Synchronization Patents (Class 380/274)
  • Patent number: 8428260
    Abstract: Methods for increasing encryption synchronization availability include collecting encryption synchronization data from a first superframe received at a gateway. The encryption synchronization data is for decrypting media in a second superframe also received at the gateway. The encryption synchronization data from the first superframe is used to form a composite encryption synchronization codeword for decrypting media in a third superframe formed by the gateway, wherein the third superframe includes the composite encryption synchronization codeword and at least a portion of the media from the second superframe. The third superframe is sent to a receiving device so that media in the third superframe can be decrypted by the receiving device using the composite encryption synchronization codeword that is included in the same superframe as the media that is being decrypted.
    Type: Grant
    Filed: December 23, 2009
    Date of Patent: April 23, 2013
    Assignee: Motorola Solutions, Inc.
    Inventors: Donald G. Newberg, Ramandeep Ahuja, Michelle M. Antonelli, Gregory D. Bishop, Peter M. Drozt, Michael F. Korus, Peter E. Thomas
  • Patent number: 8428264
    Abstract: A method and system for commissioning a wireless connection with a related authentication and the eventual encryption to a remote relay node, whereto an electronic mobile device is connected to a hosting wireless access node for transmitting/receiving data to/from a service provider available on the Internet by means of a commissioned relay access node selected by an authentication and commissioning manager. The data transfer between the mobile device and the service provider is encapsulated into the tunnel between the hosting wireless access node and the commissioned relay access node and is finally forwarded by the commissioned relay access node to the service provider. The service provider thereby is exchanging data with the commissioned relay access node and not directly with the hosting wireless access node.
    Type: Grant
    Filed: April 30, 2009
    Date of Patent: April 23, 2013
    Assignee: PeerTribe SA
    Inventors: Angelo Maestrini, Fabio de Vito, Davide Lenzarini
  • Patent number: 8417218
    Abstract: A method of authentication in a communications network, said communications network comprising a network authentication server, a local authentication entity and a user terminal, said local authentication entity comprising a subscriber application and an authentication application, said method comprising the steps of: sending a request from the local authentication entity to the network authentication server to authenticate the user terminal, said request comprising the identity of the user terminal; generating by the network authentication entity an authentication key in response to the request and generating by the subscriber application an identical authentication key; sending the authentication key generated by the network authentication server securely to the user terminal identified by said identity, then storing the authentication key at the user terminal; sending the authentication key generated by the subscriber application securely to the authentication application, then storing the authentication k
    Type: Grant
    Filed: February 8, 2007
    Date of Patent: April 9, 2013
    Assignee: British Telecommunications PLC
    Inventor: Piotr L Cofta
  • Patent number: 8411858
    Abstract: The present invention utilizes the AAA infrastructure to dynamically allocate the various parameters needed to establish the security association between the Foreign Agent and the Home Agent. The present invention uses the AAA server as a central entity to dynamically generate and distribute the chosen security association parameters needed to support the Foreign Agent and Home Agent security association based on a request from the Foreign Agent. The AAA server can also dynamically assigns a unique SPI value to the Foreign Agent and Home Agent pairs. The various parameters that can be allocated in the present invention include a FA-HA shared secret key or a public/private key pair, an authentication algorithm and mode, a FA-HA secret key lifetime, and security parameter index or security index values. The present invention also can assist in making sure that the Foreign Agent and the Home Agent stay synchronized with respect to their security association.
    Type: Grant
    Filed: March 27, 2008
    Date of Patent: April 2, 2013
    Assignee: Apple Inc.
    Inventors: Ahmad Muhanna, Mohamed Khalil
  • Patent number: 8411862
    Abstract: According to certain embodiments of the present invention, cryptosynchronization values are calculated on an initiating and/or responding device in a communications system such that cryptosynchronization-based procedures might succeed even when the discrepancy between the system times of the initiating and responding devices exceeds the cryptosync constraints imposed by the communications system. In one embodiment, the initiating device add/subtracts a cryptosynchronization adjustment value x to/from the initiating device's system time to yield an adjusted initiator cryptosynchronization value. In another embodiment, the receiving device adjusts the receiving device's system time to yield an adjusted receiver cryptosynchronization value.
    Type: Grant
    Filed: January 22, 2009
    Date of Patent: April 2, 2013
    Assignee: Alcatel Lucent
    Inventor: Bulin Zhang
  • Patent number: 8391491
    Abstract: A sender transmits to a receiver an optical signal that is phase-modulated in accordance with source data and a basis stored in a memory. The receiver phase-modulates the received optical signal in accordance with a basis, obtains detection data through interference, and stores the detection data in a memory. An inter-device address difference (GD) and an intra-device address difference (DI) are provisionally set. The detection data are checked against the source data while sequentially changing the values of GD and DI within a predetermined adjustment range. Based on the result of this checking, GD and DI are determined.
    Type: Grant
    Filed: July 7, 2006
    Date of Patent: March 5, 2013
    Assignee: NEC Corporation
    Inventors: Akihiro Tanaka, Akio Tajima, Seigo Takahashi, Wakako Maeda
  • Patent number: 8392717
    Abstract: An authentication method is disclosed herein. The method includes: by a server, using a Trigger message nonce to generate a Trigger message, and sending the generated Trigger message to a client so that the client can extract the Trigger message nonce; after determining that the Trigger message nonce is valid, using the Trigger message nonce to generate a digest, and authenticating the Trigger message generated by using the Trigger message nonce; after the authentication succeeds, sending a session request to the server indicated by the Trigger message, where the session request carries a session ID. The corresponding system, server and client are disclosed herein. The present invention makes the authentication process more secure through the client and the server based on the DS or DM protocol.
    Type: Grant
    Filed: May 7, 2010
    Date of Patent: March 5, 2013
    Assignee: Huawei Technologies Co., Ltd.
    Inventors: Xiaoqian Chai, Hongtao Gao, Kepeng Li, Linyi Tian
  • Patent number: 8379860
    Abstract: An enterprise communication system adapted for establishing secure wireless communication sessions, the system comprising: an enterprise platform adapted for establishing communications sessions with one or more wireless devices, and for transmitting signals to and receiving signals from the one or more wireless devices; an platform-side automatic synchronized random key generator associated with the enterprise platform for generating platform-generated synchronized random keys; the enterprise platform being adapted to: receive one or more signals representing a request to establish a communication session between the enterprise platform and at least one wireless device; receive a device-generated synchronized random key from the at least one wireless device; compare the device-generated synchronized random key to a platform-generated synchronized random key synchronized to the device-generated synchronized random key; and based on the comparison, output a signal representing a response to authorize or prohib
    Type: Grant
    Filed: February 26, 2009
    Date of Patent: February 19, 2013
    Assignees: Ascendent Telecommunications, Inc., Research In Motion Limited
    Inventors: Yuriy Lobzakov, Colin Werner, Carsten Bergmann, Peter Baccay
  • Patent number: 8370638
    Abstract: A method of generating authentication seeds for a plurality of users, the method involving: based on a single master seed, generating a plurality of derivative seeds, each one for a corresponding different one of a plurality of users; and distributing the plurality of derivative seeds to a verifier for use in individually authenticating each of the plurality of users to that verifier, wherein generating each one of the plurality of derivative seeds involves mathematically combining the master seed and a unique identifier identifying the corresponding user.
    Type: Grant
    Filed: February 17, 2006
    Date of Patent: February 5, 2013
    Assignee: EMC Corporation
    Inventors: William Duane, Jeffrey Hamel
  • Patent number: 8370630
    Abstract: A mail system having high security is realized by mounting TCP2 for mail communication between client apparatuses. The present invention relates to a mail communication system which is connected to a network and exchanges mails between client apparatuses provided with the existing mailers, and each client apparatus is mounted with a TCP2 driver. A TCP2 driver 34 includes a TCP2 core 36 and a mail system core 37 and an e-mail received via the network is processed in this TCP2 driver 34 and thereafter, is supplied to an existing mailer 31 of the client apparatus. In the mail system core 37 of the TCP2 driver 34, control of mail encryption and decryption, deletion of an unnecessary mail and the like is carried out.
    Type: Grant
    Filed: July 31, 2006
    Date of Patent: February 5, 2013
    Inventor: Keiko Ogawa
  • Patent number: 8358784
    Abstract: The present invention provides a system and method for designing secure synchronization protocols in mobile communication by using Deterministic Random Number Generator (DRNG) through linear operators without using multi-precision integers. It also provides an efficient way to generate a huge size collection of pseudorandom numbers with a less computational complexity and DRSG is designed for mobile and wireless communications and also the said DRSG algorithm is a lightweight algorithm. The generated sequence has a lot of applications in Mobile computation and Information security. The invention provides a securely transfer of registry and provision of consumer details over the communication network and also provide a light weight security with better performance in comparison to the lower layer chip level security provided by 2G, 3G or 4G applications.
    Type: Grant
    Filed: December 14, 2010
    Date of Patent: January 22, 2013
    Assignee: Tata Consultancy Services Limited
    Inventor: Vijayarangan Natarajan
  • Publication number: 20120308009
    Abstract: Disclosed are methods and apparatus for detecting mismatch of ciphering parameters, such as Count-C, in a wireless device and recovery therefrom. The methods and apparatus for detection include examining a predefined ciphered field, such as a Length Indicator field, in one or more received Radio Link Control (RLC) Protocol Data Units (PDUs). Next, a determination of when the field is invalid over a predetermined sample number of PDUs is performed. Mismatch of ciphering parameters can then be determined when a predetermined number of samples of the field detected as invalid exceed a predetermined threshold. Additionally, recovery of PDUs after mismatch detections is disclosed using a range of Hyper-Frame Numbers (HFNs) to decipher buffered PDUs, and then check which of the HFNs eliminate the parameter mismatch by again determining if parameter mismatch occurs using the methods and apparatus for detection.
    Type: Application
    Filed: June 1, 2011
    Publication date: December 6, 2012
    Applicant: QUALCOMM INCORPORATED
    Inventors: Ajay K. Venkatsuresh, Suresh Sanka
  • Publication number: 20120300935
    Abstract: Disclosed are alternate embodiments of various components of a barrier operator system. and methods of operation, including of the mechanical drive subsystem with segmented and self-locking rail unit, rail mounting supports, belt and chain drive tensioning, and drive assembly carriage and interface; the electronics and software routines for controlled operation of the various barrier operator functions; wall console communications with the barrier operator; encryption and decryption of access codes; establishment and monitoring of travel limits and barrier speed and force profiles; thermal protection of barrier operator drive motors; and establishment and control of communications from the barrier operator to accessories by way of a wireless adapter.
    Type: Application
    Filed: May 22, 2012
    Publication date: November 29, 2012
    Inventors: David Patrick Bresson, Vivien Neil Delport
  • Patent number: 8279049
    Abstract: The invention relates to a multimedia device comprising a remote control system for wirelessly controlling a multimedia appliance. In order to establish a connection between a remote control system and a multimedia appliance, the remote control system must identify itself to the multimedia appliance, by means of a hardware device, especially a SIM card. The individual user must also identify him/herself to the multimedia appliance, by means of a hardware device for detecting biometric data. The respective identification data is encoded by means of asymmetrical cryptography. During the initialization process between said two appliances, data encoded for the identification of the remote control system and each person is transmitted to the multimedia appliance and stored therein in an encoded manner.
    Type: Grant
    Filed: March 28, 2008
    Date of Patent: October 2, 2012
    Assignee: FM Marketing GmbH
    Inventor: Ferdinand Maier
  • Patent number: 8270608
    Abstract: An apparatus, system and method provides an out-of-synchronization detection by using a network layer checksum. A process operating at an upper layer verifies that a checksum embedded in a network layer header is correct before encrypting and transmitting a data packet containing the header and a payload. The data packet is received through a wireless communication channel at a receiver and decrypted. A calculated checksum is calculated on the received payload at the receiver and compared to the received checksum embedded in the header. A key stream used at the receiver for decrypting the received encrypted data packets is determined to be out of synchronization with a key stream used at the transmitter to encrypt the data packets if the calculated checksum is not equal to the network layer checksum.
    Type: Grant
    Filed: November 25, 2009
    Date of Patent: September 18, 2012
    Assignee: AT&T Mobility II LLC
    Inventors: James Alexander Reeds, III, Wen-Ping Ying
  • Patent number: 8254892
    Abstract: Methods and apparatus for providing personalized content to a user of a wireless network include establishing an anonymous user identifier and delivering the user identifier to a content provider. Based on the user identifier, communication with a predetermined data source is established or predetermined data content is selected. In some embodiments, a device identifier is provided in addition to the user identifier and device specific, personalized content is delivered to the user. In one example, a device identifier and a user identifier are based on a mobile station serial number and a subscriber identity module, respectively, and are used in an HTTP header. The anonymous user identifier can be based on a subscriber identity module (SIM) serial number, or a hash of the SIM serial number so that user information such as a user phone numbers is not available to content providers.
    Type: Grant
    Filed: May 19, 2009
    Date of Patent: August 28, 2012
    Assignee: AT&T Mobility II LLC
    Inventor: Herman Chien
  • Patent number: 8208632
    Abstract: An apparatus including a key mixing circuit, an input circuit, and a decapsulation circuit. The key mixing circuit generates a plurality of seeds, each based on a predetermined temporal key, a transmitter MAC address, and a predetermined start value for a Temporal Key Integrity Protocol (TKIP) Sequence Count (TSC). The input circuit receives a message including the transmitter MAC address and the predetermined start value. The key mixing circuit generates the plurality of seeds based on the message. The input circuit receives a plurality of encapsulated MAC Payload Data Units (MPDUs). The input circuit receives the message before receiving the plurality of encapsulated MPDUs. The decapsulation circuit decapsulates each of the plurality of encapsulated MPDUs using one of the plurality of seeds that was generated based on the value for the TSC in the respective one of the N encapsulated MPDUs.
    Type: Grant
    Filed: April 13, 2010
    Date of Patent: June 26, 2012
    Assignee: Marvell International Ltd.
    Inventors: Peter Loc, Rahul Kopikare
  • Patent number: 8195954
    Abstract: A memory controller for a smart card including a non-volatile memory can include an internal circuit that is configured to perform cryptographic key processing responsive to a first clock and a non-volatile memory interface circuit for transferring/receiving a signal to/from the internal circuit in synchronization with the first clock and transferring/receiving the signal to/from an external device in synchronization with a second clock that is asynchronous relative to the first clock.
    Type: Grant
    Filed: June 27, 2007
    Date of Patent: June 5, 2012
    Assignee: Samsung Electronics Co., Ltd.
    Inventor: Keon-Han Sohn
  • Patent number: 8184812
    Abstract: A secure computing device (14) includes a secure processing section (30) having a tamper detection circuit (58) and a monotonic counter (68). The tamper detection circuit (58) detects an event which suggests that the trust associated with the secure processing section (30) may have been compromised. When such an event is detected, a security breach is declared and trusted software (38) is disabled. After a security breach is declared, the monotonic counter (68) may be reclaimed. The monotonic counter (68) provides a monotonic count value (70) that includes an LSB portion (80) and an MSB portion (82). The LSB portion (80) is obtained from a binary counter (72). The MSB portion (82) is obtained from a register (84) of independent one-time-programmable bits. The monotonic counter (68) is reclaimed by programming one of the one-time programmable bits to guarantee that future counting of the monotonic counter will be monotonic relative to all past counting.
    Type: Grant
    Filed: June 3, 2009
    Date of Patent: May 22, 2012
    Assignee: Freescale Semiconductor, Inc.
    Inventors: Evgeni Margolis, Thomas E. Tkacik
  • Patent number: 8184612
    Abstract: A method and an apparatus for managing an HFN for ciphering/deciphering at an RNC of a mobile communication system are provided. In the method, a Timing Adjustment (ToA) value is received from a base station, and a Connection Frame Number (CFN) is corrected. Whether correction of the CFN has been generated within the same cycle is determined by comparing the correction CFN with an absolute CFN serving as a reference. An HFN value is changed or maintained depending on whether the CFN correction has been generated within the same cycle.
    Type: Grant
    Filed: February 2, 2009
    Date of Patent: May 22, 2012
    Assignee: Samsung Electronics Co., Ltd.
    Inventor: Gu-Lee An
  • Patent number: 8171542
    Abstract: A system to control access to at least one protected device, the system comprising a test access port operable to mate with an external key device and an internal key device that is operable to receive synchronized cipher words during an idle state of the test access port from a removable external key device. The internal key device is also operable to receive test signals via the external key device and to input the received test signals to the protected device based on the synchronized cipher words. The protected device and the internal key device are one of located within a closed chassis, located under a protective security coating, located within a multi-chip-module, located within a closed integrated circuit package, and combinations thereof.
    Type: Grant
    Filed: February 13, 2006
    Date of Patent: May 1, 2012
    Assignee: Honeywell International Inc.
    Inventor: James L. Tucker
  • Patent number: 8132017
    Abstract: A centralized password repository (CPR) provides network users with a password portal through which the user can manage password access to domains and applications on the network. A subset of the domains and applications on the network may be required, by design, to maintain a separate password infrastructure. For these systems, the CPR establishes a secure and authenticated communication channel and software on the system interfaces with the password infrastructure to synchronize the password in the system password infrastructure with the password in the CPR. For other systems not required to maintain a separate password infrastructure, the CPR performs password services by responding to requests from those systems seeking to validate user IDs and passwords. The CPR enables an administrator to modify network privileges and enables a user to alter passwords on the network through a single interface.
    Type: Grant
    Filed: March 31, 2003
    Date of Patent: March 6, 2012
    Assignee: Nortel Networks Limited
    Inventor: Christopher Raymond Lewis
  • Patent number: 8131994
    Abstract: A dual cryptographic keying system. In particular implementations, a method includes responsive to an initial session key negotiation, storing security association information for a tunnel in a security association memory; responsive to a session key renegotiation, storing security association information for the tunnel in a cache; decrypting received packets associated with the tunnel conditionally using the security association information in the cache or the security association information in the security association memory; and upon an expiration condition, overwriting the security association information, for the tunnel, in the security association memory with the security association information, for the tunnel, copied from the cache.
    Type: Grant
    Filed: June 1, 2007
    Date of Patent: March 6, 2012
    Assignee: Cisco Technology, Inc.
    Inventors: Santanu Sinha, Kenneth William Batcher
  • Publication number: 20120045059
    Abstract: A communication apparatus includes display control means for displaying a secret information image containing secret information, and secret information image generation means for, upon receiving a notification signal indicating that a preparation for shooting is completed from another communication apparatus, instructing the display control means to display the secret information image. Note that the display control means displays a predetermined dummy image, and the notification signal is a notification signal indicating that a shooting preparation has been completed based on the dummy image. Further, when the secret information image generation means receives a notification signal indicating that secret information contained in a secret information image is obtained from another communication apparatus, the secret information image generation means instructs the display control means to stop displaying the secret information image.
    Type: Application
    Filed: April 13, 2010
    Publication date: February 23, 2012
    Inventor: Makoto Fujinami
  • Publication number: 20120045060
    Abstract: A method and system for commissioning a wireless connection with a related authentication and the eventual encryption to a remote relay node, whereto an electronic mobile device is connected to a hosting wireless access node for transmitting/receiving data to/from a service provider available on the Internet by means of a commissioned relay access node selected by an authentication and commissioning manager. The data transfer between the mobile device and the service provider is encapsulated into the tunnel between the hosting wireless access node and the commissioned relay access node and is finally forwarded by the commissioned relay access node to the service provider. The service provider thereby is exchanging data with the commissioned relay access node and not directly with the hosting wireless access node.
    Type: Application
    Filed: April 30, 2009
    Publication date: February 23, 2012
    Applicant: PEERTRIBE SA
    Inventors: Angelo Maestrini, Fabio de Vito, Davide Lenzarini
  • Patent number: 8095126
    Abstract: A transmitter is configured to transmit activation signals based on transmission schemes in which one of the schemes is an appropriate scheme such that the appliance activates upon receiving an activation signal that is based on the appropriate scheme and has a code associated with the appliance. The transmitter is configured to receive a code represented by a sequence of bits and to transmit a sequence of different activation signals including different sets of first and second activation signals until user input indicating activation of the appliance is received by the transmitter. Each set of activation signals is based on a respective scheme, each first activation signal includes the sequence of bits and each second activation signal includes a bitwise reversal of the sequence of bits.
    Type: Grant
    Filed: May 25, 2011
    Date of Patent: January 10, 2012
    Assignee: Lear Corporation
    Inventors: Mark D. Chuey, Jody K. Harwood, Kenan R. Rudnick
  • Publication number: 20110299686
    Abstract: A computer computes an SSID and a key from a string. The computer wirelessly accesses a wireless-access-device preconfigured with the SSID and the key.
    Type: Application
    Filed: February 25, 2009
    Publication date: December 8, 2011
    Inventors: Michael L. Saboff, Wolfgang Baltes
  • Patent number: 8006093
    Abstract: Systems for instant messaging private tags preferably comprise a parser for parsing an instant message for sensitive data and an encryption engine for encrypting the sensitive data. A modified uuencoder is also preferably included for converting the encrypted sensitive data into a data stream that complies with an XML format. Other systems and methods are also provided.
    Type: Grant
    Filed: May 1, 2009
    Date of Patent: August 23, 2011
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Larry G Kent, Jr., W. Todd Daniell, Joel A. Davis, Brian K. Daigle
  • Patent number: 8000476
    Abstract: A method of enciphering data which is applicable to cipher-transmission of digital information data, in which the HD-SDI signal DHS is subjected to enciphering process using common key data DEY which is common to encipherment and decipherment to produce enciphered HD-SDI signal DHSE, the common key data DEY are subjected to enciphering process using open key data DOY to produce enciphered common key data DXY, and the enciphered HD-SDI signal DHSE accompanied with the enciphered common key data DXY are send to be transmitted, so that such a fear that the common key data DEY are eavesdropped on the transmission thereof can be effectively reduced.
    Type: Grant
    Filed: May 7, 2003
    Date of Patent: August 16, 2011
    Assignee: Sony Corporation
    Inventors: Tsutomu Shimosato, Yujiro Ito
  • Patent number: 7987363
    Abstract: A wireless communications system may include wireless communications devices with each including a wireless transceiver and a processor coupled thereto for transmitting and receiving communications and using a challenge-response authentication protocol. The wireless communications devices may also include a master wireless communications device and a slave wireless communications device. The master wireless communications device may transmit a polling message including an unencrypted portion and an initial encrypted challenge portion. The slave wireless communications device may transmit a polling reply message including an unencrypted portion and an initial encrypted response portion based upon receiving the polling message from the master wireless communications device.
    Type: Grant
    Filed: December 21, 2007
    Date of Patent: July 26, 2011
    Assignee: Harris Corporation
    Inventors: David Chauncey, Mitel Kuliner
  • Publication number: 20110164751
    Abstract: The present invention provides a system and method for designing secure synchronization protocols in mobile communication by using Deterministic Random Number Generator (DRNG) through linear operators without using multi-precision integers. It also provides an efficient way to generate a huge size collection of pseudorandom numbers with a less computational complexity and DRSG is designed for mobile and wireless communications and also the said DRSG algorithm is a lightweight algorithm. The generated sequence has a lot of applications in Mobile computation and Information security. The invention provides a securely transfer of registry and provision of consumer details over the communication network and also provide a light weight security with better performance in comparison to the lower layer chip level security provided by 2G, 3G or 4G applications.
    Type: Application
    Filed: December 14, 2010
    Publication date: July 7, 2011
    Inventor: VIJAYARANGAN NATARAJAN
  • Patent number: 7970140
    Abstract: A transmitting node produces synchronization data to be inserted into plain text and encrypts the thus generated data into multi-valued data so as to transmit the data. The synchronization data indicates the position of a running key used for encryption. A receiving node decrypts a signal including the synchronization data using the running key and detects the synchronization data from the signal to confirm synchronization of the running key between transmitting and receiving nodes. Then, the receiving node transmits a synchronization confirmation signal to the transmitting node. If the transmitting node does not receive the synchronization confirmation signal, it determines that synchronization of the running key is shifted, and re-synchronization is performed. To perform re-synchronization, a running key ahead of the position of the running key associated with synchronization data that has been stored is generated.
    Type: Grant
    Filed: April 26, 2007
    Date of Patent: June 28, 2011
    Assignee: Hitachi Information & Communication Engineering, Ltd.
    Inventors: Takeshi Hosoi, Katsuyoshi Harasawa, Makoto Honda, Shigeto Akutsu
  • Patent number: 7966007
    Abstract: A universal remote control interacts with a user to assist in training to one or more appliances. If the appliance is activated by a rolling code activation signal, a sequence of different rolling code activation signals is transmitted until the user indicates a successful transmission. If the appliance is activated by a fixed code activation signal, a fixed code word is used to generate and transmit each of a sequence of different fixed code activation signals until the user indicates a successful transmission. At least one of the sequences of activation signals inserts a preset amount of time after each activation signal transmission. If user input is not received within the preset amount of time, the next activation signal in the sequence is transmitted.
    Type: Grant
    Filed: February 17, 2009
    Date of Patent: June 21, 2011
    Assignee: Lear Corporation
    Inventors: Mark D. Chuey, Jody K. Harwood, Kenan R. Rudnick
  • Patent number: 7945783
    Abstract: Systems for customizing the privatizing of instant messages preferably comprise a processing device configured to detect a marking of select portions of an instant message as sensitive data. The instant message is parsed for marked sensitive data. An encryption engine encrypts the sensitive data. A modified unencoder is also preferably included for converting the encrypted sensitive data into a data stream that complies with an XML format. Other systems and methods are also provided.
    Type: Grant
    Filed: October 17, 2008
    Date of Patent: May 17, 2011
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Larry G. Kent, Jr., W. Todd Daniell, Joel A. Davis, Brian K. Daigle
  • Patent number: 7937071
    Abstract: A device management (DM) system and a method of controlling the same, are discussed. According to an embodiment, the DM system comprises a DM server for transmitting a notification message in response to a device control request of a user, the notification message including unique authentication information having previously stored unique information of a device and basic authentication information having a setup value for setting up communication; and a device having a DM client, for receiving the notification message, performing authentications using the basic authentication information and the unique authentication information, and discarding the notification message if the authentications using the basic authentication information and the unique authentication information fail.
    Type: Grant
    Filed: June 19, 2007
    Date of Patent: May 3, 2011
    Assignee: LG Electronics Inc.
    Inventor: Joonho Lee
  • Patent number: 7882350
    Abstract: Example embodiments relate to an encryption and decryption method for a conditional access content, including (a) extracting a marker (Mc) from a data packet (DP); (b) creating a first marking block including the marker (Mc) and a second padding value (PAD2); (c) encrypting the first marking block with a second encryption key (K2); (d) encrypting a second encrypted marking value (MK2) of the first encrypted marking block; (e) creating a mixed marking block including the second encrypted marking value (MK2) a the first encrypted padding element (PADK1); (f) decrypting the mixed marking block a device of the first encryption key (K1), in order to obtain a decrypted mixed marking block; (g) extracting a predetermined part of the decrypted mixed marking block; (h) comparing the extracted part with a reference value (Mc; PDV2); and (i) if the comparison leads to an identity, determining a new set of encryption parameters different to the first set of encryption parameters and repeating steps b) to h) in which the
    Type: Grant
    Filed: December 11, 2006
    Date of Patent: February 1, 2011
    Assignee: Nagra France SAS
    Inventors: Thierry Lelegard, Pascal Junod
  • Patent number: 7840008
    Abstract: A decryption apparatus (109) comprises a key stream generator (111) generating a local decryption key stream. It furthermore comprises a synchronization value receiver (201) receiving key stream synchronization values. A synchronization processor (203) implements a state machine which may operate in a synchronized state (303) wherein the communication is decrypted using the local key stream, a non-synchronized state (301) wherein the local key stream is not synchronized, or in an uncertain synchronization state (305) wherein the communication is decrypted using the local key stream and wherein the local key stream is synchronized to each new received synchronization value. The synchronization processor (203) furthermore comprises a transition controller (213) operable to transition from the synchronized state to the non-synchronized state in response to a first criterion and to the uncertain synchronization state in response to a second criterion.
    Type: Grant
    Filed: October 6, 2006
    Date of Patent: November 23, 2010
    Assignee: Motorola, Inc.
    Inventor: Kristian Gronkjaer Pedersen
  • Patent number: 7826618
    Abstract: Disclosed embodiments include a method for synchronizing a cryptosystem. In one embodiment, the method uses existing control data that is transmitted as part of a connection establishment process in a wireless communication system. In one embodiment, messages that are normally sent between a base station and a remote unit during the setup of both originating and terminating calls are parsed to detect a particular control message that indicates the start of telephony data transmission. Detection of this message indicates a point at which encryption/decryption can begin, and is used to synchronize the cryptosystem. Synchronizing a cryptosystem involves generating an RC4 state space in a keyed-autokey (“KEK”) encryption system. In one embodiment, Lower Medium Access Channel (“LMAC”) messages are used according to a wireless communication protocol. This is convenient because the LMAC messages are passed through the same Associated Control Channel (“ACC”) processing that encrypts and decrypts the telephony data.
    Type: Grant
    Filed: September 4, 2008
    Date of Patent: November 2, 2010
    Assignee: AT&T Mobility II LLC
    Inventors: Eric Klingler, Jeffrey Tedeschi
  • Publication number: 20100215177
    Abstract: An enterprise communication system adapted for establishing secure wireless communication sessions, the system comprising: an enterprise platform adapted for establishing communications sessions with one or more wireless devices, and for transmitting signals to and receiving signals from the one or more wireless devices; an platform-side automatic synchronized random key generator associated with the enterprise platform for generating platform-generated synchronized random keys; the enterprise platform being adapted to: receive one or more signals representing a request to establish a communication session between the enterprise platform and at least one wireless device; receive a device-generated synchronized random key from the at least one wireless device; compare the device-generated synchronized random key to a platform-generated synchronized random key synchronized to the device-generated synchronized random key; and based on the comparison, output a signal representing a response to authorize or prohib
    Type: Application
    Filed: February 26, 2009
    Publication date: August 26, 2010
    Inventors: Yuriy Lobzakov, Colin Werner, Carsten Bergmann, Peter Baccay
  • Patent number: 7773972
    Abstract: Individual wireless devices communicate amongst each other exchanging identity information, authentication-state or both, thereby forming a collaborative-collection of wireless devices. This collaborative-collection of wireless devices offers improvements over individual wireless devices in three areas. First, device functions are affected by the group of devices that are active-members of the collaborative-collection, enabling improved functionality. Second, the times-of-membership and times-of-non-membership of the devices in the collaborative-collection are monitored and this information is used to affect the function of individual devices in the collaborative-collection, including improved security and authorization policies. Third, the authentication-state of the active-member devices in the collaborative-collection affects the function of the active-member devices in the collaborative-collection, also adding to improved security.
    Type: Grant
    Filed: May 14, 2003
    Date of Patent: August 10, 2010
    Assignee: Socket Mobile, Inc.
    Inventors: Martin Croome, Kevin J. Mills
  • Patent number: 7747021
    Abstract: Methods and apparatus are provided for secure communication techniques in a communication system. The system can include a first device which communicates with a second device over a channel. A security association can be established during a first session between the devices via an asymmetric key exchange. The security association comprises a Traffic Encryption Key (TEK) and a first state vector. The TEK comprises a shared, secret symmetric key. The security association is stored in each of the devices for use during a second session between the devices to expedite security association establishment during call set-up of the second session. The security association can be associated with the second device in the first device, and with the first device in the second device. An updated state vector can be generated at the first device. A second session can be established between the first device and the second device by using the TEKs from the first session and the updated state vector.
    Type: Grant
    Filed: May 18, 2005
    Date of Patent: June 29, 2010
    Assignees: General Dynamics C4 Systems, Inc., Motorola, Inc.
    Inventors: Ty B. Lindteigen, Bernard R. McKibben, William C. Neubauer, III, Jerry D. Ray, Michael A. Savage, Bryce Sutherland, Barbara S. Winterfield, Keith M. Klug, Stuart S. Kreitzer, Brent M. McKay, Bradley J. Rainbolt, Fred R. Villa, Marc A. Boillot
  • Patent number: 7734044
    Abstract: A method and apparatus for a signal encryption device constructed to perform synchronous stream cipher encryption for a sequence of input words with restricted codes. The encryption device includes a keystream generator for producing a sequence of pseudorandom words from a key, and an adder that is used to sum the output of the keystream generator and the input words. A lookup table of size substantially twice the number of possible input words provides encrypted codes excluding restricted codes from the summed signal. A signal encryption and decryption system is constructed by including a second keystream generator for producing a second sequence of pseudorandom words from the key, and a second adder to produce a second summed signal from the output of the second keystream generator and the encrypted codes. A corresponding lookup table provides decrypted codes excluding restricted codes from the second summed signal.
    Type: Grant
    Filed: February 23, 2006
    Date of Patent: June 8, 2010
    Assignee: Texas Instruments Incorporated
    Inventor: Matthew John Fritz
  • Patent number: 7715559
    Abstract: An apparatus (213) and corresponding methods (FIG. 7) to facilitate maintaining crypto synchronization while processing communication signals in a communication unit includes a vocoder (215) configured to convert input audio band signals to vocoder output frames; a crypto processor (217) configured to encrypt the vocoder output frames to provide encrypted output frames; and a synchronizer (219) configured to substitute in a predetermined manner synchronization information corresponding to an encryption state of the crypto processor for a portion of the encrypted data in a portion of the encrypted output frames to provide resultant output synchronization frames suitable for synchronizing a decryption process at a target communication unit.
    Type: Grant
    Filed: August 26, 2004
    Date of Patent: May 11, 2010
    Assignee: Motorola, Inc.
    Inventors: Bradley J. Rainbolt, Marc A. Boillot
  • Patent number: 7715563
    Abstract: A state vector acquisition technique for a counter-based cryptographic data communication system is disclosed. The acquisition technique facilitates receipt of the state vector components (the short component and the long components) in any chronological order. The state vector components are saved upon receipt, and a counter for each long component is initialized upon receipt of the long component. After receipt of all components, the receiver device constructs a current state vector value based upon the received component values and the long component counter values.
    Type: Grant
    Filed: February 16, 2006
    Date of Patent: May 11, 2010
    Assignee: General Dynamics C4 Systems, Inc.
    Inventor: Ty Lindteigen
  • Patent number: 7697688
    Abstract: An apparatus includes a key mixing circuit, an input circuit, and a decapsulation circuit. The key mixing circuit generates N Wired Equivalent Privacy (WEP) seeds, N?1, each based on a predetermined temporal key, a transmitter MAC address, and a predetermined start value for a Temporal Key Integrity Protocol (TKIP) Sequence Count (TSC). The input circuit receives a message including the transmitter MAC address and the predetermined start value. The key mixing circuit generates the N WEP seeds based on the message. The input circuit receives N encapsulated MAC Payload Data Units (MPDUs) each including the transmitter MAC address and one of N values for the TSC, greater than or equal to the predetermined start value. The decapsulation circuit decapsulates the N encapsulated MPDUs using one of the N WEP seeds generated based on the value for the TSC in the respective one of the N encapsulated MPDUs.
    Type: Grant
    Filed: October 27, 2004
    Date of Patent: April 13, 2010
    Assignee: Marvell International Ltd.
    Inventors: Peter Loc, Rahul Kopikare
  • Patent number: 7680278
    Abstract: A system and method for secure wireless cryptographic communication among participants in a wireless computing network is presented. This secure communication method is based on a random modulation technique and a domino match. Once the initial modulation scheme is selected, each data transmission includes an indication of what modulation scheme should be used for the next data transmission. If a given number of bits are to be used, the modulation scheme for the final transmission may be limited to complete the bit transfer. The bit value assignments within particular modulation schemes may also be varied for each subsequent transmission.
    Type: Grant
    Filed: February 4, 2004
    Date of Patent: March 16, 2010
    Assignee: Microsoft Corporation
    Inventors: Amer Hassan, Christopher J. Corbett
  • Patent number: 7660420
    Abstract: A system and method for wireless device synchronization is provided. A default connection is established between a first wireless device and a second wireless using default connection values. Unique address information is exchanged over the default connection. A unique connection is established between the first wireless device and the second wireless device.
    Type: Grant
    Filed: September 8, 2004
    Date of Patent: February 9, 2010
    Assignee: Stryker Corporation
    Inventors: Anand Narayan, Steven B. Uhl, Salmaan Hameed
  • Publication number: 20100030916
    Abstract: A system and method for distributing accurate time signals comprises a plurality of base stations distributed over an area and a plurality of time receivers. The plurality of base stations receive time signals from a GPS system and transmits time signal packets. The plurality of time receives time signal packets from one or more base stations. Each time receiver is located at or near a measurement point and is operable to estimate a corrected time by a triangulation process from a received time signal packet.
    Type: Application
    Filed: August 4, 2009
    Publication date: February 4, 2010
    Inventor: Ian David Greenwood Graham
  • Publication number: 20090316904
    Abstract: Systems and methods for wireless communications are provided. These include data deciphering components, interrupt processing components, adaptive aggregations methods, optimized data path processing, buffer pool processing, application processing where data is formatted in a suitable format for a destination process, and Keystream bank processing among other hardware acceleration features. Such systems and methods are provided to simplify logic designs and mitigate processing steps during wireless network data processing.
    Type: Application
    Filed: June 18, 2009
    Publication date: December 24, 2009
    Applicant: QUALCOMM INCORPORATED
    Inventors: Thomas Klingenbrunn, Uppinder S. Babbar, Vanitha A. Kumar, Vikas Nagpal, Sriram Narayan, Samson Jim, Shailesh Maheshwari, Marcello V. Lioy, Mathias Kohlenz, Idreas Mir, Irfan A. Khan, Gurvinder S. Chhabra, Jean-Marie QD Tran
  • Publication number: 20090304184
    Abstract: A mobile communication system that performs concealment processing of data between a wireless base station and a mobile station. The mobile communication system includes a concealment synchronization deviation detecting unit that detects concealment synchronization deviation between the mobile station and the wireless base station by detecting expansion failure of a compressed header after concealment release; and a concealment synchronization information notifying unit that notifies an opposite side of concealment synchronization information when the concealment synchronization deviation occurs.
    Type: Application
    Filed: October 28, 2008
    Publication date: December 10, 2009
    Applicant: FUJITSU LIMITED
    Inventor: Yasushi MIYAGAWA