Patents by Inventor Kent D. Rager
Kent D. Rager has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8171527Abstract: A process may be utilized for securing unlock password generation and distribution. A first set of exclusive responsibilities, assigned to a trusted authority, includes random generation and encryption of an unlock password to compose a randomly generated encrypted unlock password. Further, a second set of exclusive responsibilities, assigned to a security agent, includes sending information associated with the unlock password and a digital signature of information associated with the unlock password to a communication device configured for a network in order to mate the unlock password to the communication device, and sending the randomly generated and encrypted unlock password along with mating data to a password processing center. In addition, a third set of exclusive responsibilities, assigned to a password processing center, includes decrypting the randomly generated and encrypted unlock password.Type: GrantFiled: June 26, 2007Date of Patent: May 1, 2012Assignee: General Instrument CorporationInventors: Xin Qiu, Liqiang Chen, Stuart P. Moskovics, Kent D. Rager
-
Patent number: 7920869Abstract: A method in a wireless communications device including determining whether the device is operating in a network other than a home network, determining whether to search for the home network when not operating in the home network by comparing network record information associated with the network in which the device is operating to reference information. In some embodiments, the device indicates that it is operating in a network other than the network in which it is operating.Type: GrantFiled: November 19, 2003Date of Patent: April 5, 2011Assignee: Motorola Mobility, Inc.Inventors: Kent D. Rager, Marcia J. Otting
-
Patent number: 7900045Abstract: An apparatus (100) used by a plurality of devices to authenticate an accessory (120) is configured to operate with a device (110) of the plurality of devices. The accessory (120) applies an authentication algorithm to a key and a challenge (130) received from the device (110) and generates a response (132) thereto. A challenge and response memory (114) stores a subset of a set of challenges (232) and pre-computed responses (230). The enabling circuit transmits a challenge (130) to the accessory (120) and receives a received response (132) therefrom. The enabling circuit (112) also compares the received response (132) to the stored response (230) corresponding to the stored challenge (232) sent to the accessory (120).Type: GrantFiled: December 28, 2006Date of Patent: March 1, 2011Assignee: Motorola Mobility, Inc.Inventors: Kent D. Rager, Joseph M. Hansen
-
Patent number: 7886355Abstract: A method for controlling subsidy locking of a handset device includes storing, in a handset device, an asymmetrically digitally signed subsidy unlock data block that has been modified based on a password after signing (505); modifying the stored unlock data block based on a received subsidy unlock password (510); and granting subsidy unlock status if the asymmetric digital signature of the modified, stored unlock data block properly verifies (510). A method (110) for controlling subsidy locking of a handset device includes storing, in the handset device, an asymmetrically digitally signed subsidy unlock data block that comprises a password portion that has been modified after signing (112); replacing the contents of the modified password portion with a received subsidy unlock password to produce an updated subsidy unlock data block (116); and granting subsidy unlock status if the asymmetric digital signature of the updated subsidy unlock data block properly verifies (118).Type: GrantFiled: June 30, 2006Date of Patent: February 8, 2011Assignee: Motorola Mobility, Inc.Inventors: Kent D. Rager, Scott P. Debates, Joel D. Voss
-
Patent number: 7603120Abstract: A method in a communication device (106) comprises registering (202) on a first network (102), identified by a first network ID, stored in the communication device. Then receiving, from the service provider, an acting network ID which identifies a second network (104). Storing the acting network ID on the communication device and reprioritizing the second network, identified by the received acting network ID, as the home network. The communication device then registers on the second network in response to the reprioritizing the second network.Type: GrantFiled: May 12, 2005Date of Patent: October 13, 2009Assignee: Motorola, Inc.Inventors: Kent D. Rager, Marcia J. Otting, David J. Theobald
-
Publication number: 20090006852Abstract: A process may be utilized for securing unlock password generation and distribution. A first set of exclusive responsibilities, assigned to a trusted authority, includes random generation and encryption of an unlock password to compose a randomly generated encrypted unlock password. Further, a second set of exclusive responsibilities, assigned to a security agent, includes sending information associated with the unlock password and a digital signature of information associated with the unlock password to a communication device configured for a network in order to mate the unlock password to the communication device, and sending the randomly generated and encrypted unlock password along with mating data to a password processing center. In addition, a third set of exclusive responsibilities, assigned to a password processing center, includes decrypting the randomly generated and encrypted unlock password.Type: ApplicationFiled: June 26, 2007Publication date: January 1, 2009Applicant: GENERAL INSTRUMENT CORPORATIONInventors: Xin Qiu, Liqiang Chen, Stuart P. Moskovics, Kent D. Rager
-
Publication number: 20080313082Abstract: A method for proximity payment provisioning by a wireless communication device is disclosed. A photo image of a user of the wireless communication device is loaded. The loaded photo image is transmitted to a trusted party via a communication network. A superimposed photo image is received from the trusted party, wherein the photo image is superimposed with a watermark. The received superimposed photo image is stored in a memory.Type: ApplicationFiled: June 14, 2007Publication date: December 18, 2008Applicant: MOTOROLA, INC.Inventors: JAMES A. VAN BOSCH, MARK R. BRAUN, KENT D. RAGER
-
Publication number: 20080313079Abstract: A method for proximity payment transaction between a wireless purchasing device and a point of sale terminal in conjunction with a trusted party. The wireless communication device initiates a proximity payment application for a transaction between the wireless purchasing device and the point of sale terminal. The wireless communication device transmits the first authentication code to the point of sale terminal. A first code is inputted at the point of sale terminal as a watermark on the superimposed photo image of the user, wherein the superimposed photo image is displayed on the wireless purchasing device. The point of sale terminal transmits a first code and the first authentication code to the trusted party via a second communication network. The point of sale terminal receives an approval message from the trusted party for approving the transaction between the wireless purchasing device and the point of sale terminal.Type: ApplicationFiled: June 14, 2007Publication date: December 18, 2008Applicant: MOTOROLA, INC.Inventors: JAMES A. VAN BOSCH, MARK R. BRAUN, KENT D. RAGER
-
Publication number: 20080159534Abstract: An apparatus (100) used by a plurality of devices to authenticate an accessory (120) is configured to operate with a device (110) of the plurality of devices. The accessory (120) applies an authentication algorithm to a key and a challenge (130) received from the device (110) and generates a response (132) thereto. A challenge and response memory (114) stores a subset of a set of challenges (232) and pre-computed responses (230). The enabling circuit transmits a challenge (130) to the accessory (120) and receives a received response (132) therefrom. The enabling circuit (112) also compares the received response (132) to the stored response (230) corresponding to the stored challenge (232) sent to the accessory (120).Type: ApplicationFiled: December 28, 2006Publication date: July 3, 2008Applicant: MOTOROLA, INC.Inventors: KENT D. RAGER, JOSEPH M. HANSEN
-
Publication number: 20080005577Abstract: A method for controlling subsidy locking of a handset device includes storing, in a handset device, an asymmetrically digitally signed subsidy unlock data block that has been modified based on a password after signing (505); modifying the stored unlock data block based on a received subsidy unlock password (510); and granting subsidy unlock status if the asymmetric digital signature of the modified, stored unlock data block properly verifies (510). A method (110) for controlling subsidy locking of a handset device includes storing, in the handset device, an asymmetrically digitally signed subsidy unlock data block that comprises a password portion that has been modified after signing (112); replacing the contents of the modified password portion with a received subsidy unlock password to produce an updated subsidy unlock data block (116); and granting subsidy unlock status if the asymmetric digital signature of the updated subsidy unlock data block properly verifies (118).Type: ApplicationFiled: June 30, 2006Publication date: January 3, 2008Applicant: Motorola, Inc.Inventors: Kent D. Rager, Scott P. Debates, Joel D. Voss
-
Publication number: 20080003980Abstract: A handset device (100) enabled for subsidy control via a SIM card (150) includes memory (110) operative to store an activation file (112) and a public key (114) and a controller (120) operatively coupled to the memory. The controller (120) is operative to send an activation file request to a SIM card (150), to receive an asymmetrically digitally signed activation file (214) from the SIM card (150), to verify the asymmetric digital signature of the activation file (214) via the public key (114) and to install the activation file (112) in the memory (110). A SIM card device (150) enabled for subsidy control of a handset device (100) includes memory (110) operative to store an activation file template (162) and a private key (164) and a controller (170) operatively coupled to the memory (160).Type: ApplicationFiled: June 30, 2006Publication date: January 3, 2008Applicant: Motorola, Inc.Inventors: Joel D. Voss, Kent D. Rager
-
Patent number: 7063262Abstract: A method (300, 400) to provide for provisioning and a product. In one embodiment a processor (210) receives a pre-configured data image and writes it to a first area (221) of non-volatile memory (220) using, for example a first writing mode. Thereafter, for example after a power cycle the processor (210) determines whether an update to a second area of the non-volatile memory is required, and if so converts a first data item from the first area into a second data item uniquely associated with the product unit and writes the second data item in a second area (222) using a second writing mode.Type: GrantFiled: August 29, 2003Date of Patent: June 20, 2006Assignee: Motorola, Inc.Inventors: Kent D. Rager, Amitkumar N. Balar, Itzhak Mizrahi
-
Publication number: 20040253952Abstract: A method in a multi-mode wireless communications device including initializing a counter (410), for example, upon changing location areas or attaching to a roaming network, scanning for service in all modes (440) of the multi-mode wireless communications device during at least one common search period, and after scanning for service in all modes of the multi-mode wireless communications device during the at least one common search period, scanning for service in each mode during subsequent search periods (450), wherein the multi-mode wireless communications device scans for service in not more than one mode during each of the subsequent search periods.Type: ApplicationFiled: June 10, 2003Publication date: December 16, 2004Inventors: Kent D. Rager, Niels Peter Skov Andersen, Marcia J. Otting
-
Patent number: 5412721Abstract: An encryption code and at least one key are provided to a secure transmission device, via an external keying device, and stored in a volatile memory. A user code, entered via a keypad by a user, is received by the secure transmission device. An encrypted representation of the at least one key, based on the encryption code and the at least one key, is generated and stored in a non-volatile memory. Also, an encrypted representation of the encryption code and the user code, based on the user code, are generated and stored in the non-volatile memory. Upon power down of the secure transmission device, the at least one key and encryption code stored in the volatile memory are erased.Type: GrantFiled: March 26, 1993Date of Patent: May 2, 1995Assignee: Motorola, Inc.Inventors: Kent D. Rager, Steven H. Lay
-
Patent number: 5363447Abstract: An encryption code and at least one key are provided to a secure transmission device, via an external keying device, and stored in a first volatile memory. An encrypted representation of the at least one key, based on the encryption code and the at least one key, is generated and stored in a non-volatile memory. Upon power down of the secure transmission device, the encryption code is stored in a second volatile memory and the at least one key and encryption code stored in the first volatile memory are erased.Type: GrantFiled: March 26, 1993Date of Patent: November 8, 1994Assignee: Motorola, Inc.Inventors: Kent D. Rager, Steven H. Lay