Patents by Inventor Eric J. Sprunk

Eric J. Sprunk has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8166292
    Abstract: A system to transmit a set of programs from a transmitter to a receiver is used to accommodate different levels of security used for each program. When a high level of security is necessary for transmitting or receiving a program the transmitter and/or receiver is operable to accommodate that level of security. Thus, both transmitters and receivers are operable to be reconfigured to encrypt or decrypt, respectively, at different levels. Accordingly, differing amounts of programs can be transmitted or received based on the resource requirements needed at any level of security. Consequently, a high level of encryption/decryption requires more resources and allows the processing of fewer services, while a lower level of encryption/decryption allows more services to be transmitted/received.
    Type: Grant
    Filed: July 10, 2009
    Date of Patent: April 24, 2012
    Assignee: General Instrument Corporation
    Inventors: Xin Qiu, Eric J. Sprunk
  • Publication number: 20110258685
    Abstract: A method for updating network-enabled devices with new identity data includes generating a plurality of new identity data records and loading the new identity data records onto an update server. A request is received at the update server for new identity data from at least one network-enabled device having a previously assigned identity linked to an identifier. The previously assigned identifier is linked to a new identifier that is linked to one of the new identity data records. One or more new identity data records are securely delivered to the network-enabled device.
    Type: Application
    Filed: April 15, 2011
    Publication date: October 20, 2011
    Applicant: GENERAL INSTRUMENT CORPORATION
    Inventors: Xin Qiu, Alexander Medvinsky, Stuart P. Moskovics, Jason A. Pasion, Eric J. Sprunk, Fan Wang, Ting Yao
  • Publication number: 20110161661
    Abstract: A method is provided for enhancing security of a communication session between first and second endpoints which employs a key management protocol. The method includes sending a first message to a first end point over a communications network requesting a secure communication session therewith. The message includes an identity of a second end point requesting the authenticated communication session. A digital certificate is received from the first endpoint over the communications network. The digital certificate is issued by a certifying source verifying information contained in the digital certificate. The digital certificate includes a plurality of fields, one or more of which are transformed in accordance with a transformation algorithm. A reverse transform is applied to the one or more transformed fields to obtain the one or more fields. The digital certificate is validated and a second message is sent to the first endpoint indicating that validation is complete.
    Type: Application
    Filed: December 31, 2009
    Publication date: June 30, 2011
    Applicant: GENERAL INSTRUMENT CORPORATION
    Inventors: Alexander Medvinsky, Tat Keung Chan, Eric J. Sprunk
  • Patent number: 7929483
    Abstract: The present invention discloses a system and method for providing a secured system time reference to a subscriber device, e.g., a set top box or a receiver. In one embodiment, the system time reference is provided in a secure system time message that is broadcasted to a plurality of subscriber devices. Each subscriber device has a security device or software application that is capable of determining whether the received system time reference is legitimate. If the system time reference is determined to be legitimate, a local time reference is synchronized with said received system time reference.
    Type: Grant
    Filed: December 30, 2004
    Date of Patent: April 19, 2011
    Assignee: General Instrument Corporation
    Inventors: Bridget D. Kimball, Michael T. Habrat, John I. Okimoto, Douglas M. Petty, Eric J. Sprunk, Lawrence W. Tang
  • Patent number: 7929701
    Abstract: Multiple public/private key pairs of varying levels of security are used to provide a high level of security while still allowing fast processing of encrypted information. The lower-security level includes keys that are small in length, that are changed relatively often, and that require less or fewer resources to implement their functions. When it is required to change key pairs of low security, a key pair at a higher security level (i.e., longer length keys) than the lower-security level keys is used to transfer the new lower-security public keys to devices using those keys. The higher-security keys can, in turn, be changed at a frequency lower than the lower-security keys. The higher-security keys require a higher level of resources to perform their coding operations.
    Type: Grant
    Filed: January 28, 2000
    Date of Patent: April 19, 2011
    Assignee: General Instrument Corporation
    Inventors: Eric J. Sprunk, Paul Moroney
  • Patent number: 7877600
    Abstract: An apparatus and method for providing at least one root certificate are disclosed. Specifically, a plurality of root certificates is received and stored. Afterwards, a request is received from a first endpoint device for a desired root certificate, where the desired root certificate is used by the first endpoint device to verify an identity of a second endpoint device. Furthermore, the first endpoint device and the second endpoint device are associated with different certificate hierarchies. The desired root certificate is then sent to at least the first endpoint device.
    Type: Grant
    Filed: December 27, 2006
    Date of Patent: January 25, 2011
    Assignee: General Instrument Corporation
    Inventors: Xin Qiu, Petr Peterka, Eric J. Sprunk
  • Patent number: 7764793
    Abstract: According to one embodiment of the invention a system is utilized to leverage the security arrangement between a first and second device to establish a secure link between the first device and a third device. One embodiment of the invention is particularly suitable for loading security data on a set top box, such as that utilized in the cable television industry.
    Type: Grant
    Filed: October 20, 2005
    Date of Patent: July 27, 2010
    Assignee: General Instrument Corporation
    Inventors: Xin Qiu, Bridget D. Kimball, Eric J. Sprunk, Lawrence W. Tang
  • Patent number: 7672452
    Abstract: According to the invention, a circuit that is capable of automated scan testing is disclosed. Included in the circuit are a cryptographic engine, a digital circuit, an input pin, and an output pin. The cryptographic engine capable of performing at least one of encryption and decryption of one or more digital signals. The digital circuit includes combinatorial logic and a number of memory cells. The memory cells have scan inputs connected serially in a scan chain. The input pin and output pin are coupled to the scan chain. At least one of the input pin and the output pin carries at least some cipher text data of the scan chain.
    Type: Grant
    Filed: May 1, 2003
    Date of Patent: March 2, 2010
    Assignee: General Instrument Corporation
    Inventors: Madhusudhan R. Penugonda, Michael W. Johnson, Eric J. Sprunk, An Tonthat
  • Patent number: 7660986
    Abstract: A system to change security levels is used to change the level of security used in a secured processing system. The system uses a status indicator to designate the security level being implemented. The security level can be upgraded to allow a higher level of security to be implemented with relative ease. However, in order to change from a higher level of security to a lower level of security, an authorization code is utilized to confirm that the change in security is authorized.
    Type: Grant
    Filed: May 23, 2000
    Date of Patent: February 9, 2010
    Assignee: General Instrument Corporation
    Inventors: Xin Qiu, Eric J. Sprunk, Paul Moroney
  • Publication number: 20090323954
    Abstract: A secure Internet Protocol (IP) telephony system, apparatus, and methods are disclosed. Communications over an IP telephony system can be secured by securing communications to and from a Cable Telephony Adapter (CTA). The system can include one or more CTAs, network servers, servers configured as signaling controllers, key distribution centers (KDC), and can include gateways that couple the IP telephony system to a Public Switched Telephone Network (PSTN). Each CTA can be configured as secure hardware and can be configured with multiple encryption keys that are used to communicate signaling or bearer channel communications. The KDC can be configured to periodically distribute symmetric encryption keys to secure communications between devices that have been provisioned to operate in the system and signaling controllers.
    Type: Application
    Filed: June 23, 2009
    Publication date: December 31, 2009
    Applicant: GENERAL INSTRUMENT CORPORATION
    Inventors: Eric J. Sprunk, Paul Moroney, Alexander Medvinsky, Steven E. Anderson, Jonathan A. Fellows
  • Publication number: 20090274295
    Abstract: A system to transmit a set of programs from a transmitter to a receiver is used to accommodate different levels of security used for each program. When a high level of security is necessary for transmitting or receiving a program the transmitter and/or receiver is operable to accommodate that level of security. Thus, both transmitters and receivers are operable to be reconfigured to encrypt or decrypt, respectively, at different levels. Accordingly, differing amounts of programs can be transmitted or received based on the resource requirements needed at any level of security. Consequently, a high level of encryption/decryption requires more resources and allows the processing of fewer services, while a lower level of encryption/decryption allows more services to be transmitted/received.
    Type: Application
    Filed: July 10, 2009
    Publication date: November 5, 2009
    Applicant: GENERAL INSTRUMENT CORPORATION
    Inventors: Xin Qiu, Eric J. Sprunk
  • Patent number: 7607022
    Abstract: A system to transmit a set of programs from a transmitter to a receiver is used to accommodate different levels of security used for each program. When a high level of security is necessary for transmitting or receiving a program the transmitter and/or receiver is operable to accommodate that level of security. Thus, both transmitters and receivers are operable to be reconfigured to encrypt or decrypt, respectively, at different levels. Accordingly, differing amounts of programs can be transmitted or received based on the resource requirements needed at any level of security. Consequently, a high level of encryption/decryption requires more resources and allows the processing of fewer services, while a lower level of encryption/decryption allows more services to be transmitted/received.
    Type: Grant
    Filed: June 6, 2000
    Date of Patent: October 20, 2009
    Assignee: General Instrument Corporation
    Inventors: Xin Qiu, Eric J. Sprunk
  • Publication number: 20090202075
    Abstract: A method and apparatus is provided for decrypting an encrypted transport stream, comprising. The method includes receiving the encrypted transport stream over a content delivery network. The encrypted transport stream is encrypted using a first control word that serves as an encryption/decryption key. A variable control word is received over the content delivery network. The variable control word is mathematically constrained to create a second control word. The encrypted transport stream is decrypted using the second control word if the second control word is the same as the first control word.
    Type: Application
    Filed: December 30, 2008
    Publication date: August 13, 2009
    Applicant: General Instrument Corporation
    Inventors: Lawrence D. Vince, Eric J. Sprunk
  • Patent number: 7568223
    Abstract: A secure Internet Protocol (IP) telephony system, apparatus, and methods are disclosed. Communications over an IP telephony system can be secured by securing communications to and from a Cable Telephony Adapter (CTA). The system can include one or more CTAs, network servers, servers configured as signaling controllers, key distribution centers (KDC), and can include gateways that couple the IP telephony system to a Public Switched Telephone Network (PSTN). Each CTA can be configured as secure hardware and can be configured with multiple encryption keys that are used to communicate signaling or bearer channel communications. The KDC can be configured to periodically distribute symmetric encryption keys to secure communications between devices that have been provisioned to operate in the system and signaling controllers.
    Type: Grant
    Filed: July 15, 2004
    Date of Patent: July 28, 2009
    Assignee: General Instrumental Corporation
    Inventors: Eric J. Sprunk, Paul Moroney, Alexander Medvinsky, Steven E. Anderson, Jonathan A. Fellows
  • Patent number: 7486792
    Abstract: According to the invention, a method for protecting digital television from unauthorized digital receivers within a population of digital receivers is disclosed. Each digital receiver in the population has a unique identifier. In one step, provisioning information is received from a subset of the population of digital receivers indicating that the subset is potentially within range to receive digital television from a broadcaster. First decryption information is distributed to the subset of the population of digital receivers. The first decryption information allows for potentially decrypting a plurality of programs coextensively in time. The unauthorized digital receivers are cryptographically excluded from using the first decryption information. A first program is encrypted using a first method that is cryptographically related to second decryption information. The first program is sent. The second decryption information is distributed and cryptographically secured with the first decryption information.
    Type: Grant
    Filed: August 21, 2003
    Date of Patent: February 3, 2009
    Assignee: General Instrument Corporation
    Inventor: Eric J. Sprunk
  • Patent number: 7450717
    Abstract: Existing key encryption approaches are extended by using overlapping portions of encrypted information. Another provision inserts one or more bits of data to ensure correct encryption/decryption. The inserted data can also be used for authentication.
    Type: Grant
    Filed: June 7, 2000
    Date of Patent: November 11, 2008
    Assignee: General Instruments Corporation
    Inventors: Eric J. Sprunk, Xin Qiu
  • Publication number: 20080162928
    Abstract: An apparatus and method for providing at least one root certificate are disclosed. Specifically, a plurality of root certificates is received and stored. Afterwards, a request is received from a first endpoint device for a desired root certificate, where the desired root certificate is used by the first endpoint device to verify an identity of a second endpoint device. Furthermore, the first endpoint device and the second endpoint device are associated with different certificate hierarchies. The desired root certificate is then sent to at least the first endpoint device.
    Type: Application
    Filed: December 27, 2006
    Publication date: July 3, 2008
    Applicant: GENERAL INSTRUMENT CORPORATION
    Inventors: Xin Qiu, Petr Peterka, Eric J. Sprunk
  • Patent number: 7305555
    Abstract: A system is described for uniquely mating components of a communication network such as a smartcard and a set-top box. When mated, the smartcard and set-top box are tied together and have a single identity. Further, the smartcard operates properly only when inserted into an authorized set-top box. Exchanges of information between both components are secured by encryption and authentication to guard against piracy of the exchanged information. The system provides the same authentication key to the set-top box and the smartcard. This key is used for authenticating communication between the set-top box and the smartcard. First, the authentication key is encrypted by a set-top box mating key. The set-top box employs this mating key to decrypt the authentication key. After it is derived, the authentication key is stored in the set-top box's memory. Further, the same authentication key is encrypted by a smartcard mating key.
    Type: Grant
    Filed: March 27, 2002
    Date of Patent: December 4, 2007
    Assignee: General Instrument Corporation
    Inventors: John I. Okimoto, Eric J. Sprunk, Lawrence W. Tang, Annie On-yee Chen, Bridget Kimball, Douglas Petty
  • Patent number: 7058609
    Abstract: A system is described for allowing “pay by time” purchasing of digital video programming. The system provides for a variable or metered approach. A user can purchase a fraction of a program for a price different from that required for purchasing the entire program. Records of the user's viewing can be created to record, e.g., when a user started receiving a program, how long the user received a program, and when the user stopped receiving a program.
    Type: Grant
    Filed: April 2, 2002
    Date of Patent: June 6, 2006
    Assignee: General Instrument Corporation
    Inventors: Paul Moroney, Eric J. Sprunk
  • Patent number: 6961427
    Abstract: Methods and apparatus for the generation of a cryptographic one way function (a key or keystream generator) for use in encrypting or decrypting binary data. A non-linear key or keystream generation algorithm using multiple feedback shift registers is provided. The feedback shift registers may be constructed utilizing an advanced mathematical construct called an extended Galois Field GF(2m). The key or keystream is generated as a non-linear function of the outputs of the multiple feedback shift registers, which may be a combination of static feedback shift registers and dynamic feedback shift registers. Dense primitive polynomials with many coefficients may be used to produce a cryptographically robust keystream for use as an encryption or decryption key.
    Type: Grant
    Filed: November 21, 2000
    Date of Patent: November 1, 2005
    Assignee: General Instrument Corporation
    Inventors: Xin Qiu, Eric J. Sprunk