Patents by Inventor Mark G. DePietro

Mark G. DePietro has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10212986
    Abstract: A system for automatically identifying performance of workout routines is provided. The system includes a set of sensors wearable on a body of an exerciser during performance of exercises. Each sensor is configured to measure a parameter selected from motion, acceleration, position, and applied force, and to communicate parameters measured. The system also includes a device configured to receive a set of parameters measured over a period of time by the set of sensors and to access stored pattern information corresponding to a plurality of predetermined exercise activities and a plurality of predetermined workout routines to identify one or more performed exercise activities performed by the exerciser and to identify a performed workout routine performed by the exerciser during the period of time. Apparel and methods are also disclosed.
    Type: Grant
    Filed: December 20, 2012
    Date of Patent: February 26, 2019
    Assignee: ARRIS Enterprises LLC
    Inventors: Mark G. DePietro, Stewart M. Wiener
  • Patent number: 9294451
    Abstract: A system is provided that includes a receiving component a first encrypting component and a second encrypting component. The receiving component can receive, from a first user, item identification data based on a tangible item and an ownership verification indicator. The receiving component can also receive, from the first user, image data based on the tangible item. The first encrypting component can generate encrypted item identification data based on the item identification data. The second encrypting component operable to generate encrypted image data based on the image data. The resultant set of encrypted information is stored so as to associate the image and the ownership data for use later as proof of ownership of an item and its associated rights.
    Type: Grant
    Filed: March 13, 2014
    Date of Patent: March 22, 2016
    Assignee: Google Technology Holdings LLC
    Inventors: David S. Brown, Lorin F. Decker, Mark G. Depietro, Sean P. Matthews
  • Patent number: 9197910
    Abstract: A system for securely authenticating software Application Program Interfaces (APIs) includes a handshake protocol that enables promulgation of licensing rights controlling Intellectual Property (IP) to multiple Actors. The handshake is a Challenge-Response protocol that includes a Challenge issued by one Actor who controls IP rights to verify a second Actor has Licensed IP rights when the second Actor Response includes use of a function IPF1. The function e.g. IPF1 is provided through the IP licensing agreement. Other Actors who wish to use software that the first Actor provides will be encouraged to acquire rights to the IP License to obtain the function IPF1 for access. Subsequent Actors who have IP rights controlled by another function IPF2 can be pulled into the same IP Licensing system, or another IP License that becomes part of the same ecosystem with the system controlled using function IPF1.
    Type: Grant
    Filed: October 29, 2013
    Date of Patent: November 24, 2015
    Assignee: ARRIS Technology, Inc.
    Inventors: Eric J. Sprunk, Mark G. Depietro
  • Patent number: 9172981
    Abstract: A system for securely authenticating software Application Program Interfaces (APIs) includes a handshake protocol provided between a Conditional Access System (CAS) and Middleware running on a Set-Top-Box. The handshake is a Challenge-Response protocol that includes several steps. The CAS or the Middleware can either act as a Claimant or Verifier in Challenge-Response process. First, a Claimant sends a request to a Verifier requesting access to a function F through the API. The Verifier reacts to the request by outputting a Challenge that is sent to the Claimant The Challenge is also retained by the Verifier for use in its internal calculation to verify the Claimant's response. The Claimant next processes the Challenge using components under a patent License Agreement, known as Hook IP, and issues a Response to the Verifier. The Verifier can then verify the Response to allow the Claimant access to the API.
    Type: Grant
    Filed: October 29, 2013
    Date of Patent: October 27, 2015
    Assignee: ARRIS Technology, Inc.
    Inventors: Eric J. Sprunk, Mark G. Depietro, Alexander Medvinsky, Paul Moroney, Xin Qiu
  • Patent number: 9031235
    Abstract: In a downloadable conditional access system (DCAS), preferably all DCAS-specific code is implemented in a configurable secure (CS) processor that is in communication with the host processor. Preferably, no DCAS-specific code is executed in the host processor. The host processor delivers commands to the CS processor, which the CS processor performs to configure itself in accordance with the particular DCAS encryption scheme used by the DCAS. Once configured, the CS processor executes a DCAS software module that has been downloaded to the CS processor, which looks for the corresponding EMMs and ECMs, processes them to obtain the CW, and then uses the CW to decrypt the content stream.
    Type: Grant
    Filed: April 11, 2014
    Date of Patent: May 12, 2015
    Assignee: ARRIS Technology, Inc.
    Inventors: Mark G. DePietro, George T. Hutchings
  • Patent number: 9027159
    Abstract: A system for securely authenticating software Application Program Interfaces (APIs) includes a handshake protocol that enables promulgation of licensing rights controlling Intellectual Property (IP) to multiple Actors. The Actors include components of a cable system that can include a Conditional Access System, Middleware, a Browser for a Set-Top-Box, a Guide and a Guide Data Provider. The handshake is a Challenge-Response protocol that includes a Challenge issued by one Actor who controls IP rights to verify a second Actor has Licensed IP rights when the second Actor Response includes a Hook IP function IPF1. Other Actors who wish to use software functions F that the first Actor provides will be encouraged to acquire rights to the IP License to obtain the function IPF1 for access. Subsequent Actors who have IP rights controlled by another function IPF2 can be pulled into the same IP Licensing system, or another IP License that becomes part of the same ecosystem with the system controlled using function IPF1.
    Type: Grant
    Filed: October 29, 2013
    Date of Patent: May 5, 2015
    Assignee: ARRIS Technology, Inc.
    Inventors: Eric J. Sprunk, Mark G. Depietro
  • Patent number: 8995821
    Abstract: A device is provided for use with a digital content provider and a content purchaser. The content provider can provide digital content and a first digital key, wherein the digital content has quantified digital rights associated therewith. The device includes a receiving portion, a security portion, a content database, an interface portion and a transmitting portion. The receiving portion can receive the digital content and the first digital key. The security portion can access the digital content with the first digital key. The content database can store the digital content. The interface portion can offer to the content purchaser the digital content and can enable the content purchaser to purchase the digital content in accordance with purchased quantified digital rights. The security portion can further encrypt the digital content with a digital key such that the content purchaser may use the purchased digital content.
    Type: Grant
    Filed: December 21, 2010
    Date of Patent: March 31, 2015
    Assignee: Google Technology Holdings LLC
    Inventors: David H. Brouda, Mark G. Depietro
  • Publication number: 20140281557
    Abstract: A system is provided that includes a receiving component a first encrypting component and a second encrypting component. The receiving component can receive, from a first user, item identification data based on a tangible item and an ownership verification indicator. The receiving component can also receive, from the first user, image data based on the tangible item. The first encrypting component can generate encrypted item identification data based on the item identification data. The second encrypting component operable to generate encrypted image data based on the image data. The resultant set of encrypted information is stored so as to associate the image and the ownership data for use later as proof of ownership of an item and its associated rights.
    Type: Application
    Filed: March 13, 2014
    Publication date: September 18, 2014
    Applicant: MOTOROLA MOBILITY LLC
    Inventors: David S. Brown, Lorin F. Decker, Mark G. Depietro, Sean P. Matthews
  • Patent number: 8837723
    Abstract: In a downloadable conditional access system (DCAS), preferably all DCAS-specific code is implemented in a configurable secure (CS) processor that is in communication with the host processor. Preferably, no DCAS-specific code is executed in the host processor. The host processor delivers commands to the CS processor, which the CS processor performs to configure itself in accordance with the particular DCAS encryption scheme used by the DCAS. Once configured, the CS processor executes a DCAS software module that has been downloaded to the CS processor, which looks for the corresponding EMMs and ECMs, processes them to obtain the CW, and then uses the CW to decrypt the content stream.
    Type: Grant
    Filed: June 18, 2007
    Date of Patent: September 16, 2014
    Assignee: General Instrument Corporation
    Inventors: Mark G. Depietro, George T. Hutchings
  • Publication number: 20140219446
    Abstract: In a downloadable conditional access system (DCAS), preferably all DCAS-specific code is implemented in a configurable secure (CS) processor that is in communication with the host processor. Preferably, no DCAS-specific code is executed in the host processor. The host processor delivers commands to the CS processor, which the CS processor performs to configure itself in accordance with the particular DCAS encryption scheme used by the DCAS. Once configured, the CS processor executes a DCAS software module that has been downloaded to the CS processor, which looks for the corresponding EMMs and ECMs, processes them to obtain the CW, and then uses the CW to decrypt the content stream.
    Type: Application
    Filed: April 11, 2014
    Publication date: August 7, 2014
    Applicant: General Instrument Corporation
    Inventors: Mark G. DePietro, George T. Hutchings
  • Publication number: 20140163704
    Abstract: A system for automatically identifying performance of workout routines is provided. The system includes a set of sensors wearable on a body of an exerciser during performance of exercises. Each sensor is configured to measure a parameter selected from motion, acceleration, position, and applied force, and to communicate parameters measured. The system also includes a device configured to receive a set of parameters measured over a period of time by the set of sensors and to access stored pattern information corresponding to a plurality of predetermined exercise activities and a plurality of predetermined workout routines to identify one or more performed exercise activities performed by the exerciser and to identify a performed workout routine performed by the exerciser during the period of time. Apparel and methods are also disclosed.
    Type: Application
    Filed: December 20, 2012
    Publication date: June 12, 2014
    Applicant: GENERAL INSTRUMENT CORPORATION
    Inventors: Mark G. DePietro, Stewart M. Wiener
  • Publication number: 20140123242
    Abstract: A system for securely authenticating software Application Program Interfaces (APIs) includes a handshake protocol that enables promulgation of licensing rights controlling Intellectual Property (IP) to multiple Actors. The handshake is a Challenge-Response protocol that includes a Challenge issued by one Actor who controls IP rights to verify a second Actor has Licensed IP rights when the second Actor Response includes use of a function IPF1. The function e.g. IPF1 is provided through the IP licensing agreement. Other Actors who wish to use software that the first Actor provides will be encouraged to acquire rights to the IP License to obtain the function IPF1 for access. Subsequent Actors who have IP rights controlled by another function IPF2 can be pulled into the same IP Licensing system, or another IP License that becomes part of the same ecosystem with the system controlled using function IPF1.
    Type: Application
    Filed: October 29, 2013
    Publication date: May 1, 2014
    Applicant: General Instrument Corporation
    Inventors: Eric J. Sprunk, Mark G. Depietro
  • Publication number: 20140123220
    Abstract: A system for securely authenticating software Application Program Interfaces (APIs) includes a handshake protocol that is provided to validate whether the parties involved are licensed to use the system which includes rights to Intellectual Property (IP) and corresponding obligations. The handshake is a Challenge-Response protocol that includes several steps. First, a Claimant sends a request to a Verifier requesting access to a function through an API. The Verifier reacts to the request by outputting a Challenge that is sent to the Claimant. The Challenge is also retained by the Verifier for use in its internal calculation to verify the Claimant's response. The Claimant next processes the Challenge using components under the license, known as Hook IP, and issues a Response to the Verifier. The Verifier compares the possibly-correct Candidate Response from the Claimant to the known-correct Target Response and if a match occurs the Verifier allows the Claimant access to the API.
    Type: Application
    Filed: October 29, 2013
    Publication date: May 1, 2014
    Applicant: General Instrument Corporation
    Inventors: Eric J. Sprunk, Mark G. Depietro, Alexander Medvinsky, Paul Moroney, Xin Qiu
  • Publication number: 20140123321
    Abstract: A system for securely authenticating software Application Program Interfaces (APIs) includes a handshake protocol that enables promulgation of licensing rights controlling Intellectual Property (IP) to multiple Actors. The Actors include components of a cable system that can include a Conditional Access System, Middleware, a Browser for a Set-Top-Box, a Guide and a Guide Data Provider. The handshake is a Challenge-Response protocol that includes a Challenge issued by one Actor who controls IP rights to verify a second Actor has Licensed IP rights when the second Actor Response includes a Hook IP function IPF1. Other Actors who wish to use software functions F that the first Actor provides will be encouraged to acquire rights to the IP License to obtain the function IPF1 for access. Subsequent Actors who have IP rights controlled by another function IPF2 can be pulled into the same IP Licensing system, or another IP License that becomes part of the same ecosystem with the system controlled using function IPF1.
    Type: Application
    Filed: October 29, 2013
    Publication date: May 1, 2014
    Applicant: General Instrument Corporation
    Inventors: Eric J. Sprunk, Mark G. Depietro
  • Publication number: 20140123172
    Abstract: A system for securely authenticating software Application Program Interfaces (APIs) includes a handshake protocol provided between a Conditional Access System (CAS) and Middleware running on a Set-Top-Box. The handshake is a Challenge-Response protocol that includes several steps. The CAS or the Middleware can either act as a Claimant or Verifier in Challenge-Response process. First, a Claimant sends a request to a Verifier requesting access to a function F through the API. The Verifier reacts to the request by outputting a Challenge that is sent to the Claimant The Challenge is also retained by the Verifier for use in its internal calculation to verify the Claimant's response. The Claimant next processes the Challenge using components under a patent License Agreement, known as Hook IP, and issues a Response to the Verifier. The Verifier can then verify the Response to allow the Claimant access to the API.
    Type: Application
    Filed: October 29, 2013
    Publication date: May 1, 2014
    Applicant: General Instrument Corporation
    Inventors: Eric J. Sprunk, Mark G. Depietro, Alexander Medvinsky, Paul Moroney, Xin Qiu
  • Publication number: 20120155836
    Abstract: A device is provided for use with a digital content provider and a content purchaser. The content provider can provide digital content and a first digital key, wherein the digital content has quantified digital rights associated therewith. The device includes a receiving portion, a security portion, a content database, an interface portion and a transmitting portion. The receiving portion can receive the digital content and the first digital key. The security portion can access the digital content with the first digital key. The content database can store the digital content. The interface portion can offer to the content purchaser the digital content and can enable the content purchaser to purchase the digital content in accordance with purchased quantified digital rights. The security portion can further encrypt the digital content with a digital key such that the content purchaser may use the purchased digital content.
    Type: Application
    Filed: December 21, 2010
    Publication date: June 21, 2012
    Applicant: GENERAL INSTRUMENT CORPORATION
    Inventors: David H. Brouda, Mark G. Depietro
  • Publication number: 20080313463
    Abstract: In a downloadable conditional access system (DCAS), preferably all DCAS-specific code is implemented in a configurable secure (CS) processor that is in communication with the host processor. Preferably, no DCAS-specific code is executed in the host processor. The host processor delivers commands to the CS processor, which the CS processor performs to configure itself in accordance with the particular DCAS encryption scheme used by the DCAS. Once configured, the CS processor executes a DCAS software module that has been downloaded to the CS processor, which looks for the corresponding EMMs and ECMs, processes them to obtain the CW, and then uses the CW to decrypt the content stream.
    Type: Application
    Filed: June 18, 2007
    Publication date: December 18, 2008
    Applicant: GENERAL INSTRUMENT CORPORATION
    Inventors: Mark G. Depietro, George T. Hutchings
  • Patent number: 5404567
    Abstract: A method and apparatus for automating the distribution of audio programming to passenger entertainment systems on-board carriers such as aircraft. Audio signals containing the audio programming are encoded to produce compressed digital audio data signals, and the compressed digital data from the encoded signals are stored and subsequently distributed from a central distribution facility to a plurality of local distribution facilities located at or in the vicinity of airports. The compressed digital data is stored at each of the local distribution facilities, and is subsequently distributed to passenger entertainment systems on-board aircraft locally situated with respect to respective ones to the local distribution facilities. The aircraft received data is stored onto computer storage media, such as computer hard-disks, resident in the passenger entertainment systems on-board the aircraft.
    Type: Grant
    Filed: July 16, 1993
    Date of Patent: April 4, 1995
    Assignee: Creative Engineering Unlimited, Inc.
    Inventors: Mark G. DePietro, Craig M. Javid, Edward E. Jubenville