Patents by Inventor Madjid Nakhjiri

Madjid Nakhjiri has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11949075
    Abstract: The present application describes power tier management for a battery of a light electric vehicle. In examples, a power tier of a battery may have an associated threshold power and time to exert a battery energy over the time of the power tier. Power tiers may be adjusted to lengthen or shorten an overall battery life and remaining battery life of the battery of the light electric vehicle. In an aspect, a processor may control or limit power to specific components and/or functions of the light electric vehicle to stay within or enter a determined power tier. Information may be received and processed by the processor to determine and apply one or more power tiers.
    Type: Grant
    Filed: April 30, 2021
    Date of Patent: April 2, 2024
    Assignee: Neutron Holdings, Inc.
    Inventors: Madjid Nakhjiri, Dave Butler
  • Publication number: 20210344051
    Abstract: The present application describes power tier management for a battery of a light electric vehicle. In examples, a power tier of a battery may have an associated threshold power and time to exert a battery energy over the time of the power tier. Power tiers may be adjusted to lengthen or shorten an overall battery life and remaining battery life of the battery of the light electric vehicle. In an aspect, a processor may control or limit power to specific components and/or functions of the light electric vehicle to stay within or enter a determined power tier. Information may be received and processed by the processor to determine and apply one or more power tiers.
    Type: Application
    Filed: April 30, 2021
    Publication date: November 4, 2021
    Inventors: Madjid NAKHJIRI, Dave Butler
  • Publication number: 20190173880
    Abstract: A method of authorizing a gateway device to communicate with a registration server on behalf of an end node device is presented. The method entails a server at the cloud receiving a registration request from the gateway device, generating a bootstrapping authorization blob (BAB) in response to the registration request, and transmitting the BAB to the gateway device. The BAB defines functions that the gateway device is authorized to perform, and may be a flag vector containing a list of flags, each of the flags indicating authorization for a specific function. The method presented herein provides a secure and reliable way for end node devices 40 to communicate with the cloud without the elaborate interfaces required by conventional standards such as LWM2M.
    Type: Application
    Filed: December 4, 2018
    Publication date: June 6, 2019
    Inventor: Madjid Nakhjiri
  • Patent number: 9647833
    Abstract: A system and method for identity (ID)-based key management are provided. The ID-based key management system includes an authentication server configured to authenticate a terminal through key exchange based on an ID and a password of a user of the terminal, set up a secure channel with the terminal, and provide a private key based on the ID of the user to the terminal through the secure channel, and a private-key generator configured to generate the private key corresponding to the ID of the terminal user according to a request of the authentication server.
    Type: Grant
    Filed: July 31, 2014
    Date of Patent: May 9, 2017
    Assignees: SAMSUNG SDS CO., LTD., SDS AMERICA, INC.
    Inventors: Hyo-Jin Yoon, Madjid Nakhjiri
  • Patent number: 9485230
    Abstract: A method provides end-to-end security for transport of a profile to a target device (e.g., a mobile computing device) over at least one communications network that includes a plurality of nodes. In accordance with the method, the profile is encrypted for transport between the target device and an initial node of the network through which the profile is transported. The encryption is an end-to-end inner layer encryption performed prior to hop-to-hop encryption. The encrypting uses a public key of a public, private key pair. The private key is derivable from a seed securely provisioned in the target device using a public key algorithm. The encrypted profile is transmitted over the communications network to the target device.
    Type: Grant
    Filed: June 17, 2015
    Date of Patent: November 1, 2016
    Assignee: GOOGLE TECHNOLOGY HOLDINGS LLC
    Inventors: Madjid Nakhjiri, Tat Keung Chan, Alexander Medvinsky, Eric J. Sprunk
  • Patent number: 9465947
    Abstract: A cloud storage system includes an encryption server configured to encrypt a plurality of data by using encryption keys having a hierarchy, the hierarchy of encryption keys corresponding to a relationship among the plurality of encrypted data, and a cloud storage server configured to store the plurality of encrypted data.
    Type: Grant
    Filed: October 6, 2014
    Date of Patent: October 11, 2016
    Assignee: SAMSUNG SDS AMERICA, INC.
    Inventor: Madjid Nakhjiri
  • Publication number: 20160021075
    Abstract: A method provides end-to-end security for transport of a profile to a target device (e.g., a mobile computing device) over at least one communications network that includes a plurality of nodes. In accordance with the method, the profile is encrypted for transport between the target device and an initial node of the network through which the profile is transported. The encryption is an end-to-end inner layer encryption performed prior to hop-to-hop encryption. The encrypting uses a public key of a public, private key pair. The private key is derivable from a seed securely provisioned in the target device using a public key algorithm. The encrypted profile is transmitted over the communications network to the target device.
    Type: Application
    Filed: June 17, 2015
    Publication date: January 21, 2016
    Inventors: Madjid Nakhjiri, Tat Keung Chan, Alexander Medvinsky, Eric J. Sprunk
  • Patent number: 9210138
    Abstract: A method provides end-to-end security for transport of a profile to a target device (e.g., a mobile computing device) over at least one communications network that includes a plurality of nodes. In accordance with the method, the profile is encrypted for transport between the target device and an initial node of the network through which the profile is transported. The encryption is an end-to-end inner layer encryption performed prior to hop-to-hop encryption. The encrypting uses a public key of a public, private key pair. The private key is derivable from a seed securely provisioned in the target device using a public key algorithm. The encrypted profile is transmitted over the communications network to the target device.
    Type: Grant
    Filed: April 17, 2013
    Date of Patent: December 8, 2015
    Assignee: GOOGLE TECHNOLOGY HOLDINGS LLC
    Inventors: Madjid Nakhjiri, Tat Keung Chan, Alexander Medvinsky, Eric J. Sprunk
  • Publication number: 20150186657
    Abstract: A cloud storage system includes an encryption server configured to encrypt a plurality of data by using encryption keys having a hierarchy, the hierarchy of encryption keys corresponding to a relationship among the plurality of encrypted data, and a cloud storage server configured to store the plurality of encrypted data.
    Type: Application
    Filed: October 6, 2014
    Publication date: July 2, 2015
    Applicant: SAMSUNG SDS CO., LTD.
    Inventor: Madjid NAKHJIRI
  • Publication number: 20150039883
    Abstract: A system and method for identity (ID)-based key management are provided. The ID-based key management system includes an authentication server configured to authenticate a terminal through key exchange based on an ID and a password of a user of the terminal, set up a secure channel with the terminal, and provide a private key based on the ID of the user to the terminal through the secure channel, and a private-key generator configured to generate the private key corresponding to the ID of the terminal user according to a request of the authentication server.
    Type: Application
    Filed: July 31, 2014
    Publication date: February 5, 2015
    Applicants: SDS AMERICA, INC., SAMSUNG SDS CO., LTD.
    Inventors: Hyo-Jin YOON, Madjid NAKHJIRI
  • Publication number: 20140082358
    Abstract: A method provides end-to-end security for transport of a profile to a target device (e.g., a mobile computing device) over at least one communications network that includes a plurality of nodes. In accordance with the method, the profile is encrypted for transport between the target device and an initial node of the network through which the profile is transported. The encryption is an end-to-end inner layer encryption performed prior to hop-to-hop encryption. The encrypting uses a public key of a public, private key pair. The private key is derivable from a seed securely provisioned in the target device using a public key algorithm. The encrypted profile is transmitted over the communications network to the target device.
    Type: Application
    Filed: April 9, 2013
    Publication date: March 20, 2014
    Applicant: General Instrument Corporation
    Inventors: Madjid Nakhjiri, Tat Keung Chan, Alexander Medvinsky, Eric J. Sprunk
  • Publication number: 20140082359
    Abstract: A method provides end-to-end security for transport of a profile to a target device (e.g., a mobile computing device) over at least one communications network that includes a plurality of nodes. In accordance with the method, the profile is encrypted for transport between the target device and an initial node of the network through which the profile is transported. The encryption is an end-to-end inner layer encryption performed prior to hop-to-hop encryption. The encrypting uses a public key of a public, private key pair. The private key is derivable from a seed securely provisioned in the target device using a public key algorithm. The encrypted profile is transmitted over the communications network to the target device.
    Type: Application
    Filed: April 17, 2013
    Publication date: March 20, 2014
    Applicant: General Instrument Corporation
    Inventors: Madjid Nakhjiri, Tat Keung Chan, Alexander Medvinsky, Eric J. Sprunk
  • Publication number: 20110161663
    Abstract: An online certificate status checking protocol (OCSP) system is provided for use with a first device, an end device and a certificate authority. The first device can provide a certificate. The end device can provide an OCSP request based on the certificate and process an OCSP response. The certificate authority can provide a CRL update. The certificate has a validity period. The OCSP system includes an OCSP responder, and OCSP proxy and a cache. The OCSP responder can provide the OCSP response. The OCSP proxy can receive the OCSP request from the end device, can send the OCSP request to the OCSP responder, can receive the OCSP response from the OCSP responder and can send the OCSP response to the end device. The cache can store information based on the OCSP response. The OCSP proxy can further store, in the cache, information based on the OCSP response and can send a proactive OCSP request to the OCSP responder based on a predetermined policy.
    Type: Application
    Filed: December 29, 2009
    Publication date: June 30, 2011
    Applicant: GENERAL INSTRUMENT CORPORATION
    Inventor: Madjid Nakhjiri
  • Publication number: 20070154016
    Abstract: A method and apparatus for delegating distribution of security keying material for the communication path between a mobile entity and a network service function, to the mobile entity. An authorization token is issued to the mobile entity which then supplies security keying material for the communication path. The keying material may be created by the Mobile entity itself. The mobile entity sends the security path material and the authorization token to a network service function. The network service function checks the authorization token to determine if the mobile entity is authorized to create the key material. If so, the received keying material is installed for use in securing the communication path with the mobile entity. The network service function may also be issued with a token to show that it is trusted by the issuer of the token.
    Type: Application
    Filed: January 5, 2006
    Publication date: July 5, 2007
    Inventors: Madjid Nakhjiri, Mahsa Nakhjiri, Narayanan Venkitaraman
  • Publication number: 20070101408
    Abstract: Various embodiments are described to address the problem of duplicated authentication processing in authorizing servers. Generally expressed, an authorizing server (220), such as an AAA server, sends (305) authorization material to a first access service node (210), such as a foreign agent or SIP agent. The authorization material is for a second access service node (230) and corresponds to a mobile node (201). The first access service node then forwards (307) the authorization material to the second access service node. By distributing the authorization material in this way, the second access service node need not communicate with the authorizing server to obtain the authorization material and neither does the authorizing server need to send messaging to both access service nodes. Thus, benefits such as reduced authorizing server load and reduced registration delays may be realized depending on the embodiment employed.
    Type: Application
    Filed: October 31, 2005
    Publication date: May 3, 2007
    Inventor: Madjid Nakhjiri
  • Publication number: 20070086382
    Abstract: Apparatus performs a method that includes the steps of: receiving (210) a location parameter request for a mobile entity; determining (220) a set of location parameters corresponding to the mobile entity, the set of location parameters comprising at least an identification of a current point of attachment of the mobile entity; and communicating (230) a response comprising at least a portion of the determined set of location parameters. Another method includes the steps of: receiving (310) a message comprising a set of location parameters corresponding to the mobile entity, wherein the set of location parameters is based on an identification of a current point of attachment of the mobile entity; and setting (320) a network access configuration for the mobile entity based on the set of location parameters.
    Type: Application
    Filed: October 17, 2005
    Publication date: April 19, 2007
    Inventors: Vidya Narayanan, Madjid Nakhjiri, Narayanan Venkitaraman
  • Publication number: 20070050618
    Abstract: The invention provides for secure end-to-end user authentication by a remote server communicating with a communication device. The communication device further communicates with an authentication device, which provides a user authentication message to the communication device for forwarding to the remote server. The authentication device comprises a data store for storing user authentication credentials. A user authentication processor performs a local authentication of a user of the authentication device in response to a user input. An authentication processor generates the authentication message if the user authentication is valid. The authentication processor implements a cryptographic function based on the user authentication credentials. A transmitter then transmits the authentication message to the at least one communication device.
    Type: Application
    Filed: August 31, 2005
    Publication date: March 1, 2007
    Inventors: Pierre Roux, Marco Fratti, Madjid Nakhjiri
  • Publication number: 20070006296
    Abstract: An Authentication, Authorization, and Accounting (AAA) key, defining a first shared secret between a mobile node (108) and an AAA server (110), is acquired. A shared key becomes associated with the mobile node (108) and the VPN server (104). The shared key is formed, at least in part, from the AAA key. The shared key defines a second shared secret, which is between the mobile node (108) and the VPN server (104). A secure data tunnel is then established between the mobile node (108) and the VPN server (104) using the shared key.
    Type: Application
    Filed: June 29, 2005
    Publication date: January 4, 2007
    Inventors: Madjid Nakhjiri, Vidya Narayanan, Narayanan Venkitaraman
  • Publication number: 20060285519
    Abstract: At least one candidate point-of-presence element to which at least one mobile node may be handed over from a first point-of-presence element is identified (201). In a preferred approach this occurs regardless of whether the point-of-presence elements differ from one another (for example, with respect to an enabling mobile node access technology, a service type, and/or a supported application to be handed over). A handover key is then derived (202) as corresponds at least to the identified point-of-presence element that use of that handover key is facilitated (203) to facilitate a possible handover of the mobile node from the first to the identified point-of-presence element. The handover key may also be used, if desired, to derive a pairwise handover key.
    Type: Application
    Filed: June 15, 2005
    Publication date: December 21, 2006
    Inventors: Vidya Narayanan, Madjid Nakhjiri, Narayanan Venkitaraman
  • Publication number: 20060240802
    Abstract: Nonce exchange with a target BS is performed even when the MS connected to the source BS so when the mobile reaches the new BS, it will be able to create a fresh key quickly. Alternatively, the MS can provide the nonce directly to the target base station immediately (or very soon) upon handing over. In a similar manner, the mobile will receive the target BS nonce via one of several techniques. In a first embodiment of the present invention the target BS will share the BS nonce with the source BS which will provide the nonce to the MS. In a second embodiment of the present invention the target base station will transmit the nonce over-the-air to the MS as part to the initial exchanges leading to the set up of the wireless link between the MS and the target BS.
    Type: Application
    Filed: February 9, 2006
    Publication date: October 26, 2006
    Applicant: MOTOROLA, INC.
    Inventors: Narayanan Venkitaraman, Madjid Nakhjiri