Patents by Inventor Joao Girao

Joao Girao has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10313142
    Abstract: For providing a simple network access process which can be used for accessing network with focus on a single service a process for providing network access for a user via a Network Provider (NP) to a Service Provider (SP) is claimed, the process including: establishing a connection between the user and the Network Provider (NP) by user's request to access the Service Provider (SP); authenticating of the user by a user's Identity Provider (IdP) on request of the Network Provider (NP); transmitting data from the Identity Provider (IdP) to the Network Provider (NP), so that the Network Provider (NP) has the information that the Service Provider (SP) or a third party is payee of the access fees; and providing the access for the user via the Network Provider (NP) to the Service Provider (SP) by the Network Provider (NP).
    Type: Grant
    Filed: July 22, 2009
    Date of Patent: June 4, 2019
    Assignee: NEC CORPORATION
    Inventors: Hugo Santos, Joao Girao
  • Patent number: 9710674
    Abstract: A method for executing applications on an untrusted device includes selecting one or more applications as sensitive applications. One or more instruction sequences of the said one or more sensitive applications are modified by an external dongle. The one or more sensitive applications are executed on the untrusted device according to the modified instruction sequences. Whether correct execution of the instructions of the said modified instruction sequences has occurred is checked by the external dongle.
    Type: Grant
    Filed: November 6, 2013
    Date of Patent: July 18, 2017
    Assignee: NEC CORPORATION
    Inventors: Ghassan Karame, Joao Girao, Wenting Li
  • Patent number: 9609000
    Abstract: A method for executing a secure application on an untrusted user equipment having storage means with at least one protected region includes establishing a secure or authenticated communication channel between a trusted device and the user equipment. Secure application information of the secure application is provided via the communication channel to be executed on the user equipment. Correctness of the secure application information is checked. Execution of the secure application is initiated on the user equipment via the communication channel such that the secure application is stored in the protected region of the storage means.
    Type: Grant
    Filed: May 10, 2013
    Date of Patent: March 28, 2017
    Assignee: NEC CORPORATION
    Inventors: Ghassan Karame, Joao Girao
  • Publication number: 20150326584
    Abstract: A method for executing a secure application on an untrusted user equipment having storage means with at least one protected region includes establishing a secure or authenticated communication channel between a trusted device and the user equipment. Secure application information of the secure application is provided via the communication channel to be executed on the user equipment. Correctness of the secure application information is checked. Execution of the secure application is initiated on the user equipment via the communication channel such that the secure application is stored in the protected region of the storage means.
    Type: Application
    Filed: May 10, 2013
    Publication date: November 12, 2015
    Inventors: Ghassan KARAME, Joao GIRAO
  • Publication number: 20150254468
    Abstract: A method for executing applications on an untrusted device includes selecting one or more applications as sensitive applications. One or more instruction sequences of the said one or more sensitive applications are modified by an external dongle. The one or more sensitive applications are executed on the untrusted device according to the modified instruction sequences. Whether correct execution of the instructions of the said modified instruction sequences has Occurred is checked by the external dongle.
    Type: Application
    Filed: November 6, 2013
    Publication date: September 10, 2015
    Applicant: NEC Europe Ltd.
    Inventors: Ghassan Karame, Joao Girao, Wenting Li
  • Patent number: 9032487
    Abstract: A method and system for providing service access to a user, includes the steps of: a) Registering a local identity provider located in al local network at a global identity provider with a local identifier of the local identity provider, b) Requesting service access requiring identity authentication to a service provider by a user located in the local network, c) Requesting an identity management service from the global identity provider by the service provider, d) Redirecting the user's access request to the local identity provider according to the provided local identifier within the local network, e) Checking if the local identifier corresponds to the local network of the user, f) Providing the requested identity management service to the service provider by the global identity provider in accordance with a result of the checking according to step e), and g) Granting service access for the user to the service provider.
    Type: Grant
    Filed: November 11, 2011
    Date of Patent: May 12, 2015
    Assignee: NEC Europe Ltd.
    Inventors: Marcus Kuhnen, Joao Girao, Yukiko Endo
  • Patent number: 9003187
    Abstract: Method for supporting a reputation mechanism in a network including one or more domains with one or more users being connected to the domains, one or more Identity Providers that manage identity information, and at least one entity that functions as Web Service Consumer for the users. When a user requests a Web Service Consumer of one of the domains for a web service provided by a Web Service Provider, the requested Web Service Consumer requests its known Identity Providers regarding a recommendation of the Web Service Provider. The Identity Providers function as recommendation aggregators by collecting reputation assessments of the Web Service Provider from entities registered on the Identity Providers who return an aggregated recommendation to the requested Web Service Consumer that determines a trust assessment about the Web Service Provider. A privacy homomorphism is employed for providing an encrypted exchange of recommendation related information.
    Type: Grant
    Filed: October 29, 2010
    Date of Patent: April 7, 2015
    Assignee: NEC Europe Ltd.
    Inventors: Joao Girao, Felix Gomez Marmol
  • Patent number: 8638928
    Abstract: A key exchanging apparatus transmits the contribution data to the plurality of counterpart apparatuses, generates a signer contribution confirmation signature with respect to a contribution data set including all the contribution data received from the plurality of counterpart apparatuses, generates auxiliary data and auxiliary data validity certification sentence from the contribution data set and the contribution random number, transmits the auxiliary data, the auxiliary data validity certification sentence and the contribution confirmation signature to the plurality of counterpart apparatuses, verifies validity of auxiliary data by using the counterpart identifier set, the counterpart public key set, the contribution confirmation signature set including the data received from the plurality of counterpart apparatuses, the auxiliary data set and the auxiliary data validity certification sentence set, and generates a public key from the contribution data set and the auxiliary data received from the plurality
    Type: Grant
    Filed: April 17, 2008
    Date of Patent: January 28, 2014
    Assignee: NEC Corporation
    Inventors: Jun Furukawa, Frederik Armknecht, Joao Girao
  • Patent number: 8606879
    Abstract: A method for supporting management and exchange of distributed data of a user or an entity, in particular user profile information data, is characterized in that a protocol is provided that employs SAML (Security Assertion Markup Language) as bearer protocol in such a way that SAML messages function as containers for DST (Data Service Template) or DST-like messages in order to compose SAML DST messages, wherein the DST or DST-like messages include data processing information, and wherein for the DST or DST-like messages unified protocol namespaces are defined as the protocol specific namespaces.
    Type: Grant
    Filed: March 12, 2010
    Date of Patent: December 10, 2013
    Assignee: NEC Europe Ltd.
    Inventors: Florian Winkler, Joao Girao, Hugo Santos, Joao Dá Silva
  • Publication number: 20130304488
    Abstract: A method coordinating home services is provided, including receiving a request for home services from a customer over a network and forwarding the request from the customer to a home services coordinator over the network. A reputation system assists the home services coordinator to select a service provider based on customer needs, preferences, and a reputation of the service provider. Information sufficient to permit the service provider to select a home delivery provider that can satisfy customer needs is provided to the selected service provider over the network. The selected home delivery provider is provided with access to customer data and with access to a customer physical system over the network, to provide the service. Feedback is requested from the customer after the service has been delivered, and is used in the reputation system to update the customer preferences and the reputation of the service provider.
    Type: Application
    Filed: May 8, 2013
    Publication date: November 14, 2013
    Inventors: Joao Girao, Brigitta Lange, Nils Gruschka, Gines Dolera Tormo, Felix Gomez Marmol
  • Publication number: 20130219474
    Abstract: A method and system for providing service access to a user, includes the steps of: a) Registering a local identity provider located in al local network at a global identity provider with a local identifier of the local identity provider, b) Requesting service access requiring identity authentication to a service provider by a user located in the local network, c) Requesting an identity management service from the global identity provider by the service provider, d) Redirecting the user's access request to the local identity provider according to the provided local identifier within the local network, e) Checking if the local identifier corresponds to the local network of the user, f) Providing the requested identity management service to the service provider by the global identity provider in accordance with a result of the checking according to step e), and g) Granting service access for the user to the service provider.
    Type: Application
    Filed: November 11, 2011
    Publication date: August 22, 2013
    Applicant: NEC EUROPE LTD.
    Inventors: Marcus Kuhnen, Joao Girao, Yukiko Endo
  • Patent number: 8510550
    Abstract: A method for managing data in a preferably non real-time sensor network, wherein the network comprises a multitude of sensor nodes to sense data, wherein the network is divided into clusters with each consisting of several sensor nodes, wherein within each cluster a sensor node acts as aggregator node to aggregate the sensed data of the rest of the sensor nodes of the cluster, and wherein always a pre-configurable number of neighbored clusters are combined to groups and the data aggregated within a cluster are stored by the aggregator node of the cluster itself and in addition by another aggregator node of a cluster of the respective group is characterized in that the data is encrypted with homomorphic methods before being stored persistently.
    Type: Grant
    Filed: June 26, 2006
    Date of Patent: August 13, 2013
    Assignee: NEC Corporation
    Inventors: Dirk Westhoff, Joao Girao, Einar Mykletun
  • Patent number: 8340301
    Abstract: A method for establishing a secret key between two nodes in a communication network, in particular in a wireless local area network (WLAN), includes concealment of the fact that a key exchange occurs, one of the nodes—first node (B)—broadcasts one or more packets (Pi) that can be received by the other node—second node (A)—, wherein the packets (Pi) contain each a first key (Ki) and wherein the packets (Pi) are each encrypted with a second key (ki) before being sent, the second node (A) randomly chooses one packet (Pm) from the packets (Pi) received and breaks the encryption of the chosen packet (Pm) in order to obtain the first key (Km), and the second node (A) initiates a key exchange protocol, wherein the second node (A) encrypts the message to be sent for initiating the key exchange protocol with the revealed key (Km).
    Type: Grant
    Filed: July 30, 2007
    Date of Patent: December 25, 2012
    Assignee: NEC Europe, Ltd.
    Inventors: Joao Girao, Frederik Armknecht, Alfredo Matos, Rui Luis Aguiar
  • Patent number: 8295491
    Abstract: A method for aggregating data in a network, particularly in a wireless sensor network, wherein the network (1) includes a plurality of sensor nodes (Ni) to measure data and at least one sink node (S) at which the data measured by the sensor nodes (Ni) are aggregated, and wherein each sensor node (Ni) encrypts its measured data with a key k and forwards the result towards the sink node (S), is characterized in that, in the context of a key distribution within the network (1), a master key K is chosen, and that the master key K is autonomously split up by the network (1) into individual keys ki to be used by the sensor nodes (Ni) for encrypting measured data, with the sum of all individual keys ki being equal to the master key K.
    Type: Grant
    Filed: April 25, 2007
    Date of Patent: October 23, 2012
    Assignee: NEC Europe Ltd.
    Inventors: Frederik Armknecht, Joao Girao, Dirk Westhoff
  • Publication number: 20120260092
    Abstract: Method for supporting a reputation mechanism in a network including one or more domains with one or more users being connected to the domains, one or more Identity Providers that manage identity information, and at least one entity that functions as Web Service Consumer for the users. When a user requests a Web Service Consumer of one of the domains for a web service provided by a Web Service Provider, the requested Web Service Consumer requests its known Identity Providers regarding a recommendation of the Web Service Provider. The Identity Providers function as recommendation aggregators by collecting reputation assessments of the Web Service Provider from entities registered on the Identity Providers who return an aggregated recommendation to the requested Web Service Consumer that determines a trust assessment about the Web Service Provider. A privacy homomorphism is employed for providing an encrypted exchange of recommendation related information.
    Type: Application
    Filed: October 29, 2010
    Publication date: October 11, 2012
    Applicant: NEC EUROPE LTD.
    Inventors: Joao Girao, Felix Gomez Marmol
  • Publication number: 20120042042
    Abstract: A method for supporting management and exchange of distributed data of a user or an entity, in particular user profile information data, is characterized in that a protocol is provided that employs SAML (Security Assertion Markup Language) as bearer protocol in such a way that SAML messages function as containers for DST (Data Service Template) or DST-like messages in order to compose SAML DST messages, wherein the DST or DST-like messages include data processing information, and wherein for the DST or DST-like messages unified protocol namespaces are defined as the protocol specific namespaces.
    Type: Application
    Filed: March 12, 2010
    Publication date: February 16, 2012
    Applicant: NEC EUROPE LTD.
    Inventors: Florian Winkler, Joao Girao, Hugo Santos, Joao Da Silva
  • Publication number: 20110307939
    Abstract: Provided is an account issuance system that can open an account owner in a service server to the outside without revealing personal information. Terminal 1 transmits joint identification information set by a user to account server 3. After having received the joint identification information from terminal 1, account server 3 generates a public ID to enable a third party different from the user to identify the user by using the joint identification information and a unique ID, and transmits the public ID to user terminal 1. After having received the public ID, user terminal 1 transmits the public ID to service server 2. After having received the public ID from user terminal 1, service server 2 sets the public ID so that the public ID can be opened to the outside.
    Type: Application
    Filed: February 4, 2010
    Publication date: December 15, 2011
    Inventors: Aya Okashita, Joao Girao
  • Patent number: 8024573
    Abstract: A method for authentication of elements of a group, especially for authentication of sensor nodes in a preferably wireless sensor network is disclosed. The group has one specific element—leading element—with which each of the group elements can exchange information and wherein the authentication of the group elements takes place with regard to the leading element. The leading element sends an authentication request to the group elements wherein the authentication request is the same for all the group elements. The group elements each send authentication responses—based on the authentication request—to the leading element, with the authentication responses being different for each group element.
    Type: Grant
    Filed: October 5, 2005
    Date of Patent: September 20, 2011
    Assignee: NEC Corporation
    Inventors: Dirk Westhoff, Joao Girao
  • Publication number: 20110213688
    Abstract: For providing a simple network access process which can be used for accessing network with focus on a single service a process for providing network access for a user via a Network Provider (NP) to a Service Provider (SP) is claimed, the process including: establishing a connection between the user and the Network Provider (NP) by user's request to access the Service Provider (SP); authenticating of the user by a user's Identity Provider (IdP) on request of the Network Provider (NP); transmitting data from the Identity Provider (IdP) to the Network Provider (NP), so that the Network Provider (NP) has the information that the Service Provider (SP) or a third party is payee of the access fees; and providing the access for the user via the Network Provider (NP) to the Service Provider (SP) by the Network Provider (NP).
    Type: Application
    Filed: July 22, 2009
    Publication date: September 1, 2011
    Applicant: NEC EUROPE LTD.
    Inventors: Hugo Santos, Joao Girao
  • Publication number: 20100319068
    Abstract: A method for performing delegation of resources, in particular services, wherein a user—resource owner—has access to a resource offered by a service provider and wherein the resource is delegated to at least one other user—delegate—by using delegation credentials, is characterized in that the method includes the steps of defining authorization rules for the delegate regarding resource access restrictions and registering the authorization rules at an identity provider thereby employing the delegation credentials, performing an authentication of the delegate at the service provider, and performing an authorization of the delegate at the identity provider based on the authorization rules. Furthermore, a corresponding system is disclosed.
    Type: Application
    Filed: August 27, 2008
    Publication date: December 16, 2010
    Applicant: NEC EUROPE LTD
    Inventors: Daniele Abbadessa, Joao Girao