Patents by Inventor Kent RAGER

Kent RAGER has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8880894
    Abstract: A method, telecommunication apparatus, and electronic device for securely creating an identity data block are disclosed. A secure memory 208 may store a unique private key 326 associated with a unique public key 328. A processor 204 may generate the identity data block 332 in the secure memory 208 using the unique private key 326. The processor 204 may erase the unique private key 326 from the secure memory 208.
    Type: Grant
    Filed: June 26, 2009
    Date of Patent: November 4, 2014
    Assignee: Motorola Mobility LLC
    Inventors: Joel Voss, Joseph Hansen, Kent Rager
  • Patent number: 8412270
    Abstract: A method, telecommunication apparatus, and electronic device for securely using a subscriber identity module are disclosed. A secure memory 308 may store a secure international mobile subscriber identity. A subscriber identity module interface 312 may receive an unlocking international mobile subscriber identity. A processor 304 may erase a cache temporary mobile subscriber identity if the unlocking international mobile subscriber identity does not match the secure international mobile subscriber identity.
    Type: Grant
    Filed: August 8, 2008
    Date of Patent: April 2, 2013
    Assignee: Motorola Mobility LLC
    Inventors: Kent Rager, Joel Voss
  • Publication number: 20100169660
    Abstract: A method, telecommunication apparatus, and electronic device for securely creating an identity data block are disclosed. A secure memory 208 may store a unique private key 326 associated with a unique public key 328. A processor 204 may generate the identity data block 332 in the secure memory 208 using the unique private key 326. The processor 204 may erase the unique private key 326 from the secure memory 208.
    Type: Application
    Filed: June 26, 2009
    Publication date: July 1, 2010
    Applicant: Motorola, Inc.
    Inventors: Joel Voss, Joseph Hansen, Kent Rager
  • Publication number: 20100035577
    Abstract: A method, telecommunication apparatus, and electronic device for securely using a subscriber identity module are disclosed. A secure memory 308 may store a secure international mobile subscriber identity. A subscriber identity module interface 312 may receive an unlocking international mobile subscriber identity. A processor 304 may erase a cache temporary mobile subscriber identity if the unlocking international mobile subscriber identity does not match the secure international mobile subscriber identity.
    Type: Application
    Filed: August 8, 2008
    Publication date: February 11, 2010
    Applicant: Motorola, Inc.
    Inventors: Kent RAGER, Joel Voss
  • Publication number: 20070155363
    Abstract: A method and system for restricting at least partial usage of a wireless communication device 300, like a mobile telephone, includes a comparison of identification information 308 read from a user configuration module 307 with one or more restricted access identification codes. Where there is a match, some or all usage of the wireless communication 300 device is restricted. A usage restriction module 309 then compares the identification information 308 with one or more restricted access identification codes, which identify one or more networks associated with service providers with which usage of the wireless communication device is restricted. Where there is a match, at least partial use of the wireless communication device 300 is restricted.
    Type: Application
    Filed: December 30, 2005
    Publication date: July 5, 2007
    Inventors: Kent Rager, Bruce Brda, Philip Gilchrist
  • Publication number: 20070077915
    Abstract: A method and apparatus for modular authentication of a wireless communication device (120) including a portable communication device (210) and a wireless communication module (220) coupleable thereto is disclosed. When the wireless communication module (220) receives information (706) from the portable communication device (210), it determines whether the information received is authentic information (710) and operates together with the portable communication device (210) as a wireless communication device (120) in a communication system (100) in response to the information received being authentic information (720). In addition, a method and apparatus is disclosed for checking subsidy lock in a wireless communication device (120) capable of operating in a communication system (100), the wireless communication device comprising a first module (210), a second module (220) and a subscriber identity module (230) coupled to the first and second modules (210, 220).
    Type: Application
    Filed: September 30, 2005
    Publication date: April 5, 2007
    Inventors: Greg Black, Joel Clark, Kent Rager
  • Publication number: 20070050622
    Abstract: Techniques are provided for preventing replacement of a one-time-programmable (OTP) component. The OTP component can be part of a wireless device. The wireless device is configured such that programming of a new IMEI code into the OTP component is permitted only when the wireless device is in a secure-mode state. A challenge-response protocol is used to place the wireless device in this secure-mode state.
    Type: Application
    Filed: September 1, 2005
    Publication date: March 1, 2007
    Inventors: Kent Rager, Joseph Hansen, Keyur Khambholja, Joel Voss
  • Publication number: 20060258349
    Abstract: A method in a communication device (106) comprises registering (202) on a first network (102), identified by a first network ID, stored in the communication device. Then receiving, from the service provider, an acting network ID which identifies a second network (104). Storing the acting network ID on the communication device and reprioritizing the second network, identified by the received acting network ID, as the home network. The communication device then registers on the second network in response to the reprioritizing the second network.
    Type: Application
    Filed: May 12, 2005
    Publication date: November 16, 2006
    Inventors: Kent Rager, Marcia Otting, David Theobald
  • Publication number: 20050107083
    Abstract: A method in a wireless communications device, including determining (410) whether the device is operating in a network other than a home network, for example, an H-PLMN, of the wireless communications device, determining (450) whether to search for the home network of the wireless communications device when not operating in the home network by comparing network record information associated with the network in which the mobile wireless communications device is operating to reference information. In some embodiments, the wireless communications device indicates (420) that it is operating in a network, e.g., a virtual home network, other than the network, e.g., a roaming network, in which it is operating based on the network record information.
    Type: Application
    Filed: November 19, 2003
    Publication date: May 19, 2005
    Inventors: Kent Rager, Marcia Otting
  • Publication number: 20050045717
    Abstract: A method (300, 400) to provide for provisioning and a product. In one embodiment a processor (210) receives a pre-configured data image and writes it to a first area (221) of non-volatile memory (220) using, for example a first writing mode. Thereafter, for example after a power cycle the processor (210) determines whether an update to a second area of the non-volatile memory is required, and if so converts a first data item from the first area into a second data item uniquely associated with the product unit and writes the second data item in a second area (222) using a second writing mode.
    Type: Application
    Filed: August 29, 2003
    Publication date: March 3, 2005
    Inventors: Kent Rager, Amitkumar Balar, Itzhak Mizrahi