Schmidt
  • Publication number: 20120072979
    Abstract: A trusted computing environment, such as a smartcard, UICC, Java card, global platform, or the like may be used as a local host trust center and a proxy for a single-sign on (SSO) provider. This may be referred to as a local SSO provider (OP). This may be done, for example, to keep authentication traffic local and to prevent over the air communications, which may burden an operator network. To establish the OP proxy in the trusted environment, the trusted environment may bind to the SSO provider in a number of ways. For example, the SSO provider may interoperate with UICC-based UE authentication or GBA. In this way, user equipment may leverage the trusted environment in order to provide increased security and reduce over the air communications and authentication burden on the OP or operator network.
    Type: Application
    Filed: February 9, 2011
    Publication date: March 22, 2012
    Applicant: INTERDIGITAL PATENT HOLDINGS, INC.
    Inventors: Inhyok Cha, Andreas Schmidt, Andreas Leicher, Yogendra C. Shah, Louis J. Guccione, Dolores F. Howry
  • Publication number: 20110265153
    Abstract: Methods and apparatus are disclosed to provide protection against Unsolicited Communication (UC) in a network, such as, without limitation, an Internet Protocol (IP) Multimedia Subsystem (IMS). A communication may originate from a sending device and may be intended for delivery to a receiving device. A network may determine authentication information associated with the sending device. The network may send the authentication information to a receiving entity to evaluate if the communication is unsolicited using the authentication information. If the communication is determined to be acceptable, a connection associated with the communication may be allowed.
    Type: Application
    Filed: October 22, 2010
    Publication date: October 27, 2011
    Applicant: INTERDIGITAL PATENT HOLDINGS, INC.
    Inventors: Louis J. Guccione, Inhyok Cha, Andreas Schmidt, Andreas Leicher, David G. Greiner, Dolores F. Howry
  • Publication number: 20110041003
    Abstract: An apparatus and method for providing home evolved node-B (H(e)NB) integrity verification and validation using autonomous validation and semi-autonomous validation is disclosed herein.
    Type: Application
    Filed: March 5, 2010
    Publication date: February 17, 2011
    Applicant: INTERDIGITAL PATENT HOLDINGS, INC.
    Inventors: Sudhir B. Pattar, Inhyok Cha, Andreas U. Schmidt, Andreas Leicher, Yogendra C. Shah, Dolores F. Howry, David G. Greiner, Lawrence L. Case, Michael V. Meyerstein, Louis J. Guccione
  • Publication number: 20110010543
    Abstract: Methods, components and apparatus for implementing platform validation and management (PVM) are disclosed. PVM provides the functionality and operations of a platform validation entity with remote management of devices by device management components and systems such as a home node-B management system or component. Example PVM operations bring devices into a secure target state before allowing connectivity and access to a core network.
    Type: Application
    Filed: March 5, 2010
    Publication date: January 13, 2011
    Applicant: INTERDIGITAL PATENT HOLDINGS, INC.
    Inventors: Andreas U. Schmidt, Andreas Leicher, Inhyok Cha, Yogendra C. Shah, Sudhir B. Pattar, Dolores F. Howry, David G. Greiner, Lawrence Case, Michael V. Meyerstein, Louis J. Guccione
  • Publication number: 20080222463
    Abstract: An apparatus, method and product for independently testing communications components are disclosed. A testing apparatus is provided that has a test control component which includes an input configured to receive a test script, an upper interface coupling and a lower upper interface coupling. In operation, a protocol stack component to be tested is coupled to the test control component via upper and lower interfaces.
    Type: Application
    Filed: March 4, 2008
    Publication date: September 11, 2008
    Applicant: INTERDIGITAL TECHNOLOGY CORPORATION
    Inventors: Rangaprabhu Parthasarathy, Dolores F. Howry, Jeffrey T. Davis, Scott C. Hergenhan