Search

Alexander Medvinsky

from Olney, MD
Age ~85

Alexander Medvinsky Phones & Addresses

  • 18001 Sunset River Ct, Olney, MD 20832 (301) 570-4186
  • Natick, MA
  • 453 Nicholas Dr, Southampton, PA 18966 (215) 322-4636
  • Silver Spring, MD
  • Jenkintown, PA
  • Buck, PA

Publications

Us Patents

Tokenized Resource Access

View page
US Patent:
8266684, Sep 11, 2012
Filed:
Sep 30, 2008
Appl. No.:
12/242150
Inventors:
Daniel E. Kline - Quakertown PA, US
Alexander Medvinsky - San Diego CA, US
Assignee:
General Instrument Corporation - Horsham PA
International Classification:
G06F 21/00
US Classification:
726 9, 726 20, 726 34, 713189
Abstract:
A method and system for unlocking diagnostic functions in a hardware device for a user. The method obtains a signed permission object for the hardware device, and validates the signed permission object. A memory of the hardware device stores a device identifier and a last recorded sequence number. The signed permission object includes a sequence number and is associated with an expiration counter having an initial value that indicates a lifetime for the signed permission object. When the signed permission object is valid, the method updates the expiration counter to decrease the lifetime of the signed permission object, stores the sequence number associated with the signed permission object as the last recorded sequence number in the hardware device, and unlocks the diagnostic functions for the user based on the signed permission object.

Tokenized Resource Access

View page
US Patent:
8522361, Aug 27, 2013
Filed:
Aug 9, 2012
Appl. No.:
13/571279
Inventors:
Daniel E. Kline - Quakertown PA, US
Alexander Medvinsky - San Diego CA, US
Assignee:
Motorola Mobility LLC - Libertyville IL
International Classification:
H04L 29/06
US Classification:
726 30, 726 9, 726 26, 713167, 713189
Abstract:
A method and system for unlocking diagnostic functions in a hardware device for a user. The method obtains a signed permission object for the hardware device, and validates the signed permission object. A memory of the hardware device stores a device identifier and a last recorded sequence number. The signed permission object includes a sequence number and is associated with an expiration counter having an initial value that indicates a lifetime for the signed permission object. When the signed permission object is valid, the method updates the expiration counter to decrease the lifetime of the signed permission object, stores the sequence number associated with the signed permission object as the last recorded sequence number in the hardware device, and unlocks the diagnostic functions for the user based on the signed permission object.

System And Method For Transcoding Content

View page
US Patent:
20140029747, Jan 30, 2014
Filed:
Jul 25, 2012
Appl. No.:
13/557595
Inventors:
John P. Kamieniecki - Lafayette Hill PA, US
Tat Keung Chan - San Diego CA, US
Kevin T. Chang - Doylestown PA, US
Alexander Medvinsky - San Diego CA, US
Assignee:
GENERAL INSTRUMENT CORPORATION - Horsham PA
International Classification:
G06F 21/24
US Classification:
380 28
Abstract:
A system is provided for use with secure content in a first format. The system includes a conditional access device, a transcoding device and a media processor. The conditional access device is operable to receive the secure content and can generate a second secure content based on the secure content. The conditional access device can further provide the second secure content to the transcoding device. The transcoding device can transcode the second secure content into transcoded content of a second format, can secure the transcoded content as secure transcoded content and can provide the secure transcoded content to the media processor

Centralized Database With Provisions To Prevent Pki Key And Security Certificate Duplication

View page
US Patent:
20220353094, Nov 3, 2022
Filed:
Apr 22, 2022
Appl. No.:
17/727552
Inventors:
- Suwanee GA, US
Christopher POLI - Doylestown PA, US
Alexander MEDVINSKY - San Diego CA, US
Ting YAO - San Diego CA, US
Jinsong ZHENG - San Diego CA, US
Assignee:
ARRIS Enterprises LLC - Suwanee GA
International Classification:
H04L 9/32
H04L 9/30
Abstract:
A system and method for preventing use of invalid digital certificates is disclosed. The method comprises receiving, in a validation service from a requesting entity, a cryptographic asset and a request to evaluate the cryptographic asset, the cryptographic asset uniquely assigned to one of the plurality of devices by an associated one of the commercially distinct entities, the request comprising the cryptographic asset, determining an evaluation state of the cryptographic asset at least in part from a database derived from a plurality of public keys currently assigned to the plurality of devices and previously received by the validation service, determining a disposition of the cryptographic asset according to a disposition policy associated with the determined evaluation state and the device and effecting the determined disposition of the cryptographic asset.

Systems And Methods For Secure Virtualized Base Station Orchestration

View page
US Patent:
20230007474, Jan 5, 2023
Filed:
Jul 1, 2022
Appl. No.:
17/856164
Inventors:
- Hickory NC, US
Shanthakumar Ramakrishnan - Westford MA, US
Tat Keung Chan - San Diego CA, US
Alexander Medvinsky - San Diego CA, US
Prashanth Venkatesh - Bangalore, IN
Devaraj Sambandan - Bengaluru, IN
Assignee:
CommScope Technologies LLC - Hickory NC
International Classification:
H04W 12/0431
H04W 12/069
H04L 9/40
Abstract:
In one embodiment, a method for secure virtualized wireless base station orchestration comprises: obtaining a node certificate and private key from a global CA defining a PKI signing certificate/private key; obtaining a sub CA certificate/private key from either an edge cloud node cluster or the global CA, using a PKI request signed using the PKI signing certificate/private key; establishing an orchestration access IPsec tunnel to a cloud comprising edge cloud orchestration functions; utilizing the orchestration functions to deploy on the node virtualized entities comprising VNFs of a wireless base station; obtaining at least one VNF certificate and private key for the VNFs from the global CA using a PKI request signed using the global certificate/private key; utilizing the VNF certificate/private key, establishing IPsec tunnels between the VNFs and a wireless network services operator network and/or to an OAM secure gateway for a DMS.

Challenge-Response Cable Set-Top-Box System To Securely Authenticate Software Application Program Interfaces (Apis)

View page
US Patent:
20140123172, May 1, 2014
Filed:
Oct 29, 2013
Appl. No.:
14/066653
Inventors:
- Horsham PA, US
Mark G. Depietro - Harleysville PA, US
Alexander Medvinsky - San Diego CA, US
Paul Moroney - La Jolla CA, US
Xin Qiu - San Diego CA, US
Assignee:
General Instrument Corporation - Horsham PA
International Classification:
H04N 21/235
H04N 21/647
H04N 21/435
US Classification:
725 31
Abstract:
A system for securely authenticating software Application Program Interfaces (APIs) includes a handshake protocol provided between a Conditional Access System (CAS) and Middleware running on a Set-Top-Box. The handshake is a Challenge-Response protocol that includes several steps. The CAS or the Middleware can either act as a Claimant or Verifier in Challenge-Response process. First, a Claimant sends a request to a Verifier requesting access to a function F through the API. The Verifier reacts to the request by outputting a Challenge that is sent to the Claimant The Challenge is also retained by the Verifier for use in its internal calculation to verify the Claimant's response. The Claimant next processes the Challenge using components under a patent License Agreement, known as Hook IP, and issues a Response to the Verifier. The Verifier can then verify the Response to allow the Claimant access to the API.

Business Method Including Challenge-Response System To Securely Authenticate Software Application Program Interfaces (Apis)

View page
US Patent:
20140123220, May 1, 2014
Filed:
Oct 29, 2013
Appl. No.:
14/066591
Inventors:
- Horsham PA, US
Mark G. Depietro - Harleysville PA, US
Alexander Medvinsky - San Diego CA, US
Paul Moroney - La Jolla CA, US
Xin Qiu - San Diego CA, US
Assignee:
General Instrument Corporation - Horsham PA
International Classification:
G06F 21/10
US Classification:
726 2
Abstract:
A system for securely authenticating software Application Program Interfaces (APIs) includes a handshake protocol that is provided to validate whether the parties involved are licensed to use the system which includes rights to Intellectual Property (IP) and corresponding obligations. The handshake is a Challenge-Response protocol that includes several steps. First, a Claimant sends a request to a Verifier requesting access to a function through an API. The Verifier reacts to the request by outputting a Challenge that is sent to the Claimant. The Challenge is also retained by the Verifier for use in its internal calculation to verify the Claimant's response. The Claimant next processes the Challenge using components under the license, known as Hook IP, and issues a Response to the Verifier. The Verifier compares the possibly-correct Candidate Response from the Claimant to the known-correct Target Response and if a match occurs the Verifier allows the Claimant access to the API.
Alexander Medvinsky from Olney, MD, age ~85 Get Report