Patents by Inventor Arman Maghbouleh
Arman Maghbouleh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11870561Abstract: An example intermediary system allows a control system to securely identify and communicate with a device. The device uses master secret and time data shared with the control system to generate and advertise a time-dependent device identifier and potentially an encrypted device message. The intermediary system augments the received device data with a message (e.g., an estimate of the device's location) encrypted using the time-dependent device identifier as an encryption key. Furthermore, it hashes the time-dependent device identifier for additional security. The augmented data is provided for retrieval and processing by the control system. The owner uses the shared master secret, time data and hash function to generate a hashed time-dependent device identifier used to retrieve matching augmented data from the server. The retrieved message data is decrypted using the reverse of the encryption operations.Type: GrantFiled: March 22, 2022Date of Patent: January 9, 2024Assignee: Luna XIO, Inc.Inventors: Alan Gous, Jeffrey Bazar, Arman Maghbouleh
-
Publication number: 20220311778Abstract: An example intermediary system allows a control system to securely identify and communicate with a device. The device uses master secret and time data shared with the control system to generate and advertise a time-dependent device identifier and potentially an encrypted device message. The intermediary system augments the received device data with a message (e.g., an estimate of the device's location) encrypted using the time-dependent device identifier as an encryption key. Furthermore, it hashes the time-dependent device identifier for additional security. The augmented data is provided for retrieval and processing by the control system. The owner uses the shared master secret, time data and hash function to generate a hashed time-dependent device identifier used to retrieve matching augmented data from the server. The retrieved message data is decrypted using the reverse of the encryption operations.Type: ApplicationFiled: March 22, 2022Publication date: September 29, 2022Inventors: Alan Gous, Jeffrey Bazar, Arman Maghbouleh
-
Patent number: 11329994Abstract: An example method for the remote authorization of a gateway to communicate with a device includes accessing time interval data, specified by an owner of the device, the time interval data specifying an access authorization time interval. A calculation is performed, using at least one processor, to generate authorization data that is specific to the device and valid for the access authorization time interval. The authorization data is accessed using the gateway. A scanning function is performed using the gateway, the scanning function to locate the device. A control request is sent to device to control the device.Type: GrantFiled: June 9, 2020Date of Patent: May 10, 2022Assignee: Luna XIO, Inc.Inventors: Alan Gous, Jeffrey Bazar, Arman Maghbouleh
-
Patent number: 11310243Abstract: An example intermediary system allows an owner computer system to securely identify and communicate with an end device. The end device uses master secret and time data shared with the owner computer system to generate and advertise a time-dependent device identifier and potentially an encrypted device message. The intermediary system augments the received device data with a message (e.g., an estimate of the device's location) encrypted using the time-dependent device identifier as an encryption key. Furthermore, it hashes the time-dependent device identifier for additional security. The augmented data is forwarded to a server for retrieval and processing by the owner computer system. The owner uses the shared master secret, time data and hash function to generate a hashed time-dependent device identifier used to retrieve matching augmented data from the server. The retrieved message data is decrypted using the reverse of the encryption operations.Type: GrantFiled: July 14, 2021Date of Patent: April 19, 2022Assignee: Luna XIO, Inc.Inventors: Alan Gous, Jeffrey Bazar, Arman Maghbouleh
-
Publication number: 20210344685Abstract: An example intermediary system allows an owner computer system to securely identify and communicate with an end device. The end device uses master secret and time data shared with the owner computer system to generate and advertise a time-dependent device identifier and potentially an encrypted device message. The intermediary system augments the received device data with a message (e.g., an estimate of the device's location) encrypted using the time-dependent device identifier as an encryption key. Furthermore, it hashes the time-dependent device identifier for additional security. The augmented data is forwarded to a server for retrieval and processing by the owner computer system. The owner uses the shared master secret, time data and hash function to generate a hashed time-dependent device identifier used to retrieve matching augmented data from the server. The retrieved message data is decrypted using the reverse of the encryption operations.Type: ApplicationFiled: July 14, 2021Publication date: November 4, 2021Inventors: Alan Gous, Jeffrey Bazar, Arman Maghbouleh
-
Publication number: 20200389465Abstract: An example method for the remote authorization of a gateway to communicate with a device includes accessing time interval data, specified by an owner of the device, the time interval data specifying an access authorization time interval. A calculation is performed, using at least one processor, to generate authorization data that is specific to the device and valid for the access authorization time interval. The authorization data is accessed using the gateway. A scanning function is performed using the gateway, the scanning function to locate the device. A control request is sent to device to control the device.Type: ApplicationFiled: June 9, 2020Publication date: December 10, 2020Inventors: Alan Gous, Jeffrey Bazar, Arman Maghbouleh
-
Patent number: 7958209Abstract: A method to reconfigure a connection-oriented network from an existing configuration to a desired configuration includes generating a sequence of configuration specifications for the connection-oriented network. The sequence specifies a plurality of intermediate configurations between the existing and the desired configurations. The sequence of configuration specifications is implemented within the connection-oriented network by, for each configuration specification, issuing at least one instruction to an element of the connection-oriented network to modify configuration information maintained at the element to thereby instantiate respective configurations. The implementing includes issuing a specific instruction to instantiate a subsequent configuration specification only if an acknowledgment is received that a preceding configuration has been successfully instantiated.Type: GrantFiled: October 30, 2007Date of Patent: June 7, 2011Assignee: Cariden Technologies, Inc.Inventors: Alan Gous, Arman Maghbouleh, Arash Afrakhteh, Andre Hentz
-
Patent number: 7734813Abstract: A method of communicating predicted network behavior includes generating network topology structure data describing at least part of a topology of a first network. Demand structure data is generated, the demand structure data describing at least some traffic demands relating to a source in the first network and a destination in a second network, wherein there are a plurality of network links between the first network and the second network. Traffic routing change data, describing at least one change scenario which would require a change of traffic routing, is generated. This data is then used to calculate change data that describes a routing of traffic through each of the plurality of network links between the first network and the second network for the at least one change scenario. The change data is transmitted to the second network.Type: GrantFiled: January 27, 2006Date of Patent: June 8, 2010Assignee: Cariden Technologies, Inc.Inventors: Alan Gous, Arman Maghbouleh, Arash Afrakhteh, Andre Hentz
-
Patent number: 7370096Abstract: A method to reconfigure a connection-oriented network from an existing configuration to a desired configuration includes generating a sequence of configuration specifications for the connection-oriented network. The sequence specifies a plurality of intermediate configurations between the existing and the desired configurations. The sequence of configuration specifications is implemented within the connection-oriented network by, for each configuration specification, issuing at least one instruction to an element of the connection-oriented network to modify configuration information maintained at the element to thereby instantiate respective configurations. The implementing includes issuing a specific instruction to instantiate a subsequent configuration specification only if an acknowledgment is received that a preceding configuration has been successfully instantiated.Type: GrantFiled: June 11, 2002Date of Patent: May 6, 2008Assignee: Cariden Technologies, Inc.Inventors: Alan Gous, Arman Maghbouleh, Arash Afrakhteh, Andre Hentz
-
Publication number: 20080056127Abstract: A method to reconfigure a connection-oriented network from an existing configuration to a desired configuration includes generating a sequence of configuration specifications for the connection-oriented network. The sequence specifies a plurality of intermediate configurations between the existing and the desired configurations. The sequence of configuration specifications is implemented within the connection-oriented network by, for each configuration specification, issuing at least one instruction to an element of the connection-oriented network to modify configuration information maintained at the element to thereby instantiate respective configurations. The implementing includes issuing a specific instruction to instantiate a subsequent configuration specification only if an acknowledgment is received that a preceding configuration has been successfully instantiated.Type: ApplicationFiled: October 30, 2007Publication date: March 6, 2008Inventors: Alan Gous, Arman Maghbouleh, Arash Afrakhteh, Andre Hentz
-
Publication number: 20060174154Abstract: A method of communicating predicted network behavior includes generating network topology structure data describing at least part of a topology of a first network. Demand structure data is generated, the demand structure data describing at least some traffic demands relating to a source in the first network and a destination in a second network, wherein there are a plurality of network links between the first network and the second network. Traffic routing change data, describing at least one change scenario which would require a change of traffic routing, is generated. This data is then used to calculate change data that describes a routing of traffic through each of the plurality of network links between the first network and the second network for the at least one change scenario. The change data is transmitted to the second network.Type: ApplicationFiled: January 27, 2006Publication date: August 3, 2006Inventors: Alan Gous, Arman Maghbouleh, Arash Afrakhteh, Andre Hentz
-
Publication number: 20020194316Abstract: A method to reconfigure a connection-oriented network from an existing configuration to a desired configuration includes generating a sequence of configuration specifications for the connection-oriented network. The sequence specifies a plurality of intermediate configurations between the existing and the desired configurations. The sequence of configuration specifications is implemented within the connection-oriented network by, for each configuration specification, issuing at least one instruction to an element of the connection-oriented network to modify configuration information maintained at the element to thereby instantiate respective configurations. The implementing includes issuing a specific instruction to instantiate a subsequent configuration specification only if an acknowledgment is received that a preceding configuration has been successfully instantiated.Type: ApplicationFiled: June 11, 2002Publication date: December 19, 2002Inventors: Alan Gous, Arman Maghbouleh, Arash Afrakhteh, Andre Hentz
-
Patent number: 5513305Abstract: A system and method for documenting and displaying computer program code comprises a token annotation unit, a comment analyzer, a token parsing library, and a code outline unit. The token parsing library parses a program comprising related program code files into a set of constituent tokens. The token annotation unit selectively associates one or more annotations with tokens in a program by creating a token annotation object. When program code is displayed, the token annotation unit visually identifies each annotated token present according to a display style. The token annotation unit presents annotations corresponding to an annotated token in response to the selection of the annotated token during program code display.Type: GrantFiled: March 1, 1994Date of Patent: April 30, 1996Assignee: Apple Computer, Inc.Inventor: Arman Maghbouleh