Patents by Inventor Dean H. Vogler

Dean H. Vogler has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9554280
    Abstract: A method for managing data communication between a communication device (102) and another device (112) in a communication network, comprises providing (500) data for transmission by the communication device (102), and controlling by at least one secure management element (300, 304) operating in a secure environment (218) in the communication device the transmission of the provided data by the communication device so as to manage data transmitted by the communication device. The step of controlling may include at least one of controlling an amount of data transmitted, controlling a time of transmission of data and controlling a periodicity of transmission of data. A communication device and a method of managing data received by a communication device are also described.
    Type: Grant
    Filed: December 16, 2009
    Date of Patent: January 24, 2017
    Assignee: Google Technology Holdings LLC
    Inventors: Timothy J. Wright, Dean H. Vogler, Joel D. Voss
  • Patent number: 9325714
    Abstract: System and methods for access control in a Universal Plug and Play (UPnP) network are based on a user identity. A control point has an identity assertion capability for identifying a user. The control point is configured to declare a value of an attribute associated with the identity assertion capability. A device is communicatively coupled to the control point via the UPnP network. The device has a first access control list and a trusted-to-identify access control list (TIA). The device is configured to permit the user to perform one or more actions based upon whether the user identity appears as a subject in the first access control list.
    Type: Grant
    Filed: July 25, 2014
    Date of Patent: April 26, 2016
    Assignee: Google Technology Holdings LLC
    Inventors: Mahesh V. Tripunitara, Dean H. Vogler, Patrick Toomey
  • Patent number: 9065656
    Abstract: System and methods for managing trust in access control are based on a user identity, in a Universal Plug and Play (UPnP) network. A device has an access control list (ACL), a trusted-to-identify access control list (TIA), and a first TIA management module configured to manage the TIA. A security console is communicatively coupled to the device via the network. The security console has a second TIA management module. The first TIA management module is able to implement an add request from the security console for adding an entry to the TIA. The entry includes a control point identity for a control point communicatively coupled to the device via the network.
    Type: Grant
    Filed: April 22, 2008
    Date of Patent: June 23, 2015
    Assignee: Google Technology Holdings LLC
    Inventors: Dean H. Vogler, Mahesh V. Tripunitara, Patrick Toomey
  • Publication number: 20140337934
    Abstract: System and methods for access control in a Universal Plug and Play (UPnP) network are based on a user identity. A control point has an identity assertion capability for identifying a user. The control point is configured to declare a value of an attribute associated with the identity assertion capability. A device is communicatively coupled to the control point via the UPnP network. The device has a first access control list and a trusted-to-identify access control list (TIA). The device is configured to permit the user to perform one or more actions based upon whether the user identity appears as a subject in the first access control list.
    Type: Application
    Filed: July 25, 2014
    Publication date: November 13, 2014
    Inventors: Mahesh V. Tripunitara, Dean H. Vogler, Patrick Toomey
  • Patent number: 8819422
    Abstract: System and methods for access control in a Universal Plug and Play (UPnP) network are based on a user identity. A control point has an identity assertion capability for identifying a user. The control point is configured to declare a value of an attribute associated with the identity assertion capability. A device is communicatively coupled to the control point via the UPnP network. The device has a first access control list and a trusted-to-identify access control list (TIA). The device is configured to permit the user to perform one or more actions based upon whether the user identity appears as a subject in the first access control list.
    Type: Grant
    Filed: April 22, 2008
    Date of Patent: August 26, 2014
    Assignee: Motorola Mobility LLC
    Inventors: Mahesh V. Tripunitara, Dean H. Vogler, Patrick Toomey
  • Patent number: 8401244
    Abstract: Systems and methods for providing secure identity authentication amongst devices using identity information contained therein to facilitate data synchronization amongst the user devices, wherein the identity information in the devices are compared for authentication but not actually transmitted or exposed for unauthorized access to such information and to the devices.
    Type: Grant
    Filed: December 21, 2007
    Date of Patent: March 19, 2013
    Assignee: General Instrument Corporation
    Inventors: Dean H. Vogler, Douglas A. Kuhlman, Yi Q. Li
  • Publication number: 20110141953
    Abstract: A method for managing data communication between a communication device (102) and another device (112) in a communication network, comprises providing (500) data for transmission by the communication device (102), and controlling by at least one secure management element (300, 304) operating in a secure environment (218) in the communication device the transmission of the provided data by the communication device so as to manage data transmitted by the communication device. The step of controlling may include at least one of controlling an amount of data transmitted, controlling a time of transmission of data and controlling a periodicity of transmission of data. A communication device and a method of managing data received by a communication device are also described.
    Type: Application
    Filed: December 16, 2009
    Publication date: June 16, 2011
    Applicant: MOTOROLA, INC.
    Inventors: Timothy J. Wright, Dean H. Vogler, Joel D. Voss
  • Publication number: 20090276823
    Abstract: A method and apparatus for modifying a color of an electronics housing (104) based on the device security, authentication, and/or authorization is provided herein. During operation a device (100) will repeatedly gather a current security status and then modify a color or pattern of the housing based on the security status. Because the color of an electronics device indicates the current security, authentication, and/or authorization level, a user of the device can easily determine their security, authentication, and/or authorization level.
    Type: Application
    Filed: April 30, 2008
    Publication date: November 5, 2009
    Applicant: MOTOROLA, INC.
    Inventors: Dean H. Vogler, Douglas A. Kuhlman, Yi Q. Li
  • Publication number: 20090265765
    Abstract: System and methods for managing trust in access control are based on a user identity, in a Universal Plug and Play (UPnP) network. A device has an access control list (ACL), a trusted-to-identify access control list (TIA), and a first TIA management module configured to manage the TIA. A security console is communicatively coupled to the device via the network. The security console has a second TIA management module. The first TIA management module is able to implement an add request from the security console for adding an entry to the TIA. The entry includes a control point identity for a control point communicatively coupled to the device via the network.
    Type: Application
    Filed: April 22, 2008
    Publication date: October 22, 2009
    Applicant: GENERAL INSTRUMENT CORPORATION
    Inventors: Dean H. Vogler, Mahesh V. Tripunitara, Patrick Toomey
  • Publication number: 20090265551
    Abstract: System and methods for access control in a Universal Plug and Play (UPnP) network are based on a user identity. A control point has an identity assertion capability for identifying a user. The control point is configured to declare a value of an attribute associated with the identity assertion capability. A device is communicatively coupled to the control point via the UPnP network. The device has a first access control list and a trusted-to-identify access control list (TIA). The device is configured to permit the user to perform one or more actions based upon whether the user identity appears as a subject in the first access control list.
    Type: Application
    Filed: April 22, 2008
    Publication date: October 22, 2009
    Applicant: GENERAL INSTRUMENT CORPORATION
    Inventors: Mahesh V. Tripunitara, Dean H. Vogler, Patrick Toomey
  • Publication number: 20090161919
    Abstract: Systems and methods for providing secure identity authentication amongst devices using identity information contained therein to facilitate data synchronization amongst the user devices, wherein the identity information in the devices are compared for authentication but not actually transmitted or exposed for unauthorized access to such information and to the devices.
    Type: Application
    Filed: December 21, 2007
    Publication date: June 25, 2009
    Applicant: GENERAL INSTRUMENT CORPORATION
    Inventors: Dean H. Vogler, Douglas A. Kuhlman, Yi Q. Li
  • Publication number: 20080313075
    Abstract: A machine-implemented method of providing dynamic access to network services may include receiving a request from a client for a type of network service, monitoring an amount and type of network service being provided to the client, and receiving incremental payments from the client for the network service being provided as the network service continues to be provided. The method may include dynamically modifying access to the network service for the client based on a set of rules. The rules may be based on one or more of the monitored amount of network service, the type of network service, and the payments received.
    Type: Application
    Filed: June 13, 2007
    Publication date: December 18, 2008
    Applicant: Motorola, Inc.
    Inventors: Mahesh V. TRIPUNITARA, Dean H. Vogler
  • Publication number: 20080072066
    Abstract: During a first time interval, an authentication system produces a fingerprint of a first application, encrypts it and stores the encrypted fingerprint in a memory. In second time interval the authentication system produces a fingerprint of a second application, and retrieves the encrypted fingerprint of the first application from the memory. The encrypted fingerprint of the first application is decrypted to recover the fingerprint of the first application. The second application is authenticated if the fingerprint of the first application is equal to the fingerprint of the second application. The fingerprint may include a hash value of the program of computer instructions of the application. The fingerprint of the first application may be encrypted using an embedded secret key of the authentication system.
    Type: Application
    Filed: August 21, 2006
    Publication date: March 20, 2008
    Applicant: MOTOROLA, INC.
    Inventors: Dean H. Vogler, Ronald F. Buskey
  • Publication number: 20040193902
    Abstract: A preferred technique includes a digital content rendering device (100) and a method used in the device, including acquiring (305) an encrypted digital content (105), acquiring (305) a set of rules (110) associated with the encrypted digital content that specify permissions involving at least one level of rendering of the digital content that are based on a comparison of a set of specified locations with a sensed location, acquiring (305) an encrypted content key (120), extracting (315) the digital content, determining (330) a sensed location of the content rendering device, performing comparisons (335) of the sensed location to each of the set of specified locations; and determining (340) a level of rendering of the digital content in accordance with the set of rules, based on results of the comparisons.
    Type: Application
    Filed: March 31, 2003
    Publication date: September 30, 2004
    Inventors: Dean H. Vogler, Ephrem A. Chemaly, Ezzat A. Dabbish, Thomas S. Messerges, Robert A. Patzer
  • Patent number: 6393127
    Abstract: Encryption keys are transferred by obtaining a public and private key pair (42, 65) from a source device (21, 61). The public key is transmitted (42, 65) from the source device (43, 66) to a target device (23, 62). The target (23, 62) obtains a traffic key (44, 67) stored within the target device (23, 62). The traffic key is encrypted (45, 68) within the target device using the public key. The encrypted traffic key is transmitted to the source device (46, 69) where it is decrypted (47, 70) using the private key. The replacement encryption key(s) is(are) encrypted using the traffic key by the source device (48, 71) forming an encrypted replacement key message which contains a target slot identification for each of the replacement encryption keys. The encrypted replacement key message is transmitted to the target device (49, 72) where the replacement encryption key(s) is(are) recovered (50, 73). The replacement encryption key(s) is(are) then stored at the target device in an identified target slot (51).
    Type: Grant
    Filed: March 2, 1998
    Date of Patent: May 21, 2002
    Assignee: Motorola, Inc.
    Inventor: Dean H. Vogler
  • Publication number: 20010055395
    Abstract: Encryption keys are transferred by obtaining a public and private key pair (42, 65) from a source device (21, 61). The public key is transmitted (42, 65) from the source device (43, 66) to a target device (23, 62). The target (23, 62) obtains a traffic key (44, 67) stored within the target device (23, 62). The traffic key is encrypted (45, 68) within the target device using the public key. The encrypted traffic key is transmitted to the source device (46, 69) where it is decrypted (47, 70) using the private key. The replacement encryption key(s) is(are) encrypted using the traffic key by the source device (48, 71) forming an encrypted replacement key message which contains a target slot identification for each of the replacement encryption keys. The encrypted replacement key message is transmitted to the target device (49, 72) where the replacement encryption key(s) is(are) recovered (50, 73). The replacement encryption key(s) is(are) then stored at the target device in an identified target slot (51).
    Type: Application
    Filed: March 2, 1998
    Publication date: December 27, 2001
    Inventor: DEAN H. VOGLER
  • Patent number: 6223291
    Abstract: A wireless electronic commerce system (10) comprising a wireless gateway (18) to a wireless network (19) with which a wireless device (11) having a unique client identifier (ID) is capable of communicating. A server (15) or servers (15 and 16) is/are coupleable to the wireless gateway, delivering content items (e.g. software products) to the wireless device (11) and maintaining digital content certificates for content items and digital license certificates for licenses for the content items. The server maintains, for each wireless client associated with the system, a record of licenses for that client and a record of content items associated with each license.
    Type: Grant
    Filed: March 26, 1999
    Date of Patent: April 24, 2001
    Assignee: Motorola, Inc.
    Inventors: Larry C. Puhl, Dean H. Vogler, Ezzat A. Dabbish