Patents by Inventor Thomas Messerges

Thomas Messerges has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20120090019
    Abstract: A method and apparatus for digital-rights management is provided herein. Various forms of authorization are allowed, with each form of authorization being dependent upon an action taken on the digital content. In particular, when server-based authorization is unavailable, less-risky operations are allowed by performing an internal authorization scheme. Thus, higher security offered by a server-based DRM is required for risky actions, yet non-risky actions on the digital content may still be taken when the server is unavailable.
    Type: Application
    Filed: December 19, 2011
    Publication date: April 12, 2012
    Applicant: Motorola Mobility, Inc.
    Inventors: Thomas Messerges, Ezzat A. Dabbish
  • Patent number: 7899187
    Abstract: New devices (101) are added to an existing domain by obtaining domain information (e.g., domain name and private domain password) from devices (101) already in the domain that preferably are in close proximity. Once the domain information has been transferred from the device already in the domain to the device being added to the domain, the device being added to the domain contacts a key issuer (105) to complete its registration into the domain. The key issuer returns a DRM domain private key (206) as well as a DRM certificate (202). Both are utilized by the device to obtain and render digital content (204).
    Type: Grant
    Filed: November 27, 2002
    Date of Patent: March 1, 2011
    Assignee: Motorola Mobility, Inc.
    Inventors: Thomas Messerges, Ezzat A. Dabbish, Larry Puhl, Dean Vogler
  • Patent number: 7734549
    Abstract: A system and method to securely create, distribute, install and execute selected features of software on wireless devices combines three different types of licenses, a validation license, a digital rights management (DRM) license, and a feature license with a software application. Each of these three licenses work independent of each other, where the validation license helps prevent malicious code from executing on wireless devices, the DRM license prevents unauthorized copying of the software application and the feature license securely enables or disables specific features of the software application. The system also allows a wireless device to unwrap a DRM protected software application, to validate the software application, to enforce DRM usage rules and to execute selected features of the software application.
    Type: Grant
    Filed: December 31, 2002
    Date of Patent: June 8, 2010
    Assignee: Motorola, Inc.
    Inventors: Ezzat A. Dabbish, Thomas Messerges
  • Publication number: 20080005034
    Abstract: A method is disclosed that receives, at a sink device, encrypted content. Further, the method receives, at the sink device, content license data from a source device. In addition, the method analyzes the content license data to determine whether a rights issuer that generated the content license data intended that the source device, which has cryptographic access to the content license data, be authorized to send, to the sink device, a value that enables decryption of the encrypted content. The method also receives the value and decrypts the encrypted content if the rights issuer intended that the source device be authorized to transfer the value to the sink device.
    Type: Application
    Filed: June 8, 2007
    Publication date: January 3, 2008
    Applicant: GENERAL INSTRUMENT CORPORATION
    Inventors: David Kravitz, Thomas Messerges, Paul Montague, Glen Olafsen, Michael Terrington
  • Publication number: 20060282680
    Abstract: A method and system for registering a user device in a domain of a domain authority (106) using biometric information is provided. The method includes sending (402) a request (by the user device) to the domain authority for joining the domain. The user device making the request is then authenticated (400) and the biometric information of the user is then requested (406). Further, the method includes authenticating (412) the biometric information of the user. The security information of the domain is transferred (414) to the user device once the authentication of the user device and the biometric information are both successful.
    Type: Application
    Filed: June 14, 2005
    Publication date: December 14, 2006
    Inventors: Douglas Kuhlman, Ezzat Dabbish, Thomas Messerges, Dean Vogler
  • Publication number: 20060189304
    Abstract: A communications device (300) enabled to support both external voice communications functionality (301) (or other external communications of interest and choice) and other functionality (302) has at least a first and second mode of operation (304 and 305). The first mode of operation permits essentially all functionality while the second mode of operation precludes at least much of the other functionality in favor of preserving the viability of at least some of the external communications functionality. A selector (306) can select a given mode of operation based, at least in part, on a trigger 307 comprising, for example, a user input and/or detection of a condition of concern.
    Type: Application
    Filed: February 22, 2005
    Publication date: August 24, 2006
    Inventors: Yi Li, Ezzat Dabbish, Thomas Messerges, Larry Puhl
  • Publication number: 20050049979
    Abstract: In order to address the need for detection of fraudulent items, a method, apparatus, and system for detection of fraudulent items is provided herein. Special anti-forgery Radio-Frequency identification (RFID) tags are utilized with additional measures to thwart would-be forgers. Each anti-forgery RFID tag comprises a unique, or semi-unique number that, along with a private key possessed by only the legitimate product manufacturer, determines a signature that is preferably printed on the product packaging. Utilizing the unique number on the anti-forgery RFID and a public key corresponding to the private key, the signature is verified by standard public-key cryptographic methods. The validation of the signature identifies the product's authenticity.
    Type: Application
    Filed: August 26, 2003
    Publication date: March 3, 2005
    Inventors: Timothy Collins, Douglas Kuhlman, Thomas Messerges
  • Publication number: 20050010780
    Abstract: A personal database (102) is maintained by the owner of personal information that is to be shared. When a requestor (103) requests personal information, the request is made to a token generation subsystem (101) that produces a token that allows access to the personal database. The personal database will allow access to information only identified by the token.
    Type: Application
    Filed: July 9, 2003
    Publication date: January 13, 2005
    Inventors: John Kane, Thomas Messerges
  • Publication number: 20040133632
    Abstract: Logic circuitry (301) determines that digital content (317) needs to be accessed or obtained and then determines a DRM core (307), or protocol necessary to obtain/access the digital content. If the DRM core (307) is not resident in memory, the core is downloaded from a DRM solution center (103). An application (305) will utilize the DRM core to access or obtain the digital content.
    Type: Application
    Filed: January 8, 2003
    Publication date: July 8, 2004
    Inventors: Thomas Messerges, Ronald Buskey, Ezzat A. Dabbish
  • Publication number: 20040127196
    Abstract: A system and method to securely create, distribute, install and execute selected features of software on wireless devices combines three different types of licenses, a validation license, a digital rights management (DRM) license, and a feature license with a software application. Each of these three licenses work independent of each other, where the validation license helps prevent malicious code from executing on wireless devices, the DRM license prevents unauthorized copying of the software application and the feature license securely enables or disables specific features of the software application. The system also allows a wireless device to unwrap a DRM protected software application, to validate the software application, to enforce DRM usage rules and to execute selected features of the software application.
    Type: Application
    Filed: December 31, 2002
    Publication date: July 1, 2004
    Inventors: Ezzat A. Dabbish, Thomas Messerges
  • Publication number: 20040103312
    Abstract: New devices (101) are added to an existing domain by obtaining domain information (e.g., domain name and private domain password) from devices (101) already in the domain that preferably are in close proximity. Once the domain information has been transferred from the device already in the domain to the device being added to the domain, the device being added to the domain contacts a key issuer (105) to complete its registration into the domain. The key issuer returns a DRM domain private key (206) as well as a DRM certificate (202). Both are utilized by the device to obtain and render digital content (204).
    Type: Application
    Filed: November 27, 2002
    Publication date: May 27, 2004
    Inventors: Thomas Messerges, Ezzat A. Dabbish, Larry Puhl, Dean Vogler
  • Publication number: 20040088175
    Abstract: A method and apparatus for digital-rights management is provided herein. Various forms of authorization are allowed, with each form of authorization being dependent upon an action taken on the digital content. In particular, when server-based authorization is unavailable, less-risky operations are allowed by performing an internal authorization scheme. Thus, higher security offered by a server-based DRM is required for risky actions, yet non-risky actions on the digital content may still be taken when the server is unavailable.
    Type: Application
    Filed: November 1, 2002
    Publication date: May 6, 2004
    Inventors: Thomas Messerges, Ezzat A. Dabbish
  • Publication number: 20040088541
    Abstract: Devices (101) are assigned a unique, unalterable, identification or serial number (313) that acts as the devices “electronic” biometric. Any certificate (302) created by a key issuer will contain the device's assigned DRM public key and the device's electronic biometric data. When a consumer wishes to purchase new content (304) from a content provider (103), the consumer will send the DRM certificate containing its DRM public key and the biometric. The rights issuer will then create a license (306) that assigns the content in such a way that only a device with the particular biometric and DRM private key is allowed to render the content.
    Type: Application
    Filed: November 1, 2002
    Publication date: May 6, 2004
    Inventors: Thomas Messerges, Ezzat A. Dabbish, Larry Puhl, Dean Vogler