Patents by Inventor Ezzat A. Dabbish

Ezzat A. Dabbish has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20060189304
    Abstract: A communications device (300) enabled to support both external voice communications functionality (301) (or other external communications of interest and choice) and other functionality (302) has at least a first and second mode of operation (304 and 305). The first mode of operation permits essentially all functionality while the second mode of operation precludes at least much of the other functionality in favor of preserving the viability of at least some of the external communications functionality. A selector (306) can select a given mode of operation based, at least in part, on a trigger 307 comprising, for example, a user input and/or detection of a condition of concern.
    Type: Application
    Filed: February 22, 2005
    Publication date: August 24, 2006
    Inventors: Yi Li, Ezzat Dabbish, Thomas Messerges, Larry Puhl
  • Patent number: 7010682
    Abstract: A vehicle authenticates a prospective component for use in the vehicle by obtaining from a certification authority a certification that an authentic component is associated with a cryptographic key. The certification certifies that the cryptographic key is bound to information identifying the authentic component. The vehicle utilizes the cryptographic key obtained from the certification authority in cryptographic communication with the prospective component, and determines whether the prospective component is the authentic component based on whether the cryptographic key is successfully utilized in the cryptographic communication.
    Type: Grant
    Filed: June 28, 2002
    Date of Patent: March 7, 2006
    Assignee: Motorola, Inc.
    Inventors: Jurgen Reinold, John D. Bruner, Ezzat A. Dabbish, Walton L. Fehr, Samual M. Levenson, Larry C. Puhl
  • Publication number: 20050283662
    Abstract: A technology provides secure data backup and recovery for an electronic device (100) having a device identification (115) that is unique and unalterable. A method of the technology includes identifying (205) backup data (405, 805, 1205) to be backed up, encoding (210) a backup data set by coding the device identification (115) and the backup data (405, 805, 1205) for integrity and authentication using a cryptographic key (110) and an integrity function, generating (220) decoded backup data (635, 1015, 1435) and decoded device identification (640, 1020, 1440) by decoding a retrieved backup data set (605, 1005, 1405) using the the cryptographic key (115) and the integrity function, and restoring (225) the backup data with the decoded backup data only when the integrity has been verified and the decoded device identification and the device identification match. Three methods of encoding and decoding are described.
    Type: Application
    Filed: June 21, 2004
    Publication date: December 22, 2005
    Inventors: Yi Li, Ezzat Dabbish, Dean Vogler
  • Patent number: 6839710
    Abstract: A vehicle maintains a record of configuration elements, such as components for use in the vehicle, of the configuration of the vehicle. The vehicle also maintains a history of configuration functions for each of the configuration elements. The history may include a type of each configuration function, such as installation of a configuration element into the vehicle, and may also include a record of corresponding times at which the configuration functions have occurred, which can be utilized to determine a configuration of the vehicle at a time of an event. Additionally or alternatively, the vehicle may maintain a service history of at least one service technician performing a service operation with respect to a corresponding one of the configuration elements.
    Type: Grant
    Filed: June 28, 2002
    Date of Patent: January 4, 2005
    Assignee: Motorola, Inc.
    Inventors: Ezzat A. Dabbish, Samuel M. Levenson, Jurgen Reinold
  • Publication number: 20040193919
    Abstract: To address the need for a communicating electronic device (102) to identify other trusted devices (103) and allow for applications, such as digital-rights management, and the easy transfer of content and commands (217) among devices, a method and apparatus for identifying trusted devices (103) is disclosed herein. Each electronic device wishing to share digital content will comprise a database (209) containing a list of trusted and/or non-trusted devices. The list of trusted and non-trusted devices is similar to a master list of trusted and non-trusted devices that exists at the certificate authority or an equivalent trusted server. However, in order to limit the size of the database existing on the electronic device, only a portion of the master list will be stored locally.
    Type: Application
    Filed: March 31, 2003
    Publication date: September 30, 2004
    Inventors: Ezzat A. Dabbish, Douglas A. Kuhlman, thomas S. Messerges
  • Publication number: 20040193902
    Abstract: A preferred technique includes a digital content rendering device (100) and a method used in the device, including acquiring (305) an encrypted digital content (105), acquiring (305) a set of rules (110) associated with the encrypted digital content that specify permissions involving at least one level of rendering of the digital content that are based on a comparison of a set of specified locations with a sensed location, acquiring (305) an encrypted content key (120), extracting (315) the digital content, determining (330) a sensed location of the content rendering device, performing comparisons (335) of the sensed location to each of the set of specified locations; and determining (340) a level of rendering of the digital content in accordance with the set of rules, based on results of the comparisons.
    Type: Application
    Filed: March 31, 2003
    Publication date: September 30, 2004
    Inventors: Dean H. Vogler, Ephrem A. Chemaly, Ezzat A. Dabbish, Thomas S. Messerges, Robert A. Patzer
  • Publication number: 20040133632
    Abstract: Logic circuitry (301) determines that digital content (317) needs to be accessed or obtained and then determines a DRM core (307), or protocol necessary to obtain/access the digital content. If the DRM core (307) is not resident in memory, the core is downloaded from a DRM solution center (103). An application (305) will utilize the DRM core to access or obtain the digital content.
    Type: Application
    Filed: January 8, 2003
    Publication date: July 8, 2004
    Inventors: Thomas Messerges, Ronald Buskey, Ezzat A. Dabbish
  • Publication number: 20040127196
    Abstract: A system and method to securely create, distribute, install and execute selected features of software on wireless devices combines three different types of licenses, a validation license, a digital rights management (DRM) license, and a feature license with a software application. Each of these three licenses work independent of each other, where the validation license helps prevent malicious code from executing on wireless devices, the DRM license prevents unauthorized copying of the software application and the feature license securely enables or disables specific features of the software application. The system also allows a wireless device to unwrap a DRM protected software application, to validate the software application, to enforce DRM usage rules and to execute selected features of the software application.
    Type: Application
    Filed: December 31, 2002
    Publication date: July 1, 2004
    Inventors: Ezzat A. Dabbish, Thomas Messerges
  • Publication number: 20040103312
    Abstract: New devices (101) are added to an existing domain by obtaining domain information (e.g., domain name and private domain password) from devices (101) already in the domain that preferably are in close proximity. Once the domain information has been transferred from the device already in the domain to the device being added to the domain, the device being added to the domain contacts a key issuer (105) to complete its registration into the domain. The key issuer returns a DRM domain private key (206) as well as a DRM certificate (202). Both are utilized by the device to obtain and render digital content (204).
    Type: Application
    Filed: November 27, 2002
    Publication date: May 27, 2004
    Inventors: Thomas Messerges, Ezzat A. Dabbish, Larry Puhl, Dean Vogler
  • Publication number: 20040088541
    Abstract: Devices (101) are assigned a unique, unalterable, identification or serial number (313) that acts as the devices “electronic” biometric. Any certificate (302) created by a key issuer will contain the device's assigned DRM public key and the device's electronic biometric data. When a consumer wishes to purchase new content (304) from a content provider (103), the consumer will send the DRM certificate containing its DRM public key and the biometric. The rights issuer will then create a license (306) that assigns the content in such a way that only a device with the particular biometric and DRM private key is allowed to render the content.
    Type: Application
    Filed: November 1, 2002
    Publication date: May 6, 2004
    Inventors: Thomas Messerges, Ezzat A. Dabbish, Larry Puhl, Dean Vogler
  • Publication number: 20040088175
    Abstract: A method and apparatus for digital-rights management is provided herein. Various forms of authorization are allowed, with each form of authorization being dependent upon an action taken on the digital content. In particular, when server-based authorization is unavailable, less-risky operations are allowed by performing an internal authorization scheme. Thus, higher security offered by a server-based DRM is required for risky actions, yet non-risky actions on the digital content may still be taken when the server is unavailable.
    Type: Application
    Filed: November 1, 2002
    Publication date: May 6, 2004
    Inventors: Thomas Messerges, Ezzat A. Dabbish
  • Publication number: 20040003227
    Abstract: A vehicle authenticates a prospective component for use in the vehicle by obtaining from a certification authority a certification that an authentic component is associated with a cryptographic key. The certification certifies that the cryptographic key is bound to information identifying the authentic component. The vehicle utilizes the cryptographic key obtained from the certification authority in cryptographic communication with the prospective component, and determines whether the prospective component is the authentic component based on whether the cryptographic key is successfully utilized in the cryptographic communication.
    Type: Application
    Filed: June 28, 2002
    Publication date: January 1, 2004
    Inventors: Jurgen Reinold, John D. Bruner, Ezzat A. Dabbish, Walton L. Fehr, Samuel M. Levenson, Larry C. Puhl
  • Publication number: 20040003231
    Abstract: A component for use in a prospective vehicle obtains from a certification authority a certification that an authentic vehicle is associated with a cryptographic key. The certification certifies that the cryptographic key is bound to information identifying the authentic vehicle. The component utilizes the cryptographic key obtained from the certification authority in cryptographic communication with the prospective vehicle, and determines whether the prospective vehicle is the authentic vehicle based on whether the cryptographic key is successfully utilized in the cryptographic communication. Upon determining the prospective vehicle is the authentic vehicle, the component may allow the prospective vehicle to operate the component.
    Type: Application
    Filed: June 28, 2002
    Publication date: January 1, 2004
    Inventors: Samuel M. Levenson, John D. Bruner, Ezzat A. Dabbish, Walton L. Fehr, Larry C. Puhl, Jurgen Reinold
  • Publication number: 20040003237
    Abstract: A vehicle authenticates a prospective component for use in the vehicle by obtaining from a certification authority a certification that an authentic component is associated with a cryptographic key. The vehicle obtains the certification separately from the component. The certification certifies that the cryptographic key is bound to information identifying the authentic component. The vehicle utilizes the cryptographic key obtained from the certification authority in cryptographic communication with the prospective component, and determines whether the prospective component is the authentic component based on whether the cryptographic key is successfully utilized in the cryptographic communication.
    Type: Application
    Filed: June 28, 2002
    Publication date: January 1, 2004
    Inventors: Larry C. Puhl, Ezzat A. Dabbish
  • Publication number: 20040003243
    Abstract: A vehicle accesses a configuration database to determine whether a reconfiguration function is authorized. The reconfiguration function may involve, for example, installing the component in the vehicle, removing the component from the vehicle, replacing the component with another component in the vehicle, replacing another component in the vehicle with the component, modifying the component, upgrading the component and rendering the component operable. Upon determining that the reconfiguration function is authorized, the vehicle allows the reconfiguration function to be performed. The reconfiguration function may be authorized based on a type of the vehicle, a type of the component or a combination of configuration elements in a current configuration of the vehicle.
    Type: Application
    Filed: June 28, 2002
    Publication date: January 1, 2004
    Inventors: Walton L. Fehr, Ezzat A. Dabbish, Samuel M. Levenson, Larry C. Puhl, Jurgen Reinold
  • Publication number: 20040003252
    Abstract: A vehicle authenticates a component class of a prospective component for use in the vehicle by obtaining from a certification authority a certification that an authentic component of the component class is associated with a second cryptographic key. The certification certifies that the second cryptographic key is bound to information identifying an authentic component of the component class. The vehicle utilizes the second cryptographic key obtained from the certification authority in cryptographic communication with the prospective component, and determines whether the prospective component is an authentic component of the component class based on whether the second cryptographic key is successfully utilized in the cryptographic communication.
    Type: Application
    Filed: June 28, 2002
    Publication date: January 1, 2004
    Inventors: Ezzat A. Dabbish, Larry C. Puhl
  • Publication number: 20040001593
    Abstract: A prospective component for use in a vehicle stores a first cryptographic key and utilizes the first cryptographic key in cryptographic communication with the vehicle. The vehicle obtains from a certification authority a certification associating a second cryptographic key with an authentic component. The vehicle utilizes the second cryptographic key in cryptographic communication and determines whether the prospective component is the authentic component based on whether the cryptographic communication is successful.
    Type: Application
    Filed: June 28, 2002
    Publication date: January 1, 2004
    Inventors: Jurgen Reinold, John D. Bruner, Ezzat A. Dabbish, Walton L. Fehr, Samuel M. Levenson, Larry C. Puhl
  • Publication number: 20040003249
    Abstract: The service technician accesses the prospective vehicle and obtains from a certification authority a certification that an authentic vehicle is associated with a cryptographic key. The service technician utilizes the cryptographic key in cryptographic communication with the prospective vehicle via a secure device having limited accessibility but being accessible by the service technician. The service technician determines whether the prospective vehicle is the authentic vehicle based on whether the cryptographic key is successfully utilized in the cryptographic communication with the prospective vehicle.
    Type: Application
    Filed: June 28, 2002
    Publication date: January 1, 2004
    Inventors: Ezzat A. Dabbish, Walton L. Fehr, Samuel M. Levenson, Larry C. Puhl, Jurgen Reinold
  • Publication number: 20040003242
    Abstract: A vehicle authenticates a service technician and accesses a technician database to determine whether the service technician is indicated as authorized to perform the service operation. If the service technician is indicated as authorized to perform the service operation, the vehicle allows the service technician to perform the service operation.
    Type: Application
    Filed: June 28, 2002
    Publication date: January 1, 2004
    Inventors: Walton L. Fehr, Ezzat A. Dabbish, Samuel M. Levenson, Larry C. Puhl, Jurgen Reinold
  • Publication number: 20040002799
    Abstract: A vehicle maintains a record of configuration elements, such as components for use in the vehicle, of the configuration of the vehicle. The vehicle also maintains a history of configuration functions for each of the configuration elements. The history may include a type of each configuration function, such as installation of a configuration element into the vehicle, and may also include a record of corresponding times at which the configuration functions have occurred, which can be utilized to determine a configuration of the vehicle at a time of an event. Additionally or alternatively, the vehicle may maintain a service history of at least one service technician performing a service operation with respect to a corresponding one of the configuration elements.
    Type: Application
    Filed: June 28, 2002
    Publication date: January 1, 2004
    Inventors: Ezzat A. Dabbish, Samuel M. Levenson, Jurgen Reinold