Patents by Inventor Lawrence Tang

Lawrence Tang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230362144
    Abstract: Methods are disclosed for creating a virtual encryption session prior to video streaming content being requested to reduce or eliminate delay in initialization of the encryption session and content delivery to the customer. A virtual session has control word(s) (CW) and virtual entitlement control message(s) (ECM) that are devoid of content specific information. One or more virtual sessions may be stored at an edge device and may be used to encrypt the first portion of a content stream while a content-specific encryption session is being initiated. An edge device may store at least a certain quantity of virtual encryption sessions in anticipation of, for example, receiving multiple content streams.
    Type: Application
    Filed: July 12, 2023
    Publication date: November 9, 2023
    Inventors: Madhu Penugonda, Lawrence Tang
  • Patent number: 11750576
    Abstract: Methods are disclosed for creating a virtual encryption session prior to video streaming content being requested to reduce or eliminate delay in initialization of the encryption session and content delivery to the customer. A virtual session has control word(s) (CW) and virtual entitlement control message(s) (ECM) that are devoid of content specific information. One or more virtual sessions may be stored at an edge device and may be used to encrypt the first portion of a content stream while a content-specific encryption session is being initiated.
    Type: Grant
    Filed: July 28, 2021
    Date of Patent: September 5, 2023
    Assignee: Combined Conditional Access Development And Support, LLC
    Inventors: Madhu Penugonda, Lawrence Tang
  • Patent number: 11552786
    Abstract: Systems and methods for data authentication can comprise processing a first secret element to generate a first encrypted secret element, processing a second secret element to generate a non-secret element, and processing the first encrypted secret element and the non-secret element to generate an encrypted data block.
    Type: Grant
    Filed: August 28, 2020
    Date of Patent: January 10, 2023
    Assignee: COMBINED CONDITIONAL ACCESS DEVELOPMENT AND SUPPORT, LLC
    Inventors: Lawrence Tang, Kenneth P. Miller, Christopher J. Bennett
  • Patent number: 11418339
    Abstract: An apparatus, method, system and computer-readable medium are provided for preserving an encryption of data when confronted by an attack, such as a side channel analysis (SCA) attack based on a statistical analysis. In some embodiments, hardware, software, and/or firmware associated with an encryption calculation may be exercised or accessed during a background operation when an actual or real operation is not taking place. During the background operation, dummy values for data and one or more keys may be input to the hardware. A switching between the real operation and the background operation may take place seamlessly such that measurement of a physical characteristic associated with the hardware is indistinguishable in terms of when the real and background operations are active. In this manner, the secrecy of a key used in connection with the real operation may be preserved.
    Type: Grant
    Filed: December 18, 2014
    Date of Patent: August 16, 2022
    Assignee: Combined Conditional Access Development & Support, LLC (CCAD)
    Inventors: Lawrence Tang, An Tonthat
  • Publication number: 20220021661
    Abstract: Methods are disclosed for creating a virtual encryption session prior to video streaming content being requested to reduce or eliminate delay in initialization of the encryption session and content delivery to the customer. A virtual session has control word(s) (CW) and virtual entitlement control message(s) (ECM) that are devoid of content specific information. One or more virtual sessions may be stored at an edge device and may be used to encrypt the first portion of a content stream while a content-specific encryption session is being initiated.
    Type: Application
    Filed: July 28, 2021
    Publication date: January 20, 2022
    Inventors: Madhu Penugonda, Lawrence Tang
  • Patent number: 11108743
    Abstract: Methods are disclosed for creating a virtual encryption session prior to video streaming content being requested to reduce or eliminate delay in initialization of the encryption session and content delivery to the customer. A virtual session has control word(s) (CW) and virtual entitlement control message(s) (ECM) that are devoid of content specific information. One or more virtual sessions may be stored at an edge device and may be used to encrypt the first portion of a content stream while a content-specific encryption session is being initiated.
    Type: Grant
    Filed: June 19, 2019
    Date of Patent: August 31, 2021
    Assignee: Combined Conditional Access Development And Support, LLC
    Inventors: Madhu Penugonda, Lawrence Tang
  • Publication number: 20210119783
    Abstract: Systems and methods for data authentication can comprise processing a first secret element to generate a first encrypted secret element, processing a second secret element to generate a non-secret element, and processing the first encrypted secret element and the non-secret element to generate an encrypted data block.
    Type: Application
    Filed: August 28, 2020
    Publication date: April 22, 2021
    Inventors: Lawrence Tang, Kenneth P. Miller, Christopher J. Bennett
  • Patent number: 10797864
    Abstract: Systems and methods for data authentication can comprise processing a first secret element to generate a first encrypted secret element, processing a second secret element to generate a non-secret element, and processing the first encrypted secret element and the non-secret element to generate an encrypted data block.
    Type: Grant
    Filed: November 21, 2011
    Date of Patent: October 6, 2020
    Assignee: Combined Conditional Access Development And Support, LLC
    Inventors: Lawrence Tang, Kenneth P. Miller, Christopher J. Bennett
  • Publication number: 20200014665
    Abstract: Methods are disclosed for creating a virtual encryption session prior to video streaming content being requested to reduce or eliminate delay in initialization of the encryption session and content delivery to the customer. A virtual session has control word(s) (CW) and virtual entitlement control message(s) (ECM) that are devoid of content specific information. One or more virtual sessions may be stored at an edge device and may be used to encrypt the first portion of a content stream while a content-specific encryption session is being initiated.
    Type: Application
    Filed: June 19, 2019
    Publication date: January 9, 2020
    Inventors: Madhu Penugonda, Lawrence Tang
  • Patent number: 10375030
    Abstract: Methods are disclosed for creating a virtual encryption session prior to video streaming content being requested to reduce or eliminate delay in initialization of the encryption session and content delivery to the customer. A virtual session has control word(s) (CW) and virtual entitlement control message(s) (ECM) that are devoid of content specific information. One or more virtual sessions may be stored at an edge device and may be used to encrypt the first portion of a content stream while a content-specific encryption session is being initiated.
    Type: Grant
    Filed: June 24, 2016
    Date of Patent: August 6, 2019
    Assignee: Combined Conditional Access Development & Support
    Inventors: Madhu Penugonda, Lawrence Tang
  • Patent number: 9930390
    Abstract: Methods, systems, computer-readable media, and apparatuses for providing control word and associated entitlement control message (ECM) functionalities are presented. In some embodiments, a computing device may cache concurrently a first set of control words and a first set of entitlement control messages (ECMs) associated with the first set of control words. The computing device may encrypt a transport stream with a particular control word of the first set of control words. The computing device may insert a particular ECM, of the first set of ECMs, corresponding to the particular control word into the transport stream sent to a device downstream from the computing device. In some embodiments, a computing device may reuse control words and associated ECMs.
    Type: Grant
    Filed: September 19, 2016
    Date of Patent: March 27, 2018
    Assignee: Combined Conditional Access Development & Support, LLC
    Inventors: Madhu Penugonda, Lawrence Tang, Kenneth Miller, Douglas Petty
  • Publication number: 20170374035
    Abstract: Methods are disclosed for creating a virtual encryption session prior to video streaming content being requested to reduce or eliminate delay in initialization of the encryption session and content delivery to the customer. A virtual session has control word(s) (CW) and virtual entitlement control message(s) (ECM) that are devoid of content specific information. One or more virtual sessions may be stored at an edge device and may be used to encrypt the first portion of a content stream while a content-specific encryption session is being initiated.
    Type: Application
    Filed: June 24, 2016
    Publication date: December 28, 2017
    Inventors: Madhu Penugonda, Lawrence Tang
  • Publication number: 20170105035
    Abstract: Methods, systems, computer-readable media, and apparatuses for providing control word and associated entitlement control message (ECM) functionalities are presented. In some embodiments, a computing device may cache concurrently a first set of control words and a first set of entitlement control messages (ECMs) associated with the first set of control words. The computing device may encrypt a transport stream with a particular control word of the first set of control words. The computing device may insert a particular ECM, of the first set of ECMs, corresponding to the particular control word into the transport stream sent to a device downstream from the computing device. In some embodiments, a computing device may reuse control words and associated ECMs.
    Type: Application
    Filed: September 19, 2016
    Publication date: April 13, 2017
    Inventors: Madhu Penugonda, Lawrence Tang, Kenneth Miller, Douglas Petty
  • Patent number: 9531778
    Abstract: Disclosed are systems and methods for controlling an amount and rate of security related information (e.g., content encryption or rights management information) being transmitted in a content stream to a user device. In one aspect, the disclosure provides a method and related apparatuses for reducing bandwidth usage required when sending transitional security related information during a transition point of different content in a content stream.
    Type: Grant
    Filed: July 24, 2014
    Date of Patent: December 27, 2016
    Assignee: Combined Conditional Access Development and Support, LLC
    Inventors: Kenneth Miller, Lawrence Tang
  • Patent number: 9473463
    Abstract: Methods, systems, computer-readable media, and apparatuses for providing control word and associated entitlement control message (ECM) functionalities are presented. In some embodiments, a computing device may cache concurrently a first set of control words and a first set of entitlement control messages (ECMs) associated with the first set of control words. The computing device may encrypt a transport stream with a particular control word of the first set of control words. The computing device may insert a particular ECM, of the first set of ECMs, corresponding to the particular control word into the transport stream sent to a device downstream from the computing device. In some embodiments, a computing device may reuse control words and associated ECMs.
    Type: Grant
    Filed: July 29, 2014
    Date of Patent: October 18, 2016
    Assignee: Combined Conditional Access Development & Support, LLC
    Inventors: Madhu Penugonda, Lawrence Tang, Kenneth Miller, Douglas Petty
  • Publication number: 20160036783
    Abstract: Methods, systems, computer-readable media, and apparatuses for providing control word and associated entitlement control message (ECM) functionalities are presented. In some embodiments, a computing device may cache concurrently a first set of control words and a first set of entitlement control messages (ECMs) associated with the first set of control words. The computing device may encrypt a transport stream with a particular control word of the first set of control words. The computing device may insert a particular ECM, of the first set of ECMs, corresponding to the particular control word into the transport stream sent to a device downstream from the computing device. In some embodiments, a computing device may reuse control words and associated ECMs.
    Type: Application
    Filed: July 29, 2014
    Publication date: February 4, 2016
    Applicant: COMBINED CONDITIONAL ACCESS DEVELOPMENT AND SUPPORT, LLC
    Inventors: Madhu Penugonda, Lawrence Tang, Kenneth Miller, Douglas Petty
  • Publication number: 20160028785
    Abstract: Disclosed are systems and methods for controlling an amount and rate of security related information (e.g., content encryption or rights management information) being transmitted in a content stream to a user device. In one aspect, the disclosure provides a method and related apparatuses for reducing bandwidth usage required when sending transitional security related information during a transition point of different content in a content stream.
    Type: Application
    Filed: July 24, 2014
    Publication date: January 28, 2016
    Inventors: Kenneth Miller, Lawrence Tang
  • Publication number: 20150104011
    Abstract: An apparatus, method, system and computer-readable medium are provided for preserving an encryption of data when confronted by an attack, such as a side channel analysis (SCA) attack based on a statistical analysis. In some embodiments, hardware, software, and/or firmware associated with an encryption calculation may be exercised or accessed during a background operation when an actual or real operation is not taking place. During the background operation, dummy values for data and one or more keys may be input to the hardware. A switching between the real operation and the background operation may take place seamlessly such that measurement of a physical characteristic associated with the hardware is indistinguishable in terms of when the real and background operations are active. In this manner, the secrecy of a key used in connection with the real operation may be preserved.
    Type: Application
    Filed: December 18, 2014
    Publication date: April 16, 2015
    Applicant: Combined Conditional Access Development & Support, LLC
    Inventors: Lawrence Tang, An Tonthat
  • Publication number: 20130129080
    Abstract: Systems and methods for data authentication can comprise processing a first secret element to generate a first encrypted secret element, processing a second secret element to generate a non-secret element, and processing the first encrypted secret element and the non-secret element to generate an encrypted data block.
    Type: Application
    Filed: November 21, 2011
    Publication date: May 23, 2013
    Applicant: Combined Conditional Access Development and Support, LLC
    Inventors: Lawrence Tang, Kenneth P. Miller, Christopher J. Bennett
  • Publication number: 20110321024
    Abstract: An approach is provided for updating an application such as a widget. An update platform receives a request to update an application executing on a device. Execution of the application retrieves all or a portion of stored code associated with the application from a storage memory of the device and places the retrieved stored code as executing code in an execution memory of the device. The update platform determines whether updated code corresponding to the application is available based, at least in part, on the request and determines to retrieve the updated code if available. The update platform then determines to replace all or a portion of the stored code with the updated code without affecting the executing code.
    Type: Application
    Filed: June 28, 2010
    Publication date: December 29, 2011
    Applicant: Nokia Corporation
    Inventors: Dennis Knothe, Lawrence Tang