1
Cha Inhyok, Shah Yogendra C, Schmidt Andreas U, Meyerstein Michael V: Method and apparatus for enabling machine to machine communication. Interdigital Patent Holdings, Cha Inhyok, Shah Yogendra C, Schmidt Andreas U, Meyerstein Michael V, MCMICHAEL Wesley T, July 23, 2009: WO/2009/092115 (36 worldwide citation)

A method and apparatus for performing secure Machine-to-Machine (M2M) provisioning and communication is disclosed. In particular a temporary private identifier, or provisional connectivity identification (PCID), for uniquely identifying machine-to-machine equipment (M2ME) is also disclosed. Addition ...


2
Cha Inhyok, Rathi Chinmayee V, Shah Yogendra C, Guccione Louis J, Schmidt Andreas U, Kuntz Nicolai: Techniques for secure channelization between uicc and a terminal. Interdigital Technology Corporation, Cha Inhyok, Rathi Chinmayee V, Shah Yogendra C, Guccione Louis J, Schmidt Andreas U, Kuntz Nicolai, WEINSTEIN Louis, April 9, 2009: WO/2009/046400 (26 worldwide citation)

The present invention is related to a wireless communication system. 3G UMTS mobile phone systems rely on a protected smart card called the UMTS integrated circuit card (UICC) that provides UMTS subscriber identity module (USIM) applications as a basis or root of various security measures protecting ...


3
Reznik Alexander, Kumoluyi Akinlolu Oloruntosi, Zhang Guodong, Chitrapu Prabhakar R, Sternberg Gregory S, Shah Yogendra C, Briancon Alain Charles Louis, Ye Chunxuan: Generation of perfectly secret keys in wireless communication networks. Interdigital Technology Corporation, Reznik Alexander, Kumoluyi Akinlolu Oloruntosi, Zhang Guodong, Chitrapu Prabhakar R, Sternberg Gregory S, Shah Yogendra C, Briancon Alain Charles Louis, Ye Chunxuan, VENEZIA Anthony L, August 3, 2006: WO/2006/081306 (11 worldwide citation)

A method and apparatus is used for generating a perfectly random secret key between two or more transceivers in a wireless communication network. In a point- to-point system, both transceivers produce an estimate of the channel impulse response (CIR) based on the received radio signal. The CIR estim ...


4
Shah Yogendra C, Cha Inhyok, Reznik Alexander: Method and apparatus for providing trusted single sign-on access to applications and internet-based services. Interdigital Technology Corporation, Shah Yogendra C, Cha Inhyok, Reznik Alexander, BALLARINI Robert J, February 28, 2008: WO/2008/024454 (7 worldwide citation)

A method and apparatus for password management and single sign-on (SSO) access based on trusted computing (TC) technology. The methods implement the Trusted Computing Group (TCG)'s trusted platform module (TPM), which interacts with both proxy SSO unit and web-accessing applications to provide a sec ...


5

6

7
Guccione Louis J, Dodis Yevgeniy, Shah Yogendra C, Cha Inhyok: Secure session key generation. Interdigital Patent Holdings, Guccione Louis J, Dodis Yevgeniy, Shah Yogendra C, Cha Inhyok, KLINE Adam D, October 15, 2009: WO/2009/126647 (6 worldwide citation)

A method and apparatus for securing the interface between a Universal Integrated Circuit Card (UICC) and a Terminal in wireless communications is disclosed. The security of Authentication and Key Agreement (AKA) and application level generic bootstrapping architecture (GBA) with UICC-based enhanceme ...


8
Shah Yogendra C: Joint signal demodulation in a low and high data rate channel environment. Interdigital Technology Corporation, Shah Yogendra C, BALLARINI Robert J, December 29, 2005: WO/2005/125024 (5 worldwide citation)

A receiver is capable of demodulating both high data rate and low data rate transmissions. An antenna (936) receives the high and low data rate transmissions, as a received signal. An interference canceling device (38, 40) cancels a contribution of at least one shared/common channel from the receive ...


9
Cha Inhyok, Singhal Amit X, Shah Yogendra C: Digital rights management using trusted processing techniques. Interdigital Technology Corporation, Cha Inhyok, Singhal Amit X, Shah Yogendra C, BALLARINI Robert J, August 21, 2008: WO/2008/100264 (5 worldwide citation)

The present invention discloses several methods to strengthen the integrity of entities, messages, and processing related to content distribution as defined by the Open Mobile Alliance (OMA) Digital Rights Management (DRM). The methods use techniques related to the Trusted Computing Group (TCG) spec ...


10
CASE Lawrence, SHAH Yogendra C, CHA Inhyok: VALIDATION DE CERTIFICAT ET ASSOCIATION DE CANAL, CERTIFICATE VALIDATION AND CHANNEL BINDING. INTERDIGITAL PATENT HOLDINGS, CASE Lawrence, SHAH Yogendra C, CHA Inhyok, SAMUELS Steven B, May 24, 2012: WO/2012/068094 (5 worldwide citation)

A constrained network entity may determine, via an authentication procedure with a core network entity, the trustworthiness of an endpoint attempting to establish a secure channel with the constrained network entity. The constrained network entity may receive a certificate from the endpoint attempti ...