Having Receiver Selection (e.g., Pager) Patents (Class 380/271)
  • Patent number: 11042663
    Abstract: A method for automatically encrypting files is disclosed. In some cases, the method may be performed by computer hardware comprising one or more processors. The method can include detecting access to a first file, which may be stored in a primary storage system. Further, the method can include determining whether the access comprises a write access. In response to determining that the access comprises a write access, the method can include accessing file metadata associated with the first file and accessing a set of encryption rules. In addition, the method can include determining whether the file metadata satisfies the set of encryption rules. In response to determining that the file metadata satisfies the set of encryption rules, the method can include encrypting the first file to obtain a first encrypted file and modifying an extension of the first encrypted file to include an encryption extension.
    Type: Grant
    Filed: June 18, 2019
    Date of Patent: June 22, 2021
    Assignee: Commvault Systems, Inc.
    Inventors: Andrei Erofeev, Rahul S. Pawar
  • Patent number: 10812130
    Abstract: Examples of backscatter systems, device, and techniques are described herein. Example backscatter devices may utilize CSS modulation to provide backscatter signals including CSS signals (e.g., LoRa packets). Utilizing CSS modulation may advantageously allow for backscatter communication over wide areas. Examples of backscatter devices described herein may toggle the impedance of the backscatter device between multiple (e.g., eight) impedances to reduce and/or eliminate higher order harmonic components in the backscatter signal (e.g., third and fifth harmonic components).
    Type: Grant
    Filed: October 18, 2017
    Date of Patent: October 20, 2020
    Assignee: University of Washington
    Inventors: Vamsi Talla, Mehrdad Hessar, Joshua R. Smith, Shyamnath Gollakota, Ali Najafi, Bryce Kellogg
  • Patent number: 10805800
    Abstract: A computer comprising a network communication interface, at least one memory, a processor coupled to the at least one memory and configured to: receive a request parameter and one or more authentication factors from a current user through a network and the network communication interface, identify an authentication file based on the received authentication factors of the current user, a first authentication factor is compared with a first authentication file and the second authentication factor is compared with a second authentication file, based at least in part on the request parameter and authentication factors, identify a first rule set, from among a plurality of rule sets defining requirements for user authentications, based on the first rule set, obtain one or more verification parameters from the identified authentication file for authentication, at least one obtained verification parameter corresponding to biometric information of the current user.
    Type: Grant
    Filed: April 3, 2020
    Date of Patent: October 13, 2020
    Inventor: Frank Yang
  • Patent number: 10726385
    Abstract: A method which comprises generating a first signature by encoding an identifier with a first additional data set at a first time instant; responding to a first read request from a tag reader by releasing the first signature; generating a second signature by encoding the identifier with a second additional data set at a second time instant, the second additional data set being different from the first additional data set; and responding to a second read request by releasing the second signature. Also, a method which comprises obtaining a signature from a contactlessly readable tag; decrypting the signature with a key to obtain a candidate identifier and a scrambling code associated with the signature; and validating the candidate identifier based on at least one of the scrambling code and the signature.
    Type: Grant
    Filed: November 12, 2014
    Date of Patent: July 28, 2020
    Assignee: BCE INC.
    Inventors: William G. O'Brien, Tet Hin Yeap, Sean MacLean Murray, Sanro Zlobec
  • Patent number: 10681547
    Abstract: A computer comprising a network communication interface, at least one memory, a processor coupled to the at least one memory and configured to: receive a request parameter and one or more authentication factors from a current user through a network and the network communication interface, identify an authentication file based on the received authentication factors of the current user, a first authentication factor is compared with a first authentication file and the second authentication factor is compared with a second authentication file, based at least in part on the request parameter and authentication factors, identify a first rule set, from among a plurality of rule sets defining requirements for user authentications, based on the first rule set, obtain one or more verification parameters from the identified authentication file for authentication, at least one obtained verification parameter corresponding to biometric information of the current user.
    Type: Grant
    Filed: May 22, 2019
    Date of Patent: June 9, 2020
    Inventor: Frank Yang
  • Patent number: 10635405
    Abstract: A method of performing finite field addition and doubling operations in an elliptic curve cryptography (ECC) authentication scheme as a countermeasure to side-channel attack. The addition and doubling operations are executed using atomic patterns that involve the same sequence and number of operation types, so that the noise consumption and electromagnetic emanation profile of circuitry performing the operations is identical regardless of operation. A subtraction operation using such an atomic pattern is also disclosed.
    Type: Grant
    Filed: July 13, 2018
    Date of Patent: April 28, 2020
    Assignee: TEXAS INSTRUMENTS INCORPORATED
    Inventor: Eric Thierry Peeters
  • Patent number: 10255171
    Abstract: A test program is run repeatedly (either as a loop that is programmed into the code of the test program itself, or by repeatedly running the test program manually in response to user input instructing repeated run(s) of the test program. At least some run(s) of the test program use a cipher key that was derived and saved by the test program during a previous run of the test program (rather than re-deriving the cipher key based on information provided by the operating system). In this way, if the corresponding cipher key, as stored in the system space of the operating system has become corrupted during previous run(s) of the test program, then the incompatibility between the corrupted cipher key in the system space, and the previously saved cipher key that was previously derived by the test program, will be more easily detected.
    Type: Grant
    Filed: November 8, 2017
    Date of Patent: April 9, 2019
    Assignee: International Business Machines Corporation
    Inventor: Louis P. Gomes
  • Patent number: 10248553
    Abstract: A test program is run repeatedly (either as a loop that is programmed into the code of the test program itself, or by repeatedly running the test program manually in response to user input instructing repeated run(s) of the test program. At least some run(s) of the test program use a cipher key that was derived and saved by the test program during a previous run of the test program (rather than re-deriving the cipher key based on information provided by the operating system). In this way, if the corresponding cipher key, as stored in the system space of the operating system has become corrupted during previous run(s) of the test program, then the incompatibility between the corrupted cipher key in the system space, and the previously saved cipher key that was previously derived by the test program, will be more easily detected.
    Type: Grant
    Filed: July 14, 2017
    Date of Patent: April 2, 2019
    Assignee: International Business Machines Corporation
    Inventor: Louis P. Gomes
  • Patent number: 10223249
    Abstract: A test program is run repeatedly (either as a loop that is programmed into the code of the test program itself, or by repeatedly running the test program manually in response to user input instructing repeated run(s) of the test program. At least some run(s) of the test program use a cipher key that was derived and saved by the test program during a previous run of the test program (rather than re-deriving the cipher key based on information provided by the operating system). In this way, if the corresponding cipher key, as stored in the system space of the operating system has become corrupted during previous run(s) of the test program, then the incompatibility between the corrupted cipher key in the system space, and the previously saved cipher key that was previously derived by the test program, will be more easily detected.
    Type: Grant
    Filed: February 13, 2018
    Date of Patent: March 5, 2019
    Assignee: International Business Machines Corporation
    Inventor: Louis P. Gomes
  • Patent number: 10148430
    Abstract: Encryption of data across an environment, such as a shared resource environment, can be updated using keys generated using one or more revocable stream cipher algorithms. Data stored in the environment can be encrypted under a first key, or other such secret. When it is desired to update the encryption, a second key can be generated under which the data is to be re-encrypted. Instead of distributing the second key, a revocable stream cipher generator can generate an intermediate key based on the first and second keys, that when processed with the first key will produce the second key. Such an approach enables data to be re-encrypted under the second key without distributing the second key. Further, the unencrypted data will not be exposed in the process. In some embodiments, the re-encryption can be performed on an as-needed basis in order to reduce processing requirements.
    Type: Grant
    Filed: April 17, 2013
    Date of Patent: December 4, 2018
    Assignee: Amazon Technologies, Inc
    Inventor: Gregory Branchek Roth
  • Patent number: 10135840
    Abstract: Methods and systems for receiving speed dial configuration changes may involve receiving a packet, determining whether the packet is associated with a valid command, determining whether a username in a header of the packet is a valid user, validating a signature using a public key, decrypting encrypted data using a first factor key, and executing the valid command associated with the decrypted data. The packet includes the header, encrypted data, and the signature, and is sent without a one-to-many management console and without prior group configuration. The validation of the signature may be based on the determination that the packet is associated with a valid command and that the username in the header of the packet is a valid user.
    Type: Grant
    Filed: July 15, 2016
    Date of Patent: November 20, 2018
    Assignee: Dell Products L.P.
    Inventors: Anto DolphinJose Jesurajan Marystella, Cyril Jose, Marshal F. Savage
  • Patent number: 9967098
    Abstract: Embodiments of a system for, and method for using, an elliptic curve cryptography integrated circuit are generally described herein. An elliptic curve cryptography (ECC) operation request may be received. One of a plurality of circuit portions may be instructed to perform the ECC operation. The plurality of circuit portions that may be used include a finite field arithmetic circuit portion, an EC point addition and doubler circuit portion, a finite field exponentiation circuit portion, and a point multiplier circuit portion. The result of the ECC operation may then be output.
    Type: Grant
    Filed: December 23, 2015
    Date of Patent: May 8, 2018
    Assignee: Intel Corporation
    Inventors: Santosh Ghosh, Manoj R Sastry
  • Patent number: 9825972
    Abstract: A trusted branded email method and apparatus in one aspect detects branded electronic messages and performs validation before it is sent to a recipient. In another aspect, an electronic messages is branded by embedding branding assets and validation signatures. Algorithms that generate validation signatures are dynamically selected to further strengthen the security aspects. Branding assets are presented to a user using a distinct indicia that represents to the user that the branding assets are secure.
    Type: Grant
    Filed: November 27, 2013
    Date of Patent: November 21, 2017
    Assignee: Jose J. Picazo Separate Property Trust
    Inventors: Harish Seshadri, Noel Ruane
  • Patent number: 9331871
    Abstract: The invention provides a method for generating an SMS business message for processing by a software application comprising the steps of: a data collection interface accepting outgoing instructions and outgoing data from said software application; a message encoding engine encoding said outgoing instructions and outgoing data from said software application using an encoding template to generate the SMS business message as a categorized SMS message formatted for processing by a data processing system; and a dispatcher runtime processor processing said SMS business message for transmission over a network to a recipient.
    Type: Grant
    Filed: October 3, 2003
    Date of Patent: May 3, 2016
    Assignee: International Business Machines Corporation
    Inventors: Rohit V. Kapoor, Jimmy W. Lo, Joanna W. Ng
  • Patent number: 9311500
    Abstract: Requests are submitted to a request processing entity where the requests include a cryptographic key to be used in fulfilling the request. The request processing entity, upon receipt of the request, extracts the key from the request and uses the key to perform one or more cryptographic operations to fulfill the request. The one or more cryptographic operations may include encryption/decryption of data that to be/is stored, in encrypted form, by a subsystem of the request processing entity. Upon fulfillment of the request, the request processing entity may perform one or more operations to lose access to the key in the request, thereby losing the ability to use the key.
    Type: Grant
    Filed: September 25, 2013
    Date of Patent: April 12, 2016
    Assignee: Amazon Technologies, Inc.
    Inventors: Gregory Branchek Roth, Eric Jason Brandwine
  • Patent number: 9292715
    Abstract: A system comprises a processor which executes an operating system and an application. The system also comprises a keyboard coupled to the processor. The keyboard and application share a shared secret that is used to encode keyboard data provided from the keyboard to the application. The shared secret is not known or accessible to the operating system.
    Type: Grant
    Filed: January 22, 2008
    Date of Patent: March 22, 2016
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Wael M. Ibrahim, Liqun Chen, Manuel Novoa, Ligy Kurian
  • Patent number: 9258281
    Abstract: A management site (10) generates an encrypted message by a public-key symmetrical encryption algorithm, the algorithm and the key being selected by the management site among a memorized list. The message (DKE), which includes an identifier of the encryption algorithm and key used, is transmitted to a portable device (16), which stores it. For the use, the message is transmitted to a secured module (20) that decrypts it, checks its compliance with an internal reference, and generates a digital accreditation controlling the unlocking of a lock device (18). The decryption is operated with the algorithm and the key recognized based on the identifiers of the message, selected among a list memorized by the secured module.
    Type: Grant
    Filed: October 10, 2013
    Date of Patent: February 9, 2016
    Assignee: OPENWAYS SAS
    Inventors: Pascal Metivier, Aitor Agueda
  • Patent number: 9231929
    Abstract: A method is provided for security key renewal performed in a key management device of a communication system. The communication system includes two or more communication devices communicating data packets by using a first security key for transmission and reception.
    Type: Grant
    Filed: July 10, 2012
    Date of Patent: January 5, 2016
    Assignee: ABB RESEARCH LTD
    Inventors: Johan Åkerberg, Linus Thrybom
  • Patent number: 9124304
    Abstract: A method, an apparatus, and a computer program product for wireless communication are provided in connection with improving NDEF message processing. In one example, a communications device is equipped to determine, based on one or more contextual factors, that data received at a NFC device is missing at least a portion of a NDEF header, and generate a complete NDEF message by adding the missing portion of the NDEF header. In another example, a communications device is equipped to receive a complete NDEF message that includes a NDEF header and data and is intended to be written on a remote NFC device, determine, based on one or more contextual factors, that the remote NFC device is configured to receive a modified version of the complete NDEF message, and generate the modified version of the complete NDEF message by removing at least a portion of the NDEF header.
    Type: Grant
    Filed: February 12, 2013
    Date of Patent: September 1, 2015
    Assignee: QUALCOMM Incorporated
    Inventor: John Hillan
  • Patent number: 9113776
    Abstract: A patient monitoring system that enables a healthcare provide to request access to patient data via interaction directly with a local patient monitor and subsequently provide patient data to the healthcare provider's portable communication device regardless of device location.
    Type: Grant
    Filed: September 28, 2011
    Date of Patent: August 25, 2015
    Assignee: ANAESTHESIA ASSOCIATES OF MASSACHUSETTS, P.C.
    Inventor: Christopher William Connor
  • Patent number: 9100773
    Abstract: In some aspects of what is described here, a first wireless device detects proximity of a second wireless device (e.g., by a Near Field Communication (NFC) interface or another type of interface). Based on detecting proximity of the second wireless device, the first wireless device generates a recommendation request from information received from the second wireless device. The first wireless device sends the recommendation request to a trusted authority and receives a response. The response includes the trusted authority's recommendation whether to trust the second wireless device. The first wireless device can determine whether to trust the second wireless device based on the recommendation.
    Type: Grant
    Filed: November 30, 2012
    Date of Patent: August 4, 2015
    Assignees: BlackBerry Limited, Certicom Corp.
    Inventors: Robert John Lambert, Neil Patrick Adams, Ravi Singh, Salvatore Federico Barbieri
  • Patent number: 9008307
    Abstract: The disclosed embodiments relate to a system and method for delivering satellite services at multiple security levels. More specifically, there is provided a method comprising determining a level of security supported by a first set top box (22a), encoding a first IP packet containing a satellite service using the level of security supported by the first set top box (22a), transmitting the first IP encoded packet to the first set top box (22a), determining a level of security supported by a second set top box (22b), wherein the level of security supported by the second set top box (22b) is different from the level of security of the first set top box (22a), encoding a second IP packet containing a satellite service using the level of security supported by the second set top box (22b); and transmitting the second encoded IP packet to the second set top box (22b).
    Type: Grant
    Filed: January 13, 2014
    Date of Patent: April 14, 2015
    Assignee: Thomson Licensing
    Inventor: Barry Jay Weber
  • Patent number: 9001642
    Abstract: A method and apparatus for a satellite system. A satellite system is comprised of a communications system in a satellite and a number of computers associated with the satellite. The communications system is configured to receive first information and transmit second information from the satellite to a remote platform over a number of communications links. The number of computers is configured to identify a block of information for encryption from instructions in the first information. The number of computers is further configured to generate a key from a portion of the block of information based on the instructions. The number of computers is further configured to perform an exclusive OR operation on the block of information using the key to form a block of encrypted information. The number of computers is further configured to transmit the block of encrypted information.
    Type: Grant
    Filed: February 23, 2012
    Date of Patent: April 7, 2015
    Assignee: The Boeing Company
    Inventors: Duane L. Blanchard, Angelia Mae Corbett
  • Patent number: 8934626
    Abstract: The present invention concerns the field of broadcast encryptionmethod, i.e. a method to organize the distribution of keys into a group of users so that it is possible to manage the revocation of one member of the group in an efficient way. The proposed solution is a private encryption key ciphertext constant collusion-resistant broadcast encryption. The main idea behind the invention is to mix the notion of efficient tree-based key derivation (also called subset management) with individual and personalized key blinding thus achieving a full collusion-resistant broadcast encryption system. The key de-blinding is performed at the last moment thanks to a cryptographic technique called pairings (also known as bilinear maps) resulting in a global key commonly shared by all authorized (non-revoked) devices.
    Type: Grant
    Filed: March 1, 2011
    Date of Patent: January 13, 2015
    Assignee: Nagravision S.A.
    Inventor: Alexandre Karlov
  • Patent number: 8908864
    Abstract: Systems, methods, and computer readable media for detecting and mitigating address spoofing in messaging service transactions are disclosed. A messaging service firewall (MSF) separate from a short message service center (SMSC) receives a mobility management reply message (MMR) that is sent by a mobile location register element in response to an associated mobility management query (MMQ) and that includes a serving switch identifier. The MSF allocates a global title address (GTA) from a pool of GTAs and stores a correlation between the allocated GTA and the originating SMSC. The MSF replaces the serving switch identifier in the MMR with the allocated GTA and routes the modified MMR. The MSF then receives a messaging service message (MSM) that is addressed to the allocated GTA and that includes the purported originating SMSC. If the purported originating SMSC does not match the SMSC to which the GTA is correlated, the MSM is discarded.
    Type: Grant
    Filed: October 5, 2012
    Date of Patent: December 9, 2014
    Assignee: Tekelec Netherlands Group, B.V.
    Inventor: Eloy Johan Lambertus Nooren
  • Patent number: 8909917
    Abstract: Generally described, the disclosed subject matter is directed to improved processes for securely accessing a meter. In accordance with one embodiment, a method for providing a mobile meter reader with an authorization that may be used to establish a secure session with a meter is implemented. In particular, the method includes issuing a request for authorization to access the meter from the mobile meter reader. If the mobile meter reader maintains sufficient rights, an authorization having an encoded digital signature is generated at a host computer system and provided to the mobile meter reader. Then the method formulates and transmits an authorization command to the meter having the encoded digital signature that was generated by the host computing system.
    Type: Grant
    Filed: July 2, 2009
    Date of Patent: December 9, 2014
    Assignee: Itron, Inc.
    Inventor: Michael T. Garrison Stuber
  • Patent number: 8761813
    Abstract: Fast Signaling Services (FSS) for E-UTRAN based wireless systems are provided. A mobility management entity defines FSS MBSFN areas for its tracking areas and generates a FSS packet including signaling information intended for a plurality of UEs in a tracking area of the wireless network. The tracking area and its associated FSS MBSFN area includes a plurality of cells/eNodeBs. The mobility management entity multicasts the generated packet to the plurality of cells/eNodeBs in the FSS MBSFN area that covers the tracking area. The plurality of eNodeBs broadcast the packaged signaling messages to the plurality of UEs in the tracking area using the FSS MBSFN transmission. The FSS improves signaling performance of the overall system for the E-UTRAN.
    Type: Grant
    Filed: November 26, 2008
    Date of Patent: June 24, 2014
    Assignee: Alcatel Lucent
    Inventor: Mingshen Gao
  • Patent number: 8750514
    Abstract: A smart poster system is provided, which includes a smart poster comprising an NFC device, a mobile device for communicating with the NFC device, and a server unit for providing content to the mobile device, wherein the NFC device is arranged to provide the mobile device with an address of the server unit, the address comprising a counter value, which counter value represents the number of executed read accesses to the NFC device. Also, a method for providing a secure communication channel between a mobile device and a server unit in a smart poster system is conceived, wherein the smart poster system comprises an NFC device for providing the mobile device with an address of the server unit, and wherein the NFC device, upon generating the address, incorporates a counter value into the address, the counter value representing the number of executed read accesses to the NFC device. Thereby, the authenticity of both the NFC device and the server unit is ensured.
    Type: Grant
    Filed: January 25, 2012
    Date of Patent: June 10, 2014
    Assignee: NXP B.V.
    Inventors: Francesco Gallo, Christian Michael Lesjak
  • Patent number: 8726019
    Abstract: In a communication system in which two communication entities seek to have a private or confidential communication session, a trust relationship needs first be established. The trust relationship is based on the determination of a shared secret which in turn is generated from contextual information. The contextual information can be derived from the circumstances surrounding the communication session. For example, the contextual information can include topological information, time-based information, and transactional information. The shared secret may be self-generated or received from a third party. In either event, the shared secret may be used as key material for any cryptographic protocol used between the communication entities.
    Type: Grant
    Filed: February 10, 2006
    Date of Patent: May 13, 2014
    Assignee: QUALCOMM Incorporated
    Inventors: Michael Paddon, Gregory Gordon Rose, James Semple, Philip Michael Hawkes
  • Patent number: 8666075
    Abstract: The present invention is directed to a system and method for improving communications between players and coaches during a sporting event, more specifically allowing coaches to dynamically transmit secure real-time communications of an intended game plays in text, visual, sketch and/or verbal format to their players or other coaches on/off the field to be effected on the field during a game.
    Type: Grant
    Filed: December 23, 2008
    Date of Patent: March 4, 2014
    Assignee: F3M3 Companies, Inc.
    Inventors: Isaac Sayo Daniel, Michael Stibilla
  • Patent number: 8515072
    Abstract: A method and apparatus that enables secure communications from a wireless communication device is disclosed. The method may include receiving a signal to transmit data, wherein the data is at least one of voice, text, image, and video, applying a first layer of encryption to the data, applying a second layer of encryption to the data, applying a third layer of encryption to the data, and sending the encrypted data over a communications network.
    Type: Grant
    Filed: July 27, 2010
    Date of Patent: August 20, 2013
    Assignee: Lockheed Martin Corporation
    Inventor: Victor Spahic
  • Patent number: 8411861
    Abstract: An apparatus, system, or method for (i) processing a System Renewability Message (SRM) that includes first and second generation SRM portions that respectively comprise first and second lists of unique privilege-revoked identifiers for receiver devices; (ii) storing the first and second SRM portions based on whether a source device is a first generation HDCP device, (iii) processing an additional SRM that includes additional first and second generation SRM portions that respectively comprise additional first and second lists of unique privilege-revoked identifiers for receiver devices and a third generation SRM portion that comprises another list of unique privilege-revoked identifiers; and (iv) storing the additional first and second SRM portions and the third SRM portion based on whether the source device is a third generation HDCP device.
    Type: Grant
    Filed: October 21, 2009
    Date of Patent: April 2, 2013
    Assignee: Intel Corporation
    Inventor: Priyadarsini Devanand
  • Patent number: 8370630
    Abstract: A mail system having high security is realized by mounting TCP2 for mail communication between client apparatuses. The present invention relates to a mail communication system which is connected to a network and exchanges mails between client apparatuses provided with the existing mailers, and each client apparatus is mounted with a TCP2 driver. A TCP2 driver 34 includes a TCP2 core 36 and a mail system core 37 and an e-mail received via the network is processed in this TCP2 driver 34 and thereafter, is supplied to an existing mailer 31 of the client apparatus. In the mail system core 37 of the TCP2 driver 34, control of mail encryption and decryption, deletion of an unnecessary mail and the like is carried out.
    Type: Grant
    Filed: July 31, 2006
    Date of Patent: February 5, 2013
    Inventor: Keiko Ogawa
  • Patent number: 8346261
    Abstract: In a procedure for a mobile station (UE) to perform handover from a cell under the control of a radio base station (NB) of an UTRAN scheme to a cell under the control of a radio base station (eNB) of an E-UTRA scheme, a switching center (MME) of the E-UTRA scheme receives, from and the radio base station (eNB) of the E-UTRA scheme, a handover request acknowledge message including a transparent container including a security algorithm of an AS used in a communication between the mobile station (UE) and the radio base station (eNB) of the E-UTRA scheme; and the switching center (MME) of the E-UTRA scheme transmits, to a switching center (SGSN) of the UTRA scheme, a NAS PDU including the transparent container, a security algorithm of a NAS and a security processing parameter of the NAS.
    Type: Grant
    Filed: October 22, 2009
    Date of Patent: January 1, 2013
    Assignee: NTT DoCoMo, Inc.
    Inventors: Mikio Iwamura, Minami Ishii, Alf Zugenmaier
  • Patent number: 8320567
    Abstract: In one embodiment, a method for processing encrypted wireless station data at a network device includes receiving from an access point, one or more frames comprising wireless station data fragmented into a plurality of encrypted protocol data units. The frames are configured to identify the encrypted protocol units associated with the wireless station data. The method further includes decrypting the encrypted protocol data units and forwarding the wireless station data. An apparatus for processing encrypted wireless station data, a method for transmitting encrypted multicast data for a wireless client, and a method for processing encrypted wireless station data at an access point are also disclosed.
    Type: Grant
    Filed: January 5, 2007
    Date of Patent: November 27, 2012
    Assignee: Cisco Technology, Inc.
    Inventors: Navindra Yadav, Sheausong Yang, Senthil Arunachalam, Bhanu Gopalasetty, Gnanaprakasam Pandian, Hiroshi Suzuki
  • Patent number: 8315390
    Abstract: A method for paging admission control for multi-service flows in a mobile packet domain is provided and comprises steps of when authentication of a mobile station accessing a connectivity service network through an access service network succeeds, assigning a service flow paging strategy for a downlink service flow of the mobile station, and sending the service flow paging strategy to the access service network; receiving, by the access service network, downlink data of a mobile station in IDLE state from a home agent, searching for a downlink service flow to which the downlink data belong, and judging whether the service flow admits paging according to the service flow paging strategy, and if yes, initiating a paging flow triggered by the downlink data.
    Type: Grant
    Filed: June 19, 2008
    Date of Patent: November 20, 2012
    Assignee: ZTE Corporation
    Inventors: Chong Ji, Junyi Liu, Donghua Chen, Hongyue Sun
  • Publication number: 20120207305
    Abstract: A smart poster system is provided, which includes a smart poster comprising an NFC device, a mobile device for communicating with the NFC device, and a server unit for providing content to the mobile device, wherein the NFC device is arranged to provide the mobile device with an address of the server unit, the address comprising a counter value, which counter value represents the number of executed read accesses to the NFC device. Also, a method for providing a secure communication channel between a mobile device and a server unit in a smart poster system is conceived, wherein the smart poster system comprises an NFC device for providing the mobile device with an address of the server unit, and wherein the NFC device, upon generating the address, incorporates a counter value into the address, the counter value representing the number of executed read accesses to the NFC device. Thereby, the authenticity of both the NFC device and the server unit is ensured.
    Type: Application
    Filed: January 25, 2012
    Publication date: August 16, 2012
    Applicant: NXP B.V.
    Inventors: Francesco Gallo, Christian Michael Lesjak
  • Patent number: 8160253
    Abstract: A method for wireless data transmission between a base station and a transponder is provided, whereby a message, comprising at least one command and one data sequence, is transmitted by the base station, the message is received and evaluated by the transponder, at least one key is provided in the transponder after receipt of the command and before complete receipt of the message and the key is transmitted to the base station, the key is detected by the base station, and parts of the message, still to be transmitted, and/or subsequent messages are encoded by the base station with the key.
    Type: Grant
    Filed: June 25, 2007
    Date of Patent: April 17, 2012
    Assignee: Atmel Corporation
    Inventors: Martin Fischer, Ulrich Friedrich, Jens Masuch, Michael Pangels, Dirk Ziebertz
  • Patent number: 8103872
    Abstract: A method, comprising: receiving an encrypted signature from a tag associated with an item; determining a dynamic parameter; obtaining a key based at least in part on the dynamic parameter; decrypting the signature with the key to obtain an identifier; and performing an action related to identification of the item, based on the identifier. Also, a system, comprising: a tag reader configured to receive an encrypted signature from a tag associated with an item; and a processing entity configured to (i) determine a dynamic parameter; (ii) obtain a key based at least in part on the dynamic parameter; (iii) decrypt the signature with the key to obtain an identifier; and (iv) perform an action related to identification of the item, based on the identifier.
    Type: Grant
    Filed: December 11, 2008
    Date of Patent: January 24, 2012
    Assignee: BCE Inc.
    Inventors: William G. O'Brien, Tet Hin Yeap, Sanro Zlobec
  • Patent number: 8099791
    Abstract: A method of generating an authentication code for a consumable in an imaging device, includes the steps of: an identification number assigned to the consumable; processing an indemnification number assigned to the consumable using a first algorithm to generate a preliminary number different from the identification number; and compressing the preliminary number using a compression algorithm that utilizes the identification number to generate the authentication code.
    Type: Grant
    Filed: June 25, 2004
    Date of Patent: January 17, 2012
    Assignee: Lexmark International, Inc.
    Inventors: Christopher Alan Adkins, Douglas Keith Peterson, Jr.
  • Patent number: 8046587
    Abstract: One feature provides a method for granting authenticated access to off-line, limited-resource mobile devices. A public-private key pair is generated by a service provider and the public key is used to digitally sign a username and (possibly) access privileges to obtain a password for technician. The public key is securely distributed to mobile devices. When off-line, a mobile device may authenticate access to restricted functions of the mobile device by a technician. The technician provides its username, access privileges and password to the mobile device. The mobile device then uses the public key, username and access privileges to verify the password. To invalidate an old username and password, the service provider replaces the public-private key pair with a new public-private key pair.
    Type: Grant
    Filed: December 11, 2006
    Date of Patent: October 25, 2011
    Assignee: QUALCOMM Incorporated
    Inventors: Alexander Gantman, Gregory G. Rose
  • Patent number: 8019349
    Abstract: In a communication network including a relay apparatus and a call control apparatus, a telephone conversation resumption system includes: a reservation unit, when a judgment unit detects communication impossibility between a portable terminal and the relay apparatus, records terminal identification data that specifies the portable terminal and an other-end terminal in a recording unit; a continuation processing unit that generates a call with the other-end terminal indicated by the terminal identification data and transmits a message to the other-end terminal; and a resumption unit that, when the judgment unit detects recovery of the communication state of the portable terminal, requests the call control apparatus to resume the telephone conversation between the portable terminal and the other-end terminal using the terminal identification data.
    Type: Grant
    Filed: July 31, 2006
    Date of Patent: September 13, 2011
    Assignee: Fujitsu Limited
    Inventors: Masahide Noda, Satoshi Okuyama
  • Patent number: 7995603
    Abstract: A system and a method for secure distribution of digital media content through a packet-based network such as the Internet. The security of the present invention does not require one-to-one key exchange, but rather enables keys, and/or information required in order to build the key, to be broadcast through the packet-based network. The digital media content is then also preferably broadcast, but cannot be accessed without the proper key. However, preferably only authorized end-user devices are able to access the digital media content, by receiving and/or being able to access the proper key. Thus, the present invention is useful for other types of networks in which digital media content is more easily broadcast rather than unicast, in addition to packet-based networks.
    Type: Grant
    Filed: May 22, 2001
    Date of Patent: August 9, 2011
    Assignee: NDS Limited
    Inventors: Dan Revital, Steve Epstein, Yossi Tsuria, Arnold Zucker, Steven Simkin
  • Patent number: 7987360
    Abstract: In a method for implementing device grouping and interactions between grouped devices a device creating a device group sends an advertisement message carrying identification information of a device group to which it belongs, to the network. After receiving the advertisement message, a network device joins the device group by the corresponding advertisement message. When two grouped network devices interact with each other, the method further comprises: sending an access request to an accessed device; judging by the accessed device whether the device sending the request is a trusted device and if so, interacting by both parties with each other; otherwise, denying the access request, or determining by the initiating device and the accessed device, a common trusted third party; acquiring by the initiating device, key information of the accessed device from the common trusted third party, and interacting with the accessed device by using the acquired key information.
    Type: Grant
    Filed: January 21, 2005
    Date of Patent: July 26, 2011
    Assignee: Lenovo (Beijing) Limited
    Inventors: Yujin Luo, Yang Liu, Mingliang Guo
  • Patent number: 7840008
    Abstract: A decryption apparatus (109) comprises a key stream generator (111) generating a local decryption key stream. It furthermore comprises a synchronization value receiver (201) receiving key stream synchronization values. A synchronization processor (203) implements a state machine which may operate in a synchronized state (303) wherein the communication is decrypted using the local key stream, a non-synchronized state (301) wherein the local key stream is not synchronized, or in an uncertain synchronization state (305) wherein the communication is decrypted using the local key stream and wherein the local key stream is synchronized to each new received synchronization value. The synchronization processor (203) furthermore comprises a transition controller (213) operable to transition from the synchronized state to the non-synchronized state in response to a first criterion and to the uncertain synchronization state in response to a second criterion.
    Type: Grant
    Filed: October 6, 2006
    Date of Patent: November 23, 2010
    Assignee: Motorola, Inc.
    Inventor: Kristian Gronkjaer Pedersen
  • Patent number: 7826618
    Abstract: Disclosed embodiments include a method for synchronizing a cryptosystem. In one embodiment, the method uses existing control data that is transmitted as part of a connection establishment process in a wireless communication system. In one embodiment, messages that are normally sent between a base station and a remote unit during the setup of both originating and terminating calls are parsed to detect a particular control message that indicates the start of telephony data transmission. Detection of this message indicates a point at which encryption/decryption can begin, and is used to synchronize the cryptosystem. Synchronizing a cryptosystem involves generating an RC4 state space in a keyed-autokey (“KEK”) encryption system. In one embodiment, Lower Medium Access Channel (“LMAC”) messages are used according to a wireless communication protocol. This is convenient because the LMAC messages are passed through the same Associated Control Channel (“ACC”) processing that encrypts and decrypts the telephony data.
    Type: Grant
    Filed: September 4, 2008
    Date of Patent: November 2, 2010
    Assignee: AT&T Mobility II LLC
    Inventors: Eric Klingler, Jeffrey Tedeschi
  • Patent number: 7809139
    Abstract: A digital broadcast receiver and a control method thereof are disclosed. The control method includes receiving a broadcast signal into which mobile service data and main service data are multiplexed, extracting TPC signaling information and FIC signaling information from a data group in the received mobile service data, acquiring a program table describing virtual channel information and a service of an ensemble, using the extracted FIC signaling information, the ensemble being a virtual channel group of the received mobile service data, detecting a conditional access descriptor indicating whether the mobile service data was encrypted, using the acquired program table, and controlling such that the encrypted mobile service data is decrypted, using information of the detected conditional access descriptor.
    Type: Grant
    Filed: September 22, 2008
    Date of Patent: October 5, 2010
    Assignee: LG Electronics, Inc.
    Inventors: In Hwan Choi, Chul Soo Lee, Sang Kil Park
  • Patent number: 7765402
    Abstract: Systems and methods for a wireless communication system used for transmitting and receiving information, the information not containing identification of the information's intended recipient. A method for transmitting payload information, the method comprising providing verification information scrambling a portion of the verification information and transmitting the payload information with the scrambled verification information portion. Also provided is a method for processing transmitted payload information incorporated into an encoded information message with scrambled verification information, the method comprising receiving the encoded information message descrambling at least a portion of the scrambled verification information and comparing said descrambled verification information with predetermined verification information processing said payload information based on said comparison.
    Type: Grant
    Filed: December 16, 2005
    Date of Patent: July 27, 2010
    Assignee: Research In Motion Limited
    Inventors: David Clark, David Bajar, Simon Wise, Ian M. Patterson, David Yach, Allan David Lewis, Gary P. Mousseau
  • Patent number: 7702109
    Abstract: A content recording/reproducing system, which records and reproduces a sub-content relating to a main content, includes a distribution device, first and second recording media, a recording device and a reproducing device. The first recording medium that is non-rewritable prestores key data based on which a public key is derivable, and the main content. The distribution device outputs verification information that includes the sub-content and is generated by applying a digital signature to relative information relating to the sub-content based on a secret key corresponding to the public key. The recording device acquires and records the verification information on the second recording medium that is rewritable.
    Type: Grant
    Filed: March 11, 2004
    Date of Patent: April 20, 2010
    Assignee: Panasonic Corporation
    Inventors: Yuichi Futa, Masato Yamamichi, Masami Yamamichi, legal representative, Satomi Yamamichi, legal representative, Keiko Yamamichi, legal representative, Motoji Ohmori, Masaya Yamamoto, Makoto Tatebayashi
  • Publication number: 20100080390
    Abstract: The present invention is directed to a system and method of distributing game play instructions to players during a game, more specifically a system and method for allowing a portable remote terminal and/or a game apparatus to dynamically transmit and/or receive in game instructions in real-time concerning game play instructions to be effected on the field or court, and to be distributed to one, a plurality, or all team players wearing a headgear configured to receive audio transmissions of the game play instructions from a game play apparatus, another headgear and/or the portable remote terminal.
    Type: Application
    Filed: November 6, 2009
    Publication date: April 1, 2010
    Inventor: ISAAC SAYO DANIEL