Patents by Inventor Goran Selander

Goran Selander has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20100325415
    Abstract: A method and apparatus for distributing time-controlled media. A media chunk is encrypted using cryptographic materials and sending the encrypted media chunk over a media channel. The cryptographic materials are distributed over a time-guaranteed control channel such that the cryptographic materials are received by a remote receiver node after the remote receiver receives the encrypted media chunk. The receiver node receives the encrypted media chunk over the media channel and stores the encrypted media chunk in a memory at the receiver node. The receiver node also receives the cryptographic materials over the time guaranteed channel, and uses the cryptographic materials to decrypt the encrypted media chunk. In this way, the receiver node cannot render the media chunk until it has received the cryptographic materials.
    Type: Application
    Filed: March 25, 2008
    Publication date: December 23, 2010
    Applicant: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)
    Inventors: Borje Ohlman, Goran Selander
  • Publication number: 20100146274
    Abstract: A module (2) for integrity protection of messages transmitted from a mobile software defined radio (SDR) terminal (1), the module provided with a confined cryptographic key K and arranged to receive loaded SDR-code. The module derives an integrity protecting key Rk from at least said cryptographic key K, and provides a periodic integrity protection on-line of generated messages using said key integrity protecting key Rk, and the integrity of said messages is verified by an integrity checking node (10) of the access network.
    Type: Application
    Filed: June 18, 2007
    Publication date: June 10, 2010
    Applicant: TELEFONAKTIEBOLAGET L M ERICSSON (PUBL)
    Inventors: Mats Naslund, Magnus Almgren, Harald Kallin, Goran Selander
  • Publication number: 20090299836
    Abstract: The present invention aims at an effective approach to radio access system attachment in a heterogeneous communication network environment. According to the present invention, cooperation between different radio access systems is executed to advertise one radio access system in another. After receipt of a secure advertisement from a control unit of the advertising radio access system, a broadcasting unit of the receiving radio access system broadcasts advertisement information in relation to the secure advertisement in the communication network. Therefore, according to the present invention, a user terminal may at any time receive broadcasted advertisement information while establishing a trusted relationship with advertiser.
    Type: Application
    Filed: April 4, 2006
    Publication date: December 3, 2009
    Inventors: Joachim Sachs, Göran Selander, András Méhes, Teemu Rinta-Aho, Johan Lundsjö, Jari Arkko, Per Magnusson, Mikael Prytz
  • Publication number: 20070127719
    Abstract: The invention generally relates to management of cryptographic key generations in an information environment comprising a key-producing side generating and distributing key information to a key-consuming side. A basic concept of the invention is to define, by means of a predetermined one-way key derivation function, a relationship between generations of keys such that earlier generations of keys efficiently may be derived from later ones but not the other way around. A basic idea according to the invention is therefore to replace, at key update, key information of an older key generation by the key information of the new key generation on the key-consuming side. Whenever necessary, the key-consuming side iteratively applies the predetermined one-way key derivation function to derive key information of at least one older key generation from the key information of the new key generation. In this way, storage requirements on the key-consuming side can be significantly reduced.
    Type: Application
    Filed: October 13, 2004
    Publication date: June 7, 2007
    Inventors: Goran Selander, Fredrik Lindholm, Magnus Nystrom
  • Publication number: 20060101288
    Abstract: The invention concerns a tamper-resistant electronic circuit configured for implementation in a device. The electronic circuit securely implements and utilizes device-specific security data during operation in the device, and is basically provided with a tamper-resistantly stored secret not accessible over an external circuit interface. The electronic circuit is also provided with functionality for performing cryptographic processing at least partly in response to the stored secret to generate an instance of device-specific security data that is internally confined within said electronic circuit during usage of the device. The electronic circuit is further configured for performing one or more security-related operations or algorithms in response to the internally confined device-specific security data. In this way, secure implementation and utilization device-specific security data for security purposes can be effectively accomplished.
    Type: Application
    Filed: October 27, 2003
    Publication date: May 11, 2006
    Inventors: Bernard Smeets, Goran Selander, Per-Olof Nerbrant
  • Publication number: 20050246282
    Abstract: The invention refers to monitoring usage of digital content provided from a content provider (30) over a network (40) to a client system (10). In the client system (10), a logging agent (150) generates and stores information concerning usage of the digital content individually for each usage to be monitored. The generated information is entered in a usage log (170; 175), either stored in the client system (10) or at a trusted party. The logged usage information is also authenticated allowing identification of the client using the associated digital content. The entries (172) of the log (170; 175) may include a representation (172-1) of the content, information about usage quality (172-2) and/or usage time (172-N). The logging agent (150) is preferably implemented in a portable tamper-resistant module (400), e.g. a network subscriber identity module. The module (400) may be pre-manufactured with the logging agent (150), or the agent (150) can be downloaded thereto.
    Type: Application
    Filed: April 25, 2003
    Publication date: November 3, 2005
    Inventors: Mats Naslund, Goran Selander, Ulf Vjorkengren
  • Publication number: 20050172127
    Abstract: A system, method and transcoding proxy are described herein that are capable of transcoding encrypted content, like an encrypted multimedia message or a multimedia message containing encrypted elements parts, which is transmitted between two devices (e.g., mobile phones). Basically, the transcoding proxy receives an encrypted multimedia message from a first device (e.g., mobile phone). The transcoding proxy then requests and receives a transcoding rights object (TRO) message from a rights issuer which includes a content encryption key (CEK) and a transcoding permission message (optional). After receiving the TRO message, the transcoding proxy is able to (1) decrypt the encrypted multimedia message (2) transcode the decrypted multimedia message so it matches the capabilities of a second device and could be accessed by a user of the second device (e.g., mobile phone) and (3) re-encrypt the transcoded multimedia message.
    Type: Application
    Filed: January 31, 2004
    Publication date: August 4, 2005
    Inventors: Frank Hartung, Goran Selander
  • Publication number: 20040117500
    Abstract: In a procedure for delivering streaming media, a Client (1) first requests the media from an Order Server (3). The Order Server authenticates the Client and sends a ticket to the Client. Then, the Client sends the ticket to a Streaming Server (5). The Streaming Server checks the ticket for validity and if found valid encrypts the streaming data using a standardized real-time protocol such as the SRTP and transmits the encrypted data to the Client. The Client receives the data and decrypts them. Copyrighted material adapted to streaming can be securely delivered to the Client. The robust protocol used is very well suited for in particular wireless clients and similar devices having a low capacity such as cellular telephones and PDAs.
    Type: Application
    Filed: September 24, 2003
    Publication date: June 17, 2004
    Inventors: Fredrik Lindholm, Rolf Blom, Karl Norrman, Goran Selander, Mats Naslund
  • Publication number: 20030131353
    Abstract: The present invention relates to an arrangement, system and method for managing rights to streaming media using a management mechanism based on a content object and a rights object. In accordance with the invention the content object comprises means for initiation of the streaming media and the rights object comprises usage rules defining the rights to use said streaming media. The invention also relates to a method of delivering and protecting digital streaming media. The initiation may comprise a session description of the streaming media, a SDP description, a URL to said streaming media or a SMIL file. Preview and super-distribution are provided. The content object is delivered like a downloadable object in a rights management system for download, thereby reusing the mechanisms for rights management of said latter system for rights management in a system for transmission of streaming media.
    Type: Application
    Filed: December 11, 2002
    Publication date: July 10, 2003
    Inventors: Rolf Blom, Fredrik Lindholm, Goran Selander