Patents by Inventor Thomas S. Messerges

Thomas S. Messerges has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20090080389
    Abstract: A means for determining a channel for communication in a wireless communication system is provided. A method includes receiving one or more sub-frames of a beacon signal on a beaconing channel until a legitimacy condition of the beacon signal is met. The beacon signal is transmitted by a beaconing device. The method further includes determining a suitability of the channel for communication in the wireless communication system based on the legitimacy condition.
    Type: Application
    Filed: September 26, 2007
    Publication date: March 26, 2009
    Applicant: MOTOROLA, INC.
    Inventors: Thomas S. Messerges, Gregory J. Buchwald, Stephen L. Kuffner
  • Publication number: 20090063852
    Abstract: A device (110) performs a method 200 for authentication and Ad Hoc network setup. The device (110) receives (210) a first security configuration; receives (220) a second security configuration based on location; authenticates (230) at least a second node (110) having the first security configuration and the second security configuration; and forms (240) a network with the at least a second node (110).
    Type: Application
    Filed: December 28, 2004
    Publication date: March 5, 2009
    Inventors: Thomas S. Messerges, Larry C. Puhl
  • Publication number: 20080141352
    Abstract: A password is securely distributed to a client device of a network by sending a first encrypted message from the client device to a server of the network, the first message comprising a nonce created by the client device, a username of the client device, and a network address of the client device, then sending a second message from the server to the network address of the client device, the second message comprising the nonce created by the client device, and a password created by the server. If the client device verifies that the nonce received from the server matches the nonce sent to the server, the password and username may be used to enable to client device to access information on the server. The first encrypted message may be an HTTPS message and the second message may be an SMS message.
    Type: Application
    Filed: December 11, 2006
    Publication date: June 12, 2008
    Applicant: MOTOROLA, INC.
    Inventors: Brett L. Lindsley, Thomas S. Messerges
  • Publication number: 20070278290
    Abstract: A mobile device as disclosed herein can support a plurality of electronic payment applications such as credit and/or debit applications. During a payment transaction, the mobile device communicates a priority list of the electronic payment applications to a point of sale terminal, which then selects one of the applications for completion of the payment transaction, where the selection is governed by the priority list. The data structure corresponding to the priority list is configured such that the end user of the mobile device has management access rights to at least some of the electronic payment applications. Such end user management access rights can be used to modify the relative priority of the electronic payment applications.
    Type: Application
    Filed: June 6, 2006
    Publication date: December 6, 2007
    Inventors: Thomas S. Messerges, Ruben R. Formoso
  • Patent number: 7099469
    Abstract: A scrambling method (510) divides a set of data (200) into a first portion and a second portion. A first scrambling method is performed on the first portion of the set of data to create a scrambled first portion of the data. The second portion of the set of data is modified with the scrambled first portion of the set of data to create a modified second portion of the set of data. A second scrambling method is performed on the modified second portion of the set of data to create a scrambled second portion of the set of data. The scrambled first portion of the set of data is modified with the scrambled second portion of the set of data to create a scrambled set of data (220). A descrambling method (520) reverses the scrambling method (510) to create a descrambed set of data (200).
    Type: Grant
    Filed: October 17, 2001
    Date of Patent: August 29, 2006
    Assignee: Motorola, Inc.
    Inventors: Douglas A. Kuhlman, Thomas S. Messerges, Timothy James Collins, David P. Gurney, Stephen L. Kuffner
  • Publication number: 20040193902
    Abstract: A preferred technique includes a digital content rendering device (100) and a method used in the device, including acquiring (305) an encrypted digital content (105), acquiring (305) a set of rules (110) associated with the encrypted digital content that specify permissions involving at least one level of rendering of the digital content that are based on a comparison of a set of specified locations with a sensed location, acquiring (305) an encrypted content key (120), extracting (315) the digital content, determining (330) a sensed location of the content rendering device, performing comparisons (335) of the sensed location to each of the set of specified locations; and determining (340) a level of rendering of the digital content in accordance with the set of rules, based on results of the comparisons.
    Type: Application
    Filed: March 31, 2003
    Publication date: September 30, 2004
    Inventors: Dean H. Vogler, Ephrem A. Chemaly, Ezzat A. Dabbish, Thomas S. Messerges, Robert A. Patzer
  • Publication number: 20040193919
    Abstract: To address the need for a communicating electronic device (102) to identify other trusted devices (103) and allow for applications, such as digital-rights management, and the easy transfer of content and commands (217) among devices, a method and apparatus for identifying trusted devices (103) is disclosed herein. Each electronic device wishing to share digital content will comprise a database (209) containing a list of trusted and/or non-trusted devices. The list of trusted and non-trusted devices is similar to a master list of trusted and non-trusted devices that exists at the certificate authority or an equivalent trusted server. However, in order to limit the size of the database existing on the electronic device, only a portion of the master list will be stored locally.
    Type: Application
    Filed: March 31, 2003
    Publication date: September 30, 2004
    Inventors: Ezzat A. Dabbish, Douglas A. Kuhlman, thomas S. Messerges
  • Publication number: 20030084298
    Abstract: A method of authenticating digital content of a digital object. Content is divided into portions or chunks. A chunk hash of each chunk is calculated to provide chunk hashes that are stored as entries in a hash table. The chunk hash entries of the hash table are in turn hashed to create an overall hash of the hash table. Verification of the content first includes determining whether a recalculated overall hash of the hash table matches the previously calculated overall hash of the hash table. If the recalculated overall hash does match, this indicates that the hash table is authenticated and that the authenticity of the individual chunks can be verified. Verification of the authenticity of an individual chunk, which may be performed concurrently with the processing of the individual chunk, allows the content of the digital object to be incrementally rendered, chunk by chunk, resulting in a much faster and efficient rendering of the verified digital content.
    Type: Application
    Filed: October 25, 2001
    Publication date: May 1, 2003
    Inventors: Thomas S. Messerges, Ezzat A. Dabbish, Larry Puhl, Douglas A. Kuhlman
  • Publication number: 20030072445
    Abstract: A scrambling method (510) divides a set of data (200) into a first portion and a second portion. A first scrambling method is performed on the first portion of the set of data to create a scrambled first portion of the data. The second portion of the set of data is modified with the scrambled first portion of the set of data to create a modified second portion of the set of data. A second scrambling method is performed on the modified second portion of the set of data to create a scrambled second portion of the set of data. The scrambled first portion of the set of data is modified with the scrambled second portion of the set of data to create a scrambled set of data (220). A descrambling method (520) reverses the scrambling method (510) to create a descrambed set of data (200).
    Type: Application
    Filed: October 17, 2001
    Publication date: April 17, 2003
    Inventors: Douglas A. Kuhlman, Thomas S. Messerges, Timothy James Collins, David P. Gurney, Stephen L. Kuffner
  • Publication number: 20020157002
    Abstract: A domain-based digital rights management (DRM) method and system. A domain has one or more communication devices, such as user devices that share a common cryptographic key of the domain. There may be a plurality of domains in a digital rights management environment and the domains may additionally be overlapping. A domain authority, in combination with a digital rights management module of a communication device, operates to selectively register and unregister the communication device to the one or more domains and to control access to encrypted digital content information.
    Type: Application
    Filed: August 29, 2001
    Publication date: October 24, 2002
    Inventors: Thomas S. Messerges, Ezzat A. Dabbish, Larry Puhl, Dean Vogler
  • Patent number: 6298135
    Abstract: Apparatus in form of a microelectronic assembly including an integrated circuit (IC) for execution of an embedded modular exponentiation program utilizing a square-and-multiply algorithm, wherein in the modular exponentiation program a secret exponent having a plurality of bits characterizes a private key, a method of providing a digital signature to prevent the detection of the secret exponent when monitoring power variations during the IC execution, the method comprising the steps of for a first operation in the modular exponentiation, selecting at least one predetermined bit, wherein the at least one predetermined bit is a bit other than a least significant bit (LSB) and the most significant bit (MSB); using the square-and-multiply algorithm, sequentially selecting bits to the left of the at least one predetermined bit for exponentiation until the MSB is selected; subsequent to selecting the MSB, sequentially selecting bits to the right of the at least one predetermined bit for exponentiation until the LSB
    Type: Grant
    Filed: April 29, 1999
    Date of Patent: October 2, 2001
    Assignee: Motorola, Inc.
    Inventors: Thomas S. Messerges, Ezzat A. Dabbish
  • Patent number: 6295606
    Abstract: An apparatus and method for preventing information leakage attacks on a microelectronic assembly is described for performing a cryptographic algorithm by transforming a first function, used by the cryptographic algorithm, into a second function. The method includes receiving (1102) a masked input data having n number of bits that is masked with an input mask, wherein n is a first predetermined integer. The method also includes processing (1104) the masked input data using a second function based on a predetermined masking scheme, and producing (1106) a masked output data having m number of bits that is masked with an output mask, wherein m is a second predetermined integer.
    Type: Grant
    Filed: July 26, 1999
    Date of Patent: September 25, 2001
    Assignee: Motorola, Inc.
    Inventors: Thomas S. Messerges, Ezzat A. Dabbish, Larry Puhl
  • Patent number: 5347548
    Abstract: Simultaneously detecting both frame and bit synchronization in a serial bit stream reduces the time required to have a receiver lock up to a transmitted serial data signal. A dual-phase correlator circuit is used to detect frame synchronization while a multiphase commutator circuit detects bit clock synchronization.
    Type: Grant
    Filed: June 19, 1992
    Date of Patent: September 13, 1994
    Assignee: Motorola Inc.
    Inventors: Thomas S. Messerges, Larry C. Puhl, Ezzat A. Dabbish