Patents by Inventor Madjid F. Nakhjiri

Madjid F. Nakhjiri has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20110075845
    Abstract: Communication nodes, acting as intermediate routers for communication packets transmitted between a source node and a destination node, are provided with different access rights to the fields of the routed communication packets. Routes of intermediate routers between the source node and the destination node are discovered and the identities of intermediate routers on the discovered routes are collected. The aggregate trust levels of the intermediate routers are computed allowing the most trusted route to be selected. Encryption keys are securely distributed to intermediate routers on the most trusted route based on the trust level of the intermediate routers and fields of the communication packets are encrypted with encryption keys corresponding to the assigned trust level. Intermediated nodes are thereby prevented from accessing selected fields of the communication packets.
    Type: Application
    Filed: December 3, 2010
    Publication date: March 31, 2011
    Applicant: MOTOROLA, INC.
    Inventors: George Calcev, Bogdan O. Carbunar, Madjid F. Nakhjiri
  • Patent number: 7865717
    Abstract: Communication nodes, acting as intermediate routers for communication packets transmitted between a source node and a destination node, are provided with different access rights to the fields of the routed communication packets. Routes of intermediate routers between the source node and the destination node are discovered and the identities of intermediate routers on the discovered routes are collected. The aggregate trust levels of the intermediate routers are computed allowing the most trusted route to be selected. Encryption keys are securely distributed to intermediate routers on the most trusted route based on the trust level of the intermediate routers and fields of the communication packets are encrypted with encryption keys corresponding to the assigned trust level. Intermediated nodes are thereby prevented from accessing selected fields of the communication packets.
    Type: Grant
    Filed: July 18, 2006
    Date of Patent: January 4, 2011
    Assignee: Motorola, Inc.
    Inventors: George Calcev, Bogdan O Carbunar, Madjid F. Nakhjiri
  • Publication number: 20100318791
    Abstract: Systems and methods are disclosed for providing certificate status information about a certificate includes receiving, at a Certificate Status Information Protocol (CSIP) proxy device the certificate identity information about the certificate of the second device. Then determining, using the CSIP proxy device, whether the certificate status information is stored in a CSIP proxy device memory. If the certificate status information is not stored in the CSIP proxy device memory, creating a CSIP request based on the certificate identity information and sending the CSIP request, including the certificate identity information, to a CSIP responder computer outside the local network domain. If the certificate status information is stored in the CSIP proxy device memory, sending the certificate status information to the first device. Also, a system and method are disclosed for using a CSIP responder computer.
    Type: Application
    Filed: June 14, 2010
    Publication date: December 16, 2010
    Applicant: GENERAL INSTRUMENT CORPORATION
    Inventors: Rafie Shamsaasef, Alexander Medvinsky, Madjid F. Nakhjiri, Petr Peterka
  • Patent number: 7725717
    Abstract: The invention provides for secure end-to-end user authentication by a remote server communicating with a communication device. The communication device further communicates with an authentication device, which provides a user authentication message to the communication device for forwarding to the remote server. The authentication device comprises a data store for storing user authentication credentials. A user authentication processor performs a local authentication of a user of the authentication device in response to a user input. An authentication processor generates the authentication message if the user authentication is valid. The authentication processor implements a cryptographic function based on the user authentication credentials. A transmitter then transmits the authentication message to the at least one communication device.
    Type: Grant
    Filed: August 31, 2005
    Date of Patent: May 25, 2010
    Assignee: Motorola, Inc.
    Inventors: Pierre Roux, Marco Fratti, Madjid F. Nakhjiri
  • Publication number: 20100071040
    Abstract: A method, a network element, and a client device for creating a trusted connection with a network are disclosed. A client device 104 may attempt to access a sub-network 106. The client device 104 may determine that a certificate of the sub-network 106 is issued by a certification authority absent from a device certificate trust list. The client device 104 may receive via the sub-network 106 a certificate trust list update 400 from a certificate trust list provider 108.
    Type: Application
    Filed: September 18, 2008
    Publication date: March 18, 2010
    Applicant: MOTOROLA, INC.
    Inventors: Steven D. Upp, Alexander Medvinsky, Madjid F. Nakhjiri
  • Publication number: 20090031138
    Abstract: A method for secure and reliable authentication in a communication system. In an embodiment, the authentication method includes performing authentication of a user utilizing Extensible Authentication Protocol (EAP), and transmitting a result indication message to the user. The result indication message can include additional information for security and reliability. The method also includes receiving an acknowledgement message from the user. The acknowledgement message is sent by the user for confirming the reception of the result indication. In an embodiment, the method also includes retransmitting the result indication message if the acknowledgement message is not received within a predetermined time. The additional information for security and reliability can include Message Authentication Code (MAC) and time interval information. The additional information for security and reliability can also include a security/reliability flag.
    Type: Application
    Filed: April 30, 2008
    Publication date: January 29, 2009
    Applicant: FutureWei Technologies, Inc.
    Inventor: Madjid F. Nakhjiri
  • Publication number: 20080229107
    Abstract: A method for establishing a new security association between a mobile node and a network source, the method comprising creating a first token comprising a security association between a network source and a mobile node, the first token being encrypted using a first key known to the mobile node and a first trust authority within a home network associated with the mobile node, and creating a second token comprising the same security association between the network source and the mobile node, the second token being encrypted using a second key known to the first trust authority and a second trust authority associated with the network source, wherein the first token and the second token are sent to the second trust authority using a chain of trust infrastructure.
    Type: Application
    Filed: March 14, 2007
    Publication date: September 18, 2008
    Applicant: FUTUREWEI TECHNOLOGIES, INC.
    Inventors: Madjid F. Nakhjiri, Changsheng Wan
  • Publication number: 20080183714
    Abstract: A method, apparatus, and electronic device for managing heterogeneous network access requests are disclosed. A memory or database may store network access data for a mobile computing device to access a primary network. A network interface may receive via a foreign network a network access request from the mobile computing device and transmit an access permission to the mobile computing device via the foreign network.
    Type: Application
    Filed: January 30, 2007
    Publication date: July 31, 2008
    Applicant: Motorola, Inc.
    Inventor: Madjid F. NAKHJIRI
  • Publication number: 20080178274
    Abstract: A novel system for utilizing an authorization token to separate authentication and authorization services. The system authenticates a client to an authenticating server; generates an authorization token with the authenticating server and the client; and authorizes services for the client using the generated authorization token. The authorization token may be transferred via a third party, or may be utilized to extend an initial session without re-authentication.
    Type: Application
    Filed: November 9, 2007
    Publication date: July 24, 2008
    Applicant: FUTUREWEI TECHNOLOGIES, INC.
    Inventors: Madjid F. Nakhjiri, Grant Rodolph
  • Publication number: 20080168537
    Abstract: A communications component comprising a processor configured to implement a method comprising acquiring an authentication identifier (Auth ID), and constructing a network service identifier (NSI) comprising the Auth ID and an authentication, authorization, and accounting (AAA) realm. The disclosure includes a system comprising an authorization server in communication with a host, wherein the authorization server is configured to verify a previous authentication of the host using a NSI. Also disclosed is a method comprising receiving a NSI and a service request, wherein the NSI comprises an Auth ID, determining an authentication server associated with the Auth ID, verifying an authentication of a host using the Auth ID, and authorizing the host to receive a service associated with the service request.
    Type: Application
    Filed: August 31, 2007
    Publication date: July 10, 2008
    Applicant: FUTUREWEI TECHNOLOGIES, INC.
    Inventor: Madjid F. Nakhjiri
  • Publication number: 20080127317
    Abstract: A novel system for utilizing an authorization token to separate authentication and authorization services. The system authenticates a client to an authenticating server; generates an authorization token with the authenticating server and the client; and authorizes services for the client using the generated authorization token.
    Type: Application
    Filed: August 14, 2007
    Publication date: May 29, 2008
    Applicant: FUTUREWEI TECHNOLOGIES, INC.
    Inventor: Madjid F. Nakhjiri
  • Publication number: 20080022389
    Abstract: Communication nodes, acting as intermediate routers for communication packets transmitted between a source node and a destination node, are provided with different access rights to the fields of the routed communication packets. Routes of intermediate routers between the source node and the destination node are discovered and the identities of intermediate routers on the discovered routes are collected. The aggregate trust levels of the intermediate routers are computed allowing the most trusted route to be selected. Encryption keys are securely distributed to intermediate routers on the most trusted route based on the trust level of the intermediate routers and fields of the communication packets are encrypted with encryption keys corresponding to the assigned trust level. Intermediated nodes are thereby prevented from accessing selected fields of the communication packets.
    Type: Application
    Filed: July 18, 2006
    Publication date: January 24, 2008
    Applicant: MOTOROLA, INC.
    Inventors: George Calcev, Madjid F. Nakhjiri, Bogdan O Carbunar
  • Publication number: 20040148427
    Abstract: To address the need for an apparatus and method of PPP link handoff that reduces setup time and air interface bandwidth requirements, an approach to PPP context transfer is disclosed. This approach can cut the number of PPP establishment messages by 50 to 100% and can save a significant amount of time in PPP state machine transitions, due to the multiphase nature of PPP. Generally, the old AR (306) transfers most of its information about its PPP link with a mobile (330) to the new AR (305). After the transfer of the PPP variables is complete, the new AR is able to omit negotiation of many already known PPP parameters from the PPP re-establishment procedure with the mobile. The old AR starts transferring the mobile's PPP state to the new AR based either on an internal trigger, a request from the new AR, or a request from the mobile.
    Type: Application
    Filed: November 24, 2003
    Publication date: July 29, 2004
    Inventors: Madjid F. Nakhjiri, Shreesha Ramanna, Ajoy K. Singh