Patents by Inventor Eric B. Jul
Eric B. Jul has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9894530Abstract: Methods and network nodes of a wireless telecommunications system are disclosed. One method of controlling transmissions with a base station of a wireless telecommunications system comprises the steps of: determining a set of neighboring base stations, each base station in the set of neighboring base stations utilizing an identical carrier and scrambling code to support transmissions with that base station; and allocating base stations in the set of neighboring base stations different spreading codes for transmissions with those base stations. By allocating each base station in the set of base stations sharing the same carrier and scrambling code different spreading codes, interference in transmissions between the base stations can be controlled.Type: GrantFiled: November 2, 2011Date of Patent: February 13, 2018Assignee: Alcatel LucentInventors: Eric B. Jul, Holger Claussen
-
Patent number: 9674153Abstract: A secure data processing apparatus and method are disclosed. The secure data processing apparatus is operable to securely process user data provided by a user and includes a trusted domain having a trusted bus; a trusted domain controller coupling the trusted bus with an untrusted bus of an untrusted domain, the trusted domain controller being operable to ensure that encrypted incoming user data received over the untrusted bus is decrypted and provided over the trusted bus as the incoming user data and to ensure that outgoing user data is encrypted and provided over the untrusted bus as encrypted outgoing data. The trusted domain controller that only encrypted data is provided in the untrusted domain reducing the chance of the data being compromised. The trusted domain controller ensures that access to the unencrypted data within the trusted domain can be avoided. Confidentiality of the data can be assured without performance shortfalls.Type: GrantFiled: May 31, 2013Date of Patent: June 6, 2017Assignee: Alcatel LucentInventors: Tommaso Cucinotta, Davide Cherubini, Eric B. Jul
-
Femtocell base station, and a method of selecting carrier frequency band of a femtocell base station
Patent number: 9179378Abstract: A method is provided of selecting carrier frequency band of a femtocell base station that provides a femtocell and resides within a macrocell provided by a macrocell base station. The method comprises: the femtocell base station operating at the carrier frequency band of the macrocell, detecting that a user terminal connected to the macrocell base station at an carrier frequency band of the macrocell is in or close to the femtocell, and the femtocell base station switching its carrier frequency band to one not allocated to the macrocell.Type: GrantFiled: August 11, 2011Date of Patent: November 3, 2015Assignee: Alcatel LucentInventors: Eric B. Jul, Holger Claussen -
Publication number: 20150294117Abstract: A technique for secure data processing includes a trusted domain comprising a trusted bus coupled with a trusted data processing apparatus adapted to process incoming user data received over the trusted bus and to generate outgoing user data. A trusted domain controller couples the trusted bus with an untrusted bus of an untrusted domain. The trusted domain controller ensures that encrypted incoming user data received over the untrusted bus is decrypted and provided over the trusted bus, and ensures that outgoing user data is encrypted and provided over the untrusted bus. A data store access controller couples the trusted domain controller and the trusted data processing apparatus with a memory bus of a data store. The data store access controller restricts successful requests to use the data store received from the trusted domain controller and the trusted data processing apparatus to those addressed to a trusted region of the data store.Type: ApplicationFiled: May 31, 2013Publication date: October 15, 2015Inventors: Tommaso Cucinotta, Davide Cherubini, Eric B. Jul
-
Publication number: 20150089589Abstract: A secure data processing apparatus and a method are disclosed. The secure data processing apparatus is operable to securely process user data provided by a user and includes a trusted domain having a trusted bus; a trusted domain controller coupling the trusted bus with an untrusted bus of an untrusted domain, the trusted domain controller being operable to ensure that encrypted incoming user data received over the untrusted bus is decrypted and provided over the trusted bus as the incoming user data and to ensure that outgoing user data is encrypted and provided over the untrusted bus as encrypted outgoing data. The trusted domain controller that only encrypted data is provided in the untrusted domain reducing the chance of the data being compromised. The trusted domain controller ensures that access to the unencrypted data within the trusted domain can be avoided. The confidentiality of the data can be assured without performance shortfalls.Type: ApplicationFiled: May 31, 2013Publication date: March 26, 2015Inventors: Tommaso Cucinotta, Davide Cherubini, Eric B. Jul
-
Publication number: 20150007290Abstract: A stimuli-response-driven authentication mechanism is implemented in a communication system including a user platform and a trusted external platform operably connected to an authentication platform. The authentication mechanism is implemented in an initialization phase and authentication phase. In the initialization phase, a user is exposed to a first set of external stimuli (e.g., image data) and data characterizing the user's physiological responses are obtained (in a high-security implementation, by the trusted external platform). In the authentication phase, the user is exposed to a second set of external stimuli (e.g., a subset of the first set) and data characterizing the user's physiological responses are obtained, and instances of the authentication data are compared to corresponding instances of the initialization data to authenticate the user.Type: ApplicationFiled: June 27, 2013Publication date: January 1, 2015Inventors: Franck Franck, Eric B. Jul
-
Publication number: 20140152540Abstract: Instead of controlling a computer by means of a hardware controller (e.g., keyboard, mouse, remote control, etc.), the present application provides systems and methods for a user to control a computer by performing certain body movements or postures (herein referred to as “gestures”) that are recognized by the computer and translated into computer commands.Type: ApplicationFiled: December 4, 2012Publication date: June 5, 2014Inventors: Franck Franck, Eric B. Jul
-
Publication number: 20140082364Abstract: An exemplary confidential computing system includes a computing device. A cryptographic processing unit is associated with the computing device. The cryptographic processing unit is configured to use a first user key for encrypting a communication to the first user that includes information from the computing device. The cryptographic processing unit is also configured to use the first user key for decrypting any first user information received from the first user device before allowing the received first user information to be available to the computing device. The processing unit is also configured to use at least one other key received from the first user device for processing any other information received from at least one other source.Type: ApplicationFiled: September 18, 2012Publication date: March 20, 2014Inventors: Tommaso Cucinotta, Davide Cherubini, Eric B. Jul
-
Publication number: 20130294364Abstract: Methods and network nodes of a wireless telecommunications system are disclosed. One method of controlling transmissions with a base station of a wireless telecommunications system comprises the steps of: determining a set of neighbouring base stations, each base station in the set of neighbouring base stations utilising an identical carrier and scrambling code to support transmissions with that base station; and allocating base stations in the set of neighbouring base stations different spreading codes for transmissions with those base stations. By allocating each base station in the set of base stations sharing the same carrier and scrambling code different spreading codes, interference in transmissions between the base stations can be controlled.Type: ApplicationFiled: November 2, 2011Publication date: November 7, 2013Applicant: ALCATEL LUCENTInventors: Eric B. Jul, Holger Claussen
-
FEMTOCELL BASE STATION, AND A METHOD OF SELECTING CARRIER FREQUENCY BAND OF A FEMTOCELL BASE STATION
Publication number: 20130225179Abstract: A method is provided of selecting carrier frequency band of a femtocell base station that provides a femtocell and resides within a macrocell provided by a macrocell base station. The method comprises: the femtocell base station operating at the carrier frequency band of the macrocell, detecting that a user terminal connected to the macrocell base station at an carrier frequency band of the macrocell is in or close to the femtocell, and the femtocell base station switching its carrier frequency band to one not allocated to the macrocell.Type: ApplicationFiled: August 11, 2011Publication date: August 29, 2013Applicant: ALCATEL LUCENTInventors: Eric B. Jul, Holger Claussen