Patents by Inventor Lawrence Tang

Lawrence Tang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20080101614
    Abstract: A method and apparatus for providing secured content distribution using a media hub is disclosed. In one embodiment, conditional access encrypted content is received at the media hub. The conditional access encrypted content is decrypted. The content is re-encrypted in accordance with a unique tier associated with the media hub and one or more devices in response to a request from at least one device associated with the unique tier. The re-encrypted content is provided to the at least one device in response to the request from the at least one device associated with the unique tier. A method and apparatus for providing secured content distribution is disclosed. In one embodiment, unit addresses (UAs) of all components within a home media architecture are obtained. A unique key is generated for the home media architecture using public information from the UA of each component. A message including the unique key is distributed to each component of the home media architecture.
    Type: Application
    Filed: December 12, 2007
    Publication date: May 1, 2008
    Applicant: GENERAL INSTRUMENT CORPORATION
    Inventors: Annie Chen, John Okimoto, Lawrence Tang
  • Publication number: 20070091345
    Abstract: According to one embodiment of the invention a system is utilized to leverage the security arrangement between a first and second device to establish a secure link between the first device and a third device. One embodiment of the invention is particularly suitable for loading security data on a set top box, such as that utilized in the cable television industry.
    Type: Application
    Filed: October 20, 2005
    Publication date: April 26, 2007
    Applicant: General Instrument Corporation
    Inventors: Xin Qiu, Bridget Kimball, Eric Sprunk, Lawrence Tang
  • Publication number: 20060159264
    Abstract: A method for forwarding messages containing cryptographic keys from a conditional access system that controls a population of set-top boxes to an encryption renewal system. The method includes storing a fictitious address of a virtual set-top box; generating a message based on the fictitious address, the message containing a cryptographic key; and forwarding the message to the fictitious address of the virtual set-top box. The encryption renewal system has information regarding the virtual set-top box, and is the receipient of the message. In addition, the encryption renewal system is for controlling access to pre-encrypted content generated by an encryption device.
    Type: Application
    Filed: December 6, 2005
    Publication date: July 20, 2006
    Inventors: Annie Chen, Lawrence Tang, Akkio Wakabayashi
  • Publication number: 20060146885
    Abstract: The present invention discloses a system and method for providing a secured system time reference to a subscriber device, e.g., a set top box or a receiver. In one embodiment, the system time reference is provided in a secure system time message that is broadcasted to a plurality of subscriber devices. Each subscriber device has a security device or software application that is capable of determining whether the received system time reference is legitimate. If the system time reference is determined to be legitimate, a local time reference is synchronized with said received system time reference.
    Type: Application
    Filed: December 30, 2004
    Publication date: July 6, 2006
    Inventors: Bridget Kimball, Michael Habrat, John Okimoto, Douglas Petty, Eric Sprunk, Lawrence Tang
  • Publication number: 20060150252
    Abstract: The present invention discloses an apparatus and method for defining and enforcing rules of transition between two security domains, e.g., a transport domain and a persistent security domain. In turn, a border guard, e.g., a security device, is provided between these two domains that enforce rules for transition between the two security domains. This novel approach of defining a transport domain and a persistent security domain simplifies the classification of the digital content and its movement through the system. Namely, the border guard once established between the two systems can enforce DRM rules associated with how contents are moved between the two domains.
    Type: Application
    Filed: December 30, 2004
    Publication date: July 6, 2006
    Inventors: John Okimoto, Bridget Kimball, Annie Chen, Michael Habrat, Douglas Petty, Eric Sprunk, Lawrence Tang
  • Publication number: 20060069645
    Abstract: A method and apparatus for providing secured content distribution using a media hub is disclosed. In one embodiment, conditional access encrypted content is received at the media hub. The conditional access encrypted content is decrypted. The content is re-encrypted in accordance with a unique tier associated with the media hub and one or more devices in response to a request from at least one device associated with the unique tier. The re-encrypted content is provided to the at least one device in response to the request from the at least one device associated with the unique tier. A method and apparatus for providing secured content distribution is disclosed. In one embodiment, unit addresses (UAs) of all components within a home media architecture are obtained. A unique key is generated for the home media architecture using public information from the UA of each component. A message including the unique key is distributed to each component of the home media architecture.
    Type: Application
    Filed: August 31, 2005
    Publication date: March 30, 2006
    Inventors: Annie Chen, John Okimoto, Lawrence Tang
  • Publication number: 20050157877
    Abstract: A method for forwarding messages containing cryptographic keys from a conditional access system that controls a population of set-top boxes to an encryption renewal system. The method includes storing a fictitious address of a virtual set-top box; generating a message based on the fictitious address, the message containing a cryptographic key; and forwarding the message to the fictitious address of the virtual set-top box. The encryption renewal system has information regarding the virtual set-top box, and is the receipient of the message. In addition, the encryption renewal system is for controlling access to pre-encrypted content generated by an encryption device.
    Type: Application
    Filed: March 9, 2005
    Publication date: July 21, 2005
    Applicant: General Instrument Corporation
    Inventors: Annie Chen, Lawrence Tang, Akiko Wakabayashi
  • Patent number: 6804782
    Abstract: A cryptography circuit provides secure processing of data by utilizing countermeasures that combat timing and power attacks. Superfluous operations such as multiplication operations, modular reductions by an integer, storage of data to memory are available for use by a processor to disguise the amount of power usage and the amount of time required to perform a cryptographic operation. A cryptographic key is available for use in order to trigger when these emulated operations occur. The occurrences of the emulated operations is controlled by the user to provide the preferred tradeoff between security and use of resources.
    Type: Grant
    Filed: August 13, 1999
    Date of Patent: October 12, 2004
    Assignee: General Instrument Corporation
    Inventors: Xin Qiu, Eric J. Sprunk, Daniel Z. Simon, Lawrence Tang, Lawrence R. Cook