Patents by Inventor Oliver Shih
Oliver Shih has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240146717Abstract: Authentication of a networked device with limited computational resources for secure communications over a network. Authentication of the device begins with the supplicant node transmitting a signed digital certificate with its authentication credentials to a proxy node. Upon verifying the certificate, the proxy node then authenticates the supplicant's credentials with an authentication server accessible over the network, acting as a proxy for the supplicant node. Typically, this verification includes decryption according to a public/private key scheme. Upon successful authentication, the authentication server creates a session key for the supplicant node and communicates it to the proxy node. The proxy node encrypts the session key with a symmetric key, and transmits the encrypted session key to the supplicant node which, after decryption, uses the session key for secure communications. In some embodiments, the authentication server encrypts the session key with the symmetric key.Type: ApplicationFiled: January 10, 2024Publication date: May 2, 2024Inventors: Kumaran Vijayasankar, Oliver Shih, Arvind K. Raghu, Ramanuja Vedantham, Xiaolin Lu
-
Patent number: 11909730Abstract: Authentication of a networked device with limited computational resources for secure communications over a network. Authentication of the device begins with the supplicant node transmitting a signed digital certificate with its authentication credentials to a proxy node. Upon verifying the certificate, the proxy node then authenticates the supplicant's credentials with an authentication server accessible over the network, acting as a proxy for the supplicant node. Typically, this verification includes decryption according to a public/private key scheme. Upon successful authentication, the authentication server creates a session key for the supplicant node and communicates it to the proxy node. The proxy node encrypts the session key with a symmetric key, and transmits the encrypted session key to the supplicant node which, after decryption, uses the session key for secure communications. In some embodiments, the authentication server encrypts the session key with the symmetric key.Type: GrantFiled: October 11, 2022Date of Patent: February 20, 2024Assignee: TEXAS INSTRUMENTS INCORPORATEDInventors: Kumaran Vijayasankar, Oliver Shih, Arvind K. Raghu, Ramanuja Vedantham, Xiaolin Lu
-
Publication number: 20230032116Abstract: Authentication of a networked device with limited computational resources for secure communications over a network. Authentication of the device begins with the supplicant node transmitting a signed digital certificate with its authentication credentials to a proxy node. Upon verifying the certificate, the proxy node then authenticates the supplicant's credentials with an authentication server accessible over the network, acting as a proxy for the supplicant node. Typically, this verification includes decryption according to a public/private key scheme. Upon successful authentication, the authentication server creates a session key for the supplicant node and communicates it to the proxy node. The proxy node encrypts the session key with a symmetric key, and transmits the encrypted session key to the supplicant node which, after decryption, uses the session key for secure communications. In some embodiments, the authentication server encrypts the session key with the symmetric key.Type: ApplicationFiled: October 11, 2022Publication date: February 2, 2023Applicant: Texas Instruments IncorporatedInventors: Kumaran Vijayasankar, Oliver Shih, Arvind K. Raghu, Ramanuja Vedantham, Xiaolin Lu
-
Patent number: 11470077Abstract: Authentication of a networked device with limited computational resources for secure communications over a network. Authentication of the device begins with the supplicant node transmitting a signed digital certificate with its authentication credentials to a proxy node. Upon verifying the certificate, the proxy node then authenticates the supplicant's credentials with an authentication server accessible over the network, acting as a proxy for the supplicant node. Typically, this verification includes decryption according to a public/private key scheme. Upon successful authentication, the authentication server creates a session key for the supplicant node and communicates it to the proxy node. The proxy node encrypts the session key with a symmetric key, and transmits the encrypted session key to the supplicant node which, after decryption, uses the session key for secure communications. In some embodiments, the authentication server encrypts the session key with the symmetric key.Type: GrantFiled: January 26, 2021Date of Patent: October 11, 2022Assignee: TEXAS INSTRUMENTS INCORPORATEDInventors: Kumaran Vijayasankar, Oliver Shih, Arvind K. Raghu, Ramanuja Vedantham, Xiaolin Lu
-
Publication number: 20210152546Abstract: Authentication of a networked device with limited computational resources for secure communications over a network. Authentication of the device begins with the supplicant node transmitting a signed digital certificate with its authentication credentials to a proxy node. Upon verifying the certificate, the proxy node then authenticates the supplicant's credentials with an authentication server accessible over the network, acting as a proxy for the supplicant node. Typically, this verification includes decryption according to a public/private key scheme. Upon successful authentication, the authentication server creates a session key for the supplicant node and communicates it to the proxy node. The proxy node encrypts the session key with a symmetric key, and transmits the encrypted session key to the supplicant node which, after decryption, uses the session key for secure communications. In some embodiments, the authentication server encrypts the session key with the symmetric key.Type: ApplicationFiled: January 26, 2021Publication date: May 20, 2021Inventors: Kumaran Vijayasankar, Oliver Shih, Arvind K. Raghu, Ramanuja Vedantham, Xiaolin Lu
-
Patent number: 10938803Abstract: Authentication of a networked device with limited computational resources for secure communications over a network. Authentication of the device begins with the supplicant node transmitting a signed digital certificate with its authentication credentials to a proxy node. Upon verifying the certificate, the proxy node then authenticates the supplicant's credentials with an authentication server accessible over the network, acting as a proxy for the supplicant node. Typically, this verification includes decryption according to a public/private key scheme. Upon successful authentication, the authentication server creates a session key for the supplicant node and communicates it to the proxy node. The proxy node encrypts the session key with a symmetric key, and transmits the encrypted session key to the supplicant node which, after decryption, uses the session key for secure communications. In some embodiments, the authentication server encrypts the session key with the symmetric key.Type: GrantFiled: January 18, 2019Date of Patent: March 2, 2021Assignee: TEXAS INSTRUMENTS INCORPORATEDInventors: Kumaran Vijayasankar, Oliver Shih, Arvind K. Raghu, Ramanuja Vedantham, Xiaolin Lu
-
Publication number: 20190245844Abstract: Authentication of a networked device with limited computational resources for secure communications over a network. Authentication of the device begins with the supplicant node transmitting a signed digital certificate with its authentication credentials to a proxy node. Upon verifying the certificate, the proxy node then authenticates the supplicant's credentials with an authentication server accessible over the network, acting as a proxy for the supplicant node. Typically, this verification includes decryption according to a public/private key scheme. Upon successful authentication, the authentication server creates a session key for the supplicant node and communicates it to the proxy node. The proxy node encrypts the session key with a symmetric key, and transmits the encrypted session key to the supplicant node which, after decryption, uses the session key for secure communications. In some embodiments, the authentication server encrypts the session key with the symmetric key.Type: ApplicationFiled: January 18, 2019Publication date: August 8, 2019Inventors: Kumaran Vijayasankar, Oliver Shih, Arvind K. Raghu, Ramanuja Vedantham, Xiaolin Lu
-
Patent number: 10247807Abstract: A method for locating a mobile device is disclosed. Initially, a set of modulated ultrasound signals and a set of radio signals are separately broadcast from a group of transmitters. The ultrasound signals include at least one symbol configured for pulse compression. After the receipt of a demodulated ultrasound signal from a mobile device, wherein the demodulated ultrasound signal is derived from the modulated ultrasound signals, transmitter identifier and timing information are extracted from the demodulated ultrasound signal. Timing information include, for example, the arrival time of the demodulated ultrasound signal in relation to the start time of its transmission. After the locations of the transmitters have been ascertained from the transmitter identifier information, the location of the mobile device can be determined based on the timing information and the locations of the transmitters.Type: GrantFiled: August 25, 2017Date of Patent: April 2, 2019Assignee: CARNEGIE MELLON UNIVERSITYInventors: Patrick Lazik, Niranjini Rajagopal, Oliver Shih, Anthony Rowe, Bruno Sinopoli
-
Patent number: 10187376Abstract: Authentication of a networked device with limited computational resources for secure communications over a network. Authentication of the device begins with the supplicant node transmitting a signed digital certificate with its authentication credentials to a proxy node. Upon verifying the certificate, the proxy node then authenticates the supplicant's credentials with an authentication server accessible over the network, acting as a proxy for the supplicant node. Typically, this verification includes decryption according to a public/private key scheme. Upon successful authentication, the authentication server creates a session key for the supplicant node and communicates it to the proxy node. The proxy node encrypts the session key with a symmetric key, and transmits the encrypted session key to the supplicant node which, after decryption, uses the session key for secure communications. In some embodiments, the authentication server encrypts the session key with the symmetric key.Type: GrantFiled: July 28, 2016Date of Patent: January 22, 2019Assignee: TEXAS INSTRUMENTS INCORPORATEDInventors: Kumaran Vijayasankar, Oliver Shih, Arvind K. Raghu, Ramanuja Vedantham, Xiaolin Lu
-
Publication number: 20170350958Abstract: A method for locating a mobile device is disclosed. Initially, a set of modulated ultrasound signals and a set of radio signals are separately broadcast from a group of transmitters. The ultrasound signals include at least one symbol configured for pulse compression. After the receipt of a demodulated ultrasound signal from a mobile device, wherein the demodulated ultrasound signal is derived from the modulated ultrasound signals, transmitter identifier and timing information are extracted from the demodulated ultrasound signal. Timing information include, for example, the arrival time of the demodulated ultrasound signal in relation to the start time of its transmission. After the locations of the transmitters have been ascertained from the transmitter identifier information, the location of the mobile device can be determined based on the timing information and the locations of the transmitters.Type: ApplicationFiled: August 25, 2017Publication date: December 7, 2017Applicant: CARNEGIE MELLON UNIVERSITYInventors: PATRICK LAZIK, NIRANJINI RAJAGOPAL, OLIVER SHIH, ANTHONY ROWE, BRUNO SINOPOLI
-
Patent number: 9766320Abstract: A method for locating a mobile device is disclosed. Initially, a set of modulated ultrasound signals and a set of radio signals are separately broadcast from a group of transmitters. The ultrasound signals include at least one symbol configured for pulse compression. After the receipt of a demodulated ultrasound signal from a mobile device, wherein the demodulated ultrasound signal is derived from the modulated ultrasound signals, transmitter identifier and timing information are extracted from the demodulated ultrasound signal. Timing information include, for example, the arrival time of the demodulated ultrasound signal in relation to the start time of its transmission. After the locations of the transmitters have been ascertained from the transmitter identifier information, the location of the mobile device can be determined based on the timing information and the locations of the transmitters.Type: GrantFiled: June 2, 2016Date of Patent: September 19, 2017Assignee: CARNEGIE MELLON UNIVERSITYInventors: Patrick Lazik, Niranjini Rajagopal, Oliver Shih, Anthony Rowe, Bruno Sinopoli
-
Publication number: 20170063843Abstract: Authentication of a networked device with limited computational resources for secure communications over a network. Authentication of the device begins with the supplicant node transmitting a signed digital certificate with its authentication credentials to a proxy node. Upon verifying the certificate, the proxy node then authenticates the supplicant's credentials with an authentication server accessible over the network, acting as a proxy for the supplicant node. Typically, this verification includes decryption according to a public/private key scheme. Upon successful authentication, the authentication server creates a session key for the supplicant node and communicates it to the proxy node. The proxy node encrypts the session key with a symmetric key, and transmits the encrypted session key to the supplicant node which, after decryption, uses the session key for secure communications. In some embodiments, the authentication server encrypts the session key with the symmetric key.Type: ApplicationFiled: July 28, 2016Publication date: March 2, 2017Inventors: Kumaran Vijayasankar, Oliver Shih, Arvind K. Raghu, Ramanuja Vedantham, Xiaolin Lu
-
Publication number: 20160356876Abstract: A method for locating a mobile device is disclosed. Initially, a set of modulated ultrasound signals and a set of radio signals are separately broadcast from a group of transmitters. The ultrasound signals include at least one symbol configured for pulse compression. After the receipt of a demodulated ultrasound signal from a mobile device, wherein the demodulated ultrasound signal is derived from the modulated ultrasound signals, transmitter identifier and timing information are extracted from the demodulated ultrasound signal. Timing information include, for example, the arrival time of the demodulated ultrasound signal in relation to the start time of its transmission. After the locations of the transmitters have been ascertained from the transmitter identifier information, the location of the mobile device can be determined based on the timing information and the locations of the transmitters.Type: ApplicationFiled: June 2, 2016Publication date: December 8, 2016Applicant: The Board of Trustees of the Leland Stanford Junior UniversityInventors: PATRICK LAZIK, NIRANJINI RAJAGOPAL, OLIVER SHIH, ANTHONY ROWE, BRUNO SINOPOLI
-
Patent number: 7133566Abstract: A method of reconstructing a previously occluded area of a video image frame exposed by the motion of a segment within said image frame. In one embodiment the method involves approximating the color values of the pixels in the newly exposed area from the color values of the neighboring image segments. The process is refined by identifying a set of neighboring segments to the exposed area, called fill segments, that most closely resemble the color values of the pixels within the exposed area. These fill segments are then used to reconstruct the color values of the exposed area. In one embodiment, the identities of the fill segments are transmitted to an exemplary decoder.Type: GrantFiled: December 20, 2001Date of Patent: November 7, 2006Assignee: Altera CorporationInventors: Adityo Prakash, David Kita, Edward Ratner, Oliver Shih, Hitoshi Watanabe
-
Publication number: 20060034373Abstract: A method and apparatus for estimating the motion of an image region (the “center” region) from a source video frame to a target video frame. The motion estimation is locally constrained in that the estimated motion of the “center region” is affected by the estimated motion of neighboring regions. Advantageously, this may reduce common motion matching problems such as false and ambiguous matches. In one embodiment, the locally-constrained motion estimation may be implemented by biasing an error map of the center region using error maps of the neighboring regions.Type: ApplicationFiled: August 26, 2005Publication date: February 16, 2006Inventors: Michial Gunter, David Kita, Oliver Shih, Carroll Gossett
-
Publication number: 20020131495Abstract: A method of reconstructing a previously occluded area of a video image frame exposed by the motion of a segment within said image frame. In one embodiment the method involves approximating the color values of the pixels in the newly exposed area from the color values of the neighboring image segments. The process is refined by identifying a set of neighboring segments to the exposed area, called fill segments, that most closely resemble the color values of the pixels within the exposed area. These fill segments are then used to reconstruct the color values of the exposed area. In one embodiment, the identities of the fill segments are transmitted to an exemplary decoder.Type: ApplicationFiled: December 20, 2001Publication date: September 19, 2002Inventors: Adityo Prakash, David Kita, Edward Ratner, Oliver Shih, Hitoshi Watanabe