Patents by Inventor Larry C. Puhl

Larry C. Puhl has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9071440
    Abstract: Methods for accessing private and public data via a public terminal are disclosed. With respect to accessing private content, a method for authenticating the identity of a user of the public terminal is disclosed. Unique identifiers are transmitted in a pre-defined area adjacent or nearby the public terminal and are monitored by a receiver. This information is utilized to electronically compile and update in real-time a list of identifiers that have recently been monitored by the receiver, and the list of identifiers is used to electronically create and update in real-time a temporary database including identity verification data corresponding only for identifiers in the list of identifiers. Identity verification data input into the public terminal by the user is compared with the set of identity verification data contained in the temporary database to determine whether or not there is a match of identity verification data.
    Type: Grant
    Filed: December 22, 2008
    Date of Patent: June 30, 2015
    Assignee: Google Technology Holdings LLC
    Inventor: Larry C. Puhl
  • Patent number: 8364120
    Abstract: The identity of a user of a mobile device is verified by the mobile device accessing the location of the mobile device over recent time to obtain a current route, comparing a feature of the current route to characteristic features of previous routes stored on the mobile device. The user is verified if the feature of the current route matches a characteristic feature of previous routes. The previous routes may be obtained by tracking the location of the mobile device over time to obtain a number of routes, identifying characteristic features of the routes, and storing the characteristic features of the routes.
    Type: Grant
    Filed: August 2, 2006
    Date of Patent: January 29, 2013
    Assignee: Motorola Mobility LLC
    Inventors: Douglas A. Kuhlman, Yi Q. Li, Larry C. Puhl
  • Publication number: 20100161664
    Abstract: Methods for accessing private and public data via a public terminal are disclosed. With respect to accessing private content, a method for authenticating the identity of a user of the public terminal is disclosed. Unique identifiers are transmitted in a pre-defined area adjacent or nearby the public terminal and are monitored by a receiver. This information is utilized to electronically compile and update in real-time a list of identifiers that have recently been monitored by the receiver, and the list of identifiers is used to electronically create and update in real-time a temporary database including identity verification data corresponding only for identifiers in the list of identifiers. Identity verification data input into the public terminal by the user is compared with the set of identity verification data contained in the temporary database to determine whether or not there is a match of identity verification data.
    Type: Application
    Filed: December 22, 2008
    Publication date: June 24, 2010
    Applicant: GENERAL INSTRUMENT CORPORATION
    Inventor: Larry C. Puhl
  • Patent number: 7571313
    Abstract: A device (110) performs a method 200 for authentication and Ad Hoc network setup. The device (110) receives (210) a first security configuration; receives (220) a second security configuration based on location; authenticates (230) at least a second node (110) having the first security configuration and the second security configuration; and forms (240) a network with the at least a second node (110).
    Type: Grant
    Filed: December 28, 2004
    Date of Patent: August 4, 2009
    Assignee: Motorola, Inc.
    Inventors: Thomas S. Messerges, Larry C. Puhl
  • Patent number: 7549046
    Abstract: A vehicle authenticates a service technician and accesses a technician database to determine whether the service technician is indicated as authorized to perform the service operation. If the service technician is indicated as authorized to perform the service operation, the vehicle allows the service technician to perform the service operation.
    Type: Grant
    Filed: June 28, 2002
    Date of Patent: June 16, 2009
    Assignee: Temic Automotive of North America, Inc.
    Inventors: Walton L. Fehr, Ezzat A. Dabbish, Samuel M. Levenson, Larry C. Puhl, Jurgen Reinold
  • Patent number: 7522915
    Abstract: A communications device (300) enabled to support both external voice communications functionality (301) (or other external communications of interest and choice) and other functionality (302) has at least a first and second mode of operation (304 and 305). The first mode of operation permits essentially all functionality while the second mode of operation precludes at least much of the other functionality in favor of preserving the viability of at least some of the external communications functionality. A selector (306) can select a given mode of operation based, at least in part, on a trigger 307 comprising, for example, a user input and/or detection of a condition of concern.
    Type: Grant
    Filed: February 22, 2005
    Date of Patent: April 21, 2009
    Assignee: Motorola, Inc.
    Inventors: Yi Q. Li, Ezzat Dabbish, Thomas S. Messerges, Larry C. Puhl
  • Patent number: 7512795
    Abstract: A method and apparatus authenticates a component (450) for use in a device (100). The device memory (122) stores a predetermined challenge and a predetermined response (212) associated with the predetermined challenge. The method detects whether the component has been coupled to the device. If the component has been detected (206), the predetermined challenge is provided to the component (208). If a component response is received within a predetermined response time (210), it is compared to the predetermined response. The component is disabled (214) if either the component response is not received within the predetermined response time or the component response is received within the predetermined response time but the component response is not equivalent to the predetermined response. The component is enabled (216) if the component response is received within the predetermined response time and the component response is equivalent to the predetermined response.
    Type: Grant
    Filed: January 4, 2005
    Date of Patent: March 31, 2009
    Assignee: Motorola, Inc.
    Inventors: Ronald F. Buskey, Larry C. Puhl, Duane C. Rabe
  • Publication number: 20090063852
    Abstract: A device (110) performs a method 200 for authentication and Ad Hoc network setup. The device (110) receives (210) a first security configuration; receives (220) a second security configuration based on location; authenticates (230) at least a second node (110) having the first security configuration and the second security configuration; and forms (240) a network with the at least a second node (110).
    Type: Application
    Filed: December 28, 2004
    Publication date: March 5, 2009
    Inventors: Thomas S. Messerges, Larry C. Puhl
  • Patent number: 7363492
    Abstract: Authentication is performed to a confidence level (CL) desired by a verifier (220). A prover (210) picks and sends certain same size, square matrices to the verifier (220). A random request bit is sent (234) from the verifier (220) to the prover (210) after the receipt of a certain square matrix. Depending on the request bit, calculations are made (244, 264) by the verifier (220) to determine if the matrices sent from the prover are verifiable. The prover (210) is iteratively authenticated by the verifier (220). Iterations are continued until (320) a count of the iterations (IL) reaches a number sufficient to achieve the desired confidence level (CL). After a delay, more iterations can achieve a higher confidence level by building on previous result of authentication without having to begin at zero. During this delay, the verifier (220) can perform tasks in reliance on the result of authentication. Digital logic can perform the authentication.
    Type: Grant
    Filed: February 25, 2005
    Date of Patent: April 22, 2008
    Assignee: Motorola, Inc.
    Inventors: Douglas A. Kuhlman, Ezzat A. Dabbish, Larry C. Puhl
  • Publication number: 20080033637
    Abstract: The identity of a user of a mobile device is verified by the mobile device accessing the location of the mobile device over recent time to obtain a current route, comparing a feature of the current route to characteristic features of previous routes stored on the mobile device. The user is verified if the feature of the current route matches a characteristic feature of previous routes. The previous routes may be obtained by tracking the location of the mobile device over time to obtain a number of routes, identifying characteristic features of the routes, and storing the characteristic features of the routes.
    Type: Application
    Filed: August 2, 2006
    Publication date: February 7, 2008
    Applicant: MOTOROLA, INC.
    Inventors: Douglas A. Kuhlman, Yi Q. Li, Larry C. Puhl
  • Patent number: 7325135
    Abstract: A vehicle accesses a configuration database to determine whether a reconfiguration function is authorized. The reconfiguration function may involve, for example, installing the component in the vehicle, removing the component from the vehicle, replacing the component with another component in the vehicle, replacing another component in the vehicle with the component, modifying the component, upgrading the component and rendering the component operable. Upon determining that the reconfiguration function is authorized, the vehicle allows the reconfiguration function to be performed. The reconfiguration function may be authorized based on a type of the vehicle, a type of the component or a combination of configuration elements in a current configuration of the vehicle.
    Type: Grant
    Filed: June 28, 2002
    Date of Patent: January 29, 2008
    Assignee: Temic Automotive of North America, Inc.
    Inventors: Walton L. Fehr, Ezzat A. Dabbish, Samuel M. Levenson, Larry C. Puhl, Jurgen Reinold
  • Patent number: 7228420
    Abstract: The service technician accesses the prospective vehicle and obtains from a certification authority a certification that an authentic vehicle is associated with a cryptographic key. The service technician utilizes the cryptographic key in cryptographic communication with the prospective vehicle via a secure device having limited accessibility but being accessible by the service technician. The service technician determines whether the prospective vehicle is the authentic vehicle based on whether the cryptographic key is successfully utilized in the cryptographic communication with the prospective vehicle.
    Type: Grant
    Filed: June 28, 2002
    Date of Patent: June 5, 2007
    Assignee: Temic Automotive of North America, Inc.
    Inventors: Ezzat A. Dabbish, Walton L. Fehr, Samuel M. Levenson, Larry C. Puhl, Jurgen Reinold
  • Patent number: 7137142
    Abstract: A vehicle authenticates a prospective component for use in the vehicle by obtaining from a certification authority a certification that an authentic component is associated with a cryptographic key. The vehicle obtains the certification separately from the component. The certification certifies that the cryptographic key is bound to information identifying the authentic component. The vehicle utilizes the cryptographic key obtained from the certification authority in cryptographic communication with the prospective component, and determines whether the prospective component is the authentic component based on whether the cryptographic key is successfully utilized in the cryptographic communication.
    Type: Grant
    Filed: June 28, 2002
    Date of Patent: November 14, 2006
    Assignee: Motorola, Inc.
    Inventors: Larry C. Puhl, Ezzat A. Dabbish
  • Patent number: 7137001
    Abstract: A vehicle authenticates a first prospective component by obtaining from a certification authority a certification that an authentic component is associated with a cryptographic key unique to the first prospective component and determining whether the first prospective component is the authentic component based on whether the cryptographic key is successfully utilized in cryptographic communication with the first prospective component. The vehicle authenticates a component class of a second prospective component by obtaining from a certification authority a certification that an authentic component of the component class is associated with a second cryptographic key unique to the component class and determining whether the second prospective component is an authentic component of the component class based on whether the second cryptographic key is successfully utilized in the cryptographic communication with the second prospective component.
    Type: Grant
    Filed: June 28, 2002
    Date of Patent: November 14, 2006
    Assignee: Motorola, Inc.
    Inventors: Ezzat A. Dabbish, Larry C. Puhl
  • Patent number: 7131005
    Abstract: A component for use in a prospective vehicle obtains from a certification authority a certification that an authentic vehicle is associated with a cryptographic key. The certification certifies that the cryptographic key is bound to information identifying the authentic vehicle. The component utilizes the cryptographic key obtained from the certification authority in cryptographic communication with the prospective vehicle, and determines whether the prospective vehicle is the authentic vehicle based on whether the cryptographic key is successfully utilized in the cryptographic communication. Upon determining the prospective vehicle is the authentic vehicle, the component may allow the prospective vehicle to operate the component.
    Type: Grant
    Filed: June 28, 2002
    Date of Patent: October 31, 2006
    Assignee: Motorola, Inc.
    Inventors: Samuel M. Levenson, John D. Bruner, Ezzat A. Dabbish, Walton L. Fehr, Larry C. Puhl, Jurgen Reinold
  • Patent number: 7127611
    Abstract: A vehicle authenticates a component class of a prospective component for use in the vehicle by obtaining from a certification authority a certification that an authentic component of the component class is associated with a second cryptographic key. The certification certifies that the second cryptographic key is bound to information identifying an authentic component of the component class. The vehicle utilizes the second cryptographic key obtained from the certification authority in cryptographic communication with the prospective component, and determines whether the prospective component is an authentic component of the component class based on whether the second cryptographic key is successfully utilized in the cryptographic communication.
    Type: Grant
    Filed: June 28, 2002
    Date of Patent: October 24, 2006
    Assignee: Motorola, Inc.
    Inventors: Ezzat A. Dabbish, Larry C. Puhl
  • Patent number: 7010682
    Abstract: A vehicle authenticates a prospective component for use in the vehicle by obtaining from a certification authority a certification that an authentic component is associated with a cryptographic key. The certification certifies that the cryptographic key is bound to information identifying the authentic component. The vehicle utilizes the cryptographic key obtained from the certification authority in cryptographic communication with the prospective component, and determines whether the prospective component is the authentic component based on whether the cryptographic key is successfully utilized in the cryptographic communication.
    Type: Grant
    Filed: June 28, 2002
    Date of Patent: March 7, 2006
    Assignee: Motorola, Inc.
    Inventors: Jurgen Reinold, John D. Bruner, Ezzat A. Dabbish, Walton L. Fehr, Samual M. Levenson, Larry C. Puhl
  • Publication number: 20040003231
    Abstract: A component for use in a prospective vehicle obtains from a certification authority a certification that an authentic vehicle is associated with a cryptographic key. The certification certifies that the cryptographic key is bound to information identifying the authentic vehicle. The component utilizes the cryptographic key obtained from the certification authority in cryptographic communication with the prospective vehicle, and determines whether the prospective vehicle is the authentic vehicle based on whether the cryptographic key is successfully utilized in the cryptographic communication. Upon determining the prospective vehicle is the authentic vehicle, the component may allow the prospective vehicle to operate the component.
    Type: Application
    Filed: June 28, 2002
    Publication date: January 1, 2004
    Inventors: Samuel M. Levenson, John D. Bruner, Ezzat A. Dabbish, Walton L. Fehr, Larry C. Puhl, Jurgen Reinold
  • Publication number: 20040003227
    Abstract: A vehicle authenticates a prospective component for use in the vehicle by obtaining from a certification authority a certification that an authentic component is associated with a cryptographic key. The certification certifies that the cryptographic key is bound to information identifying the authentic component. The vehicle utilizes the cryptographic key obtained from the certification authority in cryptographic communication with the prospective component, and determines whether the prospective component is the authentic component based on whether the cryptographic key is successfully utilized in the cryptographic communication.
    Type: Application
    Filed: June 28, 2002
    Publication date: January 1, 2004
    Inventors: Jurgen Reinold, John D. Bruner, Ezzat A. Dabbish, Walton L. Fehr, Samuel M. Levenson, Larry C. Puhl
  • Publication number: 20040001593
    Abstract: A prospective component for use in a vehicle stores a first cryptographic key and utilizes the first cryptographic key in cryptographic communication with the vehicle. The vehicle obtains from a certification authority a certification associating a second cryptographic key with an authentic component. The vehicle utilizes the second cryptographic key in cryptographic communication and determines whether the prospective component is the authentic component based on whether the cryptographic communication is successful.
    Type: Application
    Filed: June 28, 2002
    Publication date: January 1, 2004
    Inventors: Jurgen Reinold, John D. Bruner, Ezzat A. Dabbish, Walton L. Fehr, Samuel M. Levenson, Larry C. Puhl