Patents by Inventor Aditi Hilbert
Aditi Hilbert has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10764261Abstract: A method for enabling a scalable public-key infrastructure (PKI) comprises invoking a process of receiving a message for a device, identifying an association ID for the device, retrieving encrypted association keys stored on the server for communicating with the device, the encrypted association keys encrypted using a wrapping key stored on a Hardware Security Module (HSM). The method further comprises sending the message and the encrypted association keys to the HSM, unwrapping, by the HSM, the encrypted association keys to create unwrapped association keys, cryptographically processing the message to generate a processed message, deleting the unwrapped association keys, sending the processed message to the device, and invoking, concurrently and by a second application, the process.Type: GrantFiled: December 31, 2014Date of Patent: September 1, 2020Assignee: ITRON, INC.Inventors: Christopher Vigliaturo, Benjamin Damm, David Drinan, Aditi Hilbert
-
Patent number: 10229291Abstract: A method for locking out a remote terminal unit includes: receiving a lockout request, wherein the lockout request includes at least a public key associated with a user, a user identifier, and a terminal identifier; identifying a user profile associated with the user based on the user identifier included in the received lockout request; verifying the public key included in the received lockout request and permission for the user to lockout a remote terminal unit associated with the terminal identifier included in the received lockout request based on data included in the identified user profile; generating a lockout permit, wherein the lockout permit includes at least the public key included in the received lockout request; and transmitting at least a lockout request and the generated lockout permit, wherein the lockout request includes an instruction to place a lockout on the remote terminal unit.Type: GrantFiled: June 12, 2017Date of Patent: March 12, 2019Assignee: ITRON NETWORKED SOLUTIONS, INC.Inventors: Aditi Hilbert, Michael St. Johns
-
Patent number: 10154457Abstract: A method for managing radio transmission in an endpoint device in a network includes: receiving, at a first endpoint device, a message requesting wake up of the first endpoint device; establishing a connection between the first endpoint device to a second endpoint device connected to the network; determining, at the first endpoint device, whether a secure command is received from the second endpoint device via the established connection within a predetermined period of time; and based on the received secure command, establishing a connection between the first endpoint device and the network via radio transmission, wherein the first endpoint device is configured to turn off radio transmission if the secure command is not received within the predetermined period of time.Type: GrantFiled: May 26, 2016Date of Patent: December 11, 2018Assignee: ITRON NETWORKED SOLUTIONS, INC.Inventors: Jana Van Greunen, William E. San Filippo, III, Aditi Hilbert
-
Publication number: 20170277912Abstract: A method for locking out a remote terminal unit includes: receiving a lockout request, wherein the lockout request includes at least a public key associated with a user, a user identifier, and a terminal identifier; identifying a user profile associated with the user based on the user identifier included in the received lockout request; verifying the public key included in the received lockout request and permission for the user to lockout a remote terminal unit associated with the terminal identifier included in the received lockout request based on data included in the identified user profile; generating a lockout permit, wherein the lockout permit includes at least the public key included in the received lockout request; and transmitting at least a lockout request and the generated lockout permit, wherein the lockout request includes an instruction to place a lockout on the remote terminal unit.Type: ApplicationFiled: June 12, 2017Publication date: September 28, 2017Applicant: Silver Spring Networks, Inc.Inventors: Aditi HILBERT, Michael St. Johns
-
Patent number: 9747469Abstract: A method for locking out a remote terminal unit includes: receiving a lockout request, wherein the lockout request includes at least a public key associated with a user, a user identifier, and a terminal identifier; identifying a user profile associated with the user based on the user identifier included in the received lockout request; verifying the public key included in the received lockout request and permission for the user to lockout a remote terminal unit associated with the terminal identifier included in the received lockout request based on data included in the identified user profile; generating a lockout permit, wherein the lockout permit includes at least the public key included in the received lockout request; and transmitting at least a lockout request and the generated lockout permit, wherein the lockout request includes an instruction to place a lockout on the remote terminal unit.Type: GrantFiled: July 1, 2014Date of Patent: August 29, 2017Assignee: SILVER SPRING NETWORKS, INC.Inventors: Aditi Hilbert, Michael St. Johns
-
Patent number: 9542713Abstract: Securing the manufacturing supply chain with digital certificates. A token is coupled to a manufacturing station and enabled via a personal identification number. The token includes a counter limiting the maximum number of certificates to be signed, and compares a serial number of a digital certificate to a tracked serial number. In some embodiments, the token is linked to a particular manufacturing station once the token is enabled.Type: GrantFiled: September 9, 2012Date of Patent: January 10, 2017Assignee: SILVER SPRING NETWORKS, INC.Inventors: Michael C. StJohns, Robert G. Boehm, Jr., Aditi Hilbert
-
Publication number: 20160269991Abstract: A method for managing radio transmission in an endpoint device in a network includes: receiving, at a first endpoint device, a message requesting wake up of the first endpoint device; establishing a connection between the first endpoint device to a second endpoint device connected to the network; determining, at the first endpoint device, whether a secure command is received from the second endpoint device via the established connection within a predetermined period of time; and based on the received secure command, establishing a connection between the first endpoint device and the network via radio transmission, wherein the first endpoint device is configured to turn off radio transmission if the secure command is not received within the predetermined period of time.Type: ApplicationFiled: May 26, 2016Publication date: September 15, 2016Applicant: Silver Spring Networks, Inc.Inventors: Jana VAN GREUNEN, William E. SAN FILIPPO, III, Aditi HILBERT
-
Patent number: 9363836Abstract: A method for managing radio transmission in an endpoint device in a network includes: receiving, at a first endpoint device, a message requesting wake up of the first endpoint device; establishing a connection between the first endpoint device to a second endpoint device connected to the network; determining, at the first endpoint device, whether a secure command is received from the second endpoint device via the established connection within a predetermined period of time; and based on the received secure command, establishing a connection between the first endpoint device and the network via radio transmission, wherein the first endpoint device is configured to turn off radio transmission if the secure command is not received within the predetermined period of time.Type: GrantFiled: April 1, 2014Date of Patent: June 7, 2016Assignee: SILVER SPRING NETWORKS, INC.Inventors: Jana Van Greunen, William E. San Filippo, III, Aditi Hilbert
-
Publication number: 20150156180Abstract: A method for enabling a scalable public-key infrastructure (PKI) comprises invoking a process of receiving a message for a device, identifying an association ID for the device, retrieving encrypted association keys stored on the server for communicating with the device, the encrypted association keys encrypted using a wrapping key stored on a Hardware Security Module (HSM). The method further comprises sending the message and the encrypted association keys to the HSM, unwrapping, by the HSM, the encrypted association keys to create unwrapped association keys, cryptographically processing the message to generate a processed message, deleting the unwrapped association keys, sending the processed message to the device, and invoking, concurrently and by a second application, the process.Type: ApplicationFiled: December 31, 2014Publication date: June 4, 2015Inventors: Christopher Vigliaturo, Benjamin Damm, David Drinan, Aditi Hilbert
-
Patent number: 8949594Abstract: A method for enabling a scalable public-key infrastructure (PKI) comprises invoking a process of receiving a message for a device, identifying an association ID for the device, retrieving encrypted association keys stored on the server for communicating with the device, the encrypted association keys encrypted using a wrapping key stored on a Hardware Security Module (HSM). The method further comprises sending the message and the encrypted association keys to the HSM, unwrapping, by the HSM, the encrypted association keys to create unwrapped association keys, cryptographically processing the message to generate a processed message, deleting the unwrapped association keys, sending the processed message to the device, and invoking, concurrently and by a second application, the process.Type: GrantFiled: March 12, 2013Date of Patent: February 3, 2015Assignee: Silver Spring Networks, Inc.Inventors: Christopher Vigliaturo, Benjamin Damm, David Drinan, Aditi Hilbert
-
Publication number: 20150007275Abstract: A method for locking out a remote terminal unit includes: receiving a lockout request, wherein the lockout request includes at least a public key associated with a user, a user identifier, and a terminal identifier; identifying a user profile associated with the user based on the user identifier included in the received lockout request; verifying the public key included in the received lockout request and permission for the user to lockout a remote terminal unit associated with the terminal identifier included in the received lockout request based on data included in the identified user profile; generating a lockout permit, wherein the lockout permit includes at least the public key included in the received lockout request; and transmitting at least a lockout request and the generated lockout permit, wherein the lockout request includes an instruction to place a lockout on the remote terminal unit.Type: ApplicationFiled: July 1, 2014Publication date: January 1, 2015Applicant: SILVER SPRING NETWORKS, INC.Inventors: Aditi HILBERT, Michael ST. JOHNS
-
Publication number: 20140295772Abstract: A method for managing radio transmission in an endpoint device in a network includes: receiving, at a first endpoint device, a message requesting wake up of the first endpoint device; establishing a connection between the first endpoint device to a second endpoint device connected to the network; determining, at the first endpoint device, whether a secure command is received from the second endpoint device via the established connection within a predetermined period of time; and based on the received secure command, establishing a connection between the first endpoint device and the network via radio transmission, wherein the first endpoint device is configured to turn off radio transmission if the secure command is not received within the predetermined period of time.Type: ApplicationFiled: April 1, 2014Publication date: October 2, 2014Applicant: Silver Spring Networks, Inc.Inventors: Jana VAN GREUNEN, William E. San Filippo, III, Aditi Hilbert
-
Publication number: 20140281483Abstract: A method for enabling a scalable public-key infrastructure (PKI) comprises invoking a process of receiving a message for a device, identifying an association ID for the device, retrieving encrypted association keys stored on the server for communicating with the device, the encrypted association keys encrypted using a wrapping key stored on a Hardware Security Module (HSM). The method further comprises sending the message and the encrypted association keys to the HSM, unwrapping, by the HSM, the encrypted association keys to create unwrapped association keys, cryptographically processing the message to generate a processed message, deleting the unwrapped association keys, sending the processed message to the device, and invoking, concurrently and by a second application, the process.Type: ApplicationFiled: March 12, 2013Publication date: September 18, 2014Applicant: SILVER SPRING NETWORKSInventors: Christopher Vigliaturo, Benjamin Damm, David Drinan, Aditi Hilbert
-
Publication number: 20140229384Abstract: Securing the manufacturing supply chain with digital certificates. A token is coupled to a manufacturing station and enabled via a personal identification number. The token includes a counter limiting the maximum number of certificates to be signed, and compares a serial number of a digital certificate to a tracked serial number. In some embodiments, the token is linked to a particular manufacturing station once the token is enabled.Type: ApplicationFiled: September 9, 2012Publication date: August 14, 2014Applicant: SILVER SPRING NETWORKS, INC.Inventors: Michael C. ST. Johns, Robert G. Boehm, JR., Aditi Hilbert