Patents by Inventor Eric J. Sprunk
Eric J. Sprunk has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 6839841Abstract: Devices in a telecommunications system are provided with means to self-generate public key pairs and certificates. This eliminates the need for such keys and certificates to be sent to the devices from an outside source so a single-trust approach can be maintained. A manufacturer's certificate is installed into a device it the time of manufacture. The device only issues itself certificates based on a signed request from an external outside server. The device's self-issued certificates incorporate information obtained from the server in a profile. This allows control by the server over a device's self-issued certificates. In order to prevent tampering, and breaking, of the self-issued certificates, the certificate issuing process occurs within a secure microprocessor.Type: GrantFiled: January 28, 2000Date of Patent: January 4, 2005Assignee: General Instrument CorporationInventors: Alexander Medvinsky, Eric J. Sprunk
-
Publication number: 20040234074Abstract: A cryptographic key (K2) is generated using a one-way function and testing for a mathematical constraint. Pre-seed data is obtained by subdividing a random bit string into several segments (PRE-P1, . . . , PRE-P8, PRE-Q1, . . . , PRE-Q8), then independently processing each segment with a one-way function to obtain respective values (P, Q). The values (P, Q) are tested for a mathematical constraint such as primeness. If the values do not pass the test, the steps are repeated. If the values do pass, a modulus N, and Euler's Totient &phgr;=(P-1)(Q-1) are formed. Segments Pre-K1-1, . . . , Pre-K1-16 are also processed through a one way function to form segments K1-1, . . . , K1-16, which are assembled to form a value K1. K1 is tested for relative primicity to &phgr;. If K1 is not relatively prime to &phgr;, a new K1 is formed. The key (K2) is then formed based on P, Q, and K1.Type: ApplicationFiled: June 21, 2004Publication date: November 25, 2004Applicant: General Instrument CorporationInventor: Eric J. Sprunk
-
Patent number: 6810525Abstract: A method and system are provided for impulse purchasing of services over a communication network, such as a cable or satellite television network. Such services can include games or information accompanying television programming, home-shopping, e-mail services, streaming media and the like. Security is provided through entitlements generated by the access controller 14 and entitlement tokens generated by a secure processor. The secure processor is located at a subscriber terminal 16 through which a subscriber orders and obtains the services. A token is generated when the subscriber either selects the service, if pre-authorized, or when the service is purchased on impulse. The token is secure and signed, and may be used by a policy/proxy server 18 subtending to the Network Operator's ISP and associated services to further facilitate offering these services to the subscribers.Type: GrantFiled: August 3, 2000Date of Patent: October 26, 2004Assignee: General Instrument CorporationInventors: Reem Safadi, Eric J. Sprunk, Doug Makofka, Ray Bontempi
-
Patent number: 6804782Abstract: A cryptography circuit provides secure processing of data by utilizing countermeasures that combat timing and power attacks. Superfluous operations such as multiplication operations, modular reductions by an integer, storage of data to memory are available for use by a processor to disguise the amount of power usage and the amount of time required to perform a cryptographic operation. A cryptographic key is available for use in order to trigger when these emulated operations occur. The occurrences of the emulated operations is controlled by the user to provide the preferred tradeoff between security and use of resources.Type: GrantFiled: August 13, 1999Date of Patent: October 12, 2004Assignee: General Instrument CorporationInventors: Xin Qiu, Eric J. Sprunk, Daniel Z. Simon, Lawrence Tang, Lawrence R. Cook
-
Publication number: 20040078584Abstract: According to the invention, a content processing unit for protecting interchip content pathways transporting digital content objects is disclosed. The content processing unit includes a first chip package, a second chip package and a content pathway. The first chip package includes a first body, a first plurality of interconnects, an encryption engine, and a first key storage register capable of storing a first key, and the second chip package includes a second body, a second plurality of interconnects, an encryption engine, and a second key storage register capable of storing a second key. The first key is used by the encryption engine to produce ciphertext content and cannot be overwritten after a programmability period. The first and second key storage registers are non-readable from outside the first body. The second key is used by the decryption engine to produce plaintext content from the ciphertext content.Type: ApplicationFiled: August 22, 2003Publication date: April 22, 2004Applicant: GENERAL INSTRUMENT CORP.Inventors: Paul Moroney, Eric J. Sprunk
-
Patent number: 6711684Abstract: Methods and an apparatus for storing information in a processing device with flexible security are disclosed. In one embodiment, a method stores information within the processing device. The method receives a download via a first input path which includes a first breakable link and stores the download within the processing device. At some point, a key is also stored within the processing device. A ciphertext download is received via a second input path which includes a second breakable link. The ciphertext download is decrypted utilizing the key and the resulting plaintext download is stored within the processing device.Type: GrantFiled: September 13, 1999Date of Patent: March 23, 2004Assignee: General Instrument CorporationInventors: Paul Moroney, Eric J. Sprunk, Adam L. Rappoport, Lawrence W. Tang
-
Publication number: 20040052380Abstract: According to the invention, a method for protecting digital television from unauthorized digital receivers within a population of digital receivers is disclosed. Each digital receiver in the population has a unique identifier. In one step, provisioning information is received from a subset of the population of digital receivers indicating that the subset is potentially within range to receive digital television from a broadcaster. First decryption information is distributed to the subset of the population of digital receivers. The first decryption information allows for potentially decrypting a plurality of programs coextensively in time. The unauthorized digital receivers are cryptographically excluded from using the first decryption information. A first program is encrypted using a first method that is cryptographically related to second decryption information. The first program is sent. The second decryption information is distributed and cryptographically secured with the first decryption information.Type: ApplicationFiled: August 21, 2003Publication date: March 18, 2004Applicant: GENERAL INSTRUMENT CORP.Inventor: Eric J. Sprunk
-
Publication number: 20030206627Abstract: According to the invention, a circuit that is capable of automated scan testing is disclosed. Included in the circuit are a cryptographic engine, a digital circuit, an input pin, and an output pin. The cryptographic engine capable of performing at least one of encryption and decryption of one or more digital signals. The digital circuit includes combinatorial logic and a number of memory cells. The memory cells have scan inputs connected serially in a scan chain. The input pin and output pin are coupled to the scan chain. At least one of the input pin and the output pin carries at least some cipher text data of the scan chain.Type: ApplicationFiled: May 1, 2003Publication date: November 6, 2003Applicant: GENERAL INSTRUMENT CORP.Inventors: Madhusudhan R. Penugonda, Michael W. Johnson, Eric J. Sprunk, An Tonthat
-
Publication number: 20030188164Abstract: A system is described for uniquely mating components of a communication network such as a smartcard and a set-top box. When mated, the smartcard and set-top box are tied together and have a single identity. Further, the smartcard operates properly only when inserted into an authorized set-top box. Exchanges of information between both components are secured by encryption and authentication to guard against piracy of the exchanged information. The system provides the same authentication key to the set-top box and the smartcard. This key is used for authenticating communication between the set-top box and the smartcard. First, the authentication key is encrypted by a set-top box mating key. The set-top box employs this mating key to decrypt the authentication key. After it is derived, the authentication key is stored in the set-top box's memory. Further, the same authentication key is encrypted by a smartcard mating key.Type: ApplicationFiled: March 27, 2002Publication date: October 2, 2003Applicant: General Instrument CorporationInventors: John I. Okimoto, Eric J. Sprunk, Lawrence W. Tang, Annie On-Yee Chen, Bridget Kimball, Douglas Petty
-
Publication number: 20020169724Abstract: A system is described for allowing “pay by time” purchasing of digital video programming. The system provides for a variable or metered approach. A user can purchase a fraction of a program for a price different from that required for purchasing the entire program. Records of the user's viewing can be created to record, e.g., when a user started receiving a program, how long the user received a program, and when the user stopped receiving a program.Type: ApplicationFiled: April 2, 2002Publication date: November 14, 2002Applicant: GENERAL INSTRUMENT, Inc.Inventors: Paul Moroney, Eric J. Sprunk
-
Publication number: 20020092015Abstract: According to the invention, a method for securing information associated with a content receiver that is part of a conditional access system is disclosed. In one step, an object is selected for monitoring. When the object should encounter a checkpoint is independently determined. A checkpoint triggers authentication and/or authorization. It is independently monitored that at least one of authentication and authorization is performed. Information regarding the monitoring is sent away from the content receiver.Type: ApplicationFiled: April 6, 2001Publication date: July 11, 2002Inventors: Eric J. Sprunk, Glen Peter Goffin
-
Publication number: 20020032903Abstract: According to the invention, a method for securing a plaintext object within a content receiver is disclosed. In one step, a secure portion of a secure object and a plaintext remainder of the secure object are received. Which portion of the secure object is the secure portion is determined. The secure portion is decrypted to provide a plaintext portion. The plaintext object that comprises the plaintext portion and the plaintext remainder is formed. The plaintext object is stored.Type: ApplicationFiled: April 6, 2001Publication date: March 14, 2002Inventor: Eric J. Sprunk
-
Publication number: 20020003884Abstract: According to the invention a method for securing information associated with a content receiver that is part of a conditional access system is disclosed. In one step an object is received by the content receiver wherein the object comprises a number of associated checkpoints. At least one of authentication and authorization is performed with the object when a first checkpoint is encountered. The object is stored. At least one of authentication and authorization is performed with the object when a second checkpoint is encountered. Performance of an action is conditioned upon the encountering the second checkpoint.Type: ApplicationFiled: April 6, 2001Publication date: January 10, 2002Inventor: Eric J. Sprunk
-
Publication number: 20020002706Abstract: According to the invention, a method for securing an object associated with a content receiver that is part of a conditional access system is disclosed. In one step, the object is received by the content receiver. The object is loaded into memory. A timer begins counting, whereafter a determination is made when the timer expires. An event is executed that correlates to the timer expiring. An authorization status is changed based, at least in part, upon the timer expiring.Type: ApplicationFiled: April 6, 2001Publication date: January 3, 2002Inventor: Eric J. Sprunk
-
Publication number: 20010010720Abstract: The invention relates to authenticating information sent to a set top box. In one embodiment, a process for distributing information to a plurality of conditional access receivers with a plurality of different signature checking capabilities is disclosed. In one step, a first signature is generated over the information and a second signature is generated over the information. The first and second signatures and the information are sent to the plurality of conditional access receivers.Type: ApplicationFiled: December 18, 2000Publication date: August 2, 2001Inventors: Bridget D. Kimball, Kenneth P. Miller, Douglas M. Petty, Robert S. Eisenbart, Eric J. Sprunk
-
Patent number: 6253223Abstract: Methods and an apparatus for generating random numbers are disclosed. In a first embodiment, a method for generating random numbers involves producing a second random number. A pseudorandom number is produced from a digital random number generator and a first random number is produced from an analog random number generator.Type: GrantFiled: December 7, 1999Date of Patent: June 26, 2001Assignee: General Instrument CorporationInventor: Eric J. Sprunk