Patents by Inventor Larry C. Puhl
Larry C. Puhl has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9071440Abstract: Methods for accessing private and public data via a public terminal are disclosed. With respect to accessing private content, a method for authenticating the identity of a user of the public terminal is disclosed. Unique identifiers are transmitted in a pre-defined area adjacent or nearby the public terminal and are monitored by a receiver. This information is utilized to electronically compile and update in real-time a list of identifiers that have recently been monitored by the receiver, and the list of identifiers is used to electronically create and update in real-time a temporary database including identity verification data corresponding only for identifiers in the list of identifiers. Identity verification data input into the public terminal by the user is compared with the set of identity verification data contained in the temporary database to determine whether or not there is a match of identity verification data.Type: GrantFiled: December 22, 2008Date of Patent: June 30, 2015Assignee: Google Technology Holdings LLCInventor: Larry C. Puhl
-
Patent number: 8364120Abstract: The identity of a user of a mobile device is verified by the mobile device accessing the location of the mobile device over recent time to obtain a current route, comparing a feature of the current route to characteristic features of previous routes stored on the mobile device. The user is verified if the feature of the current route matches a characteristic feature of previous routes. The previous routes may be obtained by tracking the location of the mobile device over time to obtain a number of routes, identifying characteristic features of the routes, and storing the characteristic features of the routes.Type: GrantFiled: August 2, 2006Date of Patent: January 29, 2013Assignee: Motorola Mobility LLCInventors: Douglas A. Kuhlman, Yi Q. Li, Larry C. Puhl
-
Publication number: 20100161664Abstract: Methods for accessing private and public data via a public terminal are disclosed. With respect to accessing private content, a method for authenticating the identity of a user of the public terminal is disclosed. Unique identifiers are transmitted in a pre-defined area adjacent or nearby the public terminal and are monitored by a receiver. This information is utilized to electronically compile and update in real-time a list of identifiers that have recently been monitored by the receiver, and the list of identifiers is used to electronically create and update in real-time a temporary database including identity verification data corresponding only for identifiers in the list of identifiers. Identity verification data input into the public terminal by the user is compared with the set of identity verification data contained in the temporary database to determine whether or not there is a match of identity verification data.Type: ApplicationFiled: December 22, 2008Publication date: June 24, 2010Applicant: GENERAL INSTRUMENT CORPORATIONInventor: Larry C. Puhl
-
Patent number: 7571313Abstract: A device (110) performs a method 200 for authentication and Ad Hoc network setup. The device (110) receives (210) a first security configuration; receives (220) a second security configuration based on location; authenticates (230) at least a second node (110) having the first security configuration and the second security configuration; and forms (240) a network with the at least a second node (110).Type: GrantFiled: December 28, 2004Date of Patent: August 4, 2009Assignee: Motorola, Inc.Inventors: Thomas S. Messerges, Larry C. Puhl
-
Patent number: 7549046Abstract: A vehicle authenticates a service technician and accesses a technician database to determine whether the service technician is indicated as authorized to perform the service operation. If the service technician is indicated as authorized to perform the service operation, the vehicle allows the service technician to perform the service operation.Type: GrantFiled: June 28, 2002Date of Patent: June 16, 2009Assignee: Temic Automotive of North America, Inc.Inventors: Walton L. Fehr, Ezzat A. Dabbish, Samuel M. Levenson, Larry C. Puhl, Jurgen Reinold
-
Patent number: 7522915Abstract: A communications device (300) enabled to support both external voice communications functionality (301) (or other external communications of interest and choice) and other functionality (302) has at least a first and second mode of operation (304 and 305). The first mode of operation permits essentially all functionality while the second mode of operation precludes at least much of the other functionality in favor of preserving the viability of at least some of the external communications functionality. A selector (306) can select a given mode of operation based, at least in part, on a trigger 307 comprising, for example, a user input and/or detection of a condition of concern.Type: GrantFiled: February 22, 2005Date of Patent: April 21, 2009Assignee: Motorola, Inc.Inventors: Yi Q. Li, Ezzat Dabbish, Thomas S. Messerges, Larry C. Puhl
-
Patent number: 7512795Abstract: A method and apparatus authenticates a component (450) for use in a device (100). The device memory (122) stores a predetermined challenge and a predetermined response (212) associated with the predetermined challenge. The method detects whether the component has been coupled to the device. If the component has been detected (206), the predetermined challenge is provided to the component (208). If a component response is received within a predetermined response time (210), it is compared to the predetermined response. The component is disabled (214) if either the component response is not received within the predetermined response time or the component response is received within the predetermined response time but the component response is not equivalent to the predetermined response. The component is enabled (216) if the component response is received within the predetermined response time and the component response is equivalent to the predetermined response.Type: GrantFiled: January 4, 2005Date of Patent: March 31, 2009Assignee: Motorola, Inc.Inventors: Ronald F. Buskey, Larry C. Puhl, Duane C. Rabe
-
Publication number: 20090063852Abstract: A device (110) performs a method 200 for authentication and Ad Hoc network setup. The device (110) receives (210) a first security configuration; receives (220) a second security configuration based on location; authenticates (230) at least a second node (110) having the first security configuration and the second security configuration; and forms (240) a network with the at least a second node (110).Type: ApplicationFiled: December 28, 2004Publication date: March 5, 2009Inventors: Thomas S. Messerges, Larry C. Puhl
-
Patent number: 7363492Abstract: Authentication is performed to a confidence level (CL) desired by a verifier (220). A prover (210) picks and sends certain same size, square matrices to the verifier (220). A random request bit is sent (234) from the verifier (220) to the prover (210) after the receipt of a certain square matrix. Depending on the request bit, calculations are made (244, 264) by the verifier (220) to determine if the matrices sent from the prover are verifiable. The prover (210) is iteratively authenticated by the verifier (220). Iterations are continued until (320) a count of the iterations (IL) reaches a number sufficient to achieve the desired confidence level (CL). After a delay, more iterations can achieve a higher confidence level by building on previous result of authentication without having to begin at zero. During this delay, the verifier (220) can perform tasks in reliance on the result of authentication. Digital logic can perform the authentication.Type: GrantFiled: February 25, 2005Date of Patent: April 22, 2008Assignee: Motorola, Inc.Inventors: Douglas A. Kuhlman, Ezzat A. Dabbish, Larry C. Puhl
-
Publication number: 20080033637Abstract: The identity of a user of a mobile device is verified by the mobile device accessing the location of the mobile device over recent time to obtain a current route, comparing a feature of the current route to characteristic features of previous routes stored on the mobile device. The user is verified if the feature of the current route matches a characteristic feature of previous routes. The previous routes may be obtained by tracking the location of the mobile device over time to obtain a number of routes, identifying characteristic features of the routes, and storing the characteristic features of the routes.Type: ApplicationFiled: August 2, 2006Publication date: February 7, 2008Applicant: MOTOROLA, INC.Inventors: Douglas A. Kuhlman, Yi Q. Li, Larry C. Puhl
-
Patent number: 7325135Abstract: A vehicle accesses a configuration database to determine whether a reconfiguration function is authorized. The reconfiguration function may involve, for example, installing the component in the vehicle, removing the component from the vehicle, replacing the component with another component in the vehicle, replacing another component in the vehicle with the component, modifying the component, upgrading the component and rendering the component operable. Upon determining that the reconfiguration function is authorized, the vehicle allows the reconfiguration function to be performed. The reconfiguration function may be authorized based on a type of the vehicle, a type of the component or a combination of configuration elements in a current configuration of the vehicle.Type: GrantFiled: June 28, 2002Date of Patent: January 29, 2008Assignee: Temic Automotive of North America, Inc.Inventors: Walton L. Fehr, Ezzat A. Dabbish, Samuel M. Levenson, Larry C. Puhl, Jurgen Reinold
-
Patent number: 7228420Abstract: The service technician accesses the prospective vehicle and obtains from a certification authority a certification that an authentic vehicle is associated with a cryptographic key. The service technician utilizes the cryptographic key in cryptographic communication with the prospective vehicle via a secure device having limited accessibility but being accessible by the service technician. The service technician determines whether the prospective vehicle is the authentic vehicle based on whether the cryptographic key is successfully utilized in the cryptographic communication with the prospective vehicle.Type: GrantFiled: June 28, 2002Date of Patent: June 5, 2007Assignee: Temic Automotive of North America, Inc.Inventors: Ezzat A. Dabbish, Walton L. Fehr, Samuel M. Levenson, Larry C. Puhl, Jurgen Reinold
-
Patent number: 7137142Abstract: A vehicle authenticates a prospective component for use in the vehicle by obtaining from a certification authority a certification that an authentic component is associated with a cryptographic key. The vehicle obtains the certification separately from the component. The certification certifies that the cryptographic key is bound to information identifying the authentic component. The vehicle utilizes the cryptographic key obtained from the certification authority in cryptographic communication with the prospective component, and determines whether the prospective component is the authentic component based on whether the cryptographic key is successfully utilized in the cryptographic communication.Type: GrantFiled: June 28, 2002Date of Patent: November 14, 2006Assignee: Motorola, Inc.Inventors: Larry C. Puhl, Ezzat A. Dabbish
-
Patent number: 7137001Abstract: A vehicle authenticates a first prospective component by obtaining from a certification authority a certification that an authentic component is associated with a cryptographic key unique to the first prospective component and determining whether the first prospective component is the authentic component based on whether the cryptographic key is successfully utilized in cryptographic communication with the first prospective component. The vehicle authenticates a component class of a second prospective component by obtaining from a certification authority a certification that an authentic component of the component class is associated with a second cryptographic key unique to the component class and determining whether the second prospective component is an authentic component of the component class based on whether the second cryptographic key is successfully utilized in the cryptographic communication with the second prospective component.Type: GrantFiled: June 28, 2002Date of Patent: November 14, 2006Assignee: Motorola, Inc.Inventors: Ezzat A. Dabbish, Larry C. Puhl
-
Patent number: 7131005Abstract: A component for use in a prospective vehicle obtains from a certification authority a certification that an authentic vehicle is associated with a cryptographic key. The certification certifies that the cryptographic key is bound to information identifying the authentic vehicle. The component utilizes the cryptographic key obtained from the certification authority in cryptographic communication with the prospective vehicle, and determines whether the prospective vehicle is the authentic vehicle based on whether the cryptographic key is successfully utilized in the cryptographic communication. Upon determining the prospective vehicle is the authentic vehicle, the component may allow the prospective vehicle to operate the component.Type: GrantFiled: June 28, 2002Date of Patent: October 31, 2006Assignee: Motorola, Inc.Inventors: Samuel M. Levenson, John D. Bruner, Ezzat A. Dabbish, Walton L. Fehr, Larry C. Puhl, Jurgen Reinold
-
Patent number: 7127611Abstract: A vehicle authenticates a component class of a prospective component for use in the vehicle by obtaining from a certification authority a certification that an authentic component of the component class is associated with a second cryptographic key. The certification certifies that the second cryptographic key is bound to information identifying an authentic component of the component class. The vehicle utilizes the second cryptographic key obtained from the certification authority in cryptographic communication with the prospective component, and determines whether the prospective component is an authentic component of the component class based on whether the second cryptographic key is successfully utilized in the cryptographic communication.Type: GrantFiled: June 28, 2002Date of Patent: October 24, 2006Assignee: Motorola, Inc.Inventors: Ezzat A. Dabbish, Larry C. Puhl
-
Patent number: 7010682Abstract: A vehicle authenticates a prospective component for use in the vehicle by obtaining from a certification authority a certification that an authentic component is associated with a cryptographic key. The certification certifies that the cryptographic key is bound to information identifying the authentic component. The vehicle utilizes the cryptographic key obtained from the certification authority in cryptographic communication with the prospective component, and determines whether the prospective component is the authentic component based on whether the cryptographic key is successfully utilized in the cryptographic communication.Type: GrantFiled: June 28, 2002Date of Patent: March 7, 2006Assignee: Motorola, Inc.Inventors: Jurgen Reinold, John D. Bruner, Ezzat A. Dabbish, Walton L. Fehr, Samual M. Levenson, Larry C. Puhl
-
Publication number: 20040003231Abstract: A component for use in a prospective vehicle obtains from a certification authority a certification that an authentic vehicle is associated with a cryptographic key. The certification certifies that the cryptographic key is bound to information identifying the authentic vehicle. The component utilizes the cryptographic key obtained from the certification authority in cryptographic communication with the prospective vehicle, and determines whether the prospective vehicle is the authentic vehicle based on whether the cryptographic key is successfully utilized in the cryptographic communication. Upon determining the prospective vehicle is the authentic vehicle, the component may allow the prospective vehicle to operate the component.Type: ApplicationFiled: June 28, 2002Publication date: January 1, 2004Inventors: Samuel M. Levenson, John D. Bruner, Ezzat A. Dabbish, Walton L. Fehr, Larry C. Puhl, Jurgen Reinold
-
Publication number: 20040003227Abstract: A vehicle authenticates a prospective component for use in the vehicle by obtaining from a certification authority a certification that an authentic component is associated with a cryptographic key. The certification certifies that the cryptographic key is bound to information identifying the authentic component. The vehicle utilizes the cryptographic key obtained from the certification authority in cryptographic communication with the prospective component, and determines whether the prospective component is the authentic component based on whether the cryptographic key is successfully utilized in the cryptographic communication.Type: ApplicationFiled: June 28, 2002Publication date: January 1, 2004Inventors: Jurgen Reinold, John D. Bruner, Ezzat A. Dabbish, Walton L. Fehr, Samuel M. Levenson, Larry C. Puhl
-
Publication number: 20040001593Abstract: A prospective component for use in a vehicle stores a first cryptographic key and utilizes the first cryptographic key in cryptographic communication with the vehicle. The vehicle obtains from a certification authority a certification associating a second cryptographic key with an authentic component. The vehicle utilizes the second cryptographic key in cryptographic communication and determines whether the prospective component is the authentic component based on whether the cryptographic communication is successful.Type: ApplicationFiled: June 28, 2002Publication date: January 1, 2004Inventors: Jurgen Reinold, John D. Bruner, Ezzat A. Dabbish, Walton L. Fehr, Samuel M. Levenson, Larry C. Puhl