Cellular Telephone Cryptographic Authentication Patents (Class 380/247)
-
Patent number: 9331993Abstract: A communication device comprising a central processing unit (CPU) and a memory device is disclosed. The CPU is configured to send a first attach request including a first subscription identity (FSI) to the network apparatus, receive an authentication request including a random number and an authentication token from the network apparatus as a response to the first attach request. Further, the CPU is configured to authenticate the authentication token using the random number and a first key associated with the FSI, obtain a second key and a second subscription identity (SSI) in response to authentication of the authentication token failing, where SSI is obtained from the authentication request. The CPU is further configured to send an authentication failure to the network apparatus. The second key and SSI are stored in the memory device such that the second key is associated with SSI.Type: GrantFiled: June 16, 2011Date of Patent: May 3, 2016Assignee: Telefonaktiebolaget L M Ericsson (Publ)Inventors: Shingo Murakami, Ryoji Kato, Toshikane Oda, Shinta Sugimoto
-
Patent number: 9307408Abstract: Embodiments of a mobile device and method for secure online sign-up and provisioning of credentials for Wi-Fi hotspots are generally described herein. In some embodiments, provisioning occurs using a service set identifier (SSID) to associate with a hotspot and retrieve a virtual LAN (VLAN) identifier. The VLAN identifier is used to complete the signup and provisioning process. In some embodiments, a hotspot may implement a primary SSID and a dependent SSID. The mobile device associates with the hotspot using the dependent SSID to perform the secure online signup and provisioning process. Once credentials are obtained using the signup and provisioning process, the device can connect to the hotspot using the primary SSID and the already provisioned credentials. The provisioned credentials may include certificates, username/password, or SIM-type credentials.Type: GrantFiled: December 27, 2012Date of Patent: April 5, 2016Assignee: Intel CorporationInventors: Vivek G. Gupta, Necati Canpolat
-
Patent number: 9300641Abstract: An approach is provided for performing authentication in a communication system. In one embodiment, a key is established with a terminal in a communication network according to a key agreement protocol. The agreed key is tied to an authentication procedure to provide a security association that supports reuse of the key. A master key is generated based on the agreed key. In another embodiment, digest authentication is combined with key exchange parameters (e.g., Diffie-Hellman parameters) in the payload of the digest message, in which a key (e.g., SMEKEY or MN-AAA) is utilized as a password. In yet another embodiment, an authentication algorithm (e.g., Cellular Authentication and Voice Encryption (CAVE)) is employed with a key agreement protocol with conversion functions to support bootstrapping.Type: GrantFiled: February 10, 2006Date of Patent: March 29, 2016Assignee: Nokia CorporationInventors: Pekka Laitinen, Philip Ginzboorg, Nadarajah Asokan, Gabor Bajko
-
Patent number: 9300509Abstract: Briefly, in accordance with one or more embodiments, a conventional physical downlink control channel (PDCCH) is transmitted in a first region of a physical downlink control channel structure utilized by a remote radio head that has been assigned a cell identifier that is common to one or more other remote radio heads within the cell, and an enhanced physical downlink control channel (ePDCCH) is transmitted in a second region of the physical downlink control channel structure.Type: GrantFiled: December 13, 2011Date of Patent: March 29, 2016Assignee: Intel CorporationInventors: Alexei Davydov, Alexander Maltsev, Yuan Zhu, Kamran Etemad, Yujian Zhang, Gregory V. Morozov, Vadim Sergeyev
-
Patent number: 9288677Abstract: A wireless terminal which newly joins a wireless communication system transmits a message containing its identification data to an access point in the wireless communication system at a communication parameter setting start. Upon receiving the message, the access point determines whether or not the wireless terminal has been registered. If it is determined that the wireless terminal has not been registered, the access point determines whether or not the wireless terminal is a setting target device of communication parameters based on the identification data contained in the message. If it is determined that the wireless terminal is a setting target device, the access point sets communication parameters for the wireless terminal.Type: GrantFiled: March 4, 2014Date of Patent: March 15, 2016Assignee: CANON KABUSHIKI KAISHAInventor: Takafumi Nakajima
-
Patent number: 9270464Abstract: A method and system for securely enrolling personal identity credentials into personal identification devices. The system of the invention comprises the manufacturer of the device and an enrollment authority. The manufacturer is responsible for recording serial numbers or another unique identifier for each device that it produces, along with a self-generated public key for each device. The enrollment authority is recognized by the manufacturer or another suitable institution as capable of validating an individual before enrolling him into the device. The enrollment authority maintains and operates the appropriate equipment for enrollment, and provides its approval of the enrollment. The methods described herein discuss post-manufacturing, enrollment, backup, and recovery processes for the device.Type: GrantFiled: July 29, 2014Date of Patent: February 23, 2016Assignee: Apple Inc.Inventors: David S. Abdallah, Barry W. Johnson
-
Patent number: 9262623Abstract: A request is received for a brokered shipment from a particular entity to an anonymous user. A shipping identifier is obtained from a shipping entity, on behalf of the particular entity, for the shipment from the particular entity to the anonymous user. The shipping identifier is communicated to the particular entity and the shipping identifier is associated with a unique user identifier unique, within a system, to a pairing of the anonymous user with the particular entity. Address information of the anonymous user is unknown to the particular entity, and address information is obtained from the shipping entity for the anonymous user. In some aspects, address information of the particular user is received from a second entity and applied to the shipment identifier in connection with delivery of the shipment to the particular user.Type: GrantFiled: August 22, 2012Date of Patent: February 16, 2016Assignee: McAfee, Inc.Inventor: Martin Stecher
-
Patent number: 9231760Abstract: Embodiments of a wireless device and methods for rekeying with reduced packet loss in a wireless network are generally described herein. In some embodiments, during rekeying operations a new key for reception may be installed early (i.e., prior to receipt of a rekeying confirmation message). The use of the new key for transmission may be delayed until after receipt of the rekeying confirmation message. The early installation of the new key for reception may allow both the new key and old key to be active at the same time for use decrypting received packets to reduce packet loss during rekeying operations. The rekeying confirmation message may be the fourth message of a four-way handshake for rekeying. In some embodiments, two key identifiers may be alternated between four-way handshakes to prevent deletion of the old key.Type: GrantFiled: January 13, 2014Date of Patent: January 5, 2016Assignee: Intel CorporationInventors: Emily H. Qi, Jesse R. Walker, Robert J. Stacey, Herbert Liondas, Marc Jalfon
-
Patent number: 9226144Abstract: Systems and methods of performing link setup and authentication are disclosed. A method includes receiving, at a mobile device, a first access point nonce (ANonce) from an access point and generating a first pairwise transient key (PTK) using the first ANonce. The mobile device sends an authentication request including a station nonce (SNonce) to the access point, where the authentication request is protected using the first PTK. The mobile device receives an authentication response including a second ANonce from the access point, where the authentication response is protected using a second PTK. The mobile device generates the second PTK using the second ANonce and the SNonce and uses the second PTK to protect at least one subsequent message to be sent from the mobile device to the access point.Type: GrantFiled: February 14, 2014Date of Patent: December 29, 2015Assignee: Qualcomm IncorporatedInventors: George Cherian, Philip Michael Hawkes, Santosh Paul Abraham, Hemanth Sampath
-
Patent number: 9215593Abstract: Methods and systems are provided that use smartcards, such as subscriber identity module (SIM) cards to provide secure functions for a mobile client. One embodiment of the invention provides a mobile communication network system that includes a mobile network, a mobile terminal, a server coupled to the mobile terminal via the mobile network, and a subscriber identity module (SIM) card coupled to the mobile terminal. The SIM card includes a first key and a second key. The first key is used to authenticate an intended user of the mobile terminal to the mobile network. Upon successful authentication of the intended user to the mobile network, the mobile terminal downloads a function offered from the server through the mobile network. The second key is then used by the mobile terminal to authenticate the intended user to the downloaded function so that the intended user can utilize the function.Type: GrantFiled: May 14, 2013Date of Patent: December 15, 2015Assignee: BROADCOM CORPORATIONInventors: Edward H. Frank, Mark Buer, Jeyhan Karaoguz
-
Patent number: 9215591Abstract: A method, computer readable medium and apparatus for obtaining cellular network load information in a secure manner are disclosed. For example, the method receives the cellular network load information, where the cellular network load information is encrypted. The method then decrypts the cellular network load information using a decryption key and performs a task responsive to the network load information that is decrypted.Type: GrantFiled: December 6, 2012Date of Patent: December 15, 2015Assignee: AT&T Intellectual Property I, L.P.Inventors: Farooq Bari, Zhi Cui
-
Patent number: 9203846Abstract: A user may access a subscription-based service via a system comprising one or more devices with one or more separate domains where each domain may be owned or controlled by one or more different local or remote owners. Each domain may have a different owner, and a remote owner offering a subscription-based service may have taken ownership of a domain, which may be referred to as a remote owner domain. Further, the user may have taken ownership of a domain, which may be referred to as a user domain. In order for the user to access the subscription-based service, registration and credential roll-out may be needed. An exemplary registration and credential roll-out process may comprise registration of the user, obtaining credentials from the remote owner and storing the credentials.Type: GrantFiled: October 15, 2010Date of Patent: December 1, 2015Assignee: InterDigital Patent Holdings, Inc.Inventors: Louis J. Guccione, Inhyok Cha
-
Patent number: 9159187Abstract: Systems and methods for verifying user identity in a virtual environment are provided that may include periodic transmitting/monitoring of biometric data and geographic location data. Integrated systems may include anti-tamper devices that automatically delete biometric data in the event if tampering and/or power loss. Thus, the present invention helps to prevent tampering with player identity information, as well as helping to prevent access by a player to the software, graphics or other content associated with selected online activities. Such systems and methods may find particular applicability in fields related to online gambling by verifying the identity and location of an on-line player.Type: GrantFiled: November 23, 2011Date of Patent: October 13, 2015Assignee: Concierge Holdings, Inc.Inventor: James D. Thackston
-
Patent number: 9154568Abstract: An intermediate server can receive a request from a mobile device to authorize a software application, transmit a secure ID included in the request to a social-networking system, receive an access token from the social-networking system indicating that the software application has been authorized, evaluate the access token for validity, and transmit a response to the mobile device indicating the software application is authorized. The secure ID can indicate that a user of the mobile device has been authenticated by the social-networking system. The access token can be valid when the access token and the secure ID both correspond to the user of the mobile device.Type: GrantFiled: March 20, 2012Date of Patent: October 6, 2015Assignee: Facebook, Inc.Inventors: Thomas Alison, Micha Berdichevsky, Bosmat Eldar, Shashank Pandit
-
Patent number: 9154464Abstract: Techniques for concealing temporary identifiers (IDs) assigned to user equipments (UEs) by a wireless communication system are described. At a network entity, a first ID Assigned to a UE and possibly a salt value are transformed, e.g., based on a hash function, to obtain a second ID for the UE. An output message directed to the UE is generated based on an input message, the second ID, and the salt value (if present). The output message is sent via a common channel shared by the UE and other UEs. At the UE, a message is received via the common channel, and a salt value (if sent) is obtained from the received message. The first ID and the salt value are transformed to obtain the second ID, which is used to determine whether the received message is intended for the UE.Type: GrantFiled: February 9, 2007Date of Patent: October 6, 2015Assignee: QUALCOMM IncorporatedInventor: Nathan Edward Tenny
-
Patent number: 9148420Abstract: Methods and systems are provided for single sign-on process for remote-access to remote servers, using user equipment associated with a user. An intermediate device (e.g., smart-card) associated with the user equipment may be activated using local-access authentication information provided by the user. The local-access authentication data may be provided by the user in response to requests by the user equipment. Once activated, the intermediate device may support remote-access operations, by providing, in response to authentication requests received from remote servers, remote-access authentication data, which may be used in authenticating the user at the remote servers. The authentication requests may be sent by the remote server to the user equipment in response to the user requesting remote access. The remote-access authentication data may be provided without requiring user input, once the intermediate device is activated.Type: GrantFiled: July 29, 2014Date of Patent: September 29, 2015Assignee: SWISSCOM AGInventors: Azim Ferchichi, Eric Lauper
-
Patent number: 9137649Abstract: Techniques for managing assignment and reassignment of short codes are described herein. One or more computing devices may assign a short code to a first messaging campaign for a first time period. After expiration of the first time period, the one or more computing devices may then reassign the short code to a second messaging campaign for a second time period.Type: GrantFiled: July 31, 2013Date of Patent: September 15, 2015Assignee: T-Mobile USA, Inc.Inventors: Poornima Magadevan, Abha Bhatia
-
Patent number: 9130742Abstract: A network and related methods for transmitting processes in a network secretly and securely is described. The network use keys, through path-key establishment and a key pool bootstrapping, to ensure that packets are transmitted and received properly and secretly in the presence of one or more adversarial nodes.Type: GrantFiled: March 29, 2013Date of Patent: September 8, 2015Assignees: CALIFORNIA INSTITUTE OF TECHNOLOGY, PURDUE RESEARCH FOUNDATIONInventors: Hongyi Yao, Tracey C. Ho, Cristina Nita-Rotaru
-
Patent number: 9130928Abstract: A method for updating network-enabled devices with new identity data includes generating a plurality of new identity data records and loading the new identity data records onto an update server. A request is received at the update server for new identity data from at least one network-enabled device having a previously assigned identity linked to an identifier. The previously assigned identifier is linked to a new identifier that is linked to one of the new identity data records. One or more new identity data records are securely delivered to the network-enabled device.Type: GrantFiled: April 15, 2011Date of Patent: September 8, 2015Assignee: Google Technology Holdings LLCInventors: Xin Qiu, Alexander Medvinsky, Stuart P. Moskovics, Jason A. Pasion, Eric J. Sprunk, Fan Wang, Ting Yao
-
Patent number: 9131047Abstract: A method of displaying a tutorial to a user of a mobile device is disclosed. In some examples, the mobile device receives an input associated with one or more user functions of the mobile device and launches a locally based application in response to the received input. The locally based application may output instructions to the user explaining to the user how to implement the one or more user functions.Type: GrantFiled: November 19, 2013Date of Patent: September 8, 2015Assignee: Nuance Communications, Inc.Inventors: Brian Roundtree, Kevin Allan, Thomas Trinneer
-
Patent number: 9124561Abstract: A method is provided for transferring control of a security module from a first entity to a second entity. The security module has a first security domain controlled by the first entity by at least one first secret control key specific to the first entity, and a second security domain, the second domain containing a private key and a certificate of a public key of a controlling authority. The method includes: receiving a request to obtain the certificate; sending the certificate; receiving data encrypted by the public key of the certificate, the data including at least one second secret control key specific to the second entity; decrypting the data; verifying the data; and if the verification is positive, replacing the at least one first secret control key by the at least one second secret control key.Type: GrantFiled: October 12, 2012Date of Patent: September 1, 2015Assignee: OrangeInventors: Ahmad Saif, Bertrand Pladeau
-
Patent number: 9088552Abstract: An apparatus and method to provision and distribute a traffic key amongst a plurality of radios enables secure communication, for a predetermined group or a predetermined event. Each radio has a controller, a radio transceiver for electromagnetic radio communications, and a near-field transceiver for near-field communications (NFC). The traffic key (or traffic keys) is provisioned locally at one radio and distributed to the remaining radios utilizing the NFC over a non propagating link. The same traffic key is distributed amongst all radios, and additional restrictions may be applied if desired. The same radios can later be re-provisioned for a different group or event. The local provisioning and distribution is highly advantageous for markets that do not require permanent assignment of radios.Type: GrantFiled: November 30, 2011Date of Patent: July 21, 2015Assignee: MOTOROLA SOLUTIONS, INC.Inventor: Ellis A. Pinder
-
Patent number: 9087183Abstract: A method and system of securing account is provided. When a client computer requests access to an account accessible via a server, the server determines a MAC address associated with the client computer and compares it to a MAC address associated with the account. If the MAC address of the client computer is not the same as the MAC address associated with the account, the server initially denies access to the client computer, but may allow access after verification of the client computer by the user associated with the account.Type: GrantFiled: June 21, 2012Date of Patent: July 21, 2015Inventor: Rob Bartlett
-
Patent number: 9078117Abstract: A method and a wireless transmit/receive unit (WTRU), including a universal subscriber identity module (USIM), for identifying a closed subscriber group (CSG) cell are disclosed. The WTRU receives a broadcast from a cell including a cell identifier (ID). If the cell ID is associated with a CSG cell, the WTRU determines whether the CSG ID is programmed in the USIM. The cell broadcast may include a single bit information element (IE) indicating that the cell is a CSG cell. If the cell ID is a CSG ID, the cell ID may further include a plurality of fields which indicate at least one of a country, a region, an operator, and a home evolved Node-B (HeNB) number. The cell broadcast may further include a bit indicating whether the CSG cell is public or private. The cell broadcast may further include a bit indicating that emergency calls are allowed from all users.Type: GrantFiled: November 19, 2013Date of Patent: July 7, 2015Assignee: InterDigital Technology CorporationInventors: Jin Wang, Shankar Somasundaram, Mohammed Sammour, Rajat P. Mukherjee, James M. Miller
-
Patent number: 9078289Abstract: Embodiments of the present disclosure provide systems and methods to allow a multimedia device to operate in multiple modes of configuration simultaneously. The disclosed multimedia system includes a first communications circuitry having an access point connected to an external network and a number of devices. The first communications circuitry can receive and distribute media content over a wireless network, the wireless circuitry facilitating multi-modal simultaneous configuration of the multimedia device. The multi-modal simultaneous configuration includes a first mode and a second mode. The first mode facilitates exchange of data between the multimedia device and the other devices through the access point such as a wireless access point. The second mode facilitates direct exchange of data between the multimedia device and other devices in the wireless network without utilization of the access point. The multimedia device can change its mode of configuration based on a predefined trigger.Type: GrantFiled: February 29, 2012Date of Patent: July 7, 2015Assignee: SMSC HOLDINGS S.A.R.L.Inventors: Ramanathan Subramaniam, Hooman Kashef Hamadani
-
Patent number: 9069510Abstract: A touch sensitive screen mobile information apparatus having a wireless communication unit for wireless device discovery is herein disclosed. Close proximity wireless device discovery is enabled by wireless searching near distance via radio frequency field for a wireless device, receiving information from the wireless device over the near distance wireless communication, and storing the received information at the information apparatus for future wireless connections. Authentication or pairing of devices may be eliminated due to close proximity of the direct wireless device discovery. After wireless device discovery, the information apparatus and the wireless device may become locked or paired for subsequent wireless communication over any number of wireless communication protocols or standards (e.g., Bluetooth, IEEE 802.11, 2.4GHz) without the need to repeat wireless discovery or pairing. Examples of information apparatus include smart phones, digital camera, laptops, or information pads.Type: GrantFiled: May 19, 2010Date of Patent: June 30, 2015Assignee: Flexiworld Technologies, Inc.Inventors: William Ho Chang, Christina Ying Liu
-
Patent number: 9064135Abstract: A hardware implemented system and method of encryption key management may facilitate access to a connected device. In some embodiments, an Input/Output (I/O) controller coupled to a host system may comprise a cryptocontext memory that is only accessible via state machines running on the controller and a key unwrap engine to decrypt wrapped keys associated with commands received from the host system.Type: GrantFiled: December 12, 2007Date of Patent: June 23, 2015Assignee: Marvell International Ltd.Inventors: Tze Lei Poo, David Geddes
-
Patent number: 9043599Abstract: A method and authentication server provide a mobile key. According to the method, upon receipt of an authentication message (access authentication) that is transmitted when a subscriber logs on to the network, the authentication server extracts a subscriber identification contained in said message and generates a corresponding mobile key, which is stored together with the respective extracted subscriber identification. Upon subsequent receipt of a key request message (key request) that is transmitted when a subscriber registers, the authentication server extracts a mobile identification of the subscriber contained in said message and searches for an identical mobile identification, which can be derived in accordance with a configurable derivation function from a subscriber identification that is stored in the authentication server.Type: GrantFiled: October 31, 2006Date of Patent: May 26, 2015Assignee: SIEMENS AKTIENGESELLSCHAFTInventors: Rainer Falk, Christian Günther, Dirk Kröselberg
-
Patent number: 9025769Abstract: A method for registering a Smartphone when accessing security authentication device and a method for access authentication of a registered Smartphone are provided. When a Smartphone based application searches for a device and attempts an access to the found device, the search and access for the device is limited according to a result of authentication using an activation code.Type: GrantFiled: August 3, 2011Date of Patent: May 5, 2015Assignee: Suprema Inc.Inventors: Yeon Gil Choi, Seong Jik Lee, Jae Won Lee
-
Publication number: 20150110270Abstract: Secure virtualizing of a mobile cellular device uses a cellular communication network having base transceiver station edge node servers. A virtualized-instance host server contains a virtualized instance of an enterprise environment. Base station controllers are in communication with and control the base transceiver stations. A mobile switching center in communication with the base station controllers contains the virtualized-instance host server. A cellular communication device is in communication with an edge node server, and an auxiliary data display entry device is in communication with the cellular communication device such that the virtualized instance of the enterprise environment is on the edge node server. Communications between the auxiliary display and data entry device are encrypted.Type: ApplicationFiled: October 21, 2013Publication date: April 23, 2015Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Dakshi Agrawal, Bruce O. Anthony, JR., Chatschik Bisdikian, Mudhakar Srivatsa, Dinesh C. Verma
-
Patent number: 9014680Abstract: An apparatus, and an associated method, for providing secured effectuation of a communication service at a substitute mobile station. A user desiring temporarily to use a substitute mobile station to carry out the communication service initiates a request at the mobile station for its use. The communication service is available to be performed at the substitute mobile station for a selected period. Upon termination of the selected period, the communication service session ends, and data associated with the communication service session is deleted from the substitute mobile station.Type: GrantFiled: August 12, 2010Date of Patent: April 21, 2015Assignee: BlackBerry LimitedInventors: Daryl Joseph Martin, James Andrew Godfrey, John Ferguson Wilson
-
Patent number: 9008309Abstract: According to various aspects of this disclosure, a circuit arrangement is provided. The circuit arrangement may include: a memory configured to store a first encryption key for generating a first authentication vector for authentication between a mobile station and a home network of the mobile station; and a key-generator configured to derive a second encryption key from the first encryption key, the second encryption key for generating a second authentication vector for authentication between the mobile station and a visited network.Type: GrantFiled: July 2, 2012Date of Patent: April 14, 2015Assignee: Intel Mobile Communications GmbHInventors: Achim Luft, Martin Hans
-
Patent number: 9008619Abstract: A mobile terminal that may be able to access a wireless communication network and a control method thereof are provided. The mobile terminal includes: a wireless communication unit configured to access a wireless communication network; a detection unit configured to detect a connectable wireless communication network through the wireless communication unit; and a controller outputting icons each corresponding to one or more wireless communication networks detected by the detection unit to a locked screen displayed in a locked state in which inputting of a control command with respect to an application is limited, releasing the locked state when selecting of any one of the output icons is detected, and controlling the wireless communication unit to access a wireless communication network corresponding to the selected icon.Type: GrantFiled: August 21, 2012Date of Patent: April 14, 2015Assignee: LG Electronics Inc.Inventors: Sanghyuck Lee, Eunju Lee, Byeongwook Kim
-
Patent number: 9003491Abstract: Systems and methods of authentication and authorization between a client, a server, and a gateway to facilitate communicating a message between a client and a server through a gateway. The client has a trusted relationship with each of the gateway and the server. A method includes registering the client with the gateway. The client also constructs the address space identifying the gateway and the client. The client communicates the address space to the server. The client receives an identity identifying the server. If the client authorizes to receive a message from the server through the gateway, the client informs the authorization to the gateway. The client puts the identity identifying the server on a list of servers which are authorized to send messages to the client. In addition, the client communicates the list of servers to the gateway.Type: GrantFiled: December 13, 2011Date of Patent: April 7, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Shai Herzog, Johannes Klein, Alexandru Gavrilescu
-
Patent number: 9003488Abstract: Described are various embodiments of a system and method in which device-identifying data can be used to uniquely recognize and optionally track and report on device activity at one or more hotspot locations by way of the creation and management of a device profile uniquely associated with such devices and stored in a network accessible knowledge base.Type: GrantFiled: November 1, 2012Date of Patent: April 7, 2015Assignee: Datavalet TechnologiesInventors: Ron Spencer, Tom Camps, Chris Burchett, Brad Gagne, Rob Madge, Ray Scobie
-
Patent number: 9001642Abstract: A method and apparatus for a satellite system. A satellite system is comprised of a communications system in a satellite and a number of computers associated with the satellite. The communications system is configured to receive first information and transmit second information from the satellite to a remote platform over a number of communications links. The number of computers is configured to identify a block of information for encryption from instructions in the first information. The number of computers is further configured to generate a key from a portion of the block of information based on the instructions. The number of computers is further configured to perform an exclusive OR operation on the block of information using the key to form a block of encrypted information. The number of computers is further configured to transmit the block of encrypted information.Type: GrantFiled: February 23, 2012Date of Patent: April 7, 2015Assignee: The Boeing CompanyInventors: Duane L. Blanchard, Angelia Mae Corbett
-
Patent number: 8984278Abstract: A novel code signing system, computer readable media, and method are provided. The code signing method includes receiving a code signing request from a requestor in order to gain access to one or more specific application programming interfaces (APIs). A digital signature is provided to the requestor. The digital signature indicates authorization by a code signing authority for code of the requestor to access the one or more specific APIs. In one example, the digital signature is provided by the code signing authority or a delegate thereof. In another example, the code signing request may include one or more of the following: code, an application, a hash of an application, an abridged version of the application, a transformed version of an application, a command, a command argument, and a library.Type: GrantFiled: January 30, 2013Date of Patent: March 17, 2015Assignee: BlackBerry LimitedInventors: David Paul Yach, Michael Stephen Brown, Herbert Anthony Little
-
Patent number: 8976962Abstract: An apparatus and method for generating a group key using the status of a wireless channel are provided. The apparatus includes a representative channel response selection unit for selecting a representative channel response signal from among pilot signals received from slave terminals. A key generation unit generates a group key based on a representative channel response value of the representative channel response signal. A hash value generation unit generates a hash value corresponding to the group key. A transmission pilot control unit adjusts power intensities of transmission pilots of the respective slave terminals using the channel response value of the representative channel response signal and channel response values and transmission power intensities of the slave terminals. A communication unit is individually connected to the slave terminals and configured to transmit pilot signals, power intensities of which have been adjusted, and the hash value to the slave terminals.Type: GrantFiled: September 3, 2012Date of Patent: March 10, 2015Assignee: Electronics and Telecommunications Research InstituteInventors: Seon-Yeob Baek, Sang-Kyung Yoo, Seok Ryu, Sang-Han Lee
-
Patent number: 8965342Abstract: Methods and apparatus for verifying authenticity of device information of an end-user device are provided herein. In some embodiments, a method for verifying authenticity of device information of an end-user device may include sending a request to verify device information of an end-user device receiving, responsive to the request, verification information regarding the device information sent, and performing a verification analysis on the verification information received.Type: GrantFiled: August 8, 2013Date of Patent: February 24, 2015Assignee: Vonage Network LLCInventors: Tzahi Efrati, Jaya Meghani
-
Patent number: 8959620Abstract: A method for composing an authentication password associated with an electronic device is implemented by a password composing system including a display, a receiving unit, and a processing unit. In the method, the display is configured to display a start point, and a plurality of displayed paths. The receiving unit is configured to detect a set of user-input movements of a contact point at the display. The processing unit is configured to determine whether the user-input movements conform with a predefined valid user-input gesture, store a plurality of codes corresponding to the valid user-input gestures, and to compose the authentication password according to valid ones of the series of the user-input movements.Type: GrantFiled: March 14, 2013Date of Patent: February 17, 2015Assignee: Mitac International Corp.Inventors: Ching-Teng Hsueh, Hui-Chun Yang
-
Patent number: 8958559Abstract: A system and method for secure instant messaging are described. For example, in one embodiment, a first user identifies a second user for an instant messaging session with the ID code of the second user. The first user is provided with network information for the second user and a public key associated with the second user. The first user encrypts an instant message using the public key of the second user and a private key. In one embodiment, the first user encrypts the content of the instant message (e.g., any text and/or attachments) using the public key of the second user and signs the content using the private key of the first user. The encrypted message is transmitted from the first user to the second user. The second user decrypts the instant message using the second user's private key and verifies the signature with the first user's public key.Type: GrantFiled: September 2, 2011Date of Patent: February 17, 2015Assignee: Apple Inc.Inventors: Alexander A. Medina, Andrew H. Vyrros, Darryl N. Bleau, Jeffrey T. Davey, Justin E. Santamaria, Justin N. Wood
-
Patent number: 8953798Abstract: Enhanced cryptographically generated addresses (ECGAs) for MIPv6 incorporate a built-in backward key chain and offer support to bind multiple logically-linked CGAs together. Enhanced CGAs may be used to implement a secure and efficient route optimization (RO) for MIPv6.Type: GrantFiled: December 15, 2010Date of Patent: February 10, 2015Assignee: Telefonaktiebolaget L M Ericsson (publ)Inventor: Angelo Rossi
-
Patent number: 8955062Abstract: A method including: assigning identifiers to respective domains, where each of the domains is allocated a corresponding set of resources, and where the resources in the sets of resources are accessible at respective physical addresses; storing permissions to access the physical addresses, where each of the permissions indicates which of the physical addresses one or more of the domains are permitted to access. The method also includes: assigning a code to a first domain, where the code includes instructions, and where each of the instructions includes a corresponding one of the physical addresses; tagging each of the instructions by adding the identifier assigned to the first domain to each of the instructions; and during execution of each of the instructions, comparing the identifier included in the corresponding instruction to one of the permissions; and based on the comparison, permitting access to the set of resources allocated to the first domain.Type: GrantFiled: March 17, 2014Date of Patent: February 10, 2015Assignee: Marvell World Trade Ltd.Inventor: Mark N. Fullerton
-
Patent number: 8948386Abstract: There are disclosed systems and methods for authenticating a mobile device by a network and/or for generating one or more keys that can be used for securely transmitting data between the mobile device and the network. In one embodiment, the following operations are performed by a mobile device: (i) the mobile device participates in at least a portion of a key agreement protocol with a network to compute a secret value; (ii) the mobile device obtains a response value derived from the secret value; and (iii) the mobile device sends the response value to a verification entity for use in authenticating the mobile device. There are also disclosed systems and methods for authenticating a network by a mobile device.Type: GrantFiled: June 27, 2012Date of Patent: February 3, 2015Assignee: Certicom Corp.Inventors: Matthew John Campagna, Robert John Lambert, Anthony Rosati
-
Application digital rights management (DRM) and portability using a mobile device for authentication
Patent number: 8950000Abstract: A method, system, and medium are provided for operating a computing device and a mobile device to access computer software with a secure access and to access a packet network, and for operating a computer software on a mobile device with different computing devices. A mobile device is used to authenticate a user's access to computer software. The computer software may reside on the mobile device, the user's computing device, or another computing device. A unique identifier is stored in the mobile device associated with the computer software to enable the authentication.Type: GrantFiled: November 15, 2012Date of Patent: February 3, 2015Assignee: Sprint Communications Company L.P.Inventors: Shane R. Werner, Warren B. Cope, Von McConnell -
Patent number: 8942224Abstract: A method and system for handling security synchronization for prolonged periods of no-reception of voice frames. The method includes receiving one or more protocol data units (PDUs) by a radio link control (RLC) sub layer and determining a time period between the receiving of each PDU and a previously received PDU by the RLC sub layer. Further, the method includes initiating recovery procedure for the time period exceeding a first predefined time. The recovery procedure includes identifying count of the one or more PDUs to be recovered, deciphering each PDU using a plurality of hyper frame numbers (HFNs) and updating a master HFN based on the deciphering. The master HFN deciphers each PDU among the one or more protocol data units. Further, the method also includes delivering the one or more PDUs to a packet data convergence protocol sub layer where type verification of the PDU is performed.Type: GrantFiled: August 23, 2010Date of Patent: January 27, 2015Assignee: Samsung Electronics Co., Ltd.Inventors: Kundan Kumar Lucky, Gert-Jan Van Lieshout
-
Patent number: 8942377Abstract: A method and apparatus to establish trust between two nodes in a communications network. A first node receives from a network node authentication data unique to the first node, which can be used to derive a compact representation of verification data for the first node. The first node also receives a certified compact representation of verification data of all nodes in the network. The first node derives trust information from the authentication data for the node, and sends to a second node a message that includes the trust information and part of the authentication data. The second node has its own copy of the certified compact representation of verification data of all nodes in the network, and verifies the authenticity of the message from the first node using the compact representation of verification data of all nodes in the network and the received trust information and authentication data.Type: GrantFiled: February 12, 2010Date of Patent: January 27, 2015Assignee: Telefonaktiebolaget L M Ericsson (Publ)Inventors: Wassim Haddad, Rolf Blom, Mats Naslund
-
Patent number: 8938805Abstract: A processing device comprises a processor coupled to a memory and implements a host-based intrusion detection system configured to permit detection of tampering with at least one software component installed on the processing device. The host-based intrusion detection system comprises a forward-secure logging module configured to record information characterizing a plurality of events occurring in the device in such a manner that modification of the recorded information characterizing the events is indicative of a tampering attack and can be detected by an authority. For example, the recorded information may comprise at least one forward-secure logging record R having entries r1 . . . rn corresponding to respective ones of the events wherein any erasure or other modification of a particular pre-existing entry ri in R by an attacker is detectable by the authority upon inspection of R.Type: GrantFiled: September 24, 2012Date of Patent: January 20, 2015Assignee: EMC CorporationInventors: Ari Juels, Catherine V. Hart
-
Publication number: 20150016609Abstract: The invention proposes a system for authenticating and authorizing network services comprising: a mobile device being adapted to, upon receipt of an information message indicating at least one network access type, determine the network access type, to create a start message containing at least a user identity, and to encapsulate the start message in an authentication message compatible with the access network identified in the information message, and an access controller for reading the encapsulated message from the mobile and forwarding the encapsulated message to an authentication server identified in the encapsulated message. The invention also proposes a corresponding method for authenticating and authorizing network services, and an access control device, a subscriber device and a router device.Type: ApplicationFiled: September 29, 2014Publication date: January 15, 2015Inventors: Jari T. Malinen, Timothy J. Kniveton, Meghana Sahasrabudhe
-
Patent number: 8935763Abstract: Methods and systems taught herein provide for authentication information for authenticating a user terminal to be shared between a network entity that supports IMS-AKA authentication of the user terminal and a network entity that supports GBA-AKA authentication of the user terminal. Sharing authentication information between these entities allows all or part of the authentication information generated for IMS-AKA authentication of the user terminal to be used subsequently for GBA-AKA authentication of the user terminal, or vice versa.Type: GrantFiled: February 15, 2008Date of Patent: January 13, 2015Assignee: Telefonaktiebolaget L M Ericsson (publ)Inventors: Luis Barriga, David Castellanos Zamora