Patents by Inventor Dafu Lou
Dafu Lou has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12149608Abstract: An apparatus method and computer media for implementing a white-box block cipher in a software application to create a secure software application having the same functionality as the software application.Type: GrantFiled: April 28, 2022Date of Patent: November 19, 2024Assignee: Irdeto B.V.Inventors: Tingting Lin, Dafu Lou, Manfred Von Willich
-
Publication number: 20220271916Abstract: An apparatus method and computer media for implementing a white-box block cipher in a software application to create a secure software application having the same functionality as the software application.Type: ApplicationFiled: April 28, 2022Publication date: August 25, 2022Applicant: Irdeto Canada CorporationInventors: Tingting LIN, Dafu LOU, Manfred VON WILLICH
-
Publication number: 20200313850Abstract: An apparatus method and computer media for implementing a white-box block cipher in a software application to create a secure software application having the same functionality as the software application.Type: ApplicationFiled: March 29, 2019Publication date: October 1, 2020Applicant: Irdeto Canada CorporationInventors: Tingting LIN, Dafu LOU, Manfred Von WILLICH
-
Patent number: 9755825Abstract: A method and system for providing secure access to a device initiating communications using a peer-to-peer signaling protocol, such as a SIP or H.323. In a device registration phase, the device contacts a secure access server, and authenticates to the secure access server by providing an identification, such as its factory ID. The secure access server then issues a device ID and private key to the authenticated device. A client can then initiate a further communication session and be authenticated by the secure access server. The secure access server returns the device identification and the device's public key to the client. The client and device can then perform a symmetrical key exchange for their current communication session, and can communicate with appropriate encryption. The device's private key can be set to expire after one or more uses.Type: GrantFiled: December 20, 2007Date of Patent: September 5, 2017Assignee: BCE INC.Inventors: William G. O'Brien, Tet Hin Yeap, Dafu Lou
-
Patent number: 8762726Abstract: The present invention provides a method and system for secure access to computer equipment. An embodiment includes a secure access controller connected to a link between a transceiver (such as a modem) and the computer equipment. Public and private keys are used by the secure access controller and a remote user. The keys are provided to the secure access controller by an authentication server. Once the transceiver establishes a communication link with the user, the access controller uses these keys to authenticate packets issued by the user to the computer equipment. If the packet is authenticated, the access controller passes the packet to the computer equipment. Otherwise, the packet is discarded.Type: GrantFiled: March 21, 2011Date of Patent: June 24, 2014Assignee: BCE Inc.Inventors: Tet Hin Yeap, Dafu Lou, William G. O'Brien
-
Patent number: 8312279Abstract: A method and system for secure access to computer equipment. An embodiment includes a secure access controller connected to a link between a transceiver (such as a modem) and the computer equipment. Public and private keys are used by the secure access controller and a remote user. The keys are provided to the secure access controller by an authentication server. Once the transceiver establishes a communication link with the user, the access controller uses these keys to authenticate packets issued by the user to the computer equipment. If the packet is authenticated, the access controller passes the packet to the computer equipment. Otherwise, the packet is discarded. Another embodiment includes a secure access controller having a plurality of ports for connection to a plurality of different pieces of computer equipment. The secure access controller thus intermediates communications between the modem and the plurality of different pieces of computer equipment.Type: GrantFiled: August 6, 2010Date of Patent: November 13, 2012Assignee: BCE Inc.Inventors: William G. O'Brien, Tef Hin Yeap, Dafu Lou
-
Publication number: 20110170696Abstract: The present invention provides a method and system for secure access to computer equipment. An embodiment includes a secure access controller connected to a link between a transceiver (such as a modem) and the computer equipment. Public and private keys are used by the secure access controller and a remote user. The keys are provided to the secure access controller by an authentication server. Once the transceiver establishes a communication link with the user, the access controller uses these keys to authenticate packets issued by the user to the computer equipment. If the packet is authenticated, the access controller passes the packet to the computer equipment. Otherwise, the packet is discarded.Type: ApplicationFiled: March 21, 2011Publication date: July 14, 2011Inventors: Tet Hin YEAP, Dafu LOU, William G. O'BRIEN
-
Patent number: 7930412Abstract: The present invention provides a method and system for secure access to computer equipment. An embodiment includes a secure access controller connected to a link between a transceiver (such as a modem) and the computer equipment. Public and private keys are used by the secure access controller and a remote user. The keys are provided to the secure access controller by an authentication server. Once the transceiver establishes a communication link with the user, the access controller uses these keys to authenticate packets issued by the user to the computer equipment. If the packet is authenticated, the access controller passes the packet to the computer equipment. Otherwise, the packet is discarded.Type: GrantFiled: September 30, 2003Date of Patent: April 19, 2011Assignee: BCE Inc.Inventors: Tet Hin Yeap, Dafu Lou, William G. O'Brien
-
Patent number: 7904952Abstract: A system and method for access control is provided. In one embodiment, a system includes a computing device connected to an access server that controls the ability of the computing device to access to a computing resource, such as the Internet. The access server connects to an activation server via a network. The activation server is operable to receive a request for to generate a certificate for the computing device from the activation server. The activation server is operable to generate the certificate and embed a unique identifier of the computing device and/or the access server and/or the like inside the certificate. Once generated, the certificate is installed in the computing device. When the computing device initiates a request to access the computing resource, the computing device initially sends the certificate to the access server.Type: GrantFiled: December 3, 2004Date of Patent: March 8, 2011Assignee: BCE Inc.Inventors: Tet Hin Yeap, Dafu Lou, William G. O'Brien
-
Patent number: 7861081Abstract: A security system and method is provided. In an embodiment, a personal integrated circuit (“PIC”), is provided that can be presented to a laptop computer. The PIC includes a digital certificate personal to an authorized user and is operable to automatically install the certificate on the laptop computer once presented into the computer and once the user enters a valid password respective to the PIC. At this point, the laptop presents the certificate to a server via a network, and the certificate is checked for validity. If valid, the user is then permitted to log into the server. Having logged into the server, the user can remain logged in even as the PIC is removed and presented to different computing devices that are also able to connect to the server via the network. Typically, the user is only able to access the server through the computing device to which the PIC is attached.Type: GrantFiled: June 4, 2004Date of Patent: December 28, 2010Assignee: BCE Inc.Inventors: Tet Hin Yeap, William G. O'Brien, Dafu Lou, Ren Xiaoli
-
Publication number: 20100306529Abstract: The present invention provides a method and system for secure access to computer equipment. An embodiment includes a secure access controller connected to a link between a transceiver (such as a modem) and the computer equipment. Public and private keys are used by the secure access controller and a remote user. The keys are provided to the secure access controller by an authentication server. Once the transceiver establishes a communication link with the user, the access controller uses these keys to authenticate packets issued by the user to the computer equipment. If the packet is authenticated, the access controller passes the packet to the computer equipment. Otherwise, the packet is discarded. Another embodiment includes a secure access controller having a plurality of ports for connection to a plurality of different pieces of computer equipment. The secure access controller thus intermediates communications between the modem and the plurality of different pieces of computer equipment.Type: ApplicationFiled: August 6, 2010Publication date: December 2, 2010Inventors: William G. O'Brien, Tef Hin Yeap, Dafu Lou
-
Patent number: 7774602Abstract: The present invention provides a method and system for secure access to computer equipment. An embodiment includes a secure access controller connected to a link between a transceiver (such as a modem) and the computer equipment. Public and private keys are used by the secure access controller and a remote user. The keys are provided to the secure access controller by an authentication server. Once the transceiver establishes a communication link with the user, the access controller uses these keys to authenticate packets issued by the user to the computer equipment. If the packet is authenticated, the access controller passes the packet to the computer equipment. Otherwise, the packet is discarded. Another embodiment includes a secure access controller having a plurality of ports for connection to a plurality of different pieces of computer equipment. The secure access controller thus intermediates communications between the modem and the plurality of different pieces of computer equipment.Type: GrantFiled: December 9, 2005Date of Patent: August 10, 2010Assignee: BCE Inc.Inventors: William G. O'Brien, Tet Hin Yeap, Dafu Lou
-
Patent number: 7660575Abstract: Method and adapter apparatus for securing information exchanged between a calling party and a called party. A first signal is generated, which is representative of an analog probe signal. The first signal is released towards the called party. Responsive to receipt from the called party of a second signal responsive to the analog probe signal and indicative of an ability of the called party to participate in a secure information exchange, negotiations are performed with the called party to securely exchange subsequent information with the called party. In this way, the adapter apparatus can securely exchange information without prior knowledge of whether the called party is secure-capable or secure-incapable and without prior knowledge of whether the called party is a POTS phone or a packet-switched device.Type: GrantFiled: December 2, 2004Date of Patent: February 9, 2010Assignee: BCE Inc.Inventors: Tet Hin Yeap, William G. O'Brien, Xiaoli Ren, Dafu Lou
-
Publication number: 20080235511Abstract: A method and system for providing secure access to a device initiating communications using a peer-to-peer signaling protocol, such as a SIP or H.323. In a device registration phase, the device contacts a secure access server, and authenticates to the secure access server by providing an identification, such as its factory ID. The secure access server then issues a device ID and private key to the authenticated device. A client can then initiate a further communication session and be authenticated by the secure access server. The secure access server returns the device identification and the device's public key to the client. The client and device can then perform a symmetrical key exchange for their current communication session, and can communicate with appropriate encryption. The device's private key can be set to expire after one or more uses.Type: ApplicationFiled: December 20, 2007Publication date: September 25, 2008Applicant: BCE INC.Inventors: William G. O'Brien, Tet Hin YEAP, Dafu LOU
-
Publication number: 20080044032Abstract: A method for securely transporting personalized service policies from a trusted home SIP server to an un-trusted host server, through a hostile environment, such as the Internet, using identity-based encryption. A user is able to define an instance-based encryption seed for a public key to be used in encryption of SIP, or other open signaling protocol, personalized services, including defining the time and the location at which the public key is to be valid. The method consists of encrypting, in accordance with instance-based parameters, personal profile information describing the personalized service policies; retrieving the encrypted personal profile information at the un-trusted host server; and decrypting the encrypted personal profile information if the instance-based parameters are satisfied.Type: ApplicationFiled: November 14, 2006Publication date: February 21, 2008Applicant: BCE INC.Inventors: Dafu Lou, Tet Yeap, William O'Brien
-
Publication number: 20060161775Abstract: The present invention provides a method and system for secure access to computer equipment. An embodiment includes a secure access controller connected to a link between a transceiver (such as a modem) and the computer equipment. Public and private keys are used by the secure access controller and a remote user. The keys are provided to the secure access controller by an authentication server. Once the transceiver establishes a communication link with the user, the access controller uses these keys to authenticate packets issued by the user to the computer equipment. If the packet is authenticated, the access controller passes the packet to the computer equipment. Otherwise, the packet is discarded. Another embodiment includes a secure access controller having a plurality of ports for connection to a plurality of different pieces of computer equipment. The secure access controller thus intermediates communications between the modem and the plurality of different pieces of computer equipment.Type: ApplicationFiled: December 9, 2005Publication date: July 20, 2006Inventors: William O'Brien, Tet Yeap, Dafu Lou
-
Publication number: 20060080534Abstract: A system and method for access control is provided. In one embodiment, a system includes a computing device connected to an access server that controls the ability of the computing device to access to a computing resource, such as the Internet. The access server connects to an activation server via a network. The activation server is operable to receive a request for to generate a certificate for the computing device from the activation server. The activation server is operable to generate the certificate and embed a unique identifier of the computing device and/or the access server and/or the like inside the certificate. Once generated, the certificate is installed in the computing device. When the computing device initiates a request to access the computing resource, the computing device initially sends the certificate to the access server.Type: ApplicationFiled: December 3, 2004Publication date: April 13, 2006Inventors: Tet Yeap, Dafu Lou, William O'Brien
-
Publication number: 20050216747Abstract: A security system and method is provided. In an embodiment, a personal integrated circuit (“PIC”), is provided that can be presented to a laptop computer. The PIC includes a digital certificate personal to an authorized user and is operable to automatically install the certificate on the laptop computer once presented into the computer and once the user enters a valid password respective to the PIC. At this point, the laptop presents the certificate to a server via a network, and the certificate is checked for validity. If valid, the user is then permitted to log into the server. Having logged into the server, the user can remain logged in even as the PIC is removed and presented to different computing devices that are also able to connect to the server via the network. Typically, the user is only able to access the server through the computing device to which the PIC is attached.Type: ApplicationFiled: June 4, 2004Publication date: September 29, 2005Applicant: BCE Inc.Inventors: Tet Yeap, William O'Brien, Dafu Lou, Ren Xiaoli
-
Publication number: 20050144445Abstract: Method and adapter apparatus for securing information exchanged between a calling party and a called party. A first signal is generated, which is representative of an analog probe signal. The first signal is released towards the called party. Responsive to receipt from the called party of a second signal responsive to the analog probe signal and indicative of an ability of the called party to participate in a secure information exchange, negotiations are performed with the called party to securely exchange subsequent information with the called party. In this way, the adapter apparatus can securely exchange information without prior knowledge of whether the called party is secure-capable or secure-incapable and without prior knowledge of whether the called party is a POTS phone or a packet-switched device.Type: ApplicationFiled: December 2, 2004Publication date: June 30, 2005Inventors: Tet Yeap, William O'Brien, Xiaoli Ren, Dafu Lou
-
Publication number: 20050071129Abstract: The present invention provides a method and system for secure access to computer equipment. An embodiment includes a secure access controller connected to a link between a transceiver (such as a modem) and the computer equipment. Public and private keys are used by the secure access controller and a remote user. The keys are provided to the secure access controller by an authentication server. Once the transceiver establishes a communication link with the user, the access controller uses these keys to authenticate packets issued by the user to the computer equipment. If the packet is authenticated, the access controller passes the packet to the computer equipment. Otherwise, the packet is discarded.Type: ApplicationFiled: September 30, 2003Publication date: March 31, 2005Inventors: Tet Yeap, Dafu Lou, William O'Brien