Patents by Inventor Ezzat Dabbish

Ezzat Dabbish has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20120090019
    Abstract: A method and apparatus for digital-rights management is provided herein. Various forms of authorization are allowed, with each form of authorization being dependent upon an action taken on the digital content. In particular, when server-based authorization is unavailable, less-risky operations are allowed by performing an internal authorization scheme. Thus, higher security offered by a server-based DRM is required for risky actions, yet non-risky actions on the digital content may still be taken when the server is unavailable.
    Type: Application
    Filed: December 19, 2011
    Publication date: April 12, 2012
    Applicant: Motorola Mobility, Inc.
    Inventors: Thomas Messerges, Ezzat A. Dabbish
  • Patent number: 8127337
    Abstract: At a two-way communications apparatus (200) of choice, one can detect (101) a two-way communications apparatus user instruction and then, in response to detecting that instruction, provide (102) certain information to a nearby two-way communications apparatus (208) via a near field communications link (206). This information can comprise, at least in part, a biometric template as pertains to a user of the two-way communications apparatus and a privacy policy as pertains to further dissemination of the biometric template.
    Type: Grant
    Filed: March 6, 2008
    Date of Patent: February 28, 2012
    Assignee: Motorola Solutions, Inc.
    Inventors: Steven Gillig, Jeffrey D. Bonta, Ezzat A. Dabbish
  • Patent number: 7899187
    Abstract: New devices (101) are added to an existing domain by obtaining domain information (e.g., domain name and private domain password) from devices (101) already in the domain that preferably are in close proximity. Once the domain information has been transferred from the device already in the domain to the device being added to the domain, the device being added to the domain contacts a key issuer (105) to complete its registration into the domain. The key issuer returns a DRM domain private key (206) as well as a DRM certificate (202). Both are utilized by the device to obtain and render digital content (204).
    Type: Grant
    Filed: November 27, 2002
    Date of Patent: March 1, 2011
    Assignee: Motorola Mobility, Inc.
    Inventors: Thomas Messerges, Ezzat A. Dabbish, Larry Puhl, Dean Vogler
  • Publication number: 20100146601
    Abstract: A system and method for accessing digital content purchased by a rights owner for a first computing device. The method receives a proxy from the rights owner that includes rights to the digital content granted to the rights owner, stores the proxy on a second computing device, and determines whether the rights owner is present at the second computing device. When the rights owner is present at the second computing device, the method enables the proxy, and accesses the digital content on the second computing device through the proxy.
    Type: Application
    Filed: December 9, 2008
    Publication date: June 10, 2010
    Applicant: MOTOROLA, INC.
    Inventors: Steve R. Bunch, James M. Connor, Ezzat A. Dabbish, John Richard Kane, Aroon V. Tungare
  • Patent number: 7734549
    Abstract: A system and method to securely create, distribute, install and execute selected features of software on wireless devices combines three different types of licenses, a validation license, a digital rights management (DRM) license, and a feature license with a software application. Each of these three licenses work independent of each other, where the validation license helps prevent malicious code from executing on wireless devices, the DRM license prevents unauthorized copying of the software application and the feature license securely enables or disables specific features of the software application. The system also allows a wireless device to unwrap a DRM protected software application, to validate the software application, to enforce DRM usage rules and to execute selected features of the software application.
    Type: Grant
    Filed: December 31, 2002
    Date of Patent: June 8, 2010
    Assignee: Motorola, Inc.
    Inventors: Ezzat A. Dabbish, Thomas Messerges
  • Patent number: 7596812
    Abstract: Disclosed is a method, system and apparatus for transferring protected data having an authorizing entity's outer encryption layer and having a user-fixed inner encryption layer from a first electronic device having a first unique, unalterable identifier to a second electronic device having a second unique, unalterable identifier. A central unit includes a receiver configured to receive from the first electronic device protected data having an authorizing entity's first outer encryption layer corresponding to the first unique, unalterable identifier and having a user-fixed inner encryption layer; a processor configured to decrypt the authorizing entity's first outer encryption layer of the protected data; a processor configured to encrypt an authorizing entity's second outer encryption layer of the protected data corresponding to the second unique, unalterable identifier; and a transmitter configured to transmit protected data to the second electronic device.
    Type: Grant
    Filed: June 14, 2005
    Date of Patent: September 29, 2009
    Assignee: Motorola, Inc.
    Inventors: Yi Q. Li, Ezzat A. Dabbish, Morris A. Moore
  • Publication number: 20090228952
    Abstract: At a two-way communications apparatus (200) of choice, one can detect (101) a two-way communications apparatus user instruction and then, in response to detecting that instruction, provide (102) certain information to a nearby two-way communications apparatus (208) via a near field communications link (206). This information can comprise, at least in part, a biometric template as pertains to a user of the two-way communications apparatus and a privacy policy as pertains to further dissemination of the biometric template.
    Type: Application
    Filed: March 6, 2008
    Publication date: September 10, 2009
    Applicant: MOTOROLA, INC.
    Inventors: Steven Gillig, Jeffrey D. Bonta, Ezzat A. Dabbish
  • Patent number: 7549046
    Abstract: A vehicle authenticates a service technician and accesses a technician database to determine whether the service technician is indicated as authorized to perform the service operation. If the service technician is indicated as authorized to perform the service operation, the vehicle allows the service technician to perform the service operation.
    Type: Grant
    Filed: June 28, 2002
    Date of Patent: June 16, 2009
    Assignee: Temic Automotive of North America, Inc.
    Inventors: Walton L. Fehr, Ezzat A. Dabbish, Samuel M. Levenson, Larry C. Puhl, Jurgen Reinold
  • Patent number: 7522915
    Abstract: A communications device (300) enabled to support both external voice communications functionality (301) (or other external communications of interest and choice) and other functionality (302) has at least a first and second mode of operation (304 and 305). The first mode of operation permits essentially all functionality while the second mode of operation precludes at least much of the other functionality in favor of preserving the viability of at least some of the external communications functionality. A selector (306) can select a given mode of operation based, at least in part, on a trigger 307 comprising, for example, a user input and/or detection of a condition of concern.
    Type: Grant
    Filed: February 22, 2005
    Date of Patent: April 21, 2009
    Assignee: Motorola, Inc.
    Inventors: Yi Q. Li, Ezzat Dabbish, Thomas S. Messerges, Larry C. Puhl
  • Patent number: 7363492
    Abstract: Authentication is performed to a confidence level (CL) desired by a verifier (220). A prover (210) picks and sends certain same size, square matrices to the verifier (220). A random request bit is sent (234) from the verifier (220) to the prover (210) after the receipt of a certain square matrix. Depending on the request bit, calculations are made (244, 264) by the verifier (220) to determine if the matrices sent from the prover are verifiable. The prover (210) is iteratively authenticated by the verifier (220). Iterations are continued until (320) a count of the iterations (IL) reaches a number sufficient to achieve the desired confidence level (CL). After a delay, more iterations can achieve a higher confidence level by building on previous result of authentication without having to begin at zero. During this delay, the verifier (220) can perform tasks in reliance on the result of authentication. Digital logic can perform the authentication.
    Type: Grant
    Filed: February 25, 2005
    Date of Patent: April 22, 2008
    Assignee: Motorola, Inc.
    Inventors: Douglas A. Kuhlman, Ezzat A. Dabbish, Larry C. Puhl
  • Patent number: 7325135
    Abstract: A vehicle accesses a configuration database to determine whether a reconfiguration function is authorized. The reconfiguration function may involve, for example, installing the component in the vehicle, removing the component from the vehicle, replacing the component with another component in the vehicle, replacing another component in the vehicle with the component, modifying the component, upgrading the component and rendering the component operable. Upon determining that the reconfiguration function is authorized, the vehicle allows the reconfiguration function to be performed. The reconfiguration function may be authorized based on a type of the vehicle, a type of the component or a combination of configuration elements in a current configuration of the vehicle.
    Type: Grant
    Filed: June 28, 2002
    Date of Patent: January 29, 2008
    Assignee: Temic Automotive of North America, Inc.
    Inventors: Walton L. Fehr, Ezzat A. Dabbish, Samuel M. Levenson, Larry C. Puhl, Jurgen Reinold
  • Patent number: 7228420
    Abstract: The service technician accesses the prospective vehicle and obtains from a certification authority a certification that an authentic vehicle is associated with a cryptographic key. The service technician utilizes the cryptographic key in cryptographic communication with the prospective vehicle via a secure device having limited accessibility but being accessible by the service technician. The service technician determines whether the prospective vehicle is the authentic vehicle based on whether the cryptographic key is successfully utilized in the cryptographic communication with the prospective vehicle.
    Type: Grant
    Filed: June 28, 2002
    Date of Patent: June 5, 2007
    Assignee: Temic Automotive of North America, Inc.
    Inventors: Ezzat A. Dabbish, Walton L. Fehr, Samuel M. Levenson, Larry C. Puhl, Jurgen Reinold
  • Publication number: 20070016961
    Abstract: A portable electronic device (110) contains an application revocation list (ARL) in memory (135) comprising at least one application identifier (AI) uniquely identifying an application. The portable electronic device also contains an application list memory (133) for storing at least application identifiers for trusted applications in the device. A processor (120) operatively connected to the memory determines whether an application identifier on the application revocation list matches an application identifier on the portable electronic device, and, if so, processes a revocation of the application. The application revocation list can be wirelessly updated. Application software in a portable electronic device can thus subsequently be revoked through operation of this application revocation list. A remote server (140) makes application revocation lists available to portable electronic devices over a network such as a cellular system.
    Type: Application
    Filed: July 11, 2005
    Publication date: January 18, 2007
    Inventors: Dean Vogler, Ezzat Dabbish, Larry Puhl
  • Publication number: 20060282680
    Abstract: A method and system for registering a user device in a domain of a domain authority (106) using biometric information is provided. The method includes sending (402) a request (by the user device) to the domain authority for joining the domain. The user device making the request is then authenticated (400) and the biometric information of the user is then requested (406). Further, the method includes authenticating (412) the biometric information of the user. The security information of the domain is transferred (414) to the user device once the authentication of the user device and the biometric information are both successful.
    Type: Application
    Filed: June 14, 2005
    Publication date: December 14, 2006
    Inventors: Douglas Kuhlman, Ezzat Dabbish, Thomas Messerges, Dean Vogler
  • Publication number: 20060282901
    Abstract: Disclosed is a method, system and apparatus for transferring protected data (404) having an authorizing entity's outer encryption layer (408) and having a user-fixed inner encryption layer (406) from a first electronic device having a first unique, unalterable identifier to a second electronic device having a second unique, unalterable identifier.
    Type: Application
    Filed: June 14, 2005
    Publication date: December 14, 2006
    Inventors: Yi Li, Ezzat Dabbish, Morris Moore
  • Patent number: 7137001
    Abstract: A vehicle authenticates a first prospective component by obtaining from a certification authority a certification that an authentic component is associated with a cryptographic key unique to the first prospective component and determining whether the first prospective component is the authentic component based on whether the cryptographic key is successfully utilized in cryptographic communication with the first prospective component. The vehicle authenticates a component class of a second prospective component by obtaining from a certification authority a certification that an authentic component of the component class is associated with a second cryptographic key unique to the component class and determining whether the second prospective component is an authentic component of the component class based on whether the second cryptographic key is successfully utilized in the cryptographic communication with the second prospective component.
    Type: Grant
    Filed: June 28, 2002
    Date of Patent: November 14, 2006
    Assignee: Motorola, Inc.
    Inventors: Ezzat A. Dabbish, Larry C. Puhl
  • Patent number: 7137142
    Abstract: A vehicle authenticates a prospective component for use in the vehicle by obtaining from a certification authority a certification that an authentic component is associated with a cryptographic key. The vehicle obtains the certification separately from the component. The certification certifies that the cryptographic key is bound to information identifying the authentic component. The vehicle utilizes the cryptographic key obtained from the certification authority in cryptographic communication with the prospective component, and determines whether the prospective component is the authentic component based on whether the cryptographic key is successfully utilized in the cryptographic communication.
    Type: Grant
    Filed: June 28, 2002
    Date of Patent: November 14, 2006
    Assignee: Motorola, Inc.
    Inventors: Larry C. Puhl, Ezzat A. Dabbish
  • Patent number: 7131005
    Abstract: A component for use in a prospective vehicle obtains from a certification authority a certification that an authentic vehicle is associated with a cryptographic key. The certification certifies that the cryptographic key is bound to information identifying the authentic vehicle. The component utilizes the cryptographic key obtained from the certification authority in cryptographic communication with the prospective vehicle, and determines whether the prospective vehicle is the authentic vehicle based on whether the cryptographic key is successfully utilized in the cryptographic communication. Upon determining the prospective vehicle is the authentic vehicle, the component may allow the prospective vehicle to operate the component.
    Type: Grant
    Filed: June 28, 2002
    Date of Patent: October 31, 2006
    Assignee: Motorola, Inc.
    Inventors: Samuel M. Levenson, John D. Bruner, Ezzat A. Dabbish, Walton L. Fehr, Larry C. Puhl, Jurgen Reinold
  • Patent number: 7127611
    Abstract: A vehicle authenticates a component class of a prospective component for use in the vehicle by obtaining from a certification authority a certification that an authentic component of the component class is associated with a second cryptographic key. The certification certifies that the second cryptographic key is bound to information identifying an authentic component of the component class. The vehicle utilizes the second cryptographic key obtained from the certification authority in cryptographic communication with the prospective component, and determines whether the prospective component is an authentic component of the component class based on whether the second cryptographic key is successfully utilized in the cryptographic communication.
    Type: Grant
    Filed: June 28, 2002
    Date of Patent: October 24, 2006
    Assignee: Motorola, Inc.
    Inventors: Ezzat A. Dabbish, Larry C. Puhl
  • Publication number: 20060195692
    Abstract: Authentication is performed to a confidence level (CL) desired by a verifier (220). A prover (210) picks and sends certain same size, square matrices to the verifier (220). A random request bit is sent (234) from the verifier (220) to the prover (210) after the receipt of a certain square matrix. Depending on the request bit, calculations are made (244, 264) by the verifier (220) to determine if the matrices sent from the prover are verifiable. The prover (210) is iteratively authenticated by the verifier (220). Iterations are continued until (320) a count of the iterations (IL) reaches a number sufficient to achieve the desired confidence level (CL). After a delay, more iterations can achieve a higher confidence level by building on previous result of authentication without having to begin at zero. During this delay, the verifier (220) can perform tasks in reliance on the result of authentication. Digital logic can perform the authentication.
    Type: Application
    Filed: February 25, 2005
    Publication date: August 31, 2006
    Inventors: Douglas Kuhlman, Ezzat Dabbish, Larry Puhl