Patents by Inventor Eric B. Jul

Eric B. Jul has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9894530
    Abstract: Methods and network nodes of a wireless telecommunications system are disclosed. One method of controlling transmissions with a base station of a wireless telecommunications system comprises the steps of: determining a set of neighboring base stations, each base station in the set of neighboring base stations utilizing an identical carrier and scrambling code to support transmissions with that base station; and allocating base stations in the set of neighboring base stations different spreading codes for transmissions with those base stations. By allocating each base station in the set of base stations sharing the same carrier and scrambling code different spreading codes, interference in transmissions between the base stations can be controlled.
    Type: Grant
    Filed: November 2, 2011
    Date of Patent: February 13, 2018
    Assignee: Alcatel Lucent
    Inventors: Eric B. Jul, Holger Claussen
  • Patent number: 9674153
    Abstract: A secure data processing apparatus and method are disclosed. The secure data processing apparatus is operable to securely process user data provided by a user and includes a trusted domain having a trusted bus; a trusted domain controller coupling the trusted bus with an untrusted bus of an untrusted domain, the trusted domain controller being operable to ensure that encrypted incoming user data received over the untrusted bus is decrypted and provided over the trusted bus as the incoming user data and to ensure that outgoing user data is encrypted and provided over the untrusted bus as encrypted outgoing data. The trusted domain controller that only encrypted data is provided in the untrusted domain reducing the chance of the data being compromised. The trusted domain controller ensures that access to the unencrypted data within the trusted domain can be avoided. Confidentiality of the data can be assured without performance shortfalls.
    Type: Grant
    Filed: May 31, 2013
    Date of Patent: June 6, 2017
    Assignee: Alcatel Lucent
    Inventors: Tommaso Cucinotta, Davide Cherubini, Eric B. Jul
  • Patent number: 9179378
    Abstract: A method is provided of selecting carrier frequency band of a femtocell base station that provides a femtocell and resides within a macrocell provided by a macrocell base station. The method comprises: the femtocell base station operating at the carrier frequency band of the macrocell, detecting that a user terminal connected to the macrocell base station at an carrier frequency band of the macrocell is in or close to the femtocell, and the femtocell base station switching its carrier frequency band to one not allocated to the macrocell.
    Type: Grant
    Filed: August 11, 2011
    Date of Patent: November 3, 2015
    Assignee: Alcatel Lucent
    Inventors: Eric B. Jul, Holger Claussen
  • Publication number: 20150294117
    Abstract: A technique for secure data processing includes a trusted domain comprising a trusted bus coupled with a trusted data processing apparatus adapted to process incoming user data received over the trusted bus and to generate outgoing user data. A trusted domain controller couples the trusted bus with an untrusted bus of an untrusted domain. The trusted domain controller ensures that encrypted incoming user data received over the untrusted bus is decrypted and provided over the trusted bus, and ensures that outgoing user data is encrypted and provided over the untrusted bus. A data store access controller couples the trusted domain controller and the trusted data processing apparatus with a memory bus of a data store. The data store access controller restricts successful requests to use the data store received from the trusted domain controller and the trusted data processing apparatus to those addressed to a trusted region of the data store.
    Type: Application
    Filed: May 31, 2013
    Publication date: October 15, 2015
    Inventors: Tommaso Cucinotta, Davide Cherubini, Eric B. Jul
  • Publication number: 20150089589
    Abstract: A secure data processing apparatus and a method are disclosed. The secure data processing apparatus is operable to securely process user data provided by a user and includes a trusted domain having a trusted bus; a trusted domain controller coupling the trusted bus with an untrusted bus of an untrusted domain, the trusted domain controller being operable to ensure that encrypted incoming user data received over the untrusted bus is decrypted and provided over the trusted bus as the incoming user data and to ensure that outgoing user data is encrypted and provided over the untrusted bus as encrypted outgoing data. The trusted domain controller that only encrypted data is provided in the untrusted domain reducing the chance of the data being compromised. The trusted domain controller ensures that access to the unencrypted data within the trusted domain can be avoided. The confidentiality of the data can be assured without performance shortfalls.
    Type: Application
    Filed: May 31, 2013
    Publication date: March 26, 2015
    Inventors: Tommaso Cucinotta, Davide Cherubini, Eric B. Jul
  • Publication number: 20150007290
    Abstract: A stimuli-response-driven authentication mechanism is implemented in a communication system including a user platform and a trusted external platform operably connected to an authentication platform. The authentication mechanism is implemented in an initialization phase and authentication phase. In the initialization phase, a user is exposed to a first set of external stimuli (e.g., image data) and data characterizing the user's physiological responses are obtained (in a high-security implementation, by the trusted external platform). In the authentication phase, the user is exposed to a second set of external stimuli (e.g., a subset of the first set) and data characterizing the user's physiological responses are obtained, and instances of the authentication data are compared to corresponding instances of the initialization data to authenticate the user.
    Type: Application
    Filed: June 27, 2013
    Publication date: January 1, 2015
    Inventors: Franck Franck, Eric B. Jul
  • Publication number: 20140152540
    Abstract: Instead of controlling a computer by means of a hardware controller (e.g., keyboard, mouse, remote control, etc.), the present application provides systems and methods for a user to control a computer by performing certain body movements or postures (herein referred to as “gestures”) that are recognized by the computer and translated into computer commands.
    Type: Application
    Filed: December 4, 2012
    Publication date: June 5, 2014
    Inventors: Franck Franck, Eric B. Jul
  • Publication number: 20140082364
    Abstract: An exemplary confidential computing system includes a computing device. A cryptographic processing unit is associated with the computing device. The cryptographic processing unit is configured to use a first user key for encrypting a communication to the first user that includes information from the computing device. The cryptographic processing unit is also configured to use the first user key for decrypting any first user information received from the first user device before allowing the received first user information to be available to the computing device. The processing unit is also configured to use at least one other key received from the first user device for processing any other information received from at least one other source.
    Type: Application
    Filed: September 18, 2012
    Publication date: March 20, 2014
    Inventors: Tommaso Cucinotta, Davide Cherubini, Eric B. Jul
  • Publication number: 20130294364
    Abstract: Methods and network nodes of a wireless telecommunications system are disclosed. One method of controlling transmissions with a base station of a wireless telecommunications system comprises the steps of: determining a set of neighbouring base stations, each base station in the set of neighbouring base stations utilising an identical carrier and scrambling code to support transmissions with that base station; and allocating base stations in the set of neighbouring base stations different spreading codes for transmissions with those base stations. By allocating each base station in the set of base stations sharing the same carrier and scrambling code different spreading codes, interference in transmissions between the base stations can be controlled.
    Type: Application
    Filed: November 2, 2011
    Publication date: November 7, 2013
    Applicant: ALCATEL LUCENT
    Inventors: Eric B. Jul, Holger Claussen
  • Publication number: 20130225179
    Abstract: A method is provided of selecting carrier frequency band of a femtocell base station that provides a femtocell and resides within a macrocell provided by a macrocell base station. The method comprises: the femtocell base station operating at the carrier frequency band of the macrocell, detecting that a user terminal connected to the macrocell base station at an carrier frequency band of the macrocell is in or close to the femtocell, and the femtocell base station switching its carrier frequency band to one not allocated to the macrocell.
    Type: Application
    Filed: August 11, 2011
    Publication date: August 29, 2013
    Applicant: ALCATEL LUCENT
    Inventors: Eric B. Jul, Holger Claussen