Patents by Inventor Aravind V. Iyer

Aravind V. Iyer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9106611
    Abstract: A method is provided for processing packets in a security module of a node in a real-time tracking system. The security module receives messages via a communication module. Each message contains an identifier associated with a transmitting entity of the message. A respective identifier is associated with a respective buffer. Messages having a same identifier are stored to an associated buffer. At least one message is selected from each buffer. For each buffer, a verification mode is selected for the message selected based on state variables and identifier-level properties of the identifier associated with that buffer. A buffer for message verification is selected based on state variables and identifier-level properties of all identifiers. The message selected is verified utilizing the selected verification mode. The state variables and the identifier-level properties of all identifiers are updated based on a result of the verification of the at least one message.
    Type: Grant
    Filed: June 27, 2012
    Date of Patent: August 11, 2015
    Assignee: GM GLOBAL TECHNOLOGY OPERATIONS LLC
    Inventors: Aditya R Karnik, Aravind V. Iyer, Bhargav R. Bellur
  • Patent number: 8904183
    Abstract: A computationally efficient message verification strategy that achieves non-repudiation and resilience to computational denial of service attacks in conjunction with a broadcast authentication protocol that authenticates messages using a combination of a digital signature and a TESLA MAC. When messages are received at a receiver, the verification strategy separates the messages into messages with the same sender identification. The strategy then determines whether the TESLA MAC authenticator is valid for each message and discards those messages that do not have a valid TESLA MAC. The strategy collects the messages that have a valid TESLA MAC for each sender identification and performs a batch verification process on the group of messages to determine if the messages in the group have a valid digital signature. This strategy verifies each message in the group of messages if the batch verification process shows that the group of messages has a valid digital signature.
    Type: Grant
    Filed: March 25, 2010
    Date of Patent: December 2, 2014
    Assignee: GM Global Technology Operations LLC
    Inventors: Bhargav R. Bellur, Aravind V. Iyer, Debojyoti Bhattacharya
  • Patent number: 8819414
    Abstract: A method is provided for obtaining a certificate revocation list (CRL) for a vehicle in a vehicle-to-vehicle communication system. A portable security unit is provided to access secured operations for the vehicle. The portable security unit is linked to a device having access to a communication network. The communication network is in communication with a certificate authority for issuing an updated CRL. The updated CRL is downloaded from the certificate authority to the portable security unit. At a later time, when a user enters the vehicle, a communication link is established between the portable security unit and a vehicle processor unit. Mutual authentication is exchanged between the portable security unit and the vehicle processing unit. The updated CRL stored in the portable security unit is downloaded to a memory of the vehicle communication system in response to a successful mutual authentication.
    Type: Grant
    Filed: April 19, 2010
    Date of Patent: August 26, 2014
    Assignee: GM Global Technology Operations LLC
    Inventors: Bhargav R. Bellur, Debojyoti Bhattacharya, Aravind V. Iyer
  • Patent number: 8704679
    Abstract: A packet processing framework is provided for a vehicle-to-vehicle communication packet processing system. The framework includes a neighborhood vehicle tracking module for tracking neighboring vehicles relative to a host vehicle. The neighborhood vehicle tracking module assigns a priority level of neighboring vehicles relative to a host vehicle. An adaptive security processing module regulates messages streamed to the neighboring vehicle tracker module that are in accordance with the priorities set forth by the neighborhood vehicle tracking module. The adaptive security processing module selects security modes and schedules messages streamed to the neighborhood vehicle tracking module as a function of priorities set forth by the neighborhood vehicle tracking module, a communication reliability of the transmitting neighboring vehicle, and a likelihood that a message from the neighboring vehicle is genuine as determined by the adaptive security processing module.
    Type: Grant
    Filed: June 27, 2012
    Date of Patent: April 22, 2014
    Assignee: GM Global Technology Operations LLC
    Inventors: Aravind V. Iyer, Aditya R Karnik, Bhargav R. Bellur
  • Publication number: 20140002276
    Abstract: A packet processing framework is provided for a vehicle-to-vehicle communication packet processing system. The framework includes a neighborhood vehicle tracking module for tracking neighboring vehicles relative to a host vehicle. The neighborhood vehicle tracking module assigns a priority level of neighboring vehicles relative to a host vehicle. An adaptive security processing module regulates messages streamed to the neighboring vehicle tracker module that are in accordance with the priorities set forth by the neighborhood vehicle tracking module. The adaptive security processing module selects security modes and schedules messages streamed to the neighborhood vehicle tracking module as a function of priorities set forth by the neighborhood vehicle tracking module, a communication reliability of the transmitting neighboring vehicle, and a likelihood that a message from the neighboring vehicle is genuine as determined by the adaptive security processing module.
    Type: Application
    Filed: June 27, 2012
    Publication date: January 2, 2014
    Applicant: GM GLOBAL TECHNOLOGY OPERATIONS LLC
    Inventors: Aravind V. Iyer, Aditya R. Karnik, Bhargav R. Bellur
  • Publication number: 20140006615
    Abstract: A method is provided for processing packets in a security module of a node in a real-time tracking system. The security module receives messages via a communication module. Each message contains an identifier associated with a transmitting entity of the message. A respective identifier is associated with a respective buffer. Messages having a same identifier are stored to an associated buffer. At least one message is selected from each buffer. For each buffer, a verification mode is selected for the message selected based on state variables and identifier-level properties of the identifier associated with that buffer. A buffer for message verification is selected based on state variables and identifier-level properties of all identifiers. The message selected is verified utilizing the selected verification mode. The state variables and the identifier-level properties of all identifiers are updated based on a result of the verification of the at least one message.
    Type: Application
    Filed: June 27, 2012
    Publication date: January 2, 2014
    Applicant: GM GLOBAL TECHNOLOGY OPERATIONS LLC
    Inventors: ADITYA R. KARNIK, ARAVIND V. IYER, BHARGAV R. BELLUR
  • Patent number: 8593253
    Abstract: A communication system is configured to operate in an ad hoc wireless network. The communication system includes a transmission device configured to send and receive a message, a signing module configured to generate a hierarchical signature using the message, and a verifying module configured to hierarchically verify a predetermined portion of a hierarchically signed message.
    Type: Grant
    Filed: June 9, 2010
    Date of Patent: November 26, 2013
    Assignee: GM Global Technology Operations, Inc.
    Inventors: Aravind V. Iyer, Bhargav R. Bellur
  • Patent number: 8452969
    Abstract: A method for authenticating a message that is transmitted wirelessly. The method includes providing a set of private key values that define a private key and performing a key pair generation process that provides a key pair including the private key and a public key, where performing the key pair generation process includes applying one or more hash functions to the private key values, where a succeeding hash function provides a hash of a previous hash function. The scheme uses a signature generation process that generates a message digest by applying a hash function on the message to be signed and then separates the message digest into two parts including signing bits and selection bits and using the private key to sign the message. A receiver verifies the authenticity of the received message using the public key and a signature verification algorithm.
    Type: Grant
    Filed: September 16, 2009
    Date of Patent: May 28, 2013
    Assignee: GM Global Technology Operations LLC
    Inventors: Aravind V. Iyer, Debojyoti Bhattacharya
  • Publication number: 20110304425
    Abstract: A communication system is configured to operate in an ad hoc wireless network. The communication system includes a transmission device configured to send and receive a message, a signing module configured to generate a hierarchical signature using the message, and a verifying module configured to hierarchically verify a predetermined portion of a hierarchically signed message.
    Type: Application
    Filed: June 9, 2010
    Publication date: December 15, 2011
    Applicant: GM GLOBAL TECHNOLOGY OPERATIONS, INC
    Inventors: Aravind V. Iyer, Bhargav R. Bellur
  • Publication number: 20110258435
    Abstract: A method is provided for obtaining a certificate revocation list (CRL) for a vehicle in a vehicle-to-vehicle communication system. A portable security unit is provided to access secured operations for the vehicle. The portable security unit is linked to a device having access to a communication network. The communication network is in communication with a certificate authority for issuing an updated CRL. The updated CRL is downloaded from the certificate authority to the portable security unit. At a later time, when a user enters the vehicle, a communication link is established between the portable security unit and a vehicle processor unit. Mutual authentication is exchanged between the portable security unit and the vehicle processing unit. The updated CRL stored in the portable security unit is downloaded to a memory of the vehicle communication system in response to a successful mutual authentication.
    Type: Application
    Filed: April 19, 2010
    Publication date: October 20, 2011
    Applicant: GM GLOBAL TECHNOLOGY OPERATIONS, INC.
    Inventors: Bhargav R. Bellur, Debojyoti Bhattacharya, Aravind V. Iyer
  • Publication number: 20110238997
    Abstract: A computationally efficient message verification strategy that achieves non-repudiation and resilience to computational denial of service attacks in conjunction with a broadcast authentication protocol that authenticates messages using a combination of a digital signature and a TESLA MAC. When messages are received at a receiver, the verification strategy separates the messages into messages with the same sender identification. The strategy then determines whether the TESLA MAC authenticator is valid for each message and discards those messages that do not have a valid TESLA MAC. The strategy collects the messages that have a valid TESLA MAC for each sender identification and performs a batch verification process on the group of messages to determine if the messages in the group have a valid digital signature. This strategy verifies each message in the group of messages if the batch verification process shows that the group of messages has a valid digital signature.
    Type: Application
    Filed: March 25, 2010
    Publication date: September 29, 2011
    Applicant: GM GLOBAL TECHNOLOGY OPERATIONS, INC.
    Inventors: Bhargav R. Bellur, Aravind V. Iyer, Debojyoti Bhattacharya
  • Publication number: 20110066859
    Abstract: A method for authenticating a message that is transmitted wirelessly. The method includes providing a set of private key values that define a private key and performing a key pair generation process that provides a key pair including the private key and a public key, where performing the key pair generation process includes applying one or more hash functions to the private key values, where a succeeding hash function provides a hash of a previous hash function. The scheme uses a signature generation process that generates a message digest by applying a hash function on the message to be signed and then separates the message digest into two parts including signing bits and selection bits and using the private key to sign the message. A receiver verifies the authenticity of the received message using the public key and a signature verification algorithm.
    Type: Application
    Filed: September 16, 2009
    Publication date: March 17, 2011
    Applicant: GM GLOBAL TECHNOLOGY OPERATIONS, INC.
    Inventors: Aravind V. Iyer, Debojyoti Bhattacharya
  • Publication number: 20090254754
    Abstract: A system and method for a vehicle-to-vehicle communications system that provide active safety applications employing lightweight geographic authentication using one-time signatures. The system and method require each vehicle to construct a discretized representation of its trajectory, which captures its kinematical history to a tunable degree of accuracy and to a tunable extent in the past. This trajectory information is then signed using a one-time signature. Thus, with every periodic message, the sending vehicle transmits the usual application payload, a signed version of the trajectory as described, and the digital signature over all of the fields.
    Type: Application
    Filed: March 30, 2009
    Publication date: October 8, 2009
    Applicant: GM GLOBAL TECHNOLOGY OPERATIONS, INC.
    Inventors: Bhargav Ramchandra Bellur, Aravind V. Iyer