Procedimiento y aparato de seguridad en un sistema de procesamiento de datos

    公开(公告)号:ES2791681T3

    公开(公告)日:2020-11-05

    申请号:ES10004388

    申请日:2002-10-08

    Applicant: QUALCOMM INC

    Abstract: Un procedimiento para la recepción segura de una transmisión en un canal de radiodifusión, comprendiendo el procedimiento: recibir (752) una transmisión en el canal de radiodifusión que incluye un identificador de clave de acceso (804), un valor aleatorio (806) y un contenido cifrado; determinar (762) una clave de acceso de radiodifusión basada en el identificador de clave de acceso (804); generar (764) una clave a corto plazo basada en la clave de acceso de radiodifusión y el valor aleatorio; y descifrar (766) el contenido cifrado en la transmisión usando la clave a corto plazo.

    Method and apparatus for security in a data processing system

    公开(公告)号:AU2002342014C1

    公开(公告)日:2008-10-30

    申请号:AU2002342014

    申请日:2002-10-08

    Applicant: QUALCOMM INC

    Abstract: Method and apparatus for secure transmissions. Each user is provided a registration key. A long-time updated broadcast key is encrypted using the registration key and provided periodically to a user. A short-time updatedkey is encrypted using the broadcast key. The short-time key is available with each broadcast message,wherein sufficient information to calculate the short-time key is provided in an Internet protocol headerpreceding the broadcast content. Broadcasts are then encrypted using the short-time key, wherein the user decrypts the broadcast message using the short-time key.

    4.
    发明专利
    未知

    公开(公告)号:DE60031304T2

    公开(公告)日:2007-05-24

    申请号:DE60031304

    申请日:2000-12-21

    Applicant: QUALCOMM INC

    Abstract: A method of authenticating anonymous users while reducing potential for "middleman" fraud includes the step of constructing a puzzle in response to information received from a software user. The puzzle includes the received information. The puzzle is sent to the user by a software provider. The user solves the puzzle and returns the solution to the provider. The puzzle includes a portion of a value derived from an encrypted "cookie" and an exponentiation of the derived value. The cookie includes information about the user.

    Method and apparatus for security in a data processing system

    公开(公告)号:AU2002342014B2

    公开(公告)日:2008-03-13

    申请号:AU2002342014

    申请日:2002-10-08

    Applicant: QUALCOMM INC

    Abstract: Method and apparatus for secure transmissions. Each user is provided a registration key. A long-time updated broadcast key is encrypted using the registration key and provided periodically to a user. A short-time updatedkey is encrypted using the broadcast key. The short-time key is available with each broadcast message,wherein sufficient information to calculate the short-time key is provided in an Internet protocol headerpreceding the broadcast content. Broadcasts are then encrypted using the short-time key, wherein the user decrypts the broadcast message using the short-time key.

    METHOD AND APPARATUS FOR SECURITY IN A DATA PROCESSING SYSTEM

    公开(公告)号:HK1076553A1

    公开(公告)日:2006-01-20

    申请号:HK05108328

    申请日:2005-09-22

    Applicant: QUALCOMM INC

    Abstract: Method and apparatus for secure transmissions. Each user is provided a registration key. A long-time updated broadcast key is encrypted using the registration key and provided periodically to a user. A short-time updatedkey is encrypted using the broadcast key. The short-time key is available with each broadcast message,wherein sufficient information to calculate the short-time key is provided in an Internet protocol headerpreceding the broadcast content. Broadcasts are then encrypted using the short-time key, wherein the user decrypts the broadcast message using the short-time key.

    8.
    发明专利
    未知

    公开(公告)号:BR0110497A

    公开(公告)日:2004-12-21

    申请号:BR0110497

    申请日:2001-05-01

    Applicant: QUALCOMM INC

    Abstract: A method for constructing keyed integer permutations over the set Z N . where N can be factored into p and q, or N can be prime. N bits are permuted by deriving a keyed permutation of representative indices. When N is factorable into p and q, the set of indices are divided into two portions. The portions undergo iterative processing called "rounds," and in each round, a first half-round function operates on the first portion to form a first half-round value; the first half-round value and the second portion are added together by a modulo-p adder to form a first output value; a second half-round function operates on the second portion to form a second half-round value; and the second half-round value and the first portion are added together by a modulo-q adder to form a second output value. In this manner, outputs of the rounds are reordered. If N is prime and not less than 13, then N is separated into composite values s and t, and two sets are formed with s and t elements, respectively. Each set is then permuted using the method for when N is not prime. At the end of each round, the two blocks are combined using a mixing operation.

    Procedimiento y aparato de seguridad en un sistema de procesamiento de datos

    公开(公告)号:ES2796115T3

    公开(公告)日:2020-11-25

    申请号:ES02776178

    申请日:2002-10-08

    Applicant: QUALCOMM INC

    Abstract: Un procedimiento para transmisiones seguras en un canal de radiodifusión, comprendiendo el procedimiento: obtener (714) una clave a corto plazo (800) para un mensaje para su transmisión, correspondiendo la clave a corto plazo a un identificador de clave a corto plazo; determinar (702) una clave de acceso de radiodifusión para el mensaje, correspondiendo la clave de acceso de radiodifusión a un identificador de clave de acceso (804); cifrar (716) el mensaje con la clave a corto plazo; formar (718) una cabecera de protocolo de Internet que comprenda el identificador de clave a corto plazo; y transmitir (718) el mensaje cifrado en el canal de radiodifusión con la cabecera de protocolo de Internet, en el que la clave a corto plazo (714) se calcula en función del identificador de clave a corto plazo y de la clave de acceso de radiodifusión.

Patent Agency Ranking