Patents by Inventor Oliver Shih

Oliver Shih has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240146717
    Abstract: Authentication of a networked device with limited computational resources for secure communications over a network. Authentication of the device begins with the supplicant node transmitting a signed digital certificate with its authentication credentials to a proxy node. Upon verifying the certificate, the proxy node then authenticates the supplicant's credentials with an authentication server accessible over the network, acting as a proxy for the supplicant node. Typically, this verification includes decryption according to a public/private key scheme. Upon successful authentication, the authentication server creates a session key for the supplicant node and communicates it to the proxy node. The proxy node encrypts the session key with a symmetric key, and transmits the encrypted session key to the supplicant node which, after decryption, uses the session key for secure communications. In some embodiments, the authentication server encrypts the session key with the symmetric key.
    Type: Application
    Filed: January 10, 2024
    Publication date: May 2, 2024
    Inventors: Kumaran Vijayasankar, Oliver Shih, Arvind K. Raghu, Ramanuja Vedantham, Xiaolin Lu
  • Patent number: 11909730
    Abstract: Authentication of a networked device with limited computational resources for secure communications over a network. Authentication of the device begins with the supplicant node transmitting a signed digital certificate with its authentication credentials to a proxy node. Upon verifying the certificate, the proxy node then authenticates the supplicant's credentials with an authentication server accessible over the network, acting as a proxy for the supplicant node. Typically, this verification includes decryption according to a public/private key scheme. Upon successful authentication, the authentication server creates a session key for the supplicant node and communicates it to the proxy node. The proxy node encrypts the session key with a symmetric key, and transmits the encrypted session key to the supplicant node which, after decryption, uses the session key for secure communications. In some embodiments, the authentication server encrypts the session key with the symmetric key.
    Type: Grant
    Filed: October 11, 2022
    Date of Patent: February 20, 2024
    Assignee: TEXAS INSTRUMENTS INCORPORATED
    Inventors: Kumaran Vijayasankar, Oliver Shih, Arvind K. Raghu, Ramanuja Vedantham, Xiaolin Lu
  • Publication number: 20230032116
    Abstract: Authentication of a networked device with limited computational resources for secure communications over a network. Authentication of the device begins with the supplicant node transmitting a signed digital certificate with its authentication credentials to a proxy node. Upon verifying the certificate, the proxy node then authenticates the supplicant's credentials with an authentication server accessible over the network, acting as a proxy for the supplicant node. Typically, this verification includes decryption according to a public/private key scheme. Upon successful authentication, the authentication server creates a session key for the supplicant node and communicates it to the proxy node. The proxy node encrypts the session key with a symmetric key, and transmits the encrypted session key to the supplicant node which, after decryption, uses the session key for secure communications. In some embodiments, the authentication server encrypts the session key with the symmetric key.
    Type: Application
    Filed: October 11, 2022
    Publication date: February 2, 2023
    Applicant: Texas Instruments Incorporated
    Inventors: Kumaran Vijayasankar, Oliver Shih, Arvind K. Raghu, Ramanuja Vedantham, Xiaolin Lu
  • Patent number: 11470077
    Abstract: Authentication of a networked device with limited computational resources for secure communications over a network. Authentication of the device begins with the supplicant node transmitting a signed digital certificate with its authentication credentials to a proxy node. Upon verifying the certificate, the proxy node then authenticates the supplicant's credentials with an authentication server accessible over the network, acting as a proxy for the supplicant node. Typically, this verification includes decryption according to a public/private key scheme. Upon successful authentication, the authentication server creates a session key for the supplicant node and communicates it to the proxy node. The proxy node encrypts the session key with a symmetric key, and transmits the encrypted session key to the supplicant node which, after decryption, uses the session key for secure communications. In some embodiments, the authentication server encrypts the session key with the symmetric key.
    Type: Grant
    Filed: January 26, 2021
    Date of Patent: October 11, 2022
    Assignee: TEXAS INSTRUMENTS INCORPORATED
    Inventors: Kumaran Vijayasankar, Oliver Shih, Arvind K. Raghu, Ramanuja Vedantham, Xiaolin Lu
  • Publication number: 20210152546
    Abstract: Authentication of a networked device with limited computational resources for secure communications over a network. Authentication of the device begins with the supplicant node transmitting a signed digital certificate with its authentication credentials to a proxy node. Upon verifying the certificate, the proxy node then authenticates the supplicant's credentials with an authentication server accessible over the network, acting as a proxy for the supplicant node. Typically, this verification includes decryption according to a public/private key scheme. Upon successful authentication, the authentication server creates a session key for the supplicant node and communicates it to the proxy node. The proxy node encrypts the session key with a symmetric key, and transmits the encrypted session key to the supplicant node which, after decryption, uses the session key for secure communications. In some embodiments, the authentication server encrypts the session key with the symmetric key.
    Type: Application
    Filed: January 26, 2021
    Publication date: May 20, 2021
    Inventors: Kumaran Vijayasankar, Oliver Shih, Arvind K. Raghu, Ramanuja Vedantham, Xiaolin Lu
  • Patent number: 10938803
    Abstract: Authentication of a networked device with limited computational resources for secure communications over a network. Authentication of the device begins with the supplicant node transmitting a signed digital certificate with its authentication credentials to a proxy node. Upon verifying the certificate, the proxy node then authenticates the supplicant's credentials with an authentication server accessible over the network, acting as a proxy for the supplicant node. Typically, this verification includes decryption according to a public/private key scheme. Upon successful authentication, the authentication server creates a session key for the supplicant node and communicates it to the proxy node. The proxy node encrypts the session key with a symmetric key, and transmits the encrypted session key to the supplicant node which, after decryption, uses the session key for secure communications. In some embodiments, the authentication server encrypts the session key with the symmetric key.
    Type: Grant
    Filed: January 18, 2019
    Date of Patent: March 2, 2021
    Assignee: TEXAS INSTRUMENTS INCORPORATED
    Inventors: Kumaran Vijayasankar, Oliver Shih, Arvind K. Raghu, Ramanuja Vedantham, Xiaolin Lu
  • Publication number: 20190245844
    Abstract: Authentication of a networked device with limited computational resources for secure communications over a network. Authentication of the device begins with the supplicant node transmitting a signed digital certificate with its authentication credentials to a proxy node. Upon verifying the certificate, the proxy node then authenticates the supplicant's credentials with an authentication server accessible over the network, acting as a proxy for the supplicant node. Typically, this verification includes decryption according to a public/private key scheme. Upon successful authentication, the authentication server creates a session key for the supplicant node and communicates it to the proxy node. The proxy node encrypts the session key with a symmetric key, and transmits the encrypted session key to the supplicant node which, after decryption, uses the session key for secure communications. In some embodiments, the authentication server encrypts the session key with the symmetric key.
    Type: Application
    Filed: January 18, 2019
    Publication date: August 8, 2019
    Inventors: Kumaran Vijayasankar, Oliver Shih, Arvind K. Raghu, Ramanuja Vedantham, Xiaolin Lu
  • Patent number: 10247807
    Abstract: A method for locating a mobile device is disclosed. Initially, a set of modulated ultrasound signals and a set of radio signals are separately broadcast from a group of transmitters. The ultrasound signals include at least one symbol configured for pulse compression. After the receipt of a demodulated ultrasound signal from a mobile device, wherein the demodulated ultrasound signal is derived from the modulated ultrasound signals, transmitter identifier and timing information are extracted from the demodulated ultrasound signal. Timing information include, for example, the arrival time of the demodulated ultrasound signal in relation to the start time of its transmission. After the locations of the transmitters have been ascertained from the transmitter identifier information, the location of the mobile device can be determined based on the timing information and the locations of the transmitters.
    Type: Grant
    Filed: August 25, 2017
    Date of Patent: April 2, 2019
    Assignee: CARNEGIE MELLON UNIVERSITY
    Inventors: Patrick Lazik, Niranjini Rajagopal, Oliver Shih, Anthony Rowe, Bruno Sinopoli
  • Patent number: 10187376
    Abstract: Authentication of a networked device with limited computational resources for secure communications over a network. Authentication of the device begins with the supplicant node transmitting a signed digital certificate with its authentication credentials to a proxy node. Upon verifying the certificate, the proxy node then authenticates the supplicant's credentials with an authentication server accessible over the network, acting as a proxy for the supplicant node. Typically, this verification includes decryption according to a public/private key scheme. Upon successful authentication, the authentication server creates a session key for the supplicant node and communicates it to the proxy node. The proxy node encrypts the session key with a symmetric key, and transmits the encrypted session key to the supplicant node which, after decryption, uses the session key for secure communications. In some embodiments, the authentication server encrypts the session key with the symmetric key.
    Type: Grant
    Filed: July 28, 2016
    Date of Patent: January 22, 2019
    Assignee: TEXAS INSTRUMENTS INCORPORATED
    Inventors: Kumaran Vijayasankar, Oliver Shih, Arvind K. Raghu, Ramanuja Vedantham, Xiaolin Lu
  • Publication number: 20170350958
    Abstract: A method for locating a mobile device is disclosed. Initially, a set of modulated ultrasound signals and a set of radio signals are separately broadcast from a group of transmitters. The ultrasound signals include at least one symbol configured for pulse compression. After the receipt of a demodulated ultrasound signal from a mobile device, wherein the demodulated ultrasound signal is derived from the modulated ultrasound signals, transmitter identifier and timing information are extracted from the demodulated ultrasound signal. Timing information include, for example, the arrival time of the demodulated ultrasound signal in relation to the start time of its transmission. After the locations of the transmitters have been ascertained from the transmitter identifier information, the location of the mobile device can be determined based on the timing information and the locations of the transmitters.
    Type: Application
    Filed: August 25, 2017
    Publication date: December 7, 2017
    Applicant: CARNEGIE MELLON UNIVERSITY
    Inventors: PATRICK LAZIK, NIRANJINI RAJAGOPAL, OLIVER SHIH, ANTHONY ROWE, BRUNO SINOPOLI
  • Patent number: 9766320
    Abstract: A method for locating a mobile device is disclosed. Initially, a set of modulated ultrasound signals and a set of radio signals are separately broadcast from a group of transmitters. The ultrasound signals include at least one symbol configured for pulse compression. After the receipt of a demodulated ultrasound signal from a mobile device, wherein the demodulated ultrasound signal is derived from the modulated ultrasound signals, transmitter identifier and timing information are extracted from the demodulated ultrasound signal. Timing information include, for example, the arrival time of the demodulated ultrasound signal in relation to the start time of its transmission. After the locations of the transmitters have been ascertained from the transmitter identifier information, the location of the mobile device can be determined based on the timing information and the locations of the transmitters.
    Type: Grant
    Filed: June 2, 2016
    Date of Patent: September 19, 2017
    Assignee: CARNEGIE MELLON UNIVERSITY
    Inventors: Patrick Lazik, Niranjini Rajagopal, Oliver Shih, Anthony Rowe, Bruno Sinopoli
  • Publication number: 20170063843
    Abstract: Authentication of a networked device with limited computational resources for secure communications over a network. Authentication of the device begins with the supplicant node transmitting a signed digital certificate with its authentication credentials to a proxy node. Upon verifying the certificate, the proxy node then authenticates the supplicant's credentials with an authentication server accessible over the network, acting as a proxy for the supplicant node. Typically, this verification includes decryption according to a public/private key scheme. Upon successful authentication, the authentication server creates a session key for the supplicant node and communicates it to the proxy node. The proxy node encrypts the session key with a symmetric key, and transmits the encrypted session key to the supplicant node which, after decryption, uses the session key for secure communications. In some embodiments, the authentication server encrypts the session key with the symmetric key.
    Type: Application
    Filed: July 28, 2016
    Publication date: March 2, 2017
    Inventors: Kumaran Vijayasankar, Oliver Shih, Arvind K. Raghu, Ramanuja Vedantham, Xiaolin Lu
  • Publication number: 20160356876
    Abstract: A method for locating a mobile device is disclosed. Initially, a set of modulated ultrasound signals and a set of radio signals are separately broadcast from a group of transmitters. The ultrasound signals include at least one symbol configured for pulse compression. After the receipt of a demodulated ultrasound signal from a mobile device, wherein the demodulated ultrasound signal is derived from the modulated ultrasound signals, transmitter identifier and timing information are extracted from the demodulated ultrasound signal. Timing information include, for example, the arrival time of the demodulated ultrasound signal in relation to the start time of its transmission. After the locations of the transmitters have been ascertained from the transmitter identifier information, the location of the mobile device can be determined based on the timing information and the locations of the transmitters.
    Type: Application
    Filed: June 2, 2016
    Publication date: December 8, 2016
    Applicant: The Board of Trustees of the Leland Stanford Junior University
    Inventors: PATRICK LAZIK, NIRANJINI RAJAGOPAL, OLIVER SHIH, ANTHONY ROWE, BRUNO SINOPOLI
  • Patent number: 7133566
    Abstract: A method of reconstructing a previously occluded area of a video image frame exposed by the motion of a segment within said image frame. In one embodiment the method involves approximating the color values of the pixels in the newly exposed area from the color values of the neighboring image segments. The process is refined by identifying a set of neighboring segments to the exposed area, called fill segments, that most closely resemble the color values of the pixels within the exposed area. These fill segments are then used to reconstruct the color values of the exposed area. In one embodiment, the identities of the fill segments are transmitted to an exemplary decoder.
    Type: Grant
    Filed: December 20, 2001
    Date of Patent: November 7, 2006
    Assignee: Altera Corporation
    Inventors: Adityo Prakash, David Kita, Edward Ratner, Oliver Shih, Hitoshi Watanabe
  • Publication number: 20060034373
    Abstract: A method and apparatus for estimating the motion of an image region (the “center” region) from a source video frame to a target video frame. The motion estimation is locally constrained in that the estimated motion of the “center region” is affected by the estimated motion of neighboring regions. Advantageously, this may reduce common motion matching problems such as false and ambiguous matches. In one embodiment, the locally-constrained motion estimation may be implemented by biasing an error map of the center region using error maps of the neighboring regions.
    Type: Application
    Filed: August 26, 2005
    Publication date: February 16, 2006
    Inventors: Michial Gunter, David Kita, Oliver Shih, Carroll Gossett
  • Publication number: 20020131495
    Abstract: A method of reconstructing a previously occluded area of a video image frame exposed by the motion of a segment within said image frame. In one embodiment the method involves approximating the color values of the pixels in the newly exposed area from the color values of the neighboring image segments. The process is refined by identifying a set of neighboring segments to the exposed area, called fill segments, that most closely resemble the color values of the pixels within the exposed area. These fill segments are then used to reconstruct the color values of the exposed area. In one embodiment, the identities of the fill segments are transmitted to an exemplary decoder.
    Type: Application
    Filed: December 20, 2001
    Publication date: September 19, 2002
    Inventors: Adityo Prakash, David Kita, Edward Ratner, Oliver Shih, Hitoshi Watanabe