Patents by Inventor Laurence G. Lundblade
Laurence G. Lundblade has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10135613Abstract: Disclosed is a method for generating a privilege-based key using a computer. In the method, a privilege is received from an application, and verified as being associated with the application. The computer cryptographically generates a second key using a first key and the privilege. The second key is provided to the application.Type: GrantFiled: January 13, 2012Date of Patent: November 20, 2018Assignee: QUALCOMM IncorporatedInventors: Ivan Hugh McLean, Laurence G. Lundblade, Brian Harold Kelley, Robert G. Walker
-
Publication number: 20170310677Abstract: A method of providing access to content within a user device is disclosed and may include determining a location of the content, determining whether the content is within an allowed region, and selectively prompting a user to purchase a license to access the content. In a particular aspect, the user may be prompted to purchase the license to the access the content when the content is not within an allowed region. If the license is purchased, the user may be allowed to access the content. The license may be an unlimited license, a limited license, or a transfer license.Type: ApplicationFiled: July 6, 2017Publication date: October 26, 2017Inventors: Mazen CHMAYTELLI, Laurence G. LUNDBLADE
-
Patent number: 9436806Abstract: A method for operating a device to protect an application from unauthorized operation is provided. The application will fail to operate on the device when the device is defined outside a selected operating region. The method includes transmitting the selected operating region for the application, and receiving the application and a geographic identifier associated with the application. The geographic identifier is configured to identify the selected operating region wherein the application will operate on the device. The method further includes transmitting a request to execute the application on the device. The request includes the geographic identifier. Further included in the method is receiving a code. The code prevents an execution of the application on the device if the code is a disable code. The disable code indicates that the device is operating outside the selected operating region. An apparatus for content protection in a wireless network is also provided.Type: GrantFiled: June 18, 2013Date of Patent: September 6, 2016Assignee: QUALCOMM IncorporatedInventors: Mazen Chmaytelli, Laurence G. Lundblade
-
Patent number: 9100403Abstract: Methods, apparatus, and systems are described for providing an accessor device an access credential to interact with a device resource on an accessee device. An authorization entity having a trust relationship with the accessee device, or a linked subordinate authorization entity, generates the access credential. The access credential includes a modification detection indicator, at least one access privilege, and an accessor public key. The at least one access privilege corresponds to at least one device resource on the accessee device. The authorization entity forwards the access credential to the accessor device, which presents the access credential to the accessee device for authentication. Once authenticated, the accessee device grants access to one or more device resources, and controls requests to insure they are within the scope of the at least one access privilege.Type: GrantFiled: August 6, 2013Date of Patent: August 4, 2015Assignee: QUALCOMM, IncorporatedInventors: Matthew W. Hohlfeld, Laurence G. Lundblade
-
Publication number: 20130326596Abstract: Methods, apparatus, and systems are described for providing an accessor device an access credential to interact with a device resource on an accessee device. An authorization entity having a trust relationship with the accessee device, or a linked subordinate authorization entity, generates the access credential. The access credential includes a modification detection indicator, at least one access privilege, and an accessor public key. The at least one access privilege corresponds to at least one device resource on the accessee device. The authorization entity forwards the access credential to the accessor device, which presents the access credential to the accessee device for authentication. Once authenticated, the accessee device grants access to one or more device resources, and controls requests to insure they are within the scope of the at least one access privilege.Type: ApplicationFiled: August 6, 2013Publication date: December 5, 2013Applicant: QUALCOMM IncorporatedInventors: Matthew W. HOHLFELD, Laurence G. LUNDBLADE
-
Publication number: 20130283395Abstract: A method for operating a device to protect an application from unauthorized operation is provided. The application will fail to operate on the device when the device is defined outside a selected operating region. The method includes transmitting the selected operating region for the application, and receiving the application and a geographic identifier associated with the application. The geographic identifier is configured to identify the selected operating region wherein the application will operate on the device. The method further includes transmitting a request to execute the application on the device. The request includes the geographic identifier. Further included in the method is receiving a code. The code prevents an execution of the application on the device if the code is a disable code. The disable code indicates that the device is operating outside the selected operating region. An apparatus for content protection in a wireless network is also provided.Type: ApplicationFiled: June 18, 2013Publication date: October 24, 2013Inventors: Mazen CHMAYTELLI, Laurence G. LUNDBLADE
-
Patent number: 8505078Abstract: Methods, apparatus, and systems are described for providing an accessor device an access credential to interact with a device resource on an accessee device. An authorization entity having a trust relationship with the accessee device, or a linked subordinate authorization entity, generates the access credential. The access credential includes a modification detection indicator, at least one access privilege, and an accessor public key. The at least one access privilege corresponds to at least one device resource on the accessee device. The authorization entity forwards the access credential to the accessor device, which presents the access credential to the accessee device for authentication. Once authenticated, the accessee device grants access to one or more device resources, and controls requests to insure they are within the scope of the at least one access privilege.Type: GrantFiled: December 17, 2009Date of Patent: August 6, 2013Assignee: QUALCOMM IncorporatedInventors: Matthew W. Hohlfeld, Laurence G. Lundblade
-
Publication number: 20130182838Abstract: Disclosed is a method for generating a privilege-based key using a computer. In the method, a privilege is received from an application, and verified as being associated with the application. The computer cryptographically generates a second key using a first key and the privilege. The second key is provided to the application.Type: ApplicationFiled: January 13, 2012Publication date: July 18, 2013Applicant: QUALCOMM IncorporatedInventors: Brian Harold Kelley, Robert G. Walker, Ivan Hugh McLEAN, Laurence G. Lundblade
-
Patent number: 8321680Abstract: Embodiments describe a system and/or method for multiple party digital signatures. According to a first aspect a method comprises establishing a first validity range for a first key, establishing a first validity range for at least a second key, and determining if the validity range of the first key overlaps the first validity range of the at least a second key. A certificate is signed with the first validity range of the first key and the first validity range of the at least a second key if the validity ranges overlap. According to another embodiment, signage of the certificate is refused if the first validity range of the first key does not overlap with the first validity range of the at least a second key.Type: GrantFiled: December 9, 2010Date of Patent: November 27, 2012Assignee: QUALCOMM IncorporatedInventors: Alexander Gantman, Aram Perez, Gregory G. Rose, Laurence G. Lundblade, Matthew W. Hohfeld, Michael W. Paddon, Oliver Michaelis, Ricardo Jorge Lopez
-
Publication number: 20110010383Abstract: Methods and systems streamline remote device management by eliminating the need to download device configuration data when no configuration changes have been made since the last device management session. A device may record data enabling it to determine whether configurations have changed since a last session with a device management server. Device management servers may record configurations of devices. While initiating a device management session, a device can inform the device management server whether an intervening configuration change has occurred. If no intervening configuration changes have occurred, the device management server can forgo obtaining the device's configuration data, saving communication time and bandwidth. If an intervening configuration change has occurred, the remote device may inform the server of the URI of the changed configuration item, enabling the server to request download of just the changed item.Type: ApplicationFiled: August 31, 2009Publication date: January 13, 2011Inventors: Peter C. THOMPSON, Laurence G. LUNDBLADE
-
Publication number: 20100269156Abstract: Methods, apparatus, and systems are described for providing an accessor device an access credential to interact with a device resource on an accessee device. An authorization entity having a trust relationship with the accessee device, or a linked subordinate authorization entity, generates the access credential. The access credential includes a modification detection indicator, at least one access privilege, and an accessor public key. The at least one access privilege corresponds to at least one device resource on the accessee device. The authorization entity forwards the access credential to the accessor device, which presents the access credential to the accessee device for authentication. Once authenticated, the accessee device grants access to one or more device resources, and controls requests to insure they are within the scope of the at least one access privilege.Type: ApplicationFiled: December 17, 2009Publication date: October 21, 2010Inventors: Matthew W. HOHLFELD, Laurence G. LUNDBLADE
-
Publication number: 20090183264Abstract: A method of providing access to content within a user device is disclosed and may include determining a location of the content, determining whether the content is within an allowed region, and selectively prompting a user to purchase a license to access the content. In a particular aspect, the user may be prompted to purchase the license to the access the content when the content is not within an allowed region. If the license is purchased, the user may be allowed to access the content. The license may be an unlimited license, a limited license, or a transfer license.Type: ApplicationFiled: December 5, 2008Publication date: July 16, 2009Applicant: QUALCOMM IncorporatedInventors: Mazen Chmaytelli, Laurence G. Lundblade