Patents by Inventor Chris A. Kruegel

Chris A. Kruegel has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9071964
    Abstract: A radio is authenticated at the site and unique authentication information for the radio is stored at the site. A subsequent non-authentication message from the radio is received at the site and authentication information in the non-authentication message is identified. The unique authentication information stored at the site is compared with authentication information identified in the non-authentication message. If there is a match, the non-authentication message is authenticated with an authentication code included in the non-authentication message, wherein a predefined portion of the authentication code is obtained from at least one of a header portion or a data portion of the non-authentication message. Upon successfully completing authentication, the site repeats the non-authentication message towards destination radios indicated in non-authentication message.
    Type: Grant
    Filed: September 16, 2011
    Date of Patent: June 30, 2015
    Assignee: MOTOROLA SOLUTIONS, INC.
    Inventors: Thomas J. Senese, Chris A. Kruegel, Timothy G. Woodward
  • Patent number: 8948396
    Abstract: A method for operating with KMFs includes a communication device having a memory device: receiving a designation of a primary KMF for the communication device, wherein only one primary KMF is designated for the communication device at any given time instance; receiving a designation of a secondary KMF for the communication device; storing, within the memory device, a first and a second set of crypto groups, wherein each crypto group within each set of crypto groups comprises at least one keyset, wherein each set of crypto groups is associated, within the memory device, to only one KMF identifier; associating, within the memory device, the first set of crypto groups to an identifier for the primary KMF; and associating, within the memory device, the second set of crypto groups to an identifier for the secondary KMF.
    Type: Grant
    Filed: January 18, 2011
    Date of Patent: February 3, 2015
    Assignee: Motorola Solutions, Inc.
    Inventors: Chris A. Kruegel, Thomas J. Senese, Timothy G. Woodward
  • Patent number: 8861482
    Abstract: Application service is provided for a subscriber unit (SU), employing a first protocol, in a communication network employing a second protocol. The method includes receiving a CAI OTAR message from the SU. The CAI OTAR message includes at least a key management message (KMM) and a CAI header of the SU. The method then includes determining that the first protocol employed by the SU is different from the second protocol associated with the communication network based on the received CAI OTAR message. The method further includes creating a key management message (KMM) preamble, associated with the second protocol, based on at least one of the CAI header and configuration information of the SU, and creating a data link independent (DLI) OTAR message associated with the second protocol. The DLI OTAR message includes the received KMM.
    Type: Grant
    Filed: September 30, 2009
    Date of Patent: October 14, 2014
    Assignee: Motorola Solutions, Inc.
    Inventors: Dennis R. Newkirk, Richard J. Bitter, Leslie G. Gustafson, Chris A. Kruegel, Obaid Shahab, Ryan P. Ziolko
  • Patent number: 8824681
    Abstract: Methods and systems for LLE encrypting and decrypting voice message streams (VMSs) already supporting eTe encryption are disclosed. In one example, LLE and eTe encryption initialization vectors (EIVs) are interleaved such that an LLE EIV retrieved from one of a header and a data unit is used to LLE decrypt both the header or data unit and a subsequent data unit. A recovered eTe EIV is used to eTe decrypt voice payloads in one or more subsequent data units. In another example, a base station dynamically LLE encrypts a VMS already supporting eTe encrypting by determining whether a received VMS is eTe encrypted, and ii it is not generating a new LLE EIV, and if it is, re-using the pre-existing eTe EIV for LLE encryption. The LLE encrypted (and perhaps eTe encrypted) VMS is then sent over the air to one or more mobile stations.
    Type: Grant
    Filed: November 8, 2012
    Date of Patent: September 2, 2014
    Assignee: Motorola Solutions, Inc.
    Inventors: Thomas J. Senese, Chris A. Kruegel, Michael C. Petrie, Harish Natarahjan
  • Publication number: 20140198916
    Abstract: Disclosed is a radio system, method, and device for a mobile station to indicate to an authentication controller, in an authentication response message, which of a plurality of group key link layer encryption keys (GKEK)s it currently has in its possession, and to work with the authentication controller to more intelligently manage multiple GKEKs. The authentication controller can use the information obtained from the authentication response message to determine which of a plurality of GKEKs to advertise in a key announcement broadcast. Furthermore, individual requests for a future LLE key (LEK) to be used for link layer encryption (LLE) encrypting and decrypting inbound and outbound group communications between base station(s) and mobile station(s) are responded to with a broadcast GKEK-encrypted transmission including the future LEK. Only the requesting mobile station transmits an acknowledgment packet in response to the broadcast.
    Type: Application
    Filed: February 18, 2014
    Publication date: July 17, 2014
    Applicant: MOTOROLA SOLUTIONS, INC
    Inventors: CHRIS A. KRUEGEL, THOMAS J. SENESE, HANS C. SOWA
  • Patent number: 8781132
    Abstract: Disclosed is a radio system, method, and device for a mobile station to indicate to an authentication controller, in an authentication response message, which of a plurality of group key link layer encryption keys (GKEK)s it currently has in its possession, and to work with the authentication controller to more intelligently manage multiple GKEKs. The authentication controller can use the information obtained from the authentication response message to determine which of a plurality of GKEKs to advertise in a key announcement broadcast. Furthermore, individual requests for a future LLE key (LEK) to be used for link layer encryption (LLE) encrypting and decrypting inbound and outbound group communications between base station(s) and mobile station(s) are responded to with a broadcast GKEK-encrypted transmission including the future LEK. Only the requesting mobile station transmits an acknowledgment packet in response to the broadcast.
    Type: Grant
    Filed: November 16, 2012
    Date of Patent: July 15, 2014
    Assignee: Motorola Solutions, Inc.
    Inventors: Chris A. Kruegel, Thomas J. Senese, Hans C. Sowa
  • Publication number: 20130243195
    Abstract: Disclosed is a radio system, method, and device for a mobile station to indicate to an authentication controller, in an authentication response message, which of a plurality of group key link layer encryption keys (GKEK)s it currently has in its possession, and to work with the authentication controller to more intelligently manage multiple GKEKs. The authentication controller can use the information obtained from the authentication response message to determine which of a plurality of GKEKs to advertise in a key announcement broadcast. Furthermore, individual requests for a future LLE key (LEK) to be used for link layer encryption (LLE) encrypting and decrypting inbound and outbound group communications between base station(s) and mobile station(s) are responded to with a broadcast GKEK-encrypted transmission including the future LEK. Only the requesting mobile station transmits an acknowledgment packet in response to the broadcast.
    Type: Application
    Filed: November 16, 2012
    Publication date: September 19, 2013
    Applicant: MOTOROLA SOLUTIONS, INC.
    Inventors: CHRIS A. KRUEGEL, THOMAS J. SENESE, HANS C. SOWA
  • Patent number: 8509448
    Abstract: A sending device generates a first and a second KMM, wherein the first KMM includes a first KEK and a KMM encryption key, and the second KMM includes a set of symmetric encryption keys. The sending device further encrypts the set of symmetric encryption keys using the first KEK; encrypts the first KEK and the KMM encryption key using a first public key of a receiving device; and encrypts the second KMM using the KMM encryption key to generate an encrypted second KMM before sending the first KMM and the encrypted second KMM to the receiving device. The receiving device decrypts the first KEK and the KMM encryption key using a first private key that corresponds to the first public key; and decrypts the encrypted second KMM using the KMM encryption key to obtain the encrypted set of symmetric keys.
    Type: Grant
    Filed: July 29, 2009
    Date of Patent: August 13, 2013
    Assignee: Motorola Solutions, Inc.
    Inventors: Shanthi E. Thomas, Michael W. Bright, Chris A. Kruegel, Anthony R. Metke, Scott J. Pappas, Thomas J. Senese
  • Patent number: 8422680
    Abstract: A first communication unit receives an encrypted transmission from a second communication unit. The encrypted transmission was encrypted by the second communication unit using a first encryption key. The first communication unit compares the first encryption key to an encryption key associated with the first communication unit. If the first encryption key matches the encryption key associated with the first communication unit, the first communication unit processes the encrypted transmission further. If the first encryption key does not match the encryption key associated with the first communication unit, the first communication unit compares the first encryption key to an encryption key associated with the second communication unit. If the first encryption key matches the encryption key associated with the second communication unit, the first communication unit processes the encrypted transmission further; otherwise, the first communication unit does not process the encrypted transmission further.
    Type: Grant
    Filed: February 13, 2008
    Date of Patent: April 16, 2013
    Assignee: Motorola Solutions, Inc.
    Inventors: Chris A. Kruegel, David J. Chater-Lea
  • Publication number: 20130072155
    Abstract: A radio is authenticated at the site and unique authentication information for the radio is stored at the site. A subsequent non-authentication message from the radio is received at the site and authentication information in the non-authentication message is identified. The unique authentication information stored at the site is compared with authentication information identified in the non-authentication message. If there is a match, the non-authentication message is authenticated with an authentication code included in the non-authentication message, wherein a predefined portion of the authentication code is obtained from at least one of a header portion or a data portion of the non-authentication message. Upon successfully completing authentication, the site repeats the non-authentication message towards destination radios indicated in non-authentication message.
    Type: Application
    Filed: September 16, 2011
    Publication date: March 21, 2013
    Applicant: MOTOROLA SOLUTIONS, INC.
    Inventors: THOMAS J. SENESE, CHRIS A. KRUEGEL, TIMOTHY G. WOODWARD
  • Publication number: 20120183143
    Abstract: A method for operating with KMFs includes a communication device having a memory device: receiving a designation of a primary KMF for the communication device, wherein only one primary KMF is designated for the communication device at any given time instance; receiving a designation of a secondary KMF for the communication device; storing, within the memory device, a first and a second set of crypto groups, wherein each crypto group within each set of crypto groups comprises at least one keyset, wherein each set of crypto groups is associated, within the memory device, to only one KMF identifier; associating, within the memory device, the first set of crypto groups to an identifier for the primary KMF; and associating, within the memory device, the second set of crypto groups to an identifier for the secondary KMF.
    Type: Application
    Filed: January 18, 2011
    Publication date: July 19, 2012
    Applicant: MOTOROLA SOLUTIONS, INC.
    Inventors: CHRIS A. KRUEGEL, THOMAS J. SENESE, TIMOTHY G. WOODWARD
  • Publication number: 20120036567
    Abstract: A security gateway and an initiating device perform methods for establishing a security session. The methods includes the security gateway: receiving a first message from an initiating device, the first message including a first message authentication code; validating the first message using the message authentication code; and responsive to the validating, sending a second message to the initiating device, the second message including a timestamp and further including a second message authentication code for authenticating of the timestamp by the initiating device, wherein the first and second messages are used to establish the security session, and the authenticated timestamp is used for subsequent replay protection of messages between the security gateway and the initiating device. The method further includes the security gateway validating a dynamically assigned IP address for the initiating device to use in authorizing VPN traffic between the two devices.
    Type: Application
    Filed: June 30, 2011
    Publication date: February 9, 2012
    Applicant: MOTOROLA SOLUTIONS, INC.
    Inventors: THOMAS J. SENESE, CHRIS A. KRUEGEL, TIMOTHY M. LANGHAM, TODD A. LEIGH, TIMOTHY G. WOODWARD
  • Patent number: 8059817
    Abstract: Disclosed is a method for encrypted communications. A first IPsec endpoint selects a security association (SA) from a security association database (SAD) by using a selector and then extracts an indexing parameter from SA. The indexing parameter is used to determine an active key location from a key storage database (KSD). Data packets are then encrypted using a key from the active key location. The first IPsec endpoint also forms a security parameter index (SPI) in a header of the data packet by using a keyID from the active key location and transmits the encrypted data packet with the header indicating the SPI to a second IPsec endpoint.
    Type: Grant
    Filed: June 19, 2007
    Date of Patent: November 15, 2011
    Assignee: Motorola Solutions, Inc.
    Inventors: Chris A. Kruegel, Michael W. Bright, Dipendra M. Chowdhary, Thomas J. Senese, Timothy G. Woodward, Larry Murrill
  • Publication number: 20110075614
    Abstract: Application service is provided for a subscriber unit (SU), employing a first protocol, in a communication network employing a second protocol. The method includes receiving a CAI OTAR message from the SU. The CAI OTAR message includes at least a key management message (KMM) and a CAI header of the SU. The method then includes determining that the first protocol employed by the SU is different from the second protocol associated with the communication network based on the received CAI OTAR message. The method further includes creating a key management message (KMM) preamble, associated with the second protocol, based on at least one of the CAI header and configuration information of the SU, and creating a data link independent (DLI) OTAR message associated with the second protocol. The DLI OTAR message includes the received KMM.
    Type: Application
    Filed: September 30, 2009
    Publication date: March 31, 2011
    Applicant: MOTOROLA, INC.
    Inventors: Dennis R. Newkirk, Richard J. Bitter, Leslie G. Gustafson, Chris A. Kruegel, Obaid Shahab, Ryan P. Ziolko
  • Publication number: 20110026714
    Abstract: A sending device generates a first and a second KMM, wherein the first KMM includes a first KEK and a KMM encryption key, and the second KMM includes a set of symmetric encryption keys. The sending device further encrypts the set of symmetric encryption keys using the first KEK; encrypts the first KEK and the KMM encryption key using a first public key of a receiving device; and encrypts the second KMM using the KMM encryption key to generate an encrypted second KMM before sending the first KMM and the encrypted second KMM to the receiving device. The receiving device decrypts the first KEK and the KMM encryption key using a first private key that corresponds to the first public key; and decrypts the encrypted second KMM using the KMM encryption key to obtain the encrypted set of symmetric keys.
    Type: Application
    Filed: July 29, 2009
    Publication date: February 3, 2011
    Applicant: MOTOROLA, INC.
    Inventors: Shanthi E. Thomas, Michael W. Bright, Chris A. Kruegel, Anthony R. Metke, Scott J. Pappas, Thomas J. Senese
  • Publication number: 20100165839
    Abstract: A method for managing a packet in a communication system between two or more endpoints, a sender and one or more recipients, comprises receiving a first packet comprising a source identifier that uniquely identifies a sender of the first packet and a current source time assigned to the first packet by the sender, determining a received time for the first packet, retrieving a cached source time assigned by the sender to a second packet that was received prior to receiving the first packet, and determining whether to discard or process the first packet based on the current source time, the received time, and the cached source time. The current source time, the received time, and the cached time, in addition to predetermined parameters such as a maximum age and an anti-replay window allows a recipient to determine whether to process or discard a packet.
    Type: Application
    Filed: December 29, 2008
    Publication date: July 1, 2010
    Applicant: MOTOROLA, INC.
    Inventors: THOMAS J. SENESE, MICHAEL W. BRIGHT, DIPENDRA M. CHOWDHARY, CHRIS A. KRUEGEL, LARRY MURRILL, TIMOTHY G. WOODWARD
  • Publication number: 20100031038
    Abstract: A first communication unit receives an encrypted transmission from a second communication unit. The encrypted transmission was encrypted by the second communication unit using a first encryption key. The first communication unit compares the first encryption key to an encryption key associated with the first communication unit. If the first encryption key matches the encryption key associated with the first communication unit, the first communication unit processes the encrypted transmission further. If the first encryption key does not match the encryption key associated with the first communication unit, the first communication unit compares the first encryption key to an encryption key associated with the second communication unit. If the first encryption key matches the encryption key associated with the second communication unit, the first communication unit processes the encrypted transmission further; otherwise, the first communication unit does not process the encrypted transmission further.
    Type: Application
    Filed: February 13, 2008
    Publication date: February 4, 2010
    Applicant: MOTOROLA, INC.
    Inventors: CHRIS A. KRUEGEL, DAVID J. CHATER-LEA
  • Patent number: 7643636
    Abstract: A plurality of storage location numbers (“SLNs”), each having a cryptographic period, is received at a first device (100). A system cryptographic period is determined based on the SLN cryptographic periods. Prior to expiration of each system cryptographic period, if at least one SLN requires an updated, the first device sends updated key material for the at least one SLN. A second device (102) maintains first, second, and third keysets, wherein the first and second keysets comprise key material. The second device receives a message to make the first keyset active, and a second message for updating at least a portion of the key material in the second keyset with updated key material for at least one SLN. The second device makes the third keyset equivalent to the second keyset, updates the second keyset with the updated key material, and receives a third message to make the second keyset active.
    Type: Grant
    Filed: September 3, 2003
    Date of Patent: January 5, 2010
    Assignee: Motorola, Inc.
    Inventor: Chris A. Kruegel
  • Publication number: 20080132204
    Abstract: A method for updating at least one attribute stored at a mobile station comprises determining a mobile station hash that is representative of a set of attributes that is currently stored at the mobile station and determining a desired hash that is representative of a set of desired attributes desired to be stored at the mobile station. The method additionally includes comparing the mobile station hash with the desired hash, and updating at least one attribute in the set of attributes that is currently stored at the mobile station when the mobile station hash is not equal to the desired hash.
    Type: Application
    Filed: December 4, 2006
    Publication date: June 5, 2008
    Applicant: MOTOROLA, INC.
    Inventors: RYAN P. ZIOLKO, STANLEY J. KNAPCZYK, CHRIS A. KRUEGEL
  • Publication number: 20080019525
    Abstract: Disclosed is a method for encrypted communications. A first IPsec endpoint selects a security association (SA) from a security association database (SAD) by using a selector and then extracts an indexing parameter from SA. The indexing parameter is used to determine an active key location from a key storage database (KSD). Data packets are then encrypted using a key from the active key location. The first IPsec endpoint also forms a security parameter index (SPI) in a header of the data packet by using a keyID from the active key location and transmits the encrypted data packet with the header indicating the SPI to a second IPsec endpoint.
    Type: Application
    Filed: June 19, 2007
    Publication date: January 24, 2008
    Applicant: MOTOROLA, INC.
    Inventors: CHRIS KRUEGEL, MICHAEL BRIGHT, DIPENDRA CHOWDHARY, THOMAS SENESE, TIMOTHY WOODWARD, LARRY MURRILL