Patents by Inventor Dean H. Vogler
Dean H. Vogler has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9554280Abstract: A method for managing data communication between a communication device (102) and another device (112) in a communication network, comprises providing (500) data for transmission by the communication device (102), and controlling by at least one secure management element (300, 304) operating in a secure environment (218) in the communication device the transmission of the provided data by the communication device so as to manage data transmitted by the communication device. The step of controlling may include at least one of controlling an amount of data transmitted, controlling a time of transmission of data and controlling a periodicity of transmission of data. A communication device and a method of managing data received by a communication device are also described.Type: GrantFiled: December 16, 2009Date of Patent: January 24, 2017Assignee: Google Technology Holdings LLCInventors: Timothy J. Wright, Dean H. Vogler, Joel D. Voss
-
Patent number: 9325714Abstract: System and methods for access control in a Universal Plug and Play (UPnP) network are based on a user identity. A control point has an identity assertion capability for identifying a user. The control point is configured to declare a value of an attribute associated with the identity assertion capability. A device is communicatively coupled to the control point via the UPnP network. The device has a first access control list and a trusted-to-identify access control list (TIA). The device is configured to permit the user to perform one or more actions based upon whether the user identity appears as a subject in the first access control list.Type: GrantFiled: July 25, 2014Date of Patent: April 26, 2016Assignee: Google Technology Holdings LLCInventors: Mahesh V. Tripunitara, Dean H. Vogler, Patrick Toomey
-
Patent number: 9065656Abstract: System and methods for managing trust in access control are based on a user identity, in a Universal Plug and Play (UPnP) network. A device has an access control list (ACL), a trusted-to-identify access control list (TIA), and a first TIA management module configured to manage the TIA. A security console is communicatively coupled to the device via the network. The security console has a second TIA management module. The first TIA management module is able to implement an add request from the security console for adding an entry to the TIA. The entry includes a control point identity for a control point communicatively coupled to the device via the network.Type: GrantFiled: April 22, 2008Date of Patent: June 23, 2015Assignee: Google Technology Holdings LLCInventors: Dean H. Vogler, Mahesh V. Tripunitara, Patrick Toomey
-
Publication number: 20140337934Abstract: System and methods for access control in a Universal Plug and Play (UPnP) network are based on a user identity. A control point has an identity assertion capability for identifying a user. The control point is configured to declare a value of an attribute associated with the identity assertion capability. A device is communicatively coupled to the control point via the UPnP network. The device has a first access control list and a trusted-to-identify access control list (TIA). The device is configured to permit the user to perform one or more actions based upon whether the user identity appears as a subject in the first access control list.Type: ApplicationFiled: July 25, 2014Publication date: November 13, 2014Inventors: Mahesh V. Tripunitara, Dean H. Vogler, Patrick Toomey
-
Patent number: 8819422Abstract: System and methods for access control in a Universal Plug and Play (UPnP) network are based on a user identity. A control point has an identity assertion capability for identifying a user. The control point is configured to declare a value of an attribute associated with the identity assertion capability. A device is communicatively coupled to the control point via the UPnP network. The device has a first access control list and a trusted-to-identify access control list (TIA). The device is configured to permit the user to perform one or more actions based upon whether the user identity appears as a subject in the first access control list.Type: GrantFiled: April 22, 2008Date of Patent: August 26, 2014Assignee: Motorola Mobility LLCInventors: Mahesh V. Tripunitara, Dean H. Vogler, Patrick Toomey
-
Patent number: 8401244Abstract: Systems and methods for providing secure identity authentication amongst devices using identity information contained therein to facilitate data synchronization amongst the user devices, wherein the identity information in the devices are compared for authentication but not actually transmitted or exposed for unauthorized access to such information and to the devices.Type: GrantFiled: December 21, 2007Date of Patent: March 19, 2013Assignee: General Instrument CorporationInventors: Dean H. Vogler, Douglas A. Kuhlman, Yi Q. Li
-
Publication number: 20110141953Abstract: A method for managing data communication between a communication device (102) and another device (112) in a communication network, comprises providing (500) data for transmission by the communication device (102), and controlling by at least one secure management element (300, 304) operating in a secure environment (218) in the communication device the transmission of the provided data by the communication device so as to manage data transmitted by the communication device. The step of controlling may include at least one of controlling an amount of data transmitted, controlling a time of transmission of data and controlling a periodicity of transmission of data. A communication device and a method of managing data received by a communication device are also described.Type: ApplicationFiled: December 16, 2009Publication date: June 16, 2011Applicant: MOTOROLA, INC.Inventors: Timothy J. Wright, Dean H. Vogler, Joel D. Voss
-
Publication number: 20090276823Abstract: A method and apparatus for modifying a color of an electronics housing (104) based on the device security, authentication, and/or authorization is provided herein. During operation a device (100) will repeatedly gather a current security status and then modify a color or pattern of the housing based on the security status. Because the color of an electronics device indicates the current security, authentication, and/or authorization level, a user of the device can easily determine their security, authentication, and/or authorization level.Type: ApplicationFiled: April 30, 2008Publication date: November 5, 2009Applicant: MOTOROLA, INC.Inventors: Dean H. Vogler, Douglas A. Kuhlman, Yi Q. Li
-
Publication number: 20090265765Abstract: System and methods for managing trust in access control are based on a user identity, in a Universal Plug and Play (UPnP) network. A device has an access control list (ACL), a trusted-to-identify access control list (TIA), and a first TIA management module configured to manage the TIA. A security console is communicatively coupled to the device via the network. The security console has a second TIA management module. The first TIA management module is able to implement an add request from the security console for adding an entry to the TIA. The entry includes a control point identity for a control point communicatively coupled to the device via the network.Type: ApplicationFiled: April 22, 2008Publication date: October 22, 2009Applicant: GENERAL INSTRUMENT CORPORATIONInventors: Dean H. Vogler, Mahesh V. Tripunitara, Patrick Toomey
-
Publication number: 20090265551Abstract: System and methods for access control in a Universal Plug and Play (UPnP) network are based on a user identity. A control point has an identity assertion capability for identifying a user. The control point is configured to declare a value of an attribute associated with the identity assertion capability. A device is communicatively coupled to the control point via the UPnP network. The device has a first access control list and a trusted-to-identify access control list (TIA). The device is configured to permit the user to perform one or more actions based upon whether the user identity appears as a subject in the first access control list.Type: ApplicationFiled: April 22, 2008Publication date: October 22, 2009Applicant: GENERAL INSTRUMENT CORPORATIONInventors: Mahesh V. Tripunitara, Dean H. Vogler, Patrick Toomey
-
Publication number: 20090161919Abstract: Systems and methods for providing secure identity authentication amongst devices using identity information contained therein to facilitate data synchronization amongst the user devices, wherein the identity information in the devices are compared for authentication but not actually transmitted or exposed for unauthorized access to such information and to the devices.Type: ApplicationFiled: December 21, 2007Publication date: June 25, 2009Applicant: GENERAL INSTRUMENT CORPORATIONInventors: Dean H. Vogler, Douglas A. Kuhlman, Yi Q. Li
-
Publication number: 20080313075Abstract: A machine-implemented method of providing dynamic access to network services may include receiving a request from a client for a type of network service, monitoring an amount and type of network service being provided to the client, and receiving incremental payments from the client for the network service being provided as the network service continues to be provided. The method may include dynamically modifying access to the network service for the client based on a set of rules. The rules may be based on one or more of the monitored amount of network service, the type of network service, and the payments received.Type: ApplicationFiled: June 13, 2007Publication date: December 18, 2008Applicant: Motorola, Inc.Inventors: Mahesh V. TRIPUNITARA, Dean H. Vogler
-
Publication number: 20080072066Abstract: During a first time interval, an authentication system produces a fingerprint of a first application, encrypts it and stores the encrypted fingerprint in a memory. In second time interval the authentication system produces a fingerprint of a second application, and retrieves the encrypted fingerprint of the first application from the memory. The encrypted fingerprint of the first application is decrypted to recover the fingerprint of the first application. The second application is authenticated if the fingerprint of the first application is equal to the fingerprint of the second application. The fingerprint may include a hash value of the program of computer instructions of the application. The fingerprint of the first application may be encrypted using an embedded secret key of the authentication system.Type: ApplicationFiled: August 21, 2006Publication date: March 20, 2008Applicant: MOTOROLA, INC.Inventors: Dean H. Vogler, Ronald F. Buskey
-
Publication number: 20040193902Abstract: A preferred technique includes a digital content rendering device (100) and a method used in the device, including acquiring (305) an encrypted digital content (105), acquiring (305) a set of rules (110) associated with the encrypted digital content that specify permissions involving at least one level of rendering of the digital content that are based on a comparison of a set of specified locations with a sensed location, acquiring (305) an encrypted content key (120), extracting (315) the digital content, determining (330) a sensed location of the content rendering device, performing comparisons (335) of the sensed location to each of the set of specified locations; and determining (340) a level of rendering of the digital content in accordance with the set of rules, based on results of the comparisons.Type: ApplicationFiled: March 31, 2003Publication date: September 30, 2004Inventors: Dean H. Vogler, Ephrem A. Chemaly, Ezzat A. Dabbish, Thomas S. Messerges, Robert A. Patzer
-
Patent number: 6393127Abstract: Encryption keys are transferred by obtaining a public and private key pair (42, 65) from a source device (21, 61). The public key is transmitted (42, 65) from the source device (43, 66) to a target device (23, 62). The target (23, 62) obtains a traffic key (44, 67) stored within the target device (23, 62). The traffic key is encrypted (45, 68) within the target device using the public key. The encrypted traffic key is transmitted to the source device (46, 69) where it is decrypted (47, 70) using the private key. The replacement encryption key(s) is(are) encrypted using the traffic key by the source device (48, 71) forming an encrypted replacement key message which contains a target slot identification for each of the replacement encryption keys. The encrypted replacement key message is transmitted to the target device (49, 72) where the replacement encryption key(s) is(are) recovered (50, 73). The replacement encryption key(s) is(are) then stored at the target device in an identified target slot (51).Type: GrantFiled: March 2, 1998Date of Patent: May 21, 2002Assignee: Motorola, Inc.Inventor: Dean H. Vogler
-
Publication number: 20010055395Abstract: Encryption keys are transferred by obtaining a public and private key pair (42, 65) from a source device (21, 61). The public key is transmitted (42, 65) from the source device (43, 66) to a target device (23, 62). The target (23, 62) obtains a traffic key (44, 67) stored within the target device (23, 62). The traffic key is encrypted (45, 68) within the target device using the public key. The encrypted traffic key is transmitted to the source device (46, 69) where it is decrypted (47, 70) using the private key. The replacement encryption key(s) is(are) encrypted using the traffic key by the source device (48, 71) forming an encrypted replacement key message which contains a target slot identification for each of the replacement encryption keys. The encrypted replacement key message is transmitted to the target device (49, 72) where the replacement encryption key(s) is(are) recovered (50, 73). The replacement encryption key(s) is(are) then stored at the target device in an identified target slot (51).Type: ApplicationFiled: March 2, 1998Publication date: December 27, 2001Inventor: DEAN H. VOGLER
-
Patent number: 6223291Abstract: A wireless electronic commerce system (10) comprising a wireless gateway (18) to a wireless network (19) with which a wireless device (11) having a unique client identifier (ID) is capable of communicating. A server (15) or servers (15 and 16) is/are coupleable to the wireless gateway, delivering content items (e.g. software products) to the wireless device (11) and maintaining digital content certificates for content items and digital license certificates for licenses for the content items. The server maintains, for each wireless client associated with the system, a record of licenses for that client and a record of content items associated with each license.Type: GrantFiled: March 26, 1999Date of Patent: April 24, 2001Assignee: Motorola, Inc.Inventors: Larry C. Puhl, Dean H. Vogler, Ezzat A. Dabbish