Synchronization Patents (Class 380/274)
  • Patent number: 10257573
    Abstract: In one embodiment, there is a content delivery system comprising: a communication network; a media component configured to transmit media content and associated metadata to user devices; a store holding permission vouchers for users of the system; an auxiliary content management component configured to: receive a request for auxiliary content insertion information from a user device, the request comprising an identifier of a user of the user device and an identifier of desired media content; access said store to determine permission for consumption of the desired media content in a resource constrained playout mode at the device based on at least one permission voucher for the user; generate auxiliary content insertion information based on the identifier of the user, the identifier of the desired media content and the at least one permission voucher; and transmit the generated auxiliary content insertion information to the user device.
    Type: Grant
    Filed: November 26, 2015
    Date of Patent: April 9, 2019
    Assignee: PIKSEL, INC.
    Inventors: Philip Shaw, Hans-Jurgen Maas, Mark Christie
  • Patent number: 10235187
    Abstract: Application configurations can be merged to enhance multi-layer performance. When a layering system is employed, a layering registry filter driver can create a merged registry hive that includes the contents of each operating system registry hive as well as the contents of each registry hive of a mounted layer. The merged registry hive will therefore form a single location that the layering registry filter driver can access to complete a registry operation.
    Type: Grant
    Filed: April 29, 2016
    Date of Patent: March 19, 2019
    Assignee: Wyse Technology L.L.C.
    Inventors: Rushikesh Patil, Puneet Kaushik
  • Patent number: 9838876
    Abstract: An automobile device transmits data to a server in a communication network. The automobile device records the data received from one or more transmitters located in an automobile. The automobile device transmits a random access preamble on an uplink carrier to a base station when a pre-defined condition is met. The automobile device encrypts the data and transmits the encrypted data to a server via a base station.
    Type: Grant
    Filed: August 16, 2015
    Date of Patent: December 5, 2017
    Assignee: Ofinno Technologies, LLC
    Inventor: Esmael Hejazi Dinan
  • Patent number: 9515826
    Abstract: A system, method, and apparatus for a network topology aided by a smart agent download are disclosed. The method involves authenticating, with at least one authenticator device, at least one claimant. The method further involves transmitting, by at least one transmission source, the smart agent download to at least one receiving source associated with at least one claimant. In one or more embodiments, at least one transmission source is employed in a Lower Earth Orbiting (LEO) Iridium satellite. Also, the method involves receiving, by at least one receiving source, the smart agent download. In addition, the method involves executing, by at least one processor, the smart agent download. Further, the method involves monitoring, by the smart agent download, network behavior. The monitoring of network behavior includes monitoring the users on the network, monitoring data passing through the network, and monitoring the quantity of data passing through the network.
    Type: Grant
    Filed: September 21, 2011
    Date of Patent: December 6, 2016
    Assignee: THE BOEING COMPANY
    Inventors: David A. Whelan, Arun Ayyagari, Gregory M. Gutt, Rachel Rane′ Schmalzried
  • Patent number: 9485678
    Abstract: System, apparatus, and methods are provided for effective allocation of cyclic prefix resources in OFDM systems under benign channel conditions. Methods may include a first network device receiving a transmission, from a second network device, comprising a symbol and a cyclic prefix. The first network device determines a first signal for a useable portion of the cyclic prefix and determines a second signal for a portion of the symbol corresponding to the useable portion of the cyclic prefix. The first network device determines a third signal based on the first signal and the second signal.
    Type: Grant
    Filed: March 11, 2013
    Date of Patent: November 1, 2016
    Assignee: QUALCOMM Incorporated
    Inventor: Niranjan Nayak Ratnakar
  • Patent number: 9462316
    Abstract: A method begins by a processing module obtaining a unique retrieval matrix based on an identity of the playback device and sending a request for retrieval of a set of encoded broadcast data slices to a dispersed storage network (DSN) memory, wherein the request includes the unique retrieval matrix and identity of the set of encoded broadcast data slices. The method continues with the processing module receiving a subset of the set of encoded broadcast data slices from the DSN memory, wherein the subset of the set of encoded broadcast data slices is based on the unique retrieval matrix. The method continues with the processing module storing the subset of the sets of encoded broadcast data slices.
    Type: Grant
    Filed: October 13, 2010
    Date of Patent: October 4, 2016
    Assignee: International Business Machines Corporation
    Inventors: S. Christopher Gladwin, Kumar Abhijeet, Greg Dhuse, Jason K. Resch, Gary W. Grube, Timothy W. Markison
  • Patent number: 9052389
    Abstract: AltBOC-modulated satellite navigation signals transmitted in the two partial bands E5a and E5b of the so-called E5 frequency band are received using a common antenna (19) and thereafter are processed separately in an analog manner in the HF front-end in two physically different incoming signal paths for the two partial bands and then digitized and coherently summed to form a complete digital E5 band signal, which is fed to a digital signal processor, in which code acquisition and code tracking are performed using PRN reference code sequences produced in the receiver and tracking of the carrier phase is performed and raw data for the final navigation calculation are determined therefrom.
    Type: Grant
    Filed: May 25, 2010
    Date of Patent: June 9, 2015
    Assignee: Deutsches Zentrum Fur Luft-Und Raumfahrt E.V.
    Inventors: Michael Meurer, Manuel Cuntz
  • Publication number: 20150110272
    Abstract: Reduction of audio truncation when transcoding speech data from one coding format to another. Embodiments include receiving packets of a first communication session containing first encrypted speech data encoded according to a vocoder of a first type and encrypted using an encryption protocol, and containing a first encryption protocol identification information distributed among the received packets. Further embodiments include extracting the first encryption protocol identification information from the received packets and processing the received packets based on the first encryption identification information. Embodiments include transmitting one or more voice header packets containing a second encryption protocol identification information in a second communication session as well as transmitting packets in the second communication session containing second encrypted speech data encoded according to a vocoder of a second type.
    Type: Application
    Filed: October 17, 2013
    Publication date: April 23, 2015
    Applicant: MOTOROLA SOLUTIONS, INC.
    Inventors: ANUJ KAPOOR, DANIEL J. MCDONALD, HARISH NATARAHJAN, YUNHAI YANG
  • Patent number: 9001642
    Abstract: A method and apparatus for a satellite system. A satellite system is comprised of a communications system in a satellite and a number of computers associated with the satellite. The communications system is configured to receive first information and transmit second information from the satellite to a remote platform over a number of communications links. The number of computers is configured to identify a block of information for encryption from instructions in the first information. The number of computers is further configured to generate a key from a portion of the block of information based on the instructions. The number of computers is further configured to perform an exclusive OR operation on the block of information using the key to form a block of encrypted information. The number of computers is further configured to transmit the block of encrypted information.
    Type: Grant
    Filed: February 23, 2012
    Date of Patent: April 7, 2015
    Assignee: The Boeing Company
    Inventors: Duane L. Blanchard, Angelia Mae Corbett
  • Patent number: 8989379
    Abstract: Systems and methods for authenticating key rotation communications. Key rotation communications can include a key counter known to both a headend device and a station. Comparison between a local key counter and the key counter included in the key rotation communication can be used to authenticate the key rotation communication.
    Type: Grant
    Filed: January 9, 2008
    Date of Patent: March 24, 2015
    Assignee: QUALCOMM Incorporated
    Inventors: Srinivas Katar, Lawrence W. Yonge, Manjunath Krishnam
  • Patent number: 8989885
    Abstract: A watermark generator for providing a watermark signal in dependence on binary message data includes an information processor configured to provide, in dependence on a single message bit of the binary message data, a 2-dimensional spread information representing the message bit in the form of a set of time-frequency-domain values. The watermark generator also includes a watermark signal provider configured to provide the watermark signal on the basis of the 2-dimensional spread information. A watermark detector, methods and computer programs are also described.
    Type: Grant
    Filed: August 14, 2012
    Date of Patent: March 24, 2015
    Assignee: Fraunhofer-Gesellschaft zur Foerderung der angewandten Forschung e.V.
    Inventors: Stefan Wabnik, Jörg Pickel, Bert Greevenbosch, Bernhard Grill, Ernst Eberlein, Giovanni Del Galdo, Stefan Krägeloh, Reinhard Zitzmann, Tobias Bliem, Marco Breiling, Juliane Borsum
  • Publication number: 20150036823
    Abstract: A short-range communication tag includes a transmitter, a clock circuit providing a clock value and a memory containing a unique identification value. The tag further includes a processor which generates encryption keys with a period of K seconds and combines the unique identification value with the encryption key, according to a predetermined encryption method, to generate an obfuscated unique identification value. The tag further includes a short-range transmitter to transmit the tag identification value.
    Type: Application
    Filed: October 13, 2014
    Publication date: February 5, 2015
    Inventor: Nicolas Graube
  • Patent number: 8948393
    Abstract: Techniques for sending information without interruption during a change in ciphering configuration are described. A user equipment (UE) communicates with a wireless communication network for a call. The UE sends first information to the wireless network using a first ciphering configuration. For a change in ciphering configuration, the UE selects an activation time for a second ciphering configuration and sends a security message with the activation time. This activation time is the time at which the UE applies the second ciphering configuration to transmission sent to the wireless network. The UE thereafter sends second information (e.g., a measurement report message) using the first ciphering configuration after sending the security message and before the activation time. The UE sends third information using the second ciphering configuration after the activation time.
    Type: Grant
    Filed: March 29, 2007
    Date of Patent: February 3, 2015
    Assignee: QUALCOMM Incorporated
    Inventors: Shailesh Maheshwari, Kiran Chikkappa, Vivek Ramachandran
  • Publication number: 20150023504
    Abstract: A method includes, in a mobile communication terminal, receiving a signal, which carries media content that has been encrypted after being compressed in accordance with a compression protocol having a plurality of predefined configurations. Each configuration specifies a respective compression mode of the compression protocol. The received signal is decrypted, and one or more parameters that define a configuration of the compression protocol that was used for compressing the media content are determined from the decrypted signal. An absence of match is detected when the determined one or more parameters do not match any of the plurality of predetermined configurations of the compression protocol. An error in decrypting the received signal is identified based on detecting the absence of a match.
    Type: Application
    Filed: July 17, 2014
    Publication date: January 22, 2015
    Inventors: Amit Wix, Boris Korenfeld, Morag Agmon
  • Publication number: 20150010154
    Abstract: A method and device for processing Single Radio Voice Call Continuity (SRVCC) switching, and a related terminal are disclosed. In a technical solution of the disclosure, two sets of authentication parameters can be stored during the process of SRVCC switching, one set of which is stored into a card and the other set is stored into a temporary data area, and specific access to the authentication parameters is controlled by a switch variable so that a user does not need to consider using which data area. It is determined, after the SRVCC switching succeeds or fails, whether authentication parameters in the temporary data area need to be written into the card. Calculated authentication parameters are directly written into the card after the SRVCC switching is started, so that update of the authentication parameters is more flexible and signalling interaction with a network can be reduced.
    Type: Application
    Filed: June 29, 2012
    Publication date: January 8, 2015
    Applicant: ZTE Corporation
    Inventor: Yang Chen
  • Patent number: 8923513
    Abstract: The present invention is directed toward secure access systems. Specifically, a method, system, and device are described that employ a synchronized pseudo-random number generator to secure communications between endpoints involved in a communication. If synchronization is lost between two devices, the two devices can regain synchronization by switching to use of a different pseudo-random number generator that is used for resynchronization instead of communications.
    Type: Grant
    Filed: November 29, 2012
    Date of Patent: December 30, 2014
    Assignee: Assa Abloy AB
    Inventors: Scott B. Guthery, Mark Robinton, Michael Lawrence Davis, David Andresky
  • Patent number: 8909966
    Abstract: A wireless power supply apparatus generates an electric signal frequency-modulated or otherwise phase-modulated according to a transmission-side code that is determined beforehand with a wireless power reception apparatus. The electric signal thus generated is transmitted via a transmission coil so as to generate an electric power signal including any one of an electric field, a magnetic field, and an electromagnetic field. The wireless power reception apparatus receives the electric power signal using a reception coil. A control unit changes the impedance of a resonance circuit that comprises the reception coil and a resonance capacitor, according to a reception-side code that is to correspond to the transmission-side code.
    Type: Grant
    Filed: March 22, 2011
    Date of Patent: December 9, 2014
    Assignee: Advantest Corporation
    Inventors: Yasuo Furukawa, Yuki Endo
  • Patent number: 8903091
    Abstract: A secure optical communication system and method are disclosed. Short optical pulses are first modulated with data, then dispersed in time so that they spread out over multiple bit periods, then the desired code is applied to the dispersed pulses. The encoding may include frequency shifts or phase shifts or other. The dispersed optical symbols overlap in time so an applied code chip thus acts on multiple symbols simultaneously. There are generally multiple code chips per dispersed symbol. The coding device does not need to be synchronized to the data rate. Multiple wavelength division multiplexed channels may be encoded simultaneously. The signal propagates to a decoder that is synchronized with encoder to apply a complementary code thereby canceling out the effect of the encoder. The encoder and decoder can be realized by varying the wavelength of an optical pump to a parametric amplifier, allowing for a wide-band frequency shift.
    Type: Grant
    Filed: September 22, 2011
    Date of Patent: December 2, 2014
    Assignee: Nucript LLC
    Inventor: Gregory S. Kanter
  • Patent number: 8898448
    Abstract: Systems and methods for wireless communications are provided. These include data deciphering components, interrupt processing components, adaptive aggregations methods, optimized data path processing, buffer pool processing, application processing where data is formatted in a suitable format for a destination process, and Keystream bank processing among other hardware acceleration features. Such systems and methods are provided to simplify logic designs and mitigate processing steps during wireless network data processing.
    Type: Grant
    Filed: June 18, 2009
    Date of Patent: November 25, 2014
    Assignee: QUALCOMM Incorporated
    Inventors: Thomas Klingenbrunn, Uppinder S. Babbar, Vanitha A. Kumar, Vikas Nagpal, Sriram Narayan, Samson Jim, Shailesh Maheshwari, Marcello V. Lioy, Mathias Kohlenz, Idreas Mir, Irfan A. Khan, Gurvinder S. Chhabra, Jean-Marie QD Tran
  • Patent number: 8880887
    Abstract: Provided are system, methods, and computer-readable media for systems, methods, and computer-readable media for secure digital communications and networks. The system provides for secure communication between nodes through the use of a subscription between two nodes based on unique identifiers that are unique to each node, and communication between nodes without a subscription may be blocked. Additionally, secure communications between a node and a remote node are dynamically encrypted using asymmetric and symmetric encryption. The encryption algorithms and key lengths may be changed at each subsequent negotiation between a node and a remote node.
    Type: Grant
    Filed: March 14, 2013
    Date of Patent: November 4, 2014
    Assignee: STT LLC.
    Inventor: Matthew Tyrone Armatis
  • Patent number: 8844049
    Abstract: A method for coupling protected digital data object, for example an application program, and a specified computer, which allows for, if desired, individual components of the computer to be modified. A cryptographic key is generated on the basis of current components of a computer in order to decrypt an encrypted, computer-specific authorization code for executing a protected digital data object on the computer. The computer-specific authorization code is encrypted with a key based on original components of the computer. The key can be determined from the current components of the computer even if they are different from the original components of the computer.
    Type: Grant
    Filed: April 20, 2012
    Date of Patent: September 23, 2014
    Assignee: WIBU-Systems AG
    Inventors: Peer Wichmann, Udo Reuther
  • Patent number: 8842833
    Abstract: The present application provides a system and method for a set of Extensible Authentication Protocols (EAPs) based on ECC (Elliptic Curve Cryptography) and SKE (Symmetric Key Encryption) mechanisms (with a suitable permutation) that can serve Confidentiality, Authentication, Authorization and Accounting (CAAA) issues at an affordable cost. According to one embodiment, a method and system of ECC and SKE based EAPs (through a permutation technique) which can avoid replay attacks. The application also provides a light weight security with better performance in comparison to the lower layer chip level security provided by 2G, 3G or 4G Applications and no certificates exchanged during the communication.
    Type: Grant
    Filed: May 26, 2011
    Date of Patent: September 23, 2014
    Assignee: Tata Consultancy Services Limited
    Inventor: Vijayarangan Natarajan
  • Patent number: 8824686
    Abstract: Apparatus and method for synchronizing encryption keys among a cluster of security appliances and stand alone lifetime key management, LKM, appliances. The cluster includes security appliances where new encryption keys are generated and assigned to an SNS ID with an SNS CTR (counter). The security appliances inside a cluster have local sequence counters and share their keys. One security appliance is a coordinator with which the LKMs will synchronize. Each LKM also has a SNS ID and local sequence counter from which increasing sequence numbers are generated. In each security appliance in a cluster, the up-to-date stored sets of keys are organized with respect to SNS IDs and SNS CTRs associated with the other cluster members. The object keys are stored in the SNS space and a peer map associates a given peer with a given SNS ID, and version numbers are assigned and incremented when a key is modified.
    Type: Grant
    Filed: April 27, 2007
    Date of Patent: September 2, 2014
    Assignee: NetApp, Inc.
    Inventors: Hiroshi Ishii, Hristo Bojinov, Ananthan Subramanian
  • Patent number: 8811971
    Abstract: A mobile communication device (1) is connectable to a memory device (MIF) that comprises a plurality of memorysectors (0-F), wherein at least one application is stored in at least one memory sector. the memory sectors are protected against unauthorized access 5 by sector keys (key A, key B, 4). The mobile communication device (1) comprises an applications manager (MAM) being adapted to disable the stored applications (TK1, AC1, AC2, TR2, TR3, CP1, TR4, AC3, TK3) when triggered by an external trigger event.
    Type: Grant
    Filed: July 21, 2008
    Date of Patent: August 19, 2014
    Assignee: NXP B.V.
    Inventors: Alexandre Corda, Ismaila Wane
  • Patent number: 8792642
    Abstract: An apparatus, system and method provides an out-of-synchronization detection by using a network layer checksum. A process operating at an upper layer verifies that a checksum embedded in a network layer header is correct before encrypting and transmitting a data packet containing the header and a payload. The data packet is received through a wireless communication channel at a receiver and decrypted. A calculated checksum is calculated on the received payload at the receiver and compared to the received checksum embedded in the header. A key stream used at the receiver for decrypting the received encrypted data packets is determined to be out of synchronization with a key stream used at the transmitter to encrypt the data packets if the calculated checksum is not equal to the network layer checksum.
    Type: Grant
    Filed: September 10, 2012
    Date of Patent: July 29, 2014
    Assignees: AT&T Mobility II LLC, AT&T Intellectual Property II, L.P.
    Inventors: James Alexander Reeds, III, Wen-Ping Ying
  • Patent number: 8787578
    Abstract: Method and apparatus for encrypting transmission traffic at separate protocol layers L1, L2, and L3 so that separate encryption elements can be assigned to separate types of transmission traffic, which allows the implementation of different levels of encryption according to service requirements. Encryption elements use variable value inputs, called crypto-syncs, along with semi-permanent encryption keys to protect from replay attacks from rogue mobile stations. Since crypto-sync values vary, a method for synchronizing crypto-syncs at the mobile station and base station is also presented.
    Type: Grant
    Filed: November 7, 2005
    Date of Patent: July 22, 2014
    Assignee: QUALCOMM Incorporated
    Inventors: Ramin Rezaiifar, Roy F. Quick, Jr., Paul Williamson, Jun Wang, Edward G. Tiedemann, Jr.
  • Patent number: 8768314
    Abstract: Methods and apparatus for providing personalized content to a user of a wireless network include establishing an anonymous user identifier and delivering the user identifier to a content provider are disclosed. Based on the user identifier, communication with a predetermined data source is established or predetermined data content is selected. In some embodiments, a device identifier is provided in addition to the user identifier and device specific personalized content is delivered to the user. In one example, a device identifier and a user identifier are based on a mobile station serial number and a subscriber identity module (SIM) and are used in an HTTP header. The anonymous user identifier can be based on a SIM serial number, or a hash of the SIM serial number so that user information such as a user phone numbers is not available to content providers.
    Type: Grant
    Filed: August 28, 2012
    Date of Patent: July 1, 2014
    Assignee: AT&T Mobility II LLC
    Inventor: Herman Chien
  • Patent number: 8750517
    Abstract: An identification friend or foe (IFF) system and method can covertly identify an object as friend or foe (FoF). An encoded illumination signal can be calculated using a detected ambient signal and an identification (ID) signal and emitted. The encoded illumination signal can be detected by analyzing a detected ambient signal and decoded using a specified key.
    Type: Grant
    Filed: October 9, 2008
    Date of Patent: June 10, 2014
    Assignee: The Trustees of Columbia University in the City of New York
    Inventor: Ioannis Kymissis
  • Patent number: 8726019
    Abstract: In a communication system in which two communication entities seek to have a private or confidential communication session, a trust relationship needs first be established. The trust relationship is based on the determination of a shared secret which in turn is generated from contextual information. The contextual information can be derived from the circumstances surrounding the communication session. For example, the contextual information can include topological information, time-based information, and transactional information. The shared secret may be self-generated or received from a third party. In either event, the shared secret may be used as key material for any cryptographic protocol used between the communication entities.
    Type: Grant
    Filed: February 10, 2006
    Date of Patent: May 13, 2014
    Assignee: QUALCOMM Incorporated
    Inventors: Michael Paddon, Gregory Gordon Rose, James Semple, Philip Michael Hawkes
  • Patent number: 8724813
    Abstract: A computer computes an SSID and a key from a string. The computer wirelessly accesses a wireless-access-device preconfigured with the SSID and the key.
    Type: Grant
    Filed: February 25, 2009
    Date of Patent: May 13, 2014
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Michael L Saboff, Wolfgang Baltes
  • Patent number: 8634560
    Abstract: A server device initiates a traffic encapsulation key (TEK) re-key sequence for a group virtual private network (VPN), based on an upcoming expiration time for an existing TEK. The server device sends, via a push message during a first time period immediately after the initiating, a new TEK to members of the group VPN. The server device receives, during a second time period that immediately follows the first time period, a pull request, for the new TEK, from one of the members of the group VPN, and sends, to the one of the members, the new TEK, where the re-key sequence transitions all the members of the group VPN from the existing TEK key to the new TEK key before the expiration time for the existing TEK.
    Type: Grant
    Filed: September 10, 2010
    Date of Patent: January 21, 2014
    Assignee: Juniper Networks, Inc.
    Inventors: Anthony Ng, Chih-Wei Chao, Suresh Melam, I-Wen Michelle Hsiung
  • Patent number: 8615658
    Abstract: Utilizing the AAA infrastructure to dynamically allocate the various parameters needed to establish the security association between the Foreign Agent and the Home Agent. The present invention uses the AAA server as a central entity to dynamically generate and distribute the chosen security association parameters needed to support the Foreign Agent and Home Agent security association based on a request from the Foreign Agent. The AAA server can also dynamically assigns a unique SPI value to the Foreign Agent and Home Agent pairs. The various parameters that can be allocated in the present invention include a FA-HA shared secret key or a public/private key pair, an authentication algorithm and mode, a FA-HA secret key lifetime, and security parameter index or security index values. The present invention also can assist in making sure that the Foreign Agent and the Home Agent stay synchronized with respect to their security association.
    Type: Grant
    Filed: January 17, 2013
    Date of Patent: December 24, 2013
    Assignee: Apple Inc.
    Inventors: Ahmad Muhanna, Mohamed Khalil
  • Patent number: 8577037
    Abstract: A network device includes an input circuit and a key mixing circuit. The input circuit is configured to receive i) a message and ii) a plurality of packets from a transmitting device. The message includes i) an address of the transmitting device and ii) a predetermined value for a count. Each of the plurality of packets i) is encapsulated and ii) includes the address of the transmitting device and one of a plurality of values for the count. The message is received prior to receiving the plurality of packets. The key mixing circuit is configured to generate a plurality of seeds based on the message. Each of the plurality of seeds is based on i) a predetermined key, ii) the address of the transmitting device, and iii) the predetermined value for the count. The plurality of seeds is used to decapsulate the plurality of packets.
    Type: Grant
    Filed: June 26, 2012
    Date of Patent: November 5, 2013
    Assignee: Marvell International Ltd.
    Inventors: Peter Loc, Rahul Kopikare
  • Patent number: 8572382
    Abstract: A method and system for out-of-band authentication of messages transmitted, e.g. as packets, on a communication network, whereby a first stream of data is received by a sender control module from a sender; the first stream of data is transmitted over a first channel, e.g. a non-secure data channel, toward a receiver control module; the sender control module generates authentication data of the first stream of data; the authentication data are transmitted from the sender control module to the receiver control module on a second channel, e.g. a secure data channel, distinct from the first channel; and a stream of data received by the receiver control module is checked using the authentication data. Before sending the authentication data, the sender control module transmits a control message including synchronization data to the receiver control module over the second channel.
    Type: Grant
    Filed: May 15, 2006
    Date of Patent: October 29, 2013
    Assignee: Telecom Italia S.p.A.
    Inventors: Paolo De Lutiis, Corrado Moiso, Gaetano Di Caprio
  • Patent number: 8566594
    Abstract: Trust establishment in short range protocol pairing between client and proxy devices includes a first aspect in which application level security is used to encrypt all packets transmitted between the client and proxy. An application-based security derives a public key from the General Bootstrapping Architecture (GBA) and used that public key to generate an encryption key in an AES encryption algorithm. A second aspect provides for out of band security to be used to establish short range protocol pairing. In this second aspect, the client and proxy exchange identification information over a third party network that is out of band to the short range protocol. With this identification information exchanged out of band, the client and proxy may establish pairing in the short range protocol.
    Type: Grant
    Filed: April 14, 2010
    Date of Patent: October 22, 2013
    Assignee: QUALCOMM Incorporated
    Inventors: Samir S. Soliman, Nishith Chaubey, Olufunmilola O. Awoniyi, Ramanathan Viswanathan
  • Patent number: 8565432
    Abstract: A mobile communications system is proposed in which a two stage procedure is used for setting up Radio Bearers within a mobile communications device and UTRAN. In the first stage, both the mobile device and UTRAN perform ciphering based on an old Start value. In the second stage, the mobile device and UTRAN perform ciphering based on a new Start value. In this way, data communication using the Radio Bearers can start without waiting for the mobile device to confirm completion of the setup procedure.
    Type: Grant
    Filed: January 30, 2009
    Date of Patent: October 22, 2013
    Assignee: NEC Corporation
    Inventors: Vivek Sharma, Keiichi Kubota, Sadafuku Hayashi
  • Patent number: 8565760
    Abstract: Methods, systems and apparatus are provided for recovering registration information at a home network when the home network determines that it has experienced a loss of the registration information. The home network communicates a triggering message to at least one visited network to initiate registration information recovery, and the visited network responds to the triggering message by communicating registration information for objects that are located at the visited network and that are associated with the home network. These objects may include, for example, subscriber units and/or talk groups that are associated with the home network and have roamed to the visited network.
    Type: Grant
    Filed: September 30, 2010
    Date of Patent: October 22, 2013
    Assignee: Motorola Solutions, Inc.
    Inventors: Steven E. Vanswol, Melissa D. Kasper
  • Publication number: 20130266143
    Abstract: Embodiments of the present invention provide a method and a device for synchronizing an uplink ciphering parameter in unacknowledged mode. The method for synchronizing an uplink ciphering parameter in unacknowledged mode includes: sending an indication message to a terminal when detecting that an unrecoverable error occurs in an uplink packet or that the uplink packet is invalid, where the indication message is used to instruct the terminal to initialize an uplink ciphering parameter; receiving a response message sent by the terminal; and initializing the uplink ciphering parameter according to an initial value of the ciphering parameter. The embodiments of the present invention solve a service defect, namely, a break of the communication link caused by synchronization of an uplink ciphering parameter between the terminal and the radio network controller in unacknowledged mode, and shorten the time of synchronizing the uplink ciphering parameter without interrupting the service.
    Type: Application
    Filed: June 3, 2013
    Publication date: October 10, 2013
    Inventors: Xiaoxiao ZHENG, Yinghong YANG, Li FENG, Xiaoying XU, Zhufen FU, Lunfeng YU, Yafei SUN
  • Patent number: 8552900
    Abstract: A successive approximation register switched capacitor analog to digital converter utilizes a high frequency clock for controlling comparator reset switches and a clock distribution block to operate at lower sample rates. The successive approximation cycles are clocked with the high frequency clock so that the reset switches stay within the leakage limit irrespective of the sample rate but the end of conversion signal is delayed to mimic the slower sample rate.
    Type: Grant
    Filed: April 20, 2012
    Date of Patent: October 8, 2013
    Assignee: Texas Instruments Incorporated
    Inventors: Haydar Bilhan, Maher Mahmoud Sarraj
  • Patent number: 8538002
    Abstract: A telephone system comprising switching circuitry configured for coupling a call to a telephone extension coupled to the system, voice processing circuitry configured for automatically interacting with the call, a microprocessor, a first data bus connected between the microprocessor and the switching circuitry, and a second data bus connected between the microprocessor and the voice processing circuitry.
    Type: Grant
    Filed: June 4, 2012
    Date of Patent: September 17, 2013
    Assignee: Estech Systems, Inc.
    Inventors: Harold E. Hansen, Eric Suder
  • Patent number: 8522007
    Abstract: A dual cryptographic keying system. In particular implementations, a method includes responsive to an initial session key negotiation, storing security association information for a tunnel in a security association memory; responsive to a session key renegotiation, storing security association information for the tunnel in a cache; decrypting received packets associated with the tunnel conditionally using the security association information in the cache or the security association information in the security association memory; and upon an expiration condition, overwriting the security association information, for the tunnel, in the security association memory with the security association information, for the tunnel, copied from the cache.
    Type: Grant
    Filed: March 6, 2012
    Date of Patent: August 27, 2013
    Assignee: Cisco Technology, Inc.
    Inventors: Santanu Sinha, Kenneth William Batcher
  • Patent number: 8495700
    Abstract: The present invention is directed to security systems and methods for mobile network-based data environments. The present invention provides an integration of security, mobile computing, wireless and IT infrastructure management technology, to create a new level of automation and enforcement to enable the transparent application of mobile security across an enterprise, while embracing end user “transparency” and “ease of use” and empowering IT administration.
    Type: Grant
    Filed: February 28, 2006
    Date of Patent: July 23, 2013
    Assignee: McAfee, Inc.
    Inventor: Majid Shahbazi
  • Patent number: 8467532
    Abstract: The present invention provides a system and method for a set of Extensible Authentication Protocols (EAPs) that can serve Confidentiality, Authentication, Authorization and Accounting (CAAA) issues at an affordable cost. According to one embodiment of the invention, a system and method is provided to generate random sequences (through prime numbers) which can be used in the authentication process of certificateless extensible authentication protocols (EAPs) for mobile and wireless communications. The invention also provides a light weight security with better performance in comparison to the lower layer chip level security provided by 2G, 3G or 4G applications.
    Type: Grant
    Filed: December 14, 2010
    Date of Patent: June 18, 2013
    Assignee: Tata Consultancy Services Limited
    Inventor: Vijayarangan Natarajan
  • Patent number: 8437475
    Abstract: The disclosed technology provides a system and method of synchronizing cryptographic operation between a transmitter and a receiver. A transmitter can communicate encrypted data to a receiver according to a first communications protocol, and communicate a transmitter number and a portion of the encrypted data to the receiver according to a second communications protocol. The receiver can be in communication with a memory space containing locations that are each associated with an encrypted data and that can contain a previous receiver number. The receiver can receive transmitted encrypted data and an associated transmitter number and can search the memory space to find a location wherein the encrypted data associated with the location is entirely, or in part, the same as the transmitted encrypted data. When such a location is found, the receiver can compare the transmitter number with the previous receiver number stored in the location.
    Type: Grant
    Filed: March 9, 2005
    Date of Patent: May 7, 2013
    Assignees: Verizon Corporate Services Group Inc., Raytheon BBN Technologies Corp.
    Inventors: Walter Clark Milliken, Gregory Donald Troxel
  • Patent number: 8433069
    Abstract: A software defined radio device and a download server store a plurality of common keys in common key data. The download server arbitrarily determines a common key from the common key data and conveys information identifying the common key to be used to the software defined radio device. An authenticator of the software defined radio device identifies a common key from the common key data using the information identifying the common key, authenticates using the common key, and performs subsequent communications using the common key. When sending software, a hash value is attached for confirming the security. A device ID of the software defined radio device is also attached to data for confirming which software defined radio device receives the software. The software is securely downloaded by a common key encryption having smaller processing requirements than those of a public key encryption.
    Type: Grant
    Filed: August 1, 2008
    Date of Patent: April 30, 2013
    Assignee: NEC System Technologies, Ltd.
    Inventor: Mie Noda
  • Patent number: 8428260
    Abstract: Methods for increasing encryption synchronization availability include collecting encryption synchronization data from a first superframe received at a gateway. The encryption synchronization data is for decrypting media in a second superframe also received at the gateway. The encryption synchronization data from the first superframe is used to form a composite encryption synchronization codeword for decrypting media in a third superframe formed by the gateway, wherein the third superframe includes the composite encryption synchronization codeword and at least a portion of the media from the second superframe. The third superframe is sent to a receiving device so that media in the third superframe can be decrypted by the receiving device using the composite encryption synchronization codeword that is included in the same superframe as the media that is being decrypted.
    Type: Grant
    Filed: December 23, 2009
    Date of Patent: April 23, 2013
    Assignee: Motorola Solutions, Inc.
    Inventors: Donald G. Newberg, Ramandeep Ahuja, Michelle M. Antonelli, Gregory D. Bishop, Peter M. Drozt, Michael F. Korus, Peter E. Thomas
  • Patent number: 8428264
    Abstract: A method and system for commissioning a wireless connection with a related authentication and the eventual encryption to a remote relay node, whereto an electronic mobile device is connected to a hosting wireless access node for transmitting/receiving data to/from a service provider available on the Internet by means of a commissioned relay access node selected by an authentication and commissioning manager. The data transfer between the mobile device and the service provider is encapsulated into the tunnel between the hosting wireless access node and the commissioned relay access node and is finally forwarded by the commissioned relay access node to the service provider. The service provider thereby is exchanging data with the commissioned relay access node and not directly with the hosting wireless access node.
    Type: Grant
    Filed: April 30, 2009
    Date of Patent: April 23, 2013
    Assignee: PeerTribe SA
    Inventors: Angelo Maestrini, Fabio de Vito, Davide Lenzarini
  • Patent number: 8417218
    Abstract: A method of authentication in a communications network, said communications network comprising a network authentication server, a local authentication entity and a user terminal, said local authentication entity comprising a subscriber application and an authentication application, said method comprising the steps of: sending a request from the local authentication entity to the network authentication server to authenticate the user terminal, said request comprising the identity of the user terminal; generating by the network authentication entity an authentication key in response to the request and generating by the subscriber application an identical authentication key; sending the authentication key generated by the network authentication server securely to the user terminal identified by said identity, then storing the authentication key at the user terminal; sending the authentication key generated by the subscriber application securely to the authentication application, then storing the authentication k
    Type: Grant
    Filed: February 8, 2007
    Date of Patent: April 9, 2013
    Assignee: British Telecommunications PLC
    Inventor: Piotr L Cofta
  • Patent number: 8411862
    Abstract: According to certain embodiments of the present invention, cryptosynchronization values are calculated on an initiating and/or responding device in a communications system such that cryptosynchronization-based procedures might succeed even when the discrepancy between the system times of the initiating and responding devices exceeds the cryptosync constraints imposed by the communications system. In one embodiment, the initiating device add/subtracts a cryptosynchronization adjustment value x to/from the initiating device's system time to yield an adjusted initiator cryptosynchronization value. In another embodiment, the receiving device adjusts the receiving device's system time to yield an adjusted receiver cryptosynchronization value.
    Type: Grant
    Filed: January 22, 2009
    Date of Patent: April 2, 2013
    Assignee: Alcatel Lucent
    Inventor: Bulin Zhang
  • Patent number: 8411858
    Abstract: The present invention utilizes the AAA infrastructure to dynamically allocate the various parameters needed to establish the security association between the Foreign Agent and the Home Agent. The present invention uses the AAA server as a central entity to dynamically generate and distribute the chosen security association parameters needed to support the Foreign Agent and Home Agent security association based on a request from the Foreign Agent. The AAA server can also dynamically assigns a unique SPI value to the Foreign Agent and Home Agent pairs. The various parameters that can be allocated in the present invention include a FA-HA shared secret key or a public/private key pair, an authentication algorithm and mode, a FA-HA secret key lifetime, and security parameter index or security index values. The present invention also can assist in making sure that the Foreign Agent and the Home Agent stay synchronized with respect to their security association.
    Type: Grant
    Filed: March 27, 2008
    Date of Patent: April 2, 2013
    Assignee: Apple Inc.
    Inventors: Ahmad Muhanna, Mohamed Khalil