Patents by Inventor Lawrence Tang
Lawrence Tang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230362144Abstract: Methods are disclosed for creating a virtual encryption session prior to video streaming content being requested to reduce or eliminate delay in initialization of the encryption session and content delivery to the customer. A virtual session has control word(s) (CW) and virtual entitlement control message(s) (ECM) that are devoid of content specific information. One or more virtual sessions may be stored at an edge device and may be used to encrypt the first portion of a content stream while a content-specific encryption session is being initiated. An edge device may store at least a certain quantity of virtual encryption sessions in anticipation of, for example, receiving multiple content streams.Type: ApplicationFiled: July 12, 2023Publication date: November 9, 2023Inventors: Madhu Penugonda, Lawrence Tang
-
Patent number: 11750576Abstract: Methods are disclosed for creating a virtual encryption session prior to video streaming content being requested to reduce or eliminate delay in initialization of the encryption session and content delivery to the customer. A virtual session has control word(s) (CW) and virtual entitlement control message(s) (ECM) that are devoid of content specific information. One or more virtual sessions may be stored at an edge device and may be used to encrypt the first portion of a content stream while a content-specific encryption session is being initiated.Type: GrantFiled: July 28, 2021Date of Patent: September 5, 2023Assignee: Combined Conditional Access Development And Support, LLCInventors: Madhu Penugonda, Lawrence Tang
-
Patent number: 11552786Abstract: Systems and methods for data authentication can comprise processing a first secret element to generate a first encrypted secret element, processing a second secret element to generate a non-secret element, and processing the first encrypted secret element and the non-secret element to generate an encrypted data block.Type: GrantFiled: August 28, 2020Date of Patent: January 10, 2023Assignee: COMBINED CONDITIONAL ACCESS DEVELOPMENT AND SUPPORT, LLCInventors: Lawrence Tang, Kenneth P. Miller, Christopher J. Bennett
-
Patent number: 11418339Abstract: An apparatus, method, system and computer-readable medium are provided for preserving an encryption of data when confronted by an attack, such as a side channel analysis (SCA) attack based on a statistical analysis. In some embodiments, hardware, software, and/or firmware associated with an encryption calculation may be exercised or accessed during a background operation when an actual or real operation is not taking place. During the background operation, dummy values for data and one or more keys may be input to the hardware. A switching between the real operation and the background operation may take place seamlessly such that measurement of a physical characteristic associated with the hardware is indistinguishable in terms of when the real and background operations are active. In this manner, the secrecy of a key used in connection with the real operation may be preserved.Type: GrantFiled: December 18, 2014Date of Patent: August 16, 2022Assignee: Combined Conditional Access Development & Support, LLC (CCAD)Inventors: Lawrence Tang, An Tonthat
-
Publication number: 20220021661Abstract: Methods are disclosed for creating a virtual encryption session prior to video streaming content being requested to reduce or eliminate delay in initialization of the encryption session and content delivery to the customer. A virtual session has control word(s) (CW) and virtual entitlement control message(s) (ECM) that are devoid of content specific information. One or more virtual sessions may be stored at an edge device and may be used to encrypt the first portion of a content stream while a content-specific encryption session is being initiated.Type: ApplicationFiled: July 28, 2021Publication date: January 20, 2022Inventors: Madhu Penugonda, Lawrence Tang
-
Patent number: 11108743Abstract: Methods are disclosed for creating a virtual encryption session prior to video streaming content being requested to reduce or eliminate delay in initialization of the encryption session and content delivery to the customer. A virtual session has control word(s) (CW) and virtual entitlement control message(s) (ECM) that are devoid of content specific information. One or more virtual sessions may be stored at an edge device and may be used to encrypt the first portion of a content stream while a content-specific encryption session is being initiated.Type: GrantFiled: June 19, 2019Date of Patent: August 31, 2021Assignee: Combined Conditional Access Development And Support, LLCInventors: Madhu Penugonda, Lawrence Tang
-
Publication number: 20210119783Abstract: Systems and methods for data authentication can comprise processing a first secret element to generate a first encrypted secret element, processing a second secret element to generate a non-secret element, and processing the first encrypted secret element and the non-secret element to generate an encrypted data block.Type: ApplicationFiled: August 28, 2020Publication date: April 22, 2021Inventors: Lawrence Tang, Kenneth P. Miller, Christopher J. Bennett
-
Patent number: 10797864Abstract: Systems and methods for data authentication can comprise processing a first secret element to generate a first encrypted secret element, processing a second secret element to generate a non-secret element, and processing the first encrypted secret element and the non-secret element to generate an encrypted data block.Type: GrantFiled: November 21, 2011Date of Patent: October 6, 2020Assignee: Combined Conditional Access Development And Support, LLCInventors: Lawrence Tang, Kenneth P. Miller, Christopher J. Bennett
-
Publication number: 20200014665Abstract: Methods are disclosed for creating a virtual encryption session prior to video streaming content being requested to reduce or eliminate delay in initialization of the encryption session and content delivery to the customer. A virtual session has control word(s) (CW) and virtual entitlement control message(s) (ECM) that are devoid of content specific information. One or more virtual sessions may be stored at an edge device and may be used to encrypt the first portion of a content stream while a content-specific encryption session is being initiated.Type: ApplicationFiled: June 19, 2019Publication date: January 9, 2020Inventors: Madhu Penugonda, Lawrence Tang
-
Patent number: 10375030Abstract: Methods are disclosed for creating a virtual encryption session prior to video streaming content being requested to reduce or eliminate delay in initialization of the encryption session and content delivery to the customer. A virtual session has control word(s) (CW) and virtual entitlement control message(s) (ECM) that are devoid of content specific information. One or more virtual sessions may be stored at an edge device and may be used to encrypt the first portion of a content stream while a content-specific encryption session is being initiated.Type: GrantFiled: June 24, 2016Date of Patent: August 6, 2019Assignee: Combined Conditional Access Development & SupportInventors: Madhu Penugonda, Lawrence Tang
-
Patent number: 9930390Abstract: Methods, systems, computer-readable media, and apparatuses for providing control word and associated entitlement control message (ECM) functionalities are presented. In some embodiments, a computing device may cache concurrently a first set of control words and a first set of entitlement control messages (ECMs) associated with the first set of control words. The computing device may encrypt a transport stream with a particular control word of the first set of control words. The computing device may insert a particular ECM, of the first set of ECMs, corresponding to the particular control word into the transport stream sent to a device downstream from the computing device. In some embodiments, a computing device may reuse control words and associated ECMs.Type: GrantFiled: September 19, 2016Date of Patent: March 27, 2018Assignee: Combined Conditional Access Development & Support, LLCInventors: Madhu Penugonda, Lawrence Tang, Kenneth Miller, Douglas Petty
-
Publication number: 20170374035Abstract: Methods are disclosed for creating a virtual encryption session prior to video streaming content being requested to reduce or eliminate delay in initialization of the encryption session and content delivery to the customer. A virtual session has control word(s) (CW) and virtual entitlement control message(s) (ECM) that are devoid of content specific information. One or more virtual sessions may be stored at an edge device and may be used to encrypt the first portion of a content stream while a content-specific encryption session is being initiated.Type: ApplicationFiled: June 24, 2016Publication date: December 28, 2017Inventors: Madhu Penugonda, Lawrence Tang
-
Publication number: 20170105035Abstract: Methods, systems, computer-readable media, and apparatuses for providing control word and associated entitlement control message (ECM) functionalities are presented. In some embodiments, a computing device may cache concurrently a first set of control words and a first set of entitlement control messages (ECMs) associated with the first set of control words. The computing device may encrypt a transport stream with a particular control word of the first set of control words. The computing device may insert a particular ECM, of the first set of ECMs, corresponding to the particular control word into the transport stream sent to a device downstream from the computing device. In some embodiments, a computing device may reuse control words and associated ECMs.Type: ApplicationFiled: September 19, 2016Publication date: April 13, 2017Inventors: Madhu Penugonda, Lawrence Tang, Kenneth Miller, Douglas Petty
-
Patent number: 9531778Abstract: Disclosed are systems and methods for controlling an amount and rate of security related information (e.g., content encryption or rights management information) being transmitted in a content stream to a user device. In one aspect, the disclosure provides a method and related apparatuses for reducing bandwidth usage required when sending transitional security related information during a transition point of different content in a content stream.Type: GrantFiled: July 24, 2014Date of Patent: December 27, 2016Assignee: Combined Conditional Access Development and Support, LLCInventors: Kenneth Miller, Lawrence Tang
-
Patent number: 9473463Abstract: Methods, systems, computer-readable media, and apparatuses for providing control word and associated entitlement control message (ECM) functionalities are presented. In some embodiments, a computing device may cache concurrently a first set of control words and a first set of entitlement control messages (ECMs) associated with the first set of control words. The computing device may encrypt a transport stream with a particular control word of the first set of control words. The computing device may insert a particular ECM, of the first set of ECMs, corresponding to the particular control word into the transport stream sent to a device downstream from the computing device. In some embodiments, a computing device may reuse control words and associated ECMs.Type: GrantFiled: July 29, 2014Date of Patent: October 18, 2016Assignee: Combined Conditional Access Development & Support, LLCInventors: Madhu Penugonda, Lawrence Tang, Kenneth Miller, Douglas Petty
-
Publication number: 20160036783Abstract: Methods, systems, computer-readable media, and apparatuses for providing control word and associated entitlement control message (ECM) functionalities are presented. In some embodiments, a computing device may cache concurrently a first set of control words and a first set of entitlement control messages (ECMs) associated with the first set of control words. The computing device may encrypt a transport stream with a particular control word of the first set of control words. The computing device may insert a particular ECM, of the first set of ECMs, corresponding to the particular control word into the transport stream sent to a device downstream from the computing device. In some embodiments, a computing device may reuse control words and associated ECMs.Type: ApplicationFiled: July 29, 2014Publication date: February 4, 2016Applicant: COMBINED CONDITIONAL ACCESS DEVELOPMENT AND SUPPORT, LLCInventors: Madhu Penugonda, Lawrence Tang, Kenneth Miller, Douglas Petty
-
Publication number: 20160028785Abstract: Disclosed are systems and methods for controlling an amount and rate of security related information (e.g., content encryption or rights management information) being transmitted in a content stream to a user device. In one aspect, the disclosure provides a method and related apparatuses for reducing bandwidth usage required when sending transitional security related information during a transition point of different content in a content stream.Type: ApplicationFiled: July 24, 2014Publication date: January 28, 2016Inventors: Kenneth Miller, Lawrence Tang
-
Publication number: 20150104011Abstract: An apparatus, method, system and computer-readable medium are provided for preserving an encryption of data when confronted by an attack, such as a side channel analysis (SCA) attack based on a statistical analysis. In some embodiments, hardware, software, and/or firmware associated with an encryption calculation may be exercised or accessed during a background operation when an actual or real operation is not taking place. During the background operation, dummy values for data and one or more keys may be input to the hardware. A switching between the real operation and the background operation may take place seamlessly such that measurement of a physical characteristic associated with the hardware is indistinguishable in terms of when the real and background operations are active. In this manner, the secrecy of a key used in connection with the real operation may be preserved.Type: ApplicationFiled: December 18, 2014Publication date: April 16, 2015Applicant: Combined Conditional Access Development & Support, LLCInventors: Lawrence Tang, An Tonthat
-
Publication number: 20130129080Abstract: Systems and methods for data authentication can comprise processing a first secret element to generate a first encrypted secret element, processing a second secret element to generate a non-secret element, and processing the first encrypted secret element and the non-secret element to generate an encrypted data block.Type: ApplicationFiled: November 21, 2011Publication date: May 23, 2013Applicant: Combined Conditional Access Development and Support, LLCInventors: Lawrence Tang, Kenneth P. Miller, Christopher J. Bennett
-
Publication number: 20110321024Abstract: An approach is provided for updating an application such as a widget. An update platform receives a request to update an application executing on a device. Execution of the application retrieves all or a portion of stored code associated with the application from a storage memory of the device and places the retrieved stored code as executing code in an execution memory of the device. The update platform determines whether updated code corresponding to the application is available based, at least in part, on the request and determines to retrieve the updated code if available. The update platform then determines to replace all or a portion of the stored code with the updated code without affecting the executing code.Type: ApplicationFiled: June 28, 2010Publication date: December 29, 2011Applicant: Nokia CorporationInventors: Dennis Knothe, Lawrence Tang