-
公开(公告)号:DE60322909D1
公开(公告)日:2008-09-25
申请号:DE60322909
申请日:2003-07-24
Applicant: QUALCOMM INC
Inventor: HAWKES PHILIP MICHAEL , ROSE GREGORY G
Abstract: Methods and apparatus are presented herein for encrypting and authentication data, such that some of data can be transmitted in the clear but still be authenticated by the sender. A set of cleartext positions and/or a set of ciphertext positions are used to specify which data blocks will be used to generate an input checksum value and an output checksum value. These checksums are then used to generate an authentication tag.
-
公开(公告)号:DE602004011554T2
公开(公告)日:2008-05-21
申请号:DE602004011554
申请日:2004-11-01
Applicant: QUALCOMM INC
Inventor: ROSE GREGORY G , PADDON MICHAEL , HAWKES PHILIP M , SEMPLE JAMES F
Abstract: Systems and methods of securing wireless communications between a network and a subscriber station include inserting a marker denoting an encryption type within a random value used for authentication, calculating a first session key and a first response value as a function of the random value, then calculating a second session key and a second response value as a function of the random value, first session key and first response value. The two levels of session keys and response values may be used by upgraded subscriber stations and network access points to prevent attackers from intercepting authentication triplets.
-
公开(公告)号:DE69937200D1
公开(公告)日:2007-11-08
申请号:DE69937200
申请日:1999-12-17
Applicant: QUALCOMM INC
Inventor: ROSE GREGORY G
Abstract: A method for permitting encrypted communications between two stations which are operable with compatible encryption algorithms that accept encryption keys having work factors with respectively different values, comprising: determining a lowest one of the different work factor values: providing an initial encryption key with a given work factor value; comparing the given work factor value with the lowest one of the different work factor values; and wherein, if the given work factor value is greater than the lowest one of the different work factor values, the method further comprises: deriving from the initial encryption key a final encryption key having a work factor value not greater than the lowest one of the different work factor values; and using the final encryption key for the encrypted communications.
-
公开(公告)号:BRPI0416233A
公开(公告)日:2007-01-02
申请号:BRPI0416233
申请日:2004-11-01
Applicant: QUALCOMM INC
Inventor: ROSE GREGORY G , PADDON MICHAEL , HAWKES PHILIP M , SEMPLE JAMES F
Abstract: Systems and methods of securing wireless communications between a network and a subscriber station include inserting a marker denoting an encryption type within a random value used for authentication, calculating a first session key and a first response value as a function of the random value, then calculating a second session key and a second response value as a function of the random value, first session key and first response value. The two levels of session keys and response values may be used by upgraded subscriber stations and network access points to prevent attackers from intercepting authentication triplets.
-
公开(公告)号:AT342539T
公开(公告)日:2006-11-15
申请号:AT00989414
申请日:2000-12-21
Applicant: QUALCOMM INC
Inventor: ROSE GREGORY G , HAWKES PHILIP
Abstract: A method of authenticating anonymous users while reducing potential for "middleman" fraud includes the step of constructing a puzzle in response to information received from a software user. The puzzle includes the received information. The puzzle is sent to the user by a software provider. The user solves the puzzle and returns the solution to the provider. The puzzle includes a portion of a value derived from an encrypted "cookie" and an exponentiation of the derived value. The cookie includes information about the user.
-
公开(公告)号:BR0313783A
公开(公告)日:2005-10-18
申请号:BR0313783
申请日:2003-08-26
Applicant: QUALCOMM INC
Inventor: HAWKES PHILIP MICHAEL , HSU RAYMOND T , REZAIIFAR RAMIN , ROSE GREGORY G , BENDER PAUL E , WANG JUN , QUICK ROY FRANKLIN JR , MAHENDRAN ARUNGUNDRAM C , AGASHE PARAG A
IPC: H04L9/08 , G06F21/00 , H04L9/30 , H04L29/06 , H04W4/06 , H04W12/02 , H04W12/04 , H04W12/06 , G06F1/00
Abstract: Method and apparatus for secure transmissions. Each user is provided a registration key. A long-time updated broadcast key is encrypted using the registration key and provided periodically to a user. A short-time updated key is encrypted using the broadcast key and provided periodically to a user. Broadcasts are then encrypted using the short-time key, wherein the user decrypts the broadcast message using the short-time key. One embodiment provides link layer content encryption. Another embodiment provides end-to-end encryption.
-
公开(公告)号:CA2544665A1
公开(公告)日:2005-05-26
申请号:CA2544665
申请日:2004-11-01
Applicant: QUALCOMM INC
Inventor: ROSE GREGORY G , PADDON MICHAEL , SEMPLE JAMES F , HAWKES PHILIP M
Abstract: Systems and methods of securing wireless communications between a network and a subscriber station include inserting a marker denoting an encryption type within a random value used for authentication, calculating a first session key and a first response value as a function of the random value, then calculating a second session key and a second response value as a function of the random value, first session key and first response value. The two levels of session keys and response values may be used by upgraded subscriber stations and network access points to prevent attackers from intercepting authentication triplets.
-
公开(公告)号:BR0307657A
公开(公告)日:2005-04-26
申请号:BR0307657
申请日:2003-02-12
Applicant: QUALCOMM INC
Inventor: GANTMAN ALEXANDER , ROSE GREGORY G
Abstract: Apparatus and method are disclosed for digital authentication and verification. In one embodiment, authentication involves storing a cryptographic key and a look up table (LUT), generating an access code using the cryptographic key; generating multiple parallel BPSK symbols based upon the access code; converting the BPSK symbols into multiple tones encoded with the access code using the LUT; and outputting the multiple tones encoded with the access code for authentication. In another embodiment, verification involves receiving multiple tones encoded with an access code; generating multiple parallel BPSK symbols from the multiple tones; converting the BPSK symbols into an encoded interleaved bit stream of the access code; de-interleaving the encoded interleaved bit stream; and recovering the access code from the encoded de-interleaved bit stream.
-
公开(公告)号:CA2532812A1
公开(公告)日:2005-02-10
申请号:CA2532812
申请日:2004-07-21
Applicant: QUALCOMM INC
Inventor: NOERENBERG JOHN W II , ROSE GREGORY G , JALALI AHMAD , GANTMAN ALEXANDER , STEENSTRA JACK
IPC: H04L9/32 , G06K20060101 , G07F7/10 , H04L9/28 , H04L27/18
Abstract: Apparatus and method are disclosed for digital authentication and verification. In one embodiment, authentication involves storing a cryptographic key and a look up table (LUT), generating an access code using the cryptographic key; generating multiple parallel BPSK symbols based upon the access code; converting the BPSK symbols into multiple tones encoded wit h the access code using the LUT; and outputting the multiple tones encoded wit h the access code for authentication. In another embodiment, verification involves receiving multiple tones encoded with an access code; generating multiple parallel BPSK symbols from the multiple tones; converting the BPSK symbols into an encoded interleaved bit stream of the access code; de- interleaving the encoded interleaved bit stream; and recovering the access code from the encoded de-interleaved bit stream.
-
公开(公告)号:AU2004261995A1
公开(公告)日:2005-02-10
申请号:AU2004261995
申请日:2004-07-28
Applicant: QUALCOMM INC
Inventor: GANTMAN ALEXANDER , ROSE GREGORY G
-
-
-
-
-
-
-
-
-