Patents by Inventor Eric J. Sprunk
Eric J. Sprunk has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8166292Abstract: A system to transmit a set of programs from a transmitter to a receiver is used to accommodate different levels of security used for each program. When a high level of security is necessary for transmitting or receiving a program the transmitter and/or receiver is operable to accommodate that level of security. Thus, both transmitters and receivers are operable to be reconfigured to encrypt or decrypt, respectively, at different levels. Accordingly, differing amounts of programs can be transmitted or received based on the resource requirements needed at any level of security. Consequently, a high level of encryption/decryption requires more resources and allows the processing of fewer services, while a lower level of encryption/decryption allows more services to be transmitted/received.Type: GrantFiled: July 10, 2009Date of Patent: April 24, 2012Assignee: General Instrument CorporationInventors: Xin Qiu, Eric J. Sprunk
-
Publication number: 20110258685Abstract: A method for updating network-enabled devices with new identity data includes generating a plurality of new identity data records and loading the new identity data records onto an update server. A request is received at the update server for new identity data from at least one network-enabled device having a previously assigned identity linked to an identifier. The previously assigned identifier is linked to a new identifier that is linked to one of the new identity data records. One or more new identity data records are securely delivered to the network-enabled device.Type: ApplicationFiled: April 15, 2011Publication date: October 20, 2011Applicant: GENERAL INSTRUMENT CORPORATIONInventors: Xin Qiu, Alexander Medvinsky, Stuart P. Moskovics, Jason A. Pasion, Eric J. Sprunk, Fan Wang, Ting Yao
-
Publication number: 20110161661Abstract: A method is provided for enhancing security of a communication session between first and second endpoints which employs a key management protocol. The method includes sending a first message to a first end point over a communications network requesting a secure communication session therewith. The message includes an identity of a second end point requesting the authenticated communication session. A digital certificate is received from the first endpoint over the communications network. The digital certificate is issued by a certifying source verifying information contained in the digital certificate. The digital certificate includes a plurality of fields, one or more of which are transformed in accordance with a transformation algorithm. A reverse transform is applied to the one or more transformed fields to obtain the one or more fields. The digital certificate is validated and a second message is sent to the first endpoint indicating that validation is complete.Type: ApplicationFiled: December 31, 2009Publication date: June 30, 2011Applicant: GENERAL INSTRUMENT CORPORATIONInventors: Alexander Medvinsky, Tat Keung Chan, Eric J. Sprunk
-
Patent number: 7929483Abstract: The present invention discloses a system and method for providing a secured system time reference to a subscriber device, e.g., a set top box or a receiver. In one embodiment, the system time reference is provided in a secure system time message that is broadcasted to a plurality of subscriber devices. Each subscriber device has a security device or software application that is capable of determining whether the received system time reference is legitimate. If the system time reference is determined to be legitimate, a local time reference is synchronized with said received system time reference.Type: GrantFiled: December 30, 2004Date of Patent: April 19, 2011Assignee: General Instrument CorporationInventors: Bridget D. Kimball, Michael T. Habrat, John I. Okimoto, Douglas M. Petty, Eric J. Sprunk, Lawrence W. Tang
-
Patent number: 7929701Abstract: Multiple public/private key pairs of varying levels of security are used to provide a high level of security while still allowing fast processing of encrypted information. The lower-security level includes keys that are small in length, that are changed relatively often, and that require less or fewer resources to implement their functions. When it is required to change key pairs of low security, a key pair at a higher security level (i.e., longer length keys) than the lower-security level keys is used to transfer the new lower-security public keys to devices using those keys. The higher-security keys can, in turn, be changed at a frequency lower than the lower-security keys. The higher-security keys require a higher level of resources to perform their coding operations.Type: GrantFiled: January 28, 2000Date of Patent: April 19, 2011Assignee: General Instrument CorporationInventors: Eric J. Sprunk, Paul Moroney
-
Patent number: 7877600Abstract: An apparatus and method for providing at least one root certificate are disclosed. Specifically, a plurality of root certificates is received and stored. Afterwards, a request is received from a first endpoint device for a desired root certificate, where the desired root certificate is used by the first endpoint device to verify an identity of a second endpoint device. Furthermore, the first endpoint device and the second endpoint device are associated with different certificate hierarchies. The desired root certificate is then sent to at least the first endpoint device.Type: GrantFiled: December 27, 2006Date of Patent: January 25, 2011Assignee: General Instrument CorporationInventors: Xin Qiu, Petr Peterka, Eric J. Sprunk
-
Patent number: 7764793Abstract: According to one embodiment of the invention a system is utilized to leverage the security arrangement between a first and second device to establish a secure link between the first device and a third device. One embodiment of the invention is particularly suitable for loading security data on a set top box, such as that utilized in the cable television industry.Type: GrantFiled: October 20, 2005Date of Patent: July 27, 2010Assignee: General Instrument CorporationInventors: Xin Qiu, Bridget D. Kimball, Eric J. Sprunk, Lawrence W. Tang
-
Patent number: 7672452Abstract: According to the invention, a circuit that is capable of automated scan testing is disclosed. Included in the circuit are a cryptographic engine, a digital circuit, an input pin, and an output pin. The cryptographic engine capable of performing at least one of encryption and decryption of one or more digital signals. The digital circuit includes combinatorial logic and a number of memory cells. The memory cells have scan inputs connected serially in a scan chain. The input pin and output pin are coupled to the scan chain. At least one of the input pin and the output pin carries at least some cipher text data of the scan chain.Type: GrantFiled: May 1, 2003Date of Patent: March 2, 2010Assignee: General Instrument CorporationInventors: Madhusudhan R. Penugonda, Michael W. Johnson, Eric J. Sprunk, An Tonthat
-
Patent number: 7660986Abstract: A system to change security levels is used to change the level of security used in a secured processing system. The system uses a status indicator to designate the security level being implemented. The security level can be upgraded to allow a higher level of security to be implemented with relative ease. However, in order to change from a higher level of security to a lower level of security, an authorization code is utilized to confirm that the change in security is authorized.Type: GrantFiled: May 23, 2000Date of Patent: February 9, 2010Assignee: General Instrument CorporationInventors: Xin Qiu, Eric J. Sprunk, Paul Moroney
-
Publication number: 20090323954Abstract: A secure Internet Protocol (IP) telephony system, apparatus, and methods are disclosed. Communications over an IP telephony system can be secured by securing communications to and from a Cable Telephony Adapter (CTA). The system can include one or more CTAs, network servers, servers configured as signaling controllers, key distribution centers (KDC), and can include gateways that couple the IP telephony system to a Public Switched Telephone Network (PSTN). Each CTA can be configured as secure hardware and can be configured with multiple encryption keys that are used to communicate signaling or bearer channel communications. The KDC can be configured to periodically distribute symmetric encryption keys to secure communications between devices that have been provisioned to operate in the system and signaling controllers.Type: ApplicationFiled: June 23, 2009Publication date: December 31, 2009Applicant: GENERAL INSTRUMENT CORPORATIONInventors: Eric J. Sprunk, Paul Moroney, Alexander Medvinsky, Steven E. Anderson, Jonathan A. Fellows
-
Publication number: 20090274295Abstract: A system to transmit a set of programs from a transmitter to a receiver is used to accommodate different levels of security used for each program. When a high level of security is necessary for transmitting or receiving a program the transmitter and/or receiver is operable to accommodate that level of security. Thus, both transmitters and receivers are operable to be reconfigured to encrypt or decrypt, respectively, at different levels. Accordingly, differing amounts of programs can be transmitted or received based on the resource requirements needed at any level of security. Consequently, a high level of encryption/decryption requires more resources and allows the processing of fewer services, while a lower level of encryption/decryption allows more services to be transmitted/received.Type: ApplicationFiled: July 10, 2009Publication date: November 5, 2009Applicant: GENERAL INSTRUMENT CORPORATIONInventors: Xin Qiu, Eric J. Sprunk
-
Patent number: 7607022Abstract: A system to transmit a set of programs from a transmitter to a receiver is used to accommodate different levels of security used for each program. When a high level of security is necessary for transmitting or receiving a program the transmitter and/or receiver is operable to accommodate that level of security. Thus, both transmitters and receivers are operable to be reconfigured to encrypt or decrypt, respectively, at different levels. Accordingly, differing amounts of programs can be transmitted or received based on the resource requirements needed at any level of security. Consequently, a high level of encryption/decryption requires more resources and allows the processing of fewer services, while a lower level of encryption/decryption allows more services to be transmitted/received.Type: GrantFiled: June 6, 2000Date of Patent: October 20, 2009Assignee: General Instrument CorporationInventors: Xin Qiu, Eric J. Sprunk
-
Publication number: 20090202075Abstract: A method and apparatus is provided for decrypting an encrypted transport stream, comprising. The method includes receiving the encrypted transport stream over a content delivery network. The encrypted transport stream is encrypted using a first control word that serves as an encryption/decryption key. A variable control word is received over the content delivery network. The variable control word is mathematically constrained to create a second control word. The encrypted transport stream is decrypted using the second control word if the second control word is the same as the first control word.Type: ApplicationFiled: December 30, 2008Publication date: August 13, 2009Applicant: General Instrument CorporationInventors: Lawrence D. Vince, Eric J. Sprunk
-
Patent number: 7568223Abstract: A secure Internet Protocol (IP) telephony system, apparatus, and methods are disclosed. Communications over an IP telephony system can be secured by securing communications to and from a Cable Telephony Adapter (CTA). The system can include one or more CTAs, network servers, servers configured as signaling controllers, key distribution centers (KDC), and can include gateways that couple the IP telephony system to a Public Switched Telephone Network (PSTN). Each CTA can be configured as secure hardware and can be configured with multiple encryption keys that are used to communicate signaling or bearer channel communications. The KDC can be configured to periodically distribute symmetric encryption keys to secure communications between devices that have been provisioned to operate in the system and signaling controllers.Type: GrantFiled: July 15, 2004Date of Patent: July 28, 2009Assignee: General Instrumental CorporationInventors: Eric J. Sprunk, Paul Moroney, Alexander Medvinsky, Steven E. Anderson, Jonathan A. Fellows
-
Patent number: 7486792Abstract: According to the invention, a method for protecting digital television from unauthorized digital receivers within a population of digital receivers is disclosed. Each digital receiver in the population has a unique identifier. In one step, provisioning information is received from a subset of the population of digital receivers indicating that the subset is potentially within range to receive digital television from a broadcaster. First decryption information is distributed to the subset of the population of digital receivers. The first decryption information allows for potentially decrypting a plurality of programs coextensively in time. The unauthorized digital receivers are cryptographically excluded from using the first decryption information. A first program is encrypted using a first method that is cryptographically related to second decryption information. The first program is sent. The second decryption information is distributed and cryptographically secured with the first decryption information.Type: GrantFiled: August 21, 2003Date of Patent: February 3, 2009Assignee: General Instrument CorporationInventor: Eric J. Sprunk
-
Patent number: 7450717Abstract: Existing key encryption approaches are extended by using overlapping portions of encrypted information. Another provision inserts one or more bits of data to ensure correct encryption/decryption. The inserted data can also be used for authentication.Type: GrantFiled: June 7, 2000Date of Patent: November 11, 2008Assignee: General Instruments CorporationInventors: Eric J. Sprunk, Xin Qiu
-
Publication number: 20080162928Abstract: An apparatus and method for providing at least one root certificate are disclosed. Specifically, a plurality of root certificates is received and stored. Afterwards, a request is received from a first endpoint device for a desired root certificate, where the desired root certificate is used by the first endpoint device to verify an identity of a second endpoint device. Furthermore, the first endpoint device and the second endpoint device are associated with different certificate hierarchies. The desired root certificate is then sent to at least the first endpoint device.Type: ApplicationFiled: December 27, 2006Publication date: July 3, 2008Applicant: GENERAL INSTRUMENT CORPORATIONInventors: Xin Qiu, Petr Peterka, Eric J. Sprunk
-
Patent number: 7305555Abstract: A system is described for uniquely mating components of a communication network such as a smartcard and a set-top box. When mated, the smartcard and set-top box are tied together and have a single identity. Further, the smartcard operates properly only when inserted into an authorized set-top box. Exchanges of information between both components are secured by encryption and authentication to guard against piracy of the exchanged information. The system provides the same authentication key to the set-top box and the smartcard. This key is used for authenticating communication between the set-top box and the smartcard. First, the authentication key is encrypted by a set-top box mating key. The set-top box employs this mating key to decrypt the authentication key. After it is derived, the authentication key is stored in the set-top box's memory. Further, the same authentication key is encrypted by a smartcard mating key.Type: GrantFiled: March 27, 2002Date of Patent: December 4, 2007Assignee: General Instrument CorporationInventors: John I. Okimoto, Eric J. Sprunk, Lawrence W. Tang, Annie On-yee Chen, Bridget Kimball, Douglas Petty
-
Patent number: 7058609Abstract: A system is described for allowing “pay by time” purchasing of digital video programming. The system provides for a variable or metered approach. A user can purchase a fraction of a program for a price different from that required for purchasing the entire program. Records of the user's viewing can be created to record, e.g., when a user started receiving a program, how long the user received a program, and when the user stopped receiving a program.Type: GrantFiled: April 2, 2002Date of Patent: June 6, 2006Assignee: General Instrument CorporationInventors: Paul Moroney, Eric J. Sprunk
-
Patent number: 6961427Abstract: Methods and apparatus for the generation of a cryptographic one way function (a key or keystream generator) for use in encrypting or decrypting binary data. A non-linear key or keystream generation algorithm using multiple feedback shift registers is provided. The feedback shift registers may be constructed utilizing an advanced mathematical construct called an extended Galois Field GF(2m). The key or keystream is generated as a non-linear function of the outputs of the multiple feedback shift registers, which may be a combination of static feedback shift registers and dynamic feedback shift registers. Dense primitive polynomials with many coefficients may be used to produce a cryptographically robust keystream for use as an encryption or decryption key.Type: GrantFiled: November 21, 2000Date of Patent: November 1, 2005Assignee: General Instrument CorporationInventors: Xin Qiu, Eric J. Sprunk