Patents by Inventor Sandeep Shankaran Kumar

Sandeep Shankaran Kumar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180020421
    Abstract: A method of determining a location of a mobile device based on a first location estimation performed using a first location system, the method comprising: obtaining an initial estimate of the mobile device's location based on a second location estimation that is coarser than the first location estimation; using the initial estimate to select a subset of the reference nodes of the first network that are within a defined vicinity of the mobile device's location; and from amongst a database of respective assistance data for each of the wireless reference nodes stored on a server of the first location system, selectively providing the respective assistance data for each of said subset of wireless reference nodes to a localization module on the mobile device, for the localization module of the mobile device to calculate a finer estimate of the mobile device's location.
    Type: Application
    Filed: February 17, 2016
    Publication date: January 18, 2018
    Inventors: SANDEEP SHANKARAN KUMAR, ASHISH VIJAY PANDHARIPANDE
  • Patent number: 9722787
    Abstract: A method of configuring a network device for key sharing and a method for a first network device to determine a shared key are provided. The method of configuring uses a private modulus (p1) a public modulus (N), and a bivariate polynomial (f1) having integer coefficients, the binary representation of the public modulus and the binary representation of the private modulus are the same in at least key length (b) consecutive bits. Local key material for a network device is generated by substituting an identity number into the bivariate polynomial and reducing modulo the private modulus the result of the substitution to obtain a univariate polynomial. Security may be increased by adding (440) one or more obfuscating numbers to coefficients of the univariate polynomial to obtain an obfuscated univariate polynomial.
    Type: Grant
    Filed: March 28, 2013
    Date of Patent: August 1, 2017
    Assignee: KONINKLIJKE PHILIPS N.V.
    Inventors: Oscar Garcia Morchon, Ludovicus Marinus Gerardus Maria Tolhuizen, Jaime Gutierrez, Sandeep Shankaran Kumar, Domingo Gomez
  • Publication number: 20160337796
    Abstract: In one aspect, a mobile device is located using a signal sent out from the mobile device to nodes of a location network, and the mobile device also sends a tracking preference associated with the signal. This specifies whether a location network is permitted to use the signal to determine the mobile's location, and/or whether a provider of a location related service associated with a location network is permitted to make use of the location. In embodiments the preference may be tagged with the ID of a particular provider. In another aspect, the localization is based on measurements taken by a mobile terminal of signals sent from the nodes, and the nodes also send out an identifier with the signal identifying a provider of a location related service associated with the network. The mobile device can then use this identifier to determine who to share its measurements or location with.
    Type: Application
    Filed: January 6, 2015
    Publication date: November 17, 2016
    Inventors: ASHISH VIJAY PANDHARIPANDE, SANDEEP SHANKARAN KUMAR
  • Publication number: 20160327629
    Abstract: A wireless device comprising: a wireless interface for communicating with a network of reference nodes, and a location module configured to obtain a measurement of a respective signal communicated between the wireless interface and each of a plurality of said reference nodes. The location module is also supplied with a respective set of transformed coordinates for each of said plurality of reference nodes, transformed relative to their actual physical coordinates. Using said signal measurements and the transformed coordinates of said plurality of reference nodes, the wireless device then submits information indicative of a transformed location of the wireless device to an interpretation function. Based on the interpretation function, the wireless device is thereby able to access functionality relating to the physical location of the mobile terminal.
    Type: Application
    Filed: January 2, 2015
    Publication date: November 10, 2016
    Inventors: ASHISH VIJAY PANDHARIPANDE, SANDEEP SHANKARAN KUMAR
  • Publication number: 20160254909
    Abstract: A method of configuring a network device for key sharing and a method for a first network device to determine a shared key are provided. The method of configuring uses a private private modulus, and a modulus (p1) a public modulus (N), and a bivariate polynomial (f1) having integer coefficients, the binary representation of the public modulus and the binary representation of the private modulus are the same in at least key length (b) consecutive bits. Local key material for a network device is generated by substituting an identity number into the bivariate polynomial and reducing modulo the private modulus the result of the substitution to obtain a univariate polynomial. Security may be increased by adding (440) one or more obfuscating numbers to coefficients of the univariate polynomial to obtain an obfuscated univariate polynomial.
    Type: Application
    Filed: March 28, 2013
    Publication date: September 1, 2016
    Inventors: OSCAR GARCIA MORCHON, LUDOVICUS MARINUS GERARDUS MARIA TOLHUIZEN, JAIME GUTIERREZ, SANDEEP SHANKARAN KUMAR, DOMINGO GOMEZ
  • Publication number: 20160205746
    Abstract: The disclosure relates to a lighting system which can be controlled from a wireless device in dependence on complying with an access rule that the wireless device is determined to be within in a spatial region associated with the lighting system. The disclosure provides apparatus for securing against the lighting system being controlled from a device located outside the relevant region via a rogue relay device located in that region. The apparatus comprises a user location module configured to determine user location information indicative of whether a user is accompanying the wireless device in the region associated with the lighting system, and an access module which is configured with a further access rule: that it does not allow the control of the lighting system by the wireless device if the user location information is indicative of the wireless device being unaccompanied by a user.
    Type: Application
    Filed: July 23, 2014
    Publication date: July 14, 2016
    Applicant: PHILIPS LIGHTING HOLDING B.V.
    Inventors: SANDEEP SHANKARAN KUMAR, ASHISH VIJAY PANDHARIPANDE
  • Publication number: 20160139573
    Abstract: The present invention relates to a method for access decision evaluation in a building automation and control system, the method comprising: sending, from an accessing device (10) to an accessed device (20), an access request, sending, from the accessed device (20) to a central decision evaluation apparatus (30), an evaluation request asking if the access request is granted or denied, evaluating, at the central decision evaluation apparatus (30), the evaluation request using one or more central access control policies in order to reach a decision on if the access request is granted or denied, deriving, at the central decision evaluation apparatus (30), the one or more central access control policies that was used for evaluation into a device specific access policy, sending, from the central decision evaluation apparatus (30) to the accessed device (20), the decision and the device specific access policy, and storing, at the accessed device (20), the device specific access policy.
    Type: Application
    Filed: February 20, 2013
    Publication date: May 19, 2016
    Inventors: Amit Soni, Sandeep Shankaran Kumar, Sye Loong Keoh, Oscar Garcia Morchon, Fulong Ma
  • Publication number: 20150381365
    Abstract: A network device (110) is provided which is configured to determine a shared cryptographic key of key length (b) bits shared with a second network device (120) from a polynomial and an identity number of the second network device. A reduction algorithm is used to evaluate the polynomial in the identity number of the second network device and reduce module a public modulus and modulo a key modulus. The reduction algorithm comprises an iteration over the terms of the polynomial. In at least the iteration which iteration is associated with a particular term of the polynomial are comprised a first and second multiplication. The first multiplication is between the identity number and a least significant part of the coefficient of the particular term obtained from the representation of the polynomial, the least significant part of the coefficient being formed by the key length least significant bits of the coefficient of the particular term.
    Type: Application
    Filed: February 11, 2014
    Publication date: December 31, 2015
    Inventors: OSCAR GARCIA MORCHON, SANDEEP SHANKARAN KUMAR, LUDOVICUS MARINUS GERARDUS MARIA TOLHUIZEN
  • Publication number: 20150358154
    Abstract: An electronic random number generating device (100) for generating a sequence of random numbers, the electronic random number generating device comprising an electronic parameter storage (110) configured to store multiple functions and for each function of the multiple functions an associated modulus, not all moduli being equal, and an electronic function evaluation device (120) configured to generate an internal sequence of random numbers, the function evaluation device being configured to generate a next number in the internal sequence of random numbers by for each function of the multiple functions, evaluating the function for a previously generated value in the internal sequence of random numbers modulo the modulus associated with the evaluating function, so obtaining multiple evaluation results, and applying a combination function to the multiple evaluation results to obtain the next number in the internal sequence, and an output (140) configured to generate a next number in the sequence of random number
    Type: Application
    Filed: February 20, 2014
    Publication date: December 10, 2015
    Applicant: KONINKLIJKE PHILIPS N.V.
    Inventors: OSCAR GARCIA MORCHON, SANDEEP SHANKARAN KUMAR, LUDOVICUS MARINUS GERARDUS MARIA TOLHUIZEN
  • Patent number: 9185133
    Abstract: The invention provides methods, devices (102, 110, 124, 136) and communication systems (100) for establishing end-to-end secure connections and for securely communicating data packets. Such a communication system (100) comprises a first device (124, 136), an intermediate device (110) and a second device (102). The first device (124, 136) communications via a first network (120), which is based on a first transport protocol and a first transport security protocol with the intermediate device (110). The second device (102) communications via a second network, which is based on a second transport protocol and a second transport security protocol with the intermediate device (110). The intermediate device (110) modifies packets received via first network to packets suitable for communication via the second network, and vice versa. The first device (124, 136) is able to reconstruct a header of a received packet as if the packet was sent via the second network (108) and its transport and security protocols.
    Type: Grant
    Filed: July 24, 2012
    Date of Patent: November 10, 2015
    Assignee: KONINKLIJKE PHILIPS N.V.
    Inventors: Sye Loong Keoh, Oscar Garcia Morchon, Sandeep Shankaran Kumar, Martina Brachmann, Bozena Erdmann
  • Publication number: 20150263861
    Abstract: The present invention relates to verification of the authenticity of a lighting device. There is provided a lighting device which is capable of emitting coded light. The lighting device has a challenge receiver, arranged to receive a challenge, and a response transmitter, arranged to generate and transmit a response to the challenge. The response is generated by means of the challenge and a secret key in combination. Furthermore, there is provided a corresponding verification device generating the challenge and providing it to the lighting device, and analyzing the response in order to check the authenticity of the lighting device.
    Type: Application
    Filed: September 12, 2013
    Publication date: September 17, 2015
    Inventors: Sandeep Shankaran Kumar, Oscar Garcia Morchon, Sye Loong Keoh, Theodorusb Jacobus Johannes Denteneer, Lorenzo Feri
  • Patent number: 9092643
    Abstract: A system including a server system, a user terminal and a hardware token, for providing secure access to a data record. The server system comprises storage means (1) for storing a plurality of data records, a data record (2) having associated therewith a sequence of secrets (14) shared with a hardware token (60) corresponding to the data record (2), the server system (100) further being arranged for storing user authentication information (3). User authenticating means (10) are provided for receiving authentication credentials (11) of a user from a user terminal (200) and authenticating the user as an authorized user, based on the authentication credentials (11) of the user and the stored authentication information (3). Secret-receiving means (9) are provided for receiving a representation of a secret (13) revealed by a hardware token (60) and information identifying the data record corresponding to the hardware token from the terminal.
    Type: Grant
    Filed: January 30, 2012
    Date of Patent: July 28, 2015
    Assignee: Koninklijke Philips N.V.
    Inventors: Sye Loong Keoh, Muhammad Asim, Sandeep Shankaran Kumar, Petrus Johannes Lenoir
  • Publication number: 20140143855
    Abstract: The invention provides methods, devices (102, 110, 124, 136) and communication systems (100) for establishing end-to-end secure connections and for securely communicating data packets. Such a communication system (100) comprises a first device (124, 136), an intermediate device (110) and a second device (102). The first device (124, 136) communications via a first network (120), which is based on a first transport protocol and a first transport security protocol with the intermediate device (110). The second device (102) communications via a second network, which is based on a second transport protocol and a second transport security protocol with the intermediate device (110). The intermediate device (110) modifies packets received via first network to packets suitable for communication via the second network, and vice versa. The first device (124, 136) is able to reconstruct a header of a received packet as if the packet was sent via the second network (108) and its transport and security protocols.
    Type: Application
    Filed: July 24, 2012
    Publication date: May 22, 2014
    Applicant: KONINKLIJKE PHILIPS N.V.
    Inventors: Sye Loong Keoh, Oscar Garcia Morchon, Sandeep Shankaran Kumar, Martina Brachmann, Bozena Erdmann
  • Publication number: 20130318632
    Abstract: A system including a server system, a user terminal and a hardware token, for providing secure access to a data record. The server system comprises storage means (1) for storing a plurality of data records, a data record (2) having associated therewith a sequence of secrets(14)shared with a hardware token (60) corresponding to the data record (2), the server system(100) further being arranged for storing user authentication information (3). User authenticating means (10) are provided for receiving authentication credentials (11) of a user from a user terminal (200) and authenticating the user as an authorized user, based on the authentication credentials (11) of the user and the stored authentication information (3). Secret-receiving means (9) are provided for receiving a representation of a secret (13) revealed by a hardware token (60) and information identifying the data record corresponding to the hardware token from the terminal. Marking means (12) are provided for marking the unused secret (s3) as used.
    Type: Application
    Filed: January 30, 2012
    Publication date: November 28, 2013
    Inventors: Sye Loong Keoh, Muhammad Asim, Sandeep Shankaran Kumar, Petrus Johannes Lenoir
  • Publication number: 20120066497
    Abstract: The present invention relates to a method and a device adapted to determine at a party whether a set comprising at least one user pseudonym is associated with a user, wherein each of the user pseudonyms in the set is associated with the user at a service portal. At the party, for each of the user pseudonyms comprised in the set, a publicly available first coded string associated with the user pseudonym is retrieved from the service portal associated with the user pseudonym, wherein each of the first coded strings has been generated on the basis of a first secret unique to said first coded string. The user's knowledge of the first secrets associated with the respective first coded strings is verified by means of a first cryptographic protocol for interacting with the user, wherein the first protocol is adapted to utilize the first coded strings.
    Type: Application
    Filed: May 11, 2010
    Publication date: March 15, 2012
    Applicant: KONINKLIJKE PHILIPS ELECTRONICS N.V.
    Inventors: Sandeep Shankaran Kumar, Robert Paul Koster
  • Publication number: 20110215829
    Abstract: A method of generating a response to a physically unclonable function, said response being uniquely representative of the identity of a device having challengeable memory, the memory comprising a plurality of logical locations each having at least two possible logical states, the method comprising applying a challenge signal to an input of said memory so as to cause each of said logical locations to enter one of said two possible logical states and thereby generate a response pattern of logical states, said response pattern being dependent on said physically unclonable function which is defined by, the physical characteristics of said memory, the method further comprising reading out said response pattern.
    Type: Application
    Filed: August 18, 2008
    Publication date: September 8, 2011
    Applicant: INTRINSIC ID B.V.
    Inventors: Jorge Guajardo Merchan, Sandeep Shankaran Kumar, Pim Theo Tuyls, Geert Jan Schrijen