Patents by Inventor Mark G. DePietro
Mark G. DePietro has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10212986Abstract: A system for automatically identifying performance of workout routines is provided. The system includes a set of sensors wearable on a body of an exerciser during performance of exercises. Each sensor is configured to measure a parameter selected from motion, acceleration, position, and applied force, and to communicate parameters measured. The system also includes a device configured to receive a set of parameters measured over a period of time by the set of sensors and to access stored pattern information corresponding to a plurality of predetermined exercise activities and a plurality of predetermined workout routines to identify one or more performed exercise activities performed by the exerciser and to identify a performed workout routine performed by the exerciser during the period of time. Apparel and methods are also disclosed.Type: GrantFiled: December 20, 2012Date of Patent: February 26, 2019Assignee: ARRIS Enterprises LLCInventors: Mark G. DePietro, Stewart M. Wiener
-
Patent number: 9294451Abstract: A system is provided that includes a receiving component a first encrypting component and a second encrypting component. The receiving component can receive, from a first user, item identification data based on a tangible item and an ownership verification indicator. The receiving component can also receive, from the first user, image data based on the tangible item. The first encrypting component can generate encrypted item identification data based on the item identification data. The second encrypting component operable to generate encrypted image data based on the image data. The resultant set of encrypted information is stored so as to associate the image and the ownership data for use later as proof of ownership of an item and its associated rights.Type: GrantFiled: March 13, 2014Date of Patent: March 22, 2016Assignee: Google Technology Holdings LLCInventors: David S. Brown, Lorin F. Decker, Mark G. Depietro, Sean P. Matthews
-
Patent number: 9197910Abstract: A system for securely authenticating software Application Program Interfaces (APIs) includes a handshake protocol that enables promulgation of licensing rights controlling Intellectual Property (IP) to multiple Actors. The handshake is a Challenge-Response protocol that includes a Challenge issued by one Actor who controls IP rights to verify a second Actor has Licensed IP rights when the second Actor Response includes use of a function IPF1. The function e.g. IPF1 is provided through the IP licensing agreement. Other Actors who wish to use software that the first Actor provides will be encouraged to acquire rights to the IP License to obtain the function IPF1 for access. Subsequent Actors who have IP rights controlled by another function IPF2 can be pulled into the same IP Licensing system, or another IP License that becomes part of the same ecosystem with the system controlled using function IPF1.Type: GrantFiled: October 29, 2013Date of Patent: November 24, 2015Assignee: ARRIS Technology, Inc.Inventors: Eric J. Sprunk, Mark G. Depietro
-
Patent number: 9172981Abstract: A system for securely authenticating software Application Program Interfaces (APIs) includes a handshake protocol provided between a Conditional Access System (CAS) and Middleware running on a Set-Top-Box. The handshake is a Challenge-Response protocol that includes several steps. The CAS or the Middleware can either act as a Claimant or Verifier in Challenge-Response process. First, a Claimant sends a request to a Verifier requesting access to a function F through the API. The Verifier reacts to the request by outputting a Challenge that is sent to the Claimant The Challenge is also retained by the Verifier for use in its internal calculation to verify the Claimant's response. The Claimant next processes the Challenge using components under a patent License Agreement, known as Hook IP, and issues a Response to the Verifier. The Verifier can then verify the Response to allow the Claimant access to the API.Type: GrantFiled: October 29, 2013Date of Patent: October 27, 2015Assignee: ARRIS Technology, Inc.Inventors: Eric J. Sprunk, Mark G. Depietro, Alexander Medvinsky, Paul Moroney, Xin Qiu
-
Patent number: 9031235Abstract: In a downloadable conditional access system (DCAS), preferably all DCAS-specific code is implemented in a configurable secure (CS) processor that is in communication with the host processor. Preferably, no DCAS-specific code is executed in the host processor. The host processor delivers commands to the CS processor, which the CS processor performs to configure itself in accordance with the particular DCAS encryption scheme used by the DCAS. Once configured, the CS processor executes a DCAS software module that has been downloaded to the CS processor, which looks for the corresponding EMMs and ECMs, processes them to obtain the CW, and then uses the CW to decrypt the content stream.Type: GrantFiled: April 11, 2014Date of Patent: May 12, 2015Assignee: ARRIS Technology, Inc.Inventors: Mark G. DePietro, George T. Hutchings
-
Patent number: 9027159Abstract: A system for securely authenticating software Application Program Interfaces (APIs) includes a handshake protocol that enables promulgation of licensing rights controlling Intellectual Property (IP) to multiple Actors. The Actors include components of a cable system that can include a Conditional Access System, Middleware, a Browser for a Set-Top-Box, a Guide and a Guide Data Provider. The handshake is a Challenge-Response protocol that includes a Challenge issued by one Actor who controls IP rights to verify a second Actor has Licensed IP rights when the second Actor Response includes a Hook IP function IPF1. Other Actors who wish to use software functions F that the first Actor provides will be encouraged to acquire rights to the IP License to obtain the function IPF1 for access. Subsequent Actors who have IP rights controlled by another function IPF2 can be pulled into the same IP Licensing system, or another IP License that becomes part of the same ecosystem with the system controlled using function IPF1.Type: GrantFiled: October 29, 2013Date of Patent: May 5, 2015Assignee: ARRIS Technology, Inc.Inventors: Eric J. Sprunk, Mark G. Depietro
-
Patent number: 8995821Abstract: A device is provided for use with a digital content provider and a content purchaser. The content provider can provide digital content and a first digital key, wherein the digital content has quantified digital rights associated therewith. The device includes a receiving portion, a security portion, a content database, an interface portion and a transmitting portion. The receiving portion can receive the digital content and the first digital key. The security portion can access the digital content with the first digital key. The content database can store the digital content. The interface portion can offer to the content purchaser the digital content and can enable the content purchaser to purchase the digital content in accordance with purchased quantified digital rights. The security portion can further encrypt the digital content with a digital key such that the content purchaser may use the purchased digital content.Type: GrantFiled: December 21, 2010Date of Patent: March 31, 2015Assignee: Google Technology Holdings LLCInventors: David H. Brouda, Mark G. Depietro
-
Publication number: 20140281557Abstract: A system is provided that includes a receiving component a first encrypting component and a second encrypting component. The receiving component can receive, from a first user, item identification data based on a tangible item and an ownership verification indicator. The receiving component can also receive, from the first user, image data based on the tangible item. The first encrypting component can generate encrypted item identification data based on the item identification data. The second encrypting component operable to generate encrypted image data based on the image data. The resultant set of encrypted information is stored so as to associate the image and the ownership data for use later as proof of ownership of an item and its associated rights.Type: ApplicationFiled: March 13, 2014Publication date: September 18, 2014Applicant: MOTOROLA MOBILITY LLCInventors: David S. Brown, Lorin F. Decker, Mark G. Depietro, Sean P. Matthews
-
Patent number: 8837723Abstract: In a downloadable conditional access system (DCAS), preferably all DCAS-specific code is implemented in a configurable secure (CS) processor that is in communication with the host processor. Preferably, no DCAS-specific code is executed in the host processor. The host processor delivers commands to the CS processor, which the CS processor performs to configure itself in accordance with the particular DCAS encryption scheme used by the DCAS. Once configured, the CS processor executes a DCAS software module that has been downloaded to the CS processor, which looks for the corresponding EMMs and ECMs, processes them to obtain the CW, and then uses the CW to decrypt the content stream.Type: GrantFiled: June 18, 2007Date of Patent: September 16, 2014Assignee: General Instrument CorporationInventors: Mark G. Depietro, George T. Hutchings
-
Publication number: 20140219446Abstract: In a downloadable conditional access system (DCAS), preferably all DCAS-specific code is implemented in a configurable secure (CS) processor that is in communication with the host processor. Preferably, no DCAS-specific code is executed in the host processor. The host processor delivers commands to the CS processor, which the CS processor performs to configure itself in accordance with the particular DCAS encryption scheme used by the DCAS. Once configured, the CS processor executes a DCAS software module that has been downloaded to the CS processor, which looks for the corresponding EMMs and ECMs, processes them to obtain the CW, and then uses the CW to decrypt the content stream.Type: ApplicationFiled: April 11, 2014Publication date: August 7, 2014Applicant: General Instrument CorporationInventors: Mark G. DePietro, George T. Hutchings
-
Publication number: 20140163704Abstract: A system for automatically identifying performance of workout routines is provided. The system includes a set of sensors wearable on a body of an exerciser during performance of exercises. Each sensor is configured to measure a parameter selected from motion, acceleration, position, and applied force, and to communicate parameters measured. The system also includes a device configured to receive a set of parameters measured over a period of time by the set of sensors and to access stored pattern information corresponding to a plurality of predetermined exercise activities and a plurality of predetermined workout routines to identify one or more performed exercise activities performed by the exerciser and to identify a performed workout routine performed by the exerciser during the period of time. Apparel and methods are also disclosed.Type: ApplicationFiled: December 20, 2012Publication date: June 12, 2014Applicant: GENERAL INSTRUMENT CORPORATIONInventors: Mark G. DePietro, Stewart M. Wiener
-
Publication number: 20140123242Abstract: A system for securely authenticating software Application Program Interfaces (APIs) includes a handshake protocol that enables promulgation of licensing rights controlling Intellectual Property (IP) to multiple Actors. The handshake is a Challenge-Response protocol that includes a Challenge issued by one Actor who controls IP rights to verify a second Actor has Licensed IP rights when the second Actor Response includes use of a function IPF1. The function e.g. IPF1 is provided through the IP licensing agreement. Other Actors who wish to use software that the first Actor provides will be encouraged to acquire rights to the IP License to obtain the function IPF1 for access. Subsequent Actors who have IP rights controlled by another function IPF2 can be pulled into the same IP Licensing system, or another IP License that becomes part of the same ecosystem with the system controlled using function IPF1.Type: ApplicationFiled: October 29, 2013Publication date: May 1, 2014Applicant: General Instrument CorporationInventors: Eric J. Sprunk, Mark G. Depietro
-
Publication number: 20140123220Abstract: A system for securely authenticating software Application Program Interfaces (APIs) includes a handshake protocol that is provided to validate whether the parties involved are licensed to use the system which includes rights to Intellectual Property (IP) and corresponding obligations. The handshake is a Challenge-Response protocol that includes several steps. First, a Claimant sends a request to a Verifier requesting access to a function through an API. The Verifier reacts to the request by outputting a Challenge that is sent to the Claimant. The Challenge is also retained by the Verifier for use in its internal calculation to verify the Claimant's response. The Claimant next processes the Challenge using components under the license, known as Hook IP, and issues a Response to the Verifier. The Verifier compares the possibly-correct Candidate Response from the Claimant to the known-correct Target Response and if a match occurs the Verifier allows the Claimant access to the API.Type: ApplicationFiled: October 29, 2013Publication date: May 1, 2014Applicant: General Instrument CorporationInventors: Eric J. Sprunk, Mark G. Depietro, Alexander Medvinsky, Paul Moroney, Xin Qiu
-
Publication number: 20140123321Abstract: A system for securely authenticating software Application Program Interfaces (APIs) includes a handshake protocol that enables promulgation of licensing rights controlling Intellectual Property (IP) to multiple Actors. The Actors include components of a cable system that can include a Conditional Access System, Middleware, a Browser for a Set-Top-Box, a Guide and a Guide Data Provider. The handshake is a Challenge-Response protocol that includes a Challenge issued by one Actor who controls IP rights to verify a second Actor has Licensed IP rights when the second Actor Response includes a Hook IP function IPF1. Other Actors who wish to use software functions F that the first Actor provides will be encouraged to acquire rights to the IP License to obtain the function IPF1 for access. Subsequent Actors who have IP rights controlled by another function IPF2 can be pulled into the same IP Licensing system, or another IP License that becomes part of the same ecosystem with the system controlled using function IPF1.Type: ApplicationFiled: October 29, 2013Publication date: May 1, 2014Applicant: General Instrument CorporationInventors: Eric J. Sprunk, Mark G. Depietro
-
Publication number: 20140123172Abstract: A system for securely authenticating software Application Program Interfaces (APIs) includes a handshake protocol provided between a Conditional Access System (CAS) and Middleware running on a Set-Top-Box. The handshake is a Challenge-Response protocol that includes several steps. The CAS or the Middleware can either act as a Claimant or Verifier in Challenge-Response process. First, a Claimant sends a request to a Verifier requesting access to a function F through the API. The Verifier reacts to the request by outputting a Challenge that is sent to the Claimant The Challenge is also retained by the Verifier for use in its internal calculation to verify the Claimant's response. The Claimant next processes the Challenge using components under a patent License Agreement, known as Hook IP, and issues a Response to the Verifier. The Verifier can then verify the Response to allow the Claimant access to the API.Type: ApplicationFiled: October 29, 2013Publication date: May 1, 2014Applicant: General Instrument CorporationInventors: Eric J. Sprunk, Mark G. Depietro, Alexander Medvinsky, Paul Moroney, Xin Qiu
-
Publication number: 20120155836Abstract: A device is provided for use with a digital content provider and a content purchaser. The content provider can provide digital content and a first digital key, wherein the digital content has quantified digital rights associated therewith. The device includes a receiving portion, a security portion, a content database, an interface portion and a transmitting portion. The receiving portion can receive the digital content and the first digital key. The security portion can access the digital content with the first digital key. The content database can store the digital content. The interface portion can offer to the content purchaser the digital content and can enable the content purchaser to purchase the digital content in accordance with purchased quantified digital rights. The security portion can further encrypt the digital content with a digital key such that the content purchaser may use the purchased digital content.Type: ApplicationFiled: December 21, 2010Publication date: June 21, 2012Applicant: GENERAL INSTRUMENT CORPORATIONInventors: David H. Brouda, Mark G. Depietro
-
Publication number: 20080313463Abstract: In a downloadable conditional access system (DCAS), preferably all DCAS-specific code is implemented in a configurable secure (CS) processor that is in communication with the host processor. Preferably, no DCAS-specific code is executed in the host processor. The host processor delivers commands to the CS processor, which the CS processor performs to configure itself in accordance with the particular DCAS encryption scheme used by the DCAS. Once configured, the CS processor executes a DCAS software module that has been downloaded to the CS processor, which looks for the corresponding EMMs and ECMs, processes them to obtain the CW, and then uses the CW to decrypt the content stream.Type: ApplicationFiled: June 18, 2007Publication date: December 18, 2008Applicant: GENERAL INSTRUMENT CORPORATIONInventors: Mark G. Depietro, George T. Hutchings
-
Patent number: 5404567Abstract: A method and apparatus for automating the distribution of audio programming to passenger entertainment systems on-board carriers such as aircraft. Audio signals containing the audio programming are encoded to produce compressed digital audio data signals, and the compressed digital data from the encoded signals are stored and subsequently distributed from a central distribution facility to a plurality of local distribution facilities located at or in the vicinity of airports. The compressed digital data is stored at each of the local distribution facilities, and is subsequently distributed to passenger entertainment systems on-board aircraft locally situated with respect to respective ones to the local distribution facilities. The aircraft received data is stored onto computer storage media, such as computer hard-disks, resident in the passenger entertainment systems on-board the aircraft.Type: GrantFiled: July 16, 1993Date of Patent: April 4, 1995Assignee: Creative Engineering Unlimited, Inc.Inventors: Mark G. DePietro, Craig M. Javid, Edward E. Jubenville