Patents by Inventor Bhargav R. Bellur
Bhargav R. Bellur has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9106611Abstract: A method is provided for processing packets in a security module of a node in a real-time tracking system. The security module receives messages via a communication module. Each message contains an identifier associated with a transmitting entity of the message. A respective identifier is associated with a respective buffer. Messages having a same identifier are stored to an associated buffer. At least one message is selected from each buffer. For each buffer, a verification mode is selected for the message selected based on state variables and identifier-level properties of the identifier associated with that buffer. A buffer for message verification is selected based on state variables and identifier-level properties of all identifiers. The message selected is verified utilizing the selected verification mode. The state variables and the identifier-level properties of all identifiers are updated based on a result of the verification of the at least one message.Type: GrantFiled: June 27, 2012Date of Patent: August 11, 2015Assignee: GM GLOBAL TECHNOLOGY OPERATIONS LLCInventors: Aditya R Karnik, Aravind V. Iyer, Bhargav R. Bellur
-
Patent number: 8904183Abstract: A computationally efficient message verification strategy that achieves non-repudiation and resilience to computational denial of service attacks in conjunction with a broadcast authentication protocol that authenticates messages using a combination of a digital signature and a TESLA MAC. When messages are received at a receiver, the verification strategy separates the messages into messages with the same sender identification. The strategy then determines whether the TESLA MAC authenticator is valid for each message and discards those messages that do not have a valid TESLA MAC. The strategy collects the messages that have a valid TESLA MAC for each sender identification and performs a batch verification process on the group of messages to determine if the messages in the group have a valid digital signature. This strategy verifies each message in the group of messages if the batch verification process shows that the group of messages has a valid digital signature.Type: GrantFiled: March 25, 2010Date of Patent: December 2, 2014Assignee: GM Global Technology Operations LLCInventors: Bhargav R. Bellur, Aravind V. Iyer, Debojyoti Bhattacharya
-
Patent number: 8819414Abstract: A method is provided for obtaining a certificate revocation list (CRL) for a vehicle in a vehicle-to-vehicle communication system. A portable security unit is provided to access secured operations for the vehicle. The portable security unit is linked to a device having access to a communication network. The communication network is in communication with a certificate authority for issuing an updated CRL. The updated CRL is downloaded from the certificate authority to the portable security unit. At a later time, when a user enters the vehicle, a communication link is established between the portable security unit and a vehicle processor unit. Mutual authentication is exchanged between the portable security unit and the vehicle processing unit. The updated CRL stored in the portable security unit is downloaded to a memory of the vehicle communication system in response to a successful mutual authentication.Type: GrantFiled: April 19, 2010Date of Patent: August 26, 2014Assignee: GM Global Technology Operations LLCInventors: Bhargav R. Bellur, Debojyoti Bhattacharya, Aravind V. Iyer
-
Patent number: 8704679Abstract: A packet processing framework is provided for a vehicle-to-vehicle communication packet processing system. The framework includes a neighborhood vehicle tracking module for tracking neighboring vehicles relative to a host vehicle. The neighborhood vehicle tracking module assigns a priority level of neighboring vehicles relative to a host vehicle. An adaptive security processing module regulates messages streamed to the neighboring vehicle tracker module that are in accordance with the priorities set forth by the neighborhood vehicle tracking module. The adaptive security processing module selects security modes and schedules messages streamed to the neighborhood vehicle tracking module as a function of priorities set forth by the neighborhood vehicle tracking module, a communication reliability of the transmitting neighboring vehicle, and a likelihood that a message from the neighboring vehicle is genuine as determined by the adaptive security processing module.Type: GrantFiled: June 27, 2012Date of Patent: April 22, 2014Assignee: GM Global Technology Operations LLCInventors: Aravind V. Iyer, Aditya R Karnik, Bhargav R. Bellur
-
Publication number: 20140037092Abstract: A method is provided for constructing a secret code in a processing unit when in communication with a portable security unit. Mutual authentication messages are exchanged between a linked portable security unit and processing unit. A first portion of the secret code is communicated to the processing unit. The processing unit combines the first portion and a second portion of the secret code stored in the non-volatile memory of the processing unit. The secret code is stored in a volatile memory of the processing unit. A secure operation is performed using the secret code. The portable security unit is de-linked from the processing unit. At least a portion of the secret code is deleted from the volatile memory of the processing unit.Type: ApplicationFiled: August 2, 2012Publication date: February 6, 2014Applicant: GM GLOBAL TECHNOLOGY OPERATIONS, INC.Inventors: Debojyoti Bhattacharya, Sugato Chakrabarty, Bhargav R. Bellur
-
Publication number: 20140002276Abstract: A packet processing framework is provided for a vehicle-to-vehicle communication packet processing system. The framework includes a neighborhood vehicle tracking module for tracking neighboring vehicles relative to a host vehicle. The neighborhood vehicle tracking module assigns a priority level of neighboring vehicles relative to a host vehicle. An adaptive security processing module regulates messages streamed to the neighboring vehicle tracker module that are in accordance with the priorities set forth by the neighborhood vehicle tracking module. The adaptive security processing module selects security modes and schedules messages streamed to the neighborhood vehicle tracking module as a function of priorities set forth by the neighborhood vehicle tracking module, a communication reliability of the transmitting neighboring vehicle, and a likelihood that a message from the neighboring vehicle is genuine as determined by the adaptive security processing module.Type: ApplicationFiled: June 27, 2012Publication date: January 2, 2014Applicant: GM GLOBAL TECHNOLOGY OPERATIONS LLCInventors: Aravind V. Iyer, Aditya R. Karnik, Bhargav R. Bellur
-
Publication number: 20140006615Abstract: A method is provided for processing packets in a security module of a node in a real-time tracking system. The security module receives messages via a communication module. Each message contains an identifier associated with a transmitting entity of the message. A respective identifier is associated with a respective buffer. Messages having a same identifier are stored to an associated buffer. At least one message is selected from each buffer. For each buffer, a verification mode is selected for the message selected based on state variables and identifier-level properties of the identifier associated with that buffer. A buffer for message verification is selected based on state variables and identifier-level properties of all identifiers. The message selected is verified utilizing the selected verification mode. The state variables and the identifier-level properties of all identifiers are updated based on a result of the verification of the at least one message.Type: ApplicationFiled: June 27, 2012Publication date: January 2, 2014Applicant: GM GLOBAL TECHNOLOGY OPERATIONS LLCInventors: ADITYA R. KARNIK, ARAVIND V. IYER, BHARGAV R. BELLUR
-
Patent number: 8593253Abstract: A communication system is configured to operate in an ad hoc wireless network. The communication system includes a transmission device configured to send and receive a message, a signing module configured to generate a hierarchical signature using the message, and a verifying module configured to hierarchically verify a predetermined portion of a hierarchically signed message.Type: GrantFiled: June 9, 2010Date of Patent: November 26, 2013Assignee: GM Global Technology Operations, Inc.Inventors: Aravind V. Iyer, Bhargav R. Bellur
-
Publication number: 20110304425Abstract: A communication system is configured to operate in an ad hoc wireless network. The communication system includes a transmission device configured to send and receive a message, a signing module configured to generate a hierarchical signature using the message, and a verifying module configured to hierarchically verify a predetermined portion of a hierarchically signed message.Type: ApplicationFiled: June 9, 2010Publication date: December 15, 2011Applicant: GM GLOBAL TECHNOLOGY OPERATIONS, INCInventors: Aravind V. Iyer, Bhargav R. Bellur
-
Publication number: 20110258435Abstract: A method is provided for obtaining a certificate revocation list (CRL) for a vehicle in a vehicle-to-vehicle communication system. A portable security unit is provided to access secured operations for the vehicle. The portable security unit is linked to a device having access to a communication network. The communication network is in communication with a certificate authority for issuing an updated CRL. The updated CRL is downloaded from the certificate authority to the portable security unit. At a later time, when a user enters the vehicle, a communication link is established between the portable security unit and a vehicle processor unit. Mutual authentication is exchanged between the portable security unit and the vehicle processing unit. The updated CRL stored in the portable security unit is downloaded to a memory of the vehicle communication system in response to a successful mutual authentication.Type: ApplicationFiled: April 19, 2010Publication date: October 20, 2011Applicant: GM GLOBAL TECHNOLOGY OPERATIONS, INC.Inventors: Bhargav R. Bellur, Debojyoti Bhattacharya, Aravind V. Iyer
-
Publication number: 20110238997Abstract: A computationally efficient message verification strategy that achieves non-repudiation and resilience to computational denial of service attacks in conjunction with a broadcast authentication protocol that authenticates messages using a combination of a digital signature and a TESLA MAC. When messages are received at a receiver, the verification strategy separates the messages into messages with the same sender identification. The strategy then determines whether the TESLA MAC authenticator is valid for each message and discards those messages that do not have a valid TESLA MAC. The strategy collects the messages that have a valid TESLA MAC for each sender identification and performs a batch verification process on the group of messages to determine if the messages in the group have a valid digital signature. This strategy verifies each message in the group of messages if the batch verification process shows that the group of messages has a valid digital signature.Type: ApplicationFiled: March 25, 2010Publication date: September 29, 2011Applicant: GM GLOBAL TECHNOLOGY OPERATIONS, INC.Inventors: Bhargav R. Bellur, Aravind V. Iyer, Debojyoti Bhattacharya
-
Patent number: 7698463Abstract: Described is a link-state routing protocol used in a mobile ad hoc network or in an Internet for disseminating topology and link-state information throughout the network. Reverse-path forwarding is used to broadcast each update along the minimum-hop-path tree rooted at the source of the update. Each path tree has the source node as a root node, a parent node, and zero or more children nodes. Updates are received from the parent node in the path tree for the source node that originates the update. Each update includes information related to a link in the network. A determination is made whether to forward the update message to children nodes, if any, in the path tree maintained for the source node originating the update in response to information in the received update. This information itself can indicate whether the update is to be forwarded to other nodes.Type: GrantFiled: December 1, 2000Date of Patent: April 13, 2010Assignee: SRI InternationalInventors: Richard G. Ogier, Bhargav R. Bellur, Fred Lambert Templin
-
Patent number: 6845091Abstract: Described is an internetworking system having various mobile ad hoc extensions to the Internet that are particularly suited to the dynamic environment of mobile ad hoc networks. The internetworking system includes any combination of a link-state routing protocol for disseminating topology and link-state information over a multi-hop network comprised of nodes, a neighbor discovery protocol that can detect the appearance and disappearance of new neighbor nodes, an address format that facilitates deployment of IPv6 nodes in a predominantly IPv4 network infrastructure, a queuing mechanism that can update information upon resuming interrupted communications between nodes, and dynamic network measurement techniques for adaptively using wireless bandwidth when establishing and maintaining connections between nodes and a server.Type: GrantFiled: December 1, 2000Date of Patent: January 18, 2005Assignee: SRI InternationalInventors: Richard G. Ogier, Carla Peccolo Woodworth, Fred Lambert Templin, Bhargav R. Bellur, James A. Arnold, D. Scott Seaton, Michael W. Frandsen, Nathan W. Williams, Christian A Gellrich
-
Publication number: 20020062388Abstract: Described is a link-state routing protocol used in a mobile ad hoc network or in an Internet for disseminating topology and link-state information throughout the network. Reverse-path forwarding is used to broadcast each update along the minimum-hop-path tree rooted at the source of the update. Each path tree has the source node as a root node, a parent node, and zero or more children nodes. Updates are received from the parent node in the path tree for the source node that originates the update. Each update includes information related to a link in the network. A determination is made whether to forward the update message to children nodes, if any, in the path tree maintained for the source node originating the update in response to information in the received update. This information itself can indicate whether the update is to be forwarded to other nodes.Type: ApplicationFiled: December 1, 2000Publication date: May 23, 2002Inventors: Richard G. Ogier, Bhargav R. Bellur, Fred Lambert Templin
-
Publication number: 20020012320Abstract: Described is an internetworking system having various mobile ad hoc extensions to the Internet that are particularly suited to the dynamic environment of mobile ad hoc networks. The internetworking system includes any combination of a link-state routing protocol for disseminating topology and link-state information over a multi-hop network comprised of nodes, a neighbor discovery protocol that can detect the appearance and disappearance of new neighbor nodes, an address format that facilitates deployment of IPv6 nodes in a predominantly IPv4 network infrastructure, a queuing mechanism that can update information upon resuming interrupted communications between nodes, and dynamic network measurement techniques for adaptively using wireless bandwidth when establishing and maintaining connections between nodes and a server.Type: ApplicationFiled: December 1, 2000Publication date: January 31, 2002Inventors: Richard G. Ogier, Carla Peccolo Woodworth, Fred Lambert Templin, Bhargav R. Bellur, James A. Arnold, D. Scott Seaton, Michael Frandsen, Nathan W. Williams, Christian A. Gellrich