Patents by Inventor Madjid F. Nakhjiri
Madjid F. Nakhjiri has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9219607Abstract: A method for providing identity data to network-enabled devices includes receiving a request for identity data from a network-enabled device that is deployed to an end-user. The network-enabled device is pre-provisioned with a PIN, a global key pair, a user-accessible first device identifier, and a second device identifier usable by a service provider delivering a service to the device. The identity data request includes the first and second identifiers, a protected rendition of the PIN, and an encryption key or other data from which an encryption key is derivable. The identifiers, the protected rendition of the PIN, and the encryption key or the other data are signed by a private key in the global key pair. The validity of the PIN included in the request is verified to authenticate the device. If the PIN is valid, identity data for the device is generated, encrypted and sent to the network-enabled device.Type: GrantFiled: December 18, 2013Date of Patent: December 22, 2015Assignee: ARRIS Technology, Inc.Inventor: Madjid F. Nakhjiri
-
Patent number: 9178869Abstract: A method and apparatus are provided for locating network resources over a communication network. The method includes receiving a digital certificate identifying a first entity and extracting information from at least one predetermined field of the digital certificate. The extracted information is used as input to a location generation function to create a resource locator (e.g., a URL). The network resource is contacted over the communication network in accordance with a communication protocol using the resource locator to obtain requested information concerning the first entity.Type: GrantFiled: April 5, 2011Date of Patent: November 3, 2015Assignee: GOOGLE TECHNOLOGY HOLDINGS LLCInventors: Madjid F. Nakhjiri, Tat Keung Chan
-
Publication number: 20150186635Abstract: A method for providing redacted representations of data. The method comprises hosting a resource on a server that comprises data pieces each tagged with a redaction level, generating a plurality of redacted representations of the resource, each redacted representations being designated for one of a plurality of authorization levels that each corresponding to a different range of redaction levels, and the redacted representation for a particular authorization level containing one or more of the data pieces that are tagged with a redaction level that falls within the range of redaction levels for that particular authorization level, receiving a request from a client comprising a claimed authorization level, and providing the client with one of the redacted representations that is designated for the authorization level that matches the claimed authorization level.Type: ApplicationFiled: January 2, 2014Publication date: July 2, 2015Inventors: Madjid F. Nakhjiri, James M. Hunter
-
Patent number: 9027101Abstract: A method and system for providing a record of consent in scenarios in which the user and a device may have to perform a function that involves two entities that don't trust each other or are not necessary interested in cooperating. In one such example, a user wants to switch services from an “old” operator to a “new” operator. An operator switch without explicit user consent may have legal or business ramifications for both the “old” and “new” operators. The ramifications are even more severe if the switch is the result of actions of, for example, a hacker maliciously causing this switches in order to cause monetary or other damage to either operators or denial of service to the users. In such cases it is useful for both operators to be on record and have an archive of proof of user consent should future disputes arise.Type: GrantFiled: March 1, 2012Date of Patent: May 5, 2015Assignee: Google Technology Holdings LLCInventor: Madjid F. Nakhjiri
-
Patent number: 8887310Abstract: A method is provided for operating a consumer programming device that provisions consumer electronic devices. The method includes receiving over a communication link a first enable message that authorizes the consumer programming device to make available one or more resources which enable it to provide services to consumer electronic devices. Services are provided to consumer electronic devices up until all the resources have been exhausted. Additional consumer electronic devices are provided with services only if a second enable message is received over the communication link.Type: GrantFiled: November 19, 2009Date of Patent: November 11, 2014Assignee: Motorola Mobility LLCInventors: Alexander Medvinsky, Stuart P. Moskovics, Madjid F. Nakhjiri, Jason A. Pasion
-
Patent number: 8856509Abstract: A method of authentication and authorization over a communications system is provided. Disclosed herein are systems and methods for creating a cryptographic evidence, called authentication/authorization evidence, AE, when a successful authentication/authorization between a client and an authentication server is complete. There are a variety of methods for generating AE. For instance, the AE can be data that is exchanged during the authentication signaling or data that results from it. A distinctive point being that AE results from the authentication process and is used as prior state for the following TLS exchange. An example for creation of AE, is as follows: EAP authentications typically result in an Extended Master Session Key (EMSK). The EMSK can be used to create an Evidence Master Key (EMK) that can then be used to create AE for a variety of servers.Type: GrantFiled: August 10, 2011Date of Patent: October 7, 2014Assignee: Motorola Mobility LLCInventors: Madjid F. Nakhjiri, Tat Keung Chan, Alexander Medvinsky
-
Publication number: 20140281493Abstract: A method for providing identity data to network-enabled devices includes receiving a request for identity data from a network-enabled device that is deployed to an end-user. The network-enabled device is pre-provisioned with a PIN, a global key pair, a user-accessible first device identifier, and a second device identifier usable by a service provider delivering a service to the device. The identity data request includes the first and second identifiers, a protected rendition of the PIN, and an encryption key or other data from which an encryption key is derivable. The identifiers, the protected rendition of the PIN, and the encryption key or the other data are signed by a private key in the global key pair. The validity of the PIN included in the request is verified to authenticate the device. If the PIN is valid, identity data for the device is generated, encrypted and sent to the network-enabled device.Type: ApplicationFiled: December 18, 2013Publication date: September 18, 2014Applicant: General Instrument CorporationInventor: Madjid F. Nakhjiri
-
Patent number: 8584214Abstract: A method, a network element, and a client device for creating a trusted connection with a network are disclosed. A client device 104 may attempt to access a sub-network 106. The client device 104 may determine that a certificate of the sub-network 106 is issued by a certification authority absent from a device certificate trust list. The client device 104 may receive via the sub-network 106 a certificate trust list update 400 from a certificate trust list provider 108.Type: GrantFiled: September 18, 2008Date of Patent: November 12, 2013Assignee: Motorola Mobility LLCInventors: Steven D. Upp, Alexander Medvinsky, Madjid F. Nakhjiri
-
Patent number: 8555361Abstract: A method of authentication and authorization over a communication system is provided. The method performs a first authentication of a device based on a set of device identity and credentials. The first authentication includes creation of a first set of keying material. The method also includes performing a second authentication of a subscriber based on a set of subscriber identity and credentials. The second authentication includes creation of a second set of keying material. A set of compound key material is created with a key derivation mechanism that uses the first set of keying material and the second set of keying material. A binding token is created by cryptographically signing at least the device identity authenticated in the first authentication and the subscriber identity authenticated in the second authentication using the set of compound keying material. The signed binding token is exchanged for verification with an authenticating and authorizing party.Type: GrantFiled: February 28, 2011Date of Patent: October 8, 2013Assignee: Motorola Mobility LLCInventors: Madjid F. Nakhjiri, Katrin Hoeper, Alexander Medvinsky
-
Patent number: 8539559Abstract: A novel system for utilizing an authorization token to separate authentication and authorization services. The system authenticates a client to an authenticating server; generates an authorization token with the authenticating server and the client; and authorizes services for the client using the generated authorization token.Type: GrantFiled: August 14, 2007Date of Patent: September 17, 2013Assignee: Futurewei Technologies, Inc.Inventor: Madjid F. Nakhjiri
-
Publication number: 20130239169Abstract: Techniques (400, 600, 700) and apparatuses (102, 106, 108, 800) are described that enable a policy for secure packet transmission using required node paths and cryptographic signatures. These techniques and apparatuses enable a secure execution environment (SEE) of a target device to receive trustworthy sensitive data.Type: ApplicationFiled: March 6, 2013Publication date: September 12, 2013Applicant: GENERAL INSTRUMENT CORPORATIONInventor: Madjid F. Nakhjiri
-
Patent number: 8285990Abstract: A method for secure and reliable authentication in a communication system. In an embodiment, the authentication method includes performing authentication of a user utilizing Extensible Authentication Protocol (EAP), and transmitting a result indication message to the user. The result indication message can include additional information for security and reliability. The method also includes receiving an acknowledgement message from the user. The acknowledgement message is sent by the user for confirming the reception of the result indication. In an embodiment, the method also includes retransmitting the result indication message if the acknowledgement message is not received within a predetermined time. The additional information for security and reliability can include Message Authentication Code (MAC) and time interval information. The additional information for security and reliability can also include a security/reliability flag.Type: GrantFiled: April 30, 2008Date of Patent: October 9, 2012Assignee: Future Wei Technologies, Inc.Inventor: Madjid F. Nakhjiri
-
Publication number: 20120227097Abstract: A method and system for providing a record of consent in scenarios in which the user and a device may have to perform a function that involves two entities that don't trust each other or are not necessary interested in cooperating. In one such example, a user wants to switch services from an “old” operator to a “new” operator. An operator switch without explicit user consent may have legal or business ramifications for both the “old” and “new” operators. The ramifications are even more severe if the switch is the result of actions of, for example, a hacker maliciously causing this switches in order to cause monetary or other damage to either operators or denial of service to the users. In such cases it is useful for both operators to be on record and have an archive of proof of user consent should future disputes arise.Type: ApplicationFiled: March 1, 2012Publication date: September 6, 2012Applicant: GENERAL INSTRUMENT CORPORATIONInventor: Madjid F. Nakhjiri
-
Patent number: 8245028Abstract: Communication nodes, acting as intermediate routers for communication packets transmitted between a source node and a destination node, are provided with different access rights to the fields of the routed communication packets. Routes of intermediate routers between the source node and the destination node are discovered and the identities of intermediate routers on the discovered routes are collected. The aggregate trust levels of the intermediate routers are computed allowing the most trusted route to be selected. Encryption keys are securely distributed to intermediate routers on the most trusted route based on the trust level of the intermediate routers and fields of the communication packets are encrypted with encryption keys corresponding to the assigned trust level. Intermediated nodes are thereby prevented from accessing selected fields of the communication packets.Type: GrantFiled: December 3, 2010Date of Patent: August 14, 2012Assignee: Motorola Solutions, Inc.Inventors: George Calcev, Bogdan O Carbunar, Madjid F. Nakhjiri
-
Publication number: 20120042160Abstract: A method of authentication and authorization over a communications system is provided. Disclosed herein are systems and methods for creating a cryptographic evidence, called authentication/authorization evidence, AE, when a successful authentication/authorization between a client and an authentication server is complete. There are a variety of methods for generating AE. For instance, the AE can be data that is exchanged during the authentication signaling or data that results from it. A distinctive point being that AE results from the authentication process and is used as prior state for the following TLS exchange. An example for creation of AE, is as follows: EAP authentications typically result in an Extended Master Session Key (EMSK). The EMSK can be used to create an Evidence Master Key (EMK) that can then be used to create AE for a variety of servers.Type: ApplicationFiled: August 10, 2011Publication date: February 16, 2012Applicant: GENERAL INSTRUMENT CORPORATIONInventors: Madjid F. Nakhjiri, Tat Keung Chan, Alexander Medvinsky
-
Patent number: 8099597Abstract: A communications component comprising a processor configured to implement a method comprising acquiring an authentication identifier (Auth ID), and constructing a network service identifier (NSI) comprising the Auth ID and an authentication, authorization, and accounting (AAA) realm. The disclosure includes a system comprising an authorization server in communication with a host, wherein the authorization server is configured to verify a previous authentication of the host using a NSI. Also disclosed is a method comprising receiving a NSI and a service request, wherein the NSI comprises an Auth ID, determining an authentication server associated with the Auth ID, verifying an authentication of a host using the Auth ID, and authorizing the host to receive a service associated with the service request.Type: GrantFiled: August 31, 2007Date of Patent: January 17, 2012Assignee: FutureWei Technologies, Inc.Inventor: Madjid F. Nakhjiri
-
Publication number: 20110246646Abstract: A method and apparatus are provided for locating network resources over a communication network. The method includes receiving a digital certificate identifying a first entity and extracting information from at least one predetermined field of the digital certificate. The extracted information is used as input to a location generation function to create a resource locator (e.g., a URL). The network resource is contacted over the communication network in accordance with a communication protocol using the resource locator to obtain requested information concerning the first entity.Type: ApplicationFiled: April 5, 2011Publication date: October 6, 2011Applicant: GENERAL INSTRUMENT CORPORATIONInventors: Madjid F. Nakhjiri, Tat Keung Chan
-
Publication number: 20110213969Abstract: A method of authentication and authorization over a communication system is provided. The method performs a first authentication of a device based on a set of device identity and credentials. The first authentication includes creation of a first set of keying material. The method also includes performing a second authentication of a subscriber based on a set of subscriber identity and credentials. The second authentication includes creation of a second set of keying material. A set of compound key material is created with a key derivation mechanism that uses the first set of keying material and the second set of keying material. A binding token is created by cryptographically signing at least the device identity authenticated in the first authentication and the subscriber identity authenticated in the second authentication using the set of compound keying material. The signed binding token is exchanged for verification with an authenticating and authorizing party.Type: ApplicationFiled: February 28, 2011Publication date: September 1, 2011Applicant: GENERAL INSTRUMENT CORPORATIONInventors: Madjid F. Nakhjiri, Katrin Hoeper, Alexander Medvinsky
-
Patent number: 8005224Abstract: A method for establishing a new security association between a mobile node and a network source, the method comprising creating a first token comprising a security association between a network source and a mobile node, the first token being encrypted using a first key known to the mobile node and a first trust authority within a home network associated with the mobile node, and creating a second token comprising the same security association between the network source and the mobile node, the second token being encrypted using a second key known to the first trust authority and a second trust authority associated with the network source, wherein the first token and the second token are sent to the second trust authority using a chain of trust infrastructure.Type: GrantFiled: March 14, 2007Date of Patent: August 23, 2011Assignee: FutureWei Technologies, Inc.Inventors: Madjid F. Nakhjiri, Changsheng Wan
-
Publication number: 20110119739Abstract: A method is provided for operating a consumer programming device that provisions consumer electronic devices. The method includes receiving over a communication link a first enable message that authorizes the consumer programming device to make available one or more resources which enable it to provide services to consumer electronic devices. Services are provided to consumer electronic devices up until all the resources have been exhausted. Additional consumer electronic devices are provided with services only if a second enable message is received over the communication link.Type: ApplicationFiled: November 19, 2009Publication date: May 19, 2011Applicant: GENERAL INSTRUMENT CORPORATIONInventors: Alexander Medvinsky, Stuart P. Moskovics, Madjid F. Nakhjiri, Jason A. Pasion