-
公开(公告)号:AT462239T
公开(公告)日:2010-04-15
申请号:AT03716025
申请日:2003-02-12
Applicant: QUALCOMM INC
Inventor: GANTMAN ALEXANDER , ROSE GREGORY G
IPC: G06F21/20 , H04L9/00 , G06F1/04 , G06F1/06 , G06F1/08 , G07F7/10 , G09C1/00 , H04K1/00 , H04L9/32
Abstract: Apparatus and method are disclosed for digital authentication and verification. In one embodiment, authentication involves storing a cryptographic key and a look up table (LUT), generating an access code using the cryptographic key; generating multiple parallel BPSK symbols based upon the access code; converting the BPSK symbols into multiple tones encoded with the access code using the LUT; and outputting the multiple tones encoded with the access code for authentication. In another embodiment, verification involves receiving multiple tones encoded with an access code; generating multiple parallel BPSK symbols from the multiple tones; converting the BPSK symbols into an encoded interleaved bit stream of the access code; de-interleaving the encoded interleaved bit stream; and recovering the access code from the encoded de-interleaved bit stream.
-
公开(公告)号:AU2003296888B2
公开(公告)日:2008-08-28
申请号:AU2003296888
申请日:2003-07-24
Applicant: QUALCOMM INC
Inventor: ROSE GREGORY G , HAWKES PHILIP MICHAEL
Abstract: Methods and apparatus are presented herein for encrypting and authentication data, such that some of data can be transmitted in the clear but still be authenticated by the sender. A set of cleartext positions and/or a set of ciphertext positions are used to specify which data blocks will be used to generate an input checksum value and an output checksum value. These checksums are then used to generate an authentication tag.
-
公开(公告)号:DE69937200T2
公开(公告)日:2008-06-26
申请号:DE69937200
申请日:1999-12-17
Applicant: QUALCOMM INC
Inventor: ROSE GREGORY G
Abstract: A method for permitting encrypted communications between two stations which are operable with compatible encryption algorithms that accept encryption keys having work factors with respectively different values, comprising: determining a lowest one of the different work factor values: providing an initial encryption key with a given work factor value; comparing the given work factor value with the lowest one of the different work factor values; and wherein, if the given work factor value is greater than the lowest one of the different work factor values, the method further comprises: deriving from the initial encryption key a final encryption key having a work factor value not greater than the lowest one of the different work factor values; and using the final encryption key for the encrypted communications.
-
公开(公告)号:DE602004011554D1
公开(公告)日:2008-03-13
申请号:DE602004011554
申请日:2004-11-01
Applicant: QUALCOMM INC
Inventor: ROSE GREGORY G , PADDON MICHAEL , HAWKES PHILIP M , SEMPLE JAMES F
Abstract: Systems and methods of securing wireless communications between a network and a subscriber station include inserting a marker denoting an encryption type within a random value used for authentication, calculating a first session key and a first response value as a function of the random value, then calculating a second session key and a second response value as a function of the random value, first session key and first response value. The two levels of session keys and response values may be used by upgraded subscriber stations and network access points to prevent attackers from intercepting authentication triplets.
-
公开(公告)号:AU2002342014B2
公开(公告)日:2008-03-13
申请号:AU2002342014
申请日:2002-10-08
Applicant: QUALCOMM INC
Inventor: LEUNG NIKOLAI K N , ROSE GREGORY G , HAWKES PHILIP
Abstract: Method and apparatus for secure transmissions. Each user is provided a registration key. A long-time updated broadcast key is encrypted using the registration key and provided periodically to a user. A short-time updatedkey is encrypted using the broadcast key. The short-time key is available with each broadcast message,wherein sufficient information to calculate the short-time key is provided in an Internet protocol headerpreceding the broadcast content. Broadcasts are then encrypted using the short-time key, wherein the user decrypts the broadcast message using the short-time key.
-
公开(公告)号:AT385157T
公开(公告)日:2008-02-15
申请号:AT04810234
申请日:2004-11-01
Applicant: QUALCOMM INC
Inventor: ROSE GREGORY G , PADDON MICHAEL , HAWKES PHILIP M , SEMPLE JAMES F
Abstract: Systems and methods of securing wireless communications between a network and a subscriber station include inserting a marker denoting an encryption type within a random value used for authentication, calculating a first session key and a first response value as a function of the random value, then calculating a second session key and a second response value as a function of the random value, first session key and first response value. The two levels of session keys and response values may be used by upgraded subscriber stations and network access points to prevent attackers from intercepting authentication triplets.
-
公开(公告)号:ES2263479T3
公开(公告)日:2006-12-16
申请号:ES00945266
申请日:2000-07-07
Applicant: QUALCOMM INC
Inventor: ROSE GREGORY G
Abstract: Un método para actualizar un número binario, dicho número binario actualizado para ser usado en procedimientos de autenticación de un sistema de teléfono celular, comprendiendo los pasos de: (A) Aplicar un primer algoritmo a una pluralidad de bits de mayor significación de un primer número binario para obtener un segundo número binario; (B) Operar en una pluralidad de bits de menos significado de dicho primer número binario con un segundo algoritmo para obtener un tercer número binario; y (C) Aplicar un cifrado en bloque a la concatenación de dicho segundo y tercer números binarios para obtener dicho número binario actualizado; en donde el paso (C) además comprende los pasos de: (1) Aplicar el cifrado en bloque a dicha concatenación para obtener un número binario encriptado; (2) Determinar si los bits de mayor significación de dicho número binario encriptado tienen un valor con todos-ceros; y (3) Reemplazar, en respuesta a dicho valor con todos-ceros, dichos bits de mayor significación de dicho número binario encriptado con los bits de mayor significación de dicha concatenación para obtener dicho número binario actualizado.
-
公开(公告)号:BRPI0412397A
公开(公告)日:2006-09-19
申请号:BRPI0412397
申请日:2004-07-08
Applicant: QUALCOMM INC
Inventor: ROSE GREGORY G , SEMPLE JAMES , QUICK ROY FRANKLIN
Abstract: Apparatus and method for provisioning an access key used for a controlled access broadcast service is disclosed. In one aspect, a method for secure processing in a device that securely stores a secret key comprises receiving a plurality of challenges from a network, generating a plurality of ciphering keys based on the secret key and the plurality of challenges, and generating an access key based on the plurality of ciphering keys.
-
公开(公告)号:HK1076553A1
公开(公告)日:2006-01-20
申请号:HK05108328
申请日:2005-09-22
Applicant: QUALCOMM INC
Inventor: HAWKES PHILIP , LEUNG NIKOLAI K , ROSE GREGORY G
IPC: G06F21/24 , H04L20100101 , H04L9/08 , H04L29/06
Abstract: Method and apparatus for secure transmissions. Each user is provided a registration key. A long-time updated broadcast key is encrypted using the registration key and provided periodically to a user. A short-time updatedkey is encrypted using the broadcast key. The short-time key is available with each broadcast message,wherein sufficient information to calculate the short-time key is provided in an Internet protocol headerpreceding the broadcast content. Broadcasts are then encrypted using the short-time key, wherein the user decrypts the broadcast message using the short-time key.
-
公开(公告)号:AT304781T
公开(公告)日:2005-09-15
申请号:AT97954602
申请日:1997-12-19
Applicant: QUALCOMM INC
Inventor: ROSE GREGORY G , QUICK ROY F
Abstract: An apparatus for providing authentication of a mobile station in a wireless communication system. The present invention takes the number dialed by the mobile station user and computes the 24 bit number (AUTH-DATA) for authentication in accordance with a hashing function that has the following characteristics. The hashing function takes as its input at least the entire dialed digit string contained in the request for service and the number of digits. In a preferred embodiment, the ordering of the digits affects the result, as well as, the values of the digits. The preferred embodiment of the hashing function also accepts some or all of the mobile station identifier data. The function provides as output a number of suitable size for input to a second calculation of an authentication signature, such as the 24 bits required for AUTH-DATA. The output number is created in such a way that there is a minimum likelihood that other sets of dialed digits may create the same result.
-
-
-
-
-
-
-
-
-