Patents by Inventor Ezzat A. Dabbish

Ezzat A. Dabbish has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20040003232
    Abstract: A configured component of a vehicle obtains from a certification authority a certification that an authentic component is associated with a cryptographic key. The certification certifies that the cryptographic key is bound to information identifying the authentic component, and may be implemented, for example, with a digital certificate obtained from a certificate authority. The configured component utilizes the cryptographic key obtained from the certification authority in cryptographic communication with the prospective component, and determines whether the prospective component is the authentic component based on whether the cryptographic key is successfully utilized in the cryptographic communication. Upon determining the prospective component is the authentic component, the configured component may allow the prospective vehicle to operate the component.
    Type: Application
    Filed: June 28, 2002
    Publication date: January 1, 2004
    Inventors: Samuel M. Levenson, Ezzat A. Dabbish, Walton L. Fehr, Larry C. Puhl, Jurgen Reinold
  • Publication number: 20040003230
    Abstract: A vehicle accesses a secure device having limited accessibility but being accessible by a service technician. The secure device stores a first cryptographic key associated with the service technician. The vehicle also obtains from a certification authority a certification that an authentic technician is associated with a second cryptographic key corresponding to the first cryptographic key. The certification certifies that the second cryptographic key is bound to information identifying the authentic technician. The vehicle utilizes the second cryptographic key obtained from the certification authority in cryptographic communication with the secure device, and determines whether the service technician is the authentic technician based on whether the cryptographic key is successfully utilized in the cryptographic communication. Upon determining the service technician is the authentic technician, the vehicle may allow the prospective component to become operative within the vehicle.
    Type: Application
    Filed: June 28, 2002
    Publication date: January 1, 2004
    Inventors: Larry C. Puhl, Ezzat A. Dabbish, Walton L. Fehr, Samuel M. Levenson, Jurgen Reinold
  • Publication number: 20040003245
    Abstract: A vehicle authenticates a first prospective component by obtaining from a certification authority a certification that an authentic component is associated with a cryptographic key unique to the first prospective component and determining whether the first prospective component is the authentic component based on whether the cryptographic key is successfully utilized in cryptographic communication with the first prospective component. The vehicle authenticates a component class of a second prospective component by obtaining from a certification authority a certification that an authentic component of the component class is associated with a second cryptographic key unique to the component class and determining whether the second prospective component is an authentic component of the component class based on whether the second cryptographic key is successfully utilized in the cryptographic communication with the second prospective component.
    Type: Application
    Filed: June 28, 2002
    Publication date: January 1, 2004
    Inventors: Ezzat A. Dabbish, Larry C. Puhl
  • Publication number: 20030147534
    Abstract: A telematics communication system (100) includes an infrastructure (140) and a vehicle (102), the vehicle including at least one in-vehicle system (104, 118) and a wireless gateway (120) in communication with an authenticated vehicle gateway (108). The authenticated vehicle gateway authenticates the wireless gateway and the at least one in-vehicle system and processes service requests and authenticated service grants for the authenticated wireless gateway and the authenticated in-vehicle system.
    Type: Application
    Filed: February 6, 2002
    Publication date: August 7, 2003
    Inventors: Sewim F. Ablay, Ronald G. Akers, Ezzat A. Dabbish, Mark A. Gannon, Donald J. Remboski, Bryan Thale
  • Publication number: 20030084298
    Abstract: A method of authenticating digital content of a digital object. Content is divided into portions or chunks. A chunk hash of each chunk is calculated to provide chunk hashes that are stored as entries in a hash table. The chunk hash entries of the hash table are in turn hashed to create an overall hash of the hash table. Verification of the content first includes determining whether a recalculated overall hash of the hash table matches the previously calculated overall hash of the hash table. If the recalculated overall hash does match, this indicates that the hash table is authenticated and that the authenticity of the individual chunks can be verified. Verification of the authenticity of an individual chunk, which may be performed concurrently with the processing of the individual chunk, allows the content of the digital object to be incrementally rendered, chunk by chunk, resulting in a much faster and efficient rendering of the verified digital content.
    Type: Application
    Filed: October 25, 2001
    Publication date: May 1, 2003
    Inventors: Thomas S. Messerges, Ezzat A. Dabbish, Larry Puhl, Douglas A. Kuhlman
  • Publication number: 20020157002
    Abstract: A domain-based digital rights management (DRM) method and system. A domain has one or more communication devices, such as user devices that share a common cryptographic key of the domain. There may be a plurality of domains in a digital rights management environment and the domains may additionally be overlapping. A domain authority, in combination with a digital rights management module of a communication device, operates to selectively register and unregister the communication device to the one or more domains and to control access to encrypted digital content information.
    Type: Application
    Filed: August 29, 2001
    Publication date: October 24, 2002
    Inventors: Thomas S. Messerges, Ezzat A. Dabbish, Larry Puhl, Dean Vogler
  • Patent number: 6298135
    Abstract: Apparatus in form of a microelectronic assembly including an integrated circuit (IC) for execution of an embedded modular exponentiation program utilizing a square-and-multiply algorithm, wherein in the modular exponentiation program a secret exponent having a plurality of bits characterizes a private key, a method of providing a digital signature to prevent the detection of the secret exponent when monitoring power variations during the IC execution, the method comprising the steps of for a first operation in the modular exponentiation, selecting at least one predetermined bit, wherein the at least one predetermined bit is a bit other than a least significant bit (LSB) and the most significant bit (MSB); using the square-and-multiply algorithm, sequentially selecting bits to the left of the at least one predetermined bit for exponentiation until the MSB is selected; subsequent to selecting the MSB, sequentially selecting bits to the right of the at least one predetermined bit for exponentiation until the LSB
    Type: Grant
    Filed: April 29, 1999
    Date of Patent: October 2, 2001
    Assignee: Motorola, Inc.
    Inventors: Thomas S. Messerges, Ezzat A. Dabbish
  • Patent number: 6295606
    Abstract: An apparatus and method for preventing information leakage attacks on a microelectronic assembly is described for performing a cryptographic algorithm by transforming a first function, used by the cryptographic algorithm, into a second function. The method includes receiving (1102) a masked input data having n number of bits that is masked with an input mask, wherein n is a first predetermined integer. The method also includes processing (1104) the masked input data using a second function based on a predetermined masking scheme, and producing (1106) a masked output data having m number of bits that is masked with an output mask, wherein m is a second predetermined integer.
    Type: Grant
    Filed: July 26, 1999
    Date of Patent: September 25, 2001
    Assignee: Motorola, Inc.
    Inventors: Thomas S. Messerges, Ezzat A. Dabbish, Larry Puhl
  • Patent number: 6223291
    Abstract: A wireless electronic commerce system (10) comprising a wireless gateway (18) to a wireless network (19) with which a wireless device (11) having a unique client identifier (ID) is capable of communicating. A server (15) or servers (15 and 16) is/are coupleable to the wireless gateway, delivering content items (e.g. software products) to the wireless device (11) and maintaining digital content certificates for content items and digital license certificates for licenses for the content items. The server maintains, for each wireless client associated with the system, a record of licenses for that client and a record of content items associated with each license.
    Type: Grant
    Filed: March 26, 1999
    Date of Patent: April 24, 2001
    Assignee: Motorola, Inc.
    Inventors: Larry C. Puhl, Dean H. Vogler, Ezzat A. Dabbish
  • Patent number: 6169492
    Abstract: A method of user-transparent auto re-synchronization for a remote keyless entry system includes assigning a default challenge-count window (101). A first data packet including a first transmitter-side symbolic count (103) and a first command code is transmitted by a transmitter (200) and authenticated by a receiver (250). An auto-synchronization challenge-count window is assigned when the first transmitter-side symbolic count (103) is not bounded within the challenge-count window (109). A second data packet including a second transmitter-side symbolic count (103) and a second command code is transmitted by the transmitter (200) and authenticated by the receiver (250). The challenge-count window is returned to the default challenge-count window, when the second transmitter-side symbolic count is bounded within the auto-synchronization challenge-count window and the receiver-side symbolic count (123). Then the second command code is executed (127).
    Type: Grant
    Filed: July 29, 1998
    Date of Patent: January 2, 2001
    Assignee: Motorola, Inc.
    Inventor: Ezzat Dabbish
  • Patent number: 5943426
    Abstract: A communication network (10) includes any number of interconnected nodes (20), including a sending node (22), a sending gateway (24), a receiving gateway (26), and a destination node (28). A low capacity or expensive communication channel (30) resides between the sending and receiving gateways (24, 26). An original digitally signed message is sent from the sending node (22) toward the destination node (28). When the original message arrives at the sending gateway (24), the original signature is verified. If verified, the sending gateway (24) shrinks the original message into a reduced message and re-signs the message with a gateway digital signature before sending the message onward through the communication channel (30) toward the destination node (28). The destination node (28) verifies the gateway digital signature against the reduced message and is not required to de-compress the reduced message into a precise duplicate of the original message.
    Type: Grant
    Filed: September 22, 1997
    Date of Patent: August 24, 1999
    Assignee: Motorola, Inc.
    Inventors: Robert David Frith, Larry Charles Puhl, Ezzat A. Dabbish
  • Patent number: 5917911
    Abstract: A key management system includes a hierarchy (10) of independent key arbitration centers (KAC) for providing access to a user's session keys through key management centers (KMC). When a court order is issued for a user's session keys, a message requesting the keys is transferred down through hierarchy until a terminal KAC (16,36) is reached. Each KAC in the hierarchy adds its ID and signs (116) the message, verifying prior signatures (114). The user's ID is encrypted with the terminal KAC's public key. The terminal KAC engages in a blind key access procedure (129) with the KMC (18,38) to receive the user's session key. The key is provided encrypted with the requesting party's or agency's public key. Accordingly, privacy is assured because only the KMC and the requesting agency have access to the actual key value, and only the terminal KAC and requesting agency have access to the user's ID.
    Type: Grant
    Filed: January 23, 1997
    Date of Patent: June 29, 1999
    Assignee: Motorola, Inc.
    Inventors: Ezzat A. Dabbish, Robert Lawrence Geiger, Larry Charles Puhl
  • Patent number: 5564106
    Abstract: Blind access (100, 300, 400) to a desired encryption key of a predetermined first group member is provided to a second group. The first group encrypts a plurality of first group member encryption keys using a predetermined algorithm and transfers to the second group, the encrypted plurality of first group member encryption keys with corresponding unencrypted first group member identification fields, IDs, and a list of IDs corresponding to the first group members. The desired ID-free encryption key is selected and encrypted by the second group using a predetermined algorithm. The doubly encrypted key is transferred to the first group, decrypted by the first group and transferred to the second group for decryption. Thus, the encryption key is provided without knowledge to the first group of which member's encryption key is being examined and with knowledge to the second group of only the desired encryption key.
    Type: Grant
    Filed: March 9, 1995
    Date of Patent: October 8, 1996
    Assignee: Motorola, Inc.
    Inventors: Larry C. Puhl, Louis D. Finkelstein, Ezzat A. Dabbish
  • Patent number: 5347548
    Abstract: Simultaneously detecting both frame and bit synchronization in a serial bit stream reduces the time required to have a receiver lock up to a transmitted serial data signal. A dual-phase correlator circuit is used to detect frame synchronization while a multiphase commutator circuit detects bit clock synchronization.
    Type: Grant
    Filed: June 19, 1992
    Date of Patent: September 13, 1994
    Assignee: Motorola Inc.
    Inventors: Thomas S. Messerges, Larry C. Puhl, Ezzat A. Dabbish
  • Patent number: 5136704
    Abstract: A redundant processing system includes a pair of processors, each processor having an error detector, a key generator, and a lock circuit. The error detectors sense the outputs generated by their processors and generate an error signal when defective data is sensed. The key generators develop multi-bit codes of known patterns that are disrupted in response to receipt of an error signal from an error detector. The codes generated by the key generators are supplied to lock circuits which produce the same known multi-bit codes, and which compare their own codes to the codes supplied by the key generators. If a mis-match is detected, it will be due to a disrupted code that resulted from an error signal. Data from the processor associated with the error signal is rejected.
    Type: Grant
    Filed: June 28, 1989
    Date of Patent: August 4, 1992
    Assignee: Motorola, Inc.
    Inventors: Carl M. Danielsen, Ezzat A. Dabbish, Larry C. Puhl
  • Patent number: 5090015
    Abstract: A self checking electronically erasable programmable array logic (EEPAL) that comprises an input receiver, a programmable array, an error detection code storage array, an error detection circuitry, and error signalling circuitry is disclosed. The self checking EEPAL verifies the storage integrity of each cell within the programmable array during the programming of the EEPAL, after completion of programming the EEPAL, and prior to executing the algorithm stored in the EEPAL.
    Type: Grant
    Filed: February 6, 1989
    Date of Patent: February 18, 1992
    Assignee: Motorola, Inc.
    Inventors: Ezzat A. Dabbish, Larry C. Puhl, William L. Brendle
  • Patent number: 4972478
    Abstract: A soft logic cryptographic circuit that can be reprogrammed with various cipher algorithms. The cryptographic circuit can be manufactured in a non-secure environment because a security sensitive cipher algorithm can be programmed after the manufacturing process.
    Type: Grant
    Filed: July 3, 1989
    Date of Patent: November 20, 1990
    Assignee: Motorola, Inc.
    Inventor: Ezzat A. Dabbish
  • Patent number: 4914697
    Abstract: A cryptographic apparatus for encrypting and decrypting digital words includes a mechanism that permits a cipher algorithm to be electronically stored after the manufacture of the apparatus. The storing mechanism includes at least one electrically erasable, programmable gate array containing a portion of the cipher algorithm and at least one random access memory device coupled to the array for storing digital data generated by the algorithm. A mechanism which is coupled to the gate array and memory device controls the execution of the algorithm for each digital word thereby decrypting encrypted digital words and encrypting non-encrypted digital words.
    Type: Grant
    Filed: February 1, 1988
    Date of Patent: April 3, 1990
    Assignee: Motorola, Inc.
    Inventors: Ezzat A. Dabbish, John P. Byrns, Michael J. McClaughry, Larry C. Puhl, Daniel P. Brown, Eric F. Ziolko, Michael W. Bright
  • Patent number: 4853884
    Abstract: A zener diode random number generator circuit is described which produces a random binary number output having a statistical distribution exhibiting a controlled degree of randomness determined in response to an input control signal. A microprocessor feedback circuit monitors the random number output and produces the input control signal in response to the difference between the degree of randomness of the output signal and that of a pre-determined statistical distribution. The digital feedback automatically adjusts the zener diode biasing point and the limiter threshold such that part-to-part tolerance, component aging, temperature variations, or voltage fluctuations will not adversely affect the randomness of the bit stream output. In the preferred embodiment, the microprocessor tests the ratio of ONES bits to ZERO bits of the random number such that a desired 1:1 ONES/ZERO ratio is approximated.
    Type: Grant
    Filed: September 11, 1987
    Date of Patent: August 1, 1989
    Assignee: Motorola, Inc.
    Inventors: Daniel P. Brown, Carl M. Danielsen, Ezzat A. Dabbish
  • Patent number: 4811377
    Abstract: The apparatus and method for transferring radio specific data from the memory of an integral logic unit of a radiotelephone to a second, replacement, memory is disclosed. Security of the data is realized by encoding the radio specific data with an operative number generated from a seed number. If the radio specific data is properly transferred to the second memory, the radio specific data is deleted from the memory of the integral logic unit.
    Type: Grant
    Filed: July 31, 1987
    Date of Patent: March 7, 1989
    Assignee: Motorola, Inc.
    Inventors: Robert K. Krolopp, Thomas J. Auchter, Gary J. Pregont, Ezzat A. Dabbish