Patents by Inventor Yogendra C. Shah

Yogendra C. Shah has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180159738
    Abstract: An apparatus and method for providing home evolved node-B (H(e)NB) integrity verification and validation using autonomous validation and semi-autonomous validation is disclosed herein.
    Type: Application
    Filed: November 10, 2017
    Publication date: June 7, 2018
    Inventors: Yogendra C. Shah, Inhyok Cha, Andreas Leicher, Andreas Schmidt, Dolores F. Howry, Sudhir B. Pattar, David G. Greiner, Louis J. Guccione, Michael V. Meyerstein, Lawrence Case
  • Publication number: 20180152841
    Abstract: Methods and instrumentalities are disclosed that enable one or more domains on one or more devices to be owned or controlled by one or more different local or remote owners, while providing a level of system-wide management of those domains. Each domain may have a different owner, and each owner may specify policies for operation of its domain and for operation of its domain in relation to the platform on which the domain resides, and other domains. A system-wide domain manager may be resident on one of the domains. The system-wide domain manager may enforce the policies of the domain on which it is resident, and it may coordinate the enforcement of the other domains by their respective policies in relation to the domain in which the system-wide domain manager resides. Additionally, the system-wide domain manager may coordinate interaction among the other domains in accordance with their respective policies.
    Type: Application
    Filed: October 30, 2017
    Publication date: May 31, 2018
    Inventors: Yogendra C. Shah, Louis J. Guccione, Inhyok Cha, Sudhir B. Pattar, Andreas Schmidt
  • Patent number: 9980213
    Abstract: Methods, apparatus and systems for managing an exposure of a network to a wireless transmit/receive unit (WTRU) are disclosed. One representative method includes receiving, by an access point (AP) of the network, information associated with the WTRU; and selectively exposing, by the AP, the network.
    Type: Grant
    Filed: August 22, 2014
    Date of Patent: May 22, 2018
    Assignee: InterDigital Patent Holdings, Inc.
    Inventors: Kenneth F. Lynch, Scott C. Hergenhan, Angelo A. Cuffaro, Alexander Reznik, Yousif Targali, Yogendra C. Shah, Vinod Kumar Choyi
  • Publication number: 20180131687
    Abstract: A certification provenance tree (CPT) structure may provide information concerning a layered certification of a device that comprises a hierarchy of components. The CPT structure may include a hierarchy of secure certification provenance document (SCPD) structures. Each SCPD structure in the hierarchy may represent a given component at a given level of the hierarchy of components of the device. Each SCPD structure may include a field that stores a certification proof indicating that security properties of the given component have been certified by a certification authority. An SCPD structure may further include accreditation information fields that store a pointer to an SCPD structure of a component at a next layer of the hierarchy of components of the device. The pointer may provide an indication of assurance that the component at that next layer will perform securely within this component at said given layer.
    Type: Application
    Filed: September 1, 2017
    Publication date: May 10, 2018
    Inventors: Dolores F. Howry, Yogendra C. Shah, Alec Brusilovsky, Joseph Gredone
  • Publication number: 20180121661
    Abstract: Methods and instrumentalities are disclosed that enable one or more domains on one or more devices to be owned or controlled by one or more different local or remote owners, while providing a level of system-wide management of those domains. Each domain may have a different owner, and each owner may specify policies for operation of its domain and for operation of its domain in relation to the platform on which the domain resides, and other domains. A system-wide domain manager may be resident on one of the domains. The system-wide domain manager may enforce the policies of the domain on which it is resident, and it may coordinate the enforcement of the other domains by their respective policies in relation to the domain in which the system-wide domain manager resides. Additionally, the system-wide domain manager may coordinate interaction among the other domains in accordance with their respective policies. A domain application may be resident on one of the domains.
    Type: Application
    Filed: December 14, 2017
    Publication date: May 3, 2018
    Inventors: Louis J. Guccione, Michael V. Meyerstein, Inhyok Cha, Andreas Schmidt, Andreas Leicher, Yogendra C. Shah
  • Publication number: 20180091978
    Abstract: Universal integrated circuit card (UICC) having a virtual subscriber identity module functionality is disclosed. A wireless transmit/receive unit (WTRU) comprises a mobile equipment (ME) configured to perform wireless communication and a UICC. The UICC is configured to perform security functionalities. The UICC supports multiple isolated domains including UICC issuer's domain. Each domain is owned by a separate owner so that each owner stores and executes an application on the UICC under a control of an UICC issuer and the UICC issuer's domain controls creation and deletion of other domains and defines and enforces security rules for authorizing third parties to have an access to the domains. The UICC is configured to verify integrity of operating system functions and applications stored on the UICC. The UICC is configured to control an access to information regarding applications according to security policies stored within the UICC.
    Type: Application
    Filed: December 4, 2017
    Publication date: March 29, 2018
    Inventors: Yogendra C. Shah, Michael V. Meyerstein, Inhyok Cha, Andreas Schmidt
  • Patent number: 9924366
    Abstract: Methods, components and apparatus for implementing platform validation and management (PVM) are disclosed. PVM provides the functionality and operations of a platform validation entity with remote management of devices by device management components and systems such as a home node-B management system or component. Example PVM operations bring devices into a secure target state before allowing connectivity and access to a core network.
    Type: Grant
    Filed: April 29, 2015
    Date of Patent: March 20, 2018
    Assignee: InterDigital Patent Holdings, Inc.
    Inventors: Andreas Schmidt, David G. Greiner, Louis J. Guccione, Dolores F. Howry, Michael V. Meyerstein, Sudhir B. Pattar, Yogendra C. Shah, Inhyok Cha, Andreas Leicher, Lawrence Case
  • Publication number: 20180077517
    Abstract: A method and apparatus for performing secure Machine-to-Machine (M2M) provisioning and communication is disclosed. In particular a temporary private identifier, or provisional connectivity identification (PCID), for uniquely identifying machine-to-machine equipment (M2ME) is also disclosed. Additionally, methods and apparatus for use in validating, authenticating and provisioning a M2ME is also disclosed. The validation procedures disclosed include an autonomous, semi-autonomous, and remote validation are disclosed. The provisioning procedures include methods for re-provisioning the M2ME. Procedures for updating software, and detecting tampering with the M2ME are also disclosed.
    Type: Application
    Filed: September 18, 2015
    Publication date: March 15, 2018
    Inventors: Inhyok Cha, Michael Meyerstein, Yogendra C. Shah, Andreas Schmidt
  • Publication number: 20180014192
    Abstract: Systems, methods, and instrumentalities are disclosed that provide for a gateway outside of a network domain to provide services to a plurality of devices. For example, the gateway may act as a management entity or as a proxy for the network domain. As a management entity, the gateway may perform a security function relating to each of the plurality of devices. The gateway may perform the security function without the network domain participating or having knowledge of the particular devices. As a proxy for the network, the gateway may receive a command from the network domain to perform a security function relating to each of a plurality of devices. The network may know the identity of each of the plurality of devices. The gateway may perform the security function for each of the plurality of devices and aggregate related information before sending the information to the network domain.
    Type: Application
    Filed: September 8, 2017
    Publication date: January 11, 2018
    Applicant: InterDigital Patent Holdings, Inc.
    Inventors: Sudhir B. Pattar, Inhyok Cha, Andreas Schmidt, Andreas Leicher, Yogendra C. Shah, Prabhakar R. Chitrapu, Lawrence Case
  • Publication number: 20180013782
    Abstract: An authentication assurance level associated with an entity, for instance a user equipment, may be computed periodically or in response to an event. The authentication assurance level is compared to an authentication threshold. Based on the comparison, it is determined whether a fresh performance of at least one authentication factor needs to be performed. Thus, appropriate authentication factors and functions may be invoked on a periodic basis to maintain a certain authentication assurance level, which is referred to herein as the assurance threshold. The authentication assurance level may change, for instance decay, over time and may be refreshed periodically.
    Type: Application
    Filed: December 23, 2015
    Publication date: January 11, 2018
    Inventors: Vinod Kumar CHOYI, Yogendra C. SHAH, Alec BRUSILOVSKY, Li-Hsiang SUN, Nobuyuki TAMAKI, Rafael A. CEPEDA
  • Publication number: 20170374070
    Abstract: Current approaches to multi-factor authentication lack scalability, among other capabilities and efficiencies. Described herein are methods, devices, and systems that provide for robust and scalable multi-factor authentication using a combination of network-based and device-based authentications. In an example embodiment, a common policy framework enables policy enforcements to be carried out in the network or on the device. As described below, the framework may provide synchronization of policies and authentication results between a network entity and an entity on a user device.
    Type: Application
    Filed: January 8, 2016
    Publication date: December 28, 2017
    Inventors: Yogendra C. SHAH, Li-Hsiang SUN, Nobuyuki TAMAKI, Vinod Kumar CHOY, Rafael A. CEPEDA
  • Publication number: 20170364685
    Abstract: Described herein are methods, device, and systems that provide security to various computing systems, such as, smartphones, tablets, personal computers, computing servers, or the like. Security is provided to computing systems at various stages of their operational cycles. For example, a secure boot of a base computing platform (BCP) may be performed, and security processor (SecP) may be instantiated on the BCP. Using the SecP, an integrity of the OS of the BCP may be verified, and an integrity of a hypervisor may be verified. A virtual machine (VM) may be created on the BCP. The VM is provided with virtual access to the SecP on the BCP. Using the virtual access to the TAM, an integrity of the guest OS of the VM is verified and an integrity of applications running on the guest OS are verified.
    Type: Application
    Filed: November 20, 2015
    Publication date: December 21, 2017
    Inventors: Yogendra C. SHAH, Andreas SCHMIDT, John W. MARLAND
  • Patent number: 9826335
    Abstract: A method and apparatus for performing secure Machine-to-Machine (M2M) provisioning and communication is disclosed. In particular a temporary private identifier, or provisional connectivity identification (PCID), for uniquely identifying machine-to-machine equipment (M2ME) is also disclosed. Additionally, methods and apparatus for use in validating, authenticating and provisioning a M2ME is also disclosed. The validation procedures disclosed include an autonomous, semi-autonomous, and remote validation are disclosed. The provisioning procedures include methods for re-provisioning the M2ME. Procedures for updating software, and detecting tampering with the M2ME are also disclosed.
    Type: Grant
    Filed: January 21, 2009
    Date of Patent: November 21, 2017
    Assignee: InterDigital Patent Holdings, Inc.
    Inventors: Inhyok Cha, Yogendra C. Shah, Andreas U. Schmidt, Michael V. Meyerstein
  • Publication number: 20170324733
    Abstract: Current approaches to using security postures lack functionalities. Security postures can be used to enable various nodes to make informed decisions. In accordance with one embodiment, a system comprises a first node and a second node. The first node receives a security posture associated with the second node. The security posture provides a verifiable point-in-time trust metric on an overall level of trust in the second node. The first node compares the security posture associated with the second node to an expected security posture level associated with the first node. If the security posture associated with the second node is adequate as compared to the expected security posture level, a connection is established between the first node and the second node.
    Type: Application
    Filed: November 20, 2015
    Publication date: November 9, 2017
    Inventors: Dolores F. HOWRY, Vinod Kumar CHOYI, Alec BRUSILOVSKY, Yogendra C. SHAH
  • Patent number: 9807608
    Abstract: Methods and instrumentalities are disclosed that enable one or more domains on one or more devices to be owned or controlled by one or more different local or remote owners, while providing a level of system-wide management of those domains. Each domain may have a different owner, and each owner may specify policies for operation of its domain and for operation of its domain in relation to the platform on which the domain resides, and other domains. A system-wide domain manager may be resident on one of the domains. The system-wide domain manager may enforce the policies of the domain on which it is resident, and it may coordinate the enforcement of the other domains by their respective policies in relation to the domain in which the system-wide domain manager resides. Additionally, the system-wide domain manager may coordinate interaction among the other domains in accordance with their respective policies.
    Type: Grant
    Filed: April 20, 2010
    Date of Patent: October 31, 2017
    Assignee: InterDigital Patent Holdings, Inc.
    Inventors: Inhyok Cha, Louis J. Guccione, Yogendra C. Shah, Andreas U. Schmidt, Sudhir B. Pattar
  • Patent number: 9781100
    Abstract: A constrained network entity may determine, via an authentication procedure with a core network entity, the trustworthiness of an endpoint attempting to establish a secure channel with the constrained network entity. The constrained network entity may receive a certificate from the endpoint attempting to establish the secure channel and the constrained network entity may send the certificate asserted by the endpoint to a core network entity for validation. The core network entity may receive the certificate during a key exchange with the constrained network entity and the core network entity may indicate to the constrained network entity the validity of the certificate. The constrained network entity may determine whether to establish the secure channel with the endpoint based on the validity of the certificate.
    Type: Grant
    Filed: November 10, 2016
    Date of Patent: October 3, 2017
    Assignee: InterDigital Patent Holdings, Inc.
    Inventors: Lawrence Case, Yogendra C Shah, Inhyok Cha
  • Publication number: 20170277895
    Abstract: Integrity validation of a network device may be performed. A network device comprising a secure hardware module, may receive a root key. The secure hardware module may also receive a first code measurement. The secure hardware module may provide a first key based on the root key and the first code measurement. The secure hardware module may receive a second code measurement and provide a second key based on the first key and the second code measurement. The release of keys based on code measurements may provide authentication in stages.
    Type: Application
    Filed: June 12, 2017
    Publication date: September 28, 2017
    Inventors: Inhyok Cha, Yogendra C Shah, Lawrence Case
  • Patent number: 9774457
    Abstract: The present invention is related to a wireless transmit/receive unit (WTRU) for providing advanced security functions. The WTRU includes trusted platform module (TPM) for performing trusted computing operations; and a secure time component (STC) for providing a secure measurement of a current time. The STC and the TPM are integrated to provide accurate trusted time information to internal and external to the WTRU. The STC may be located on an expanded a subscriber identity module (SIM), on the WTRU platform, or two STCs may be used, one in each location. Similarly, the TPM may be located on an expanded SIM, on the WTRU platform, or two TPMs may be used, one in each location. Preferably, the STC will include a real time clock (RTC); a tamper detection and power failure unit; and a time report and sync controller.
    Type: Grant
    Filed: August 29, 2016
    Date of Patent: September 26, 2017
    Assignee: InterDigital Technology Corporation
    Inventors: Yogendra C. Shah, Inhyok Cha
  • Patent number: 9774581
    Abstract: A user equipment (UE) may perform functions locally, such as on a trusted module that resides within the UE. For example, a UE may perform functions associated with a single sign-on protocol, such as OpenID Connect for example, via a local identity provider function. For example, a UE may generate identity tokens and access tokens that can be used by a service provider to retrieve user information, such as identity information and/or user attributes. User attributes may be retrieved via a user information endpoint that may reside locally on the UE or on a network entity. A service provider may grant a user access to a service based on the information that it retrieves using the tokens.
    Type: Grant
    Filed: January 18, 2013
    Date of Patent: September 26, 2017
    Assignee: InterDigital Patent Holdings, Inc.
    Inventors: Andreas Leicher, Yogendra C. Shah, Vinod K. Choyi
  • Patent number: 9756037
    Abstract: A certification provenance tree (CPT) structure may provide information concerning a layered certification of a device that comprises a hierarchy of components. The CPT structure may include a hierarchy of secure certification provenance document (SCPD) structures. Each SCPD structure in the hierarchy may represent a given component at a given level of the hierarchy of components of the device. Each SCPD structure may include a field that stores a certification proof indicating that security properties of the given component have been certified by a certification authority. An SCPD structure may further include accreditation information fields that store a pointer to an SCPD structure of a component at a next layer of the hierarchy of components of the device. The pointer may provide an indication of assurance that the component at that next layer will perform securely within this component at said given layer.
    Type: Grant
    Filed: September 19, 2013
    Date of Patent: September 5, 2017
    Assignee: InterDigital Patent Holdings, Inc.
    Inventors: Dolores F. Howry, Yogendra C. Shah, Alec Brusilovsky, Joseph Gredone