121.
    发明专利
    未知

    公开(公告)号:DE60322909D1

    公开(公告)日:2008-09-25

    申请号:DE60322909

    申请日:2003-07-24

    Applicant: QUALCOMM INC

    Abstract: Methods and apparatus are presented herein for encrypting and authentication data, such that some of data can be transmitted in the clear but still be authenticated by the sender. A set of cleartext positions and/or a set of ciphertext positions are used to specify which data blocks will be used to generate an input checksum value and an output checksum value. These checksums are then used to generate an authentication tag.

    122.
    发明专利
    未知

    公开(公告)号:DE602004011554T2

    公开(公告)日:2008-05-21

    申请号:DE602004011554

    申请日:2004-11-01

    Applicant: QUALCOMM INC

    Abstract: Systems and methods of securing wireless communications between a network and a subscriber station include inserting a marker denoting an encryption type within a random value used for authentication, calculating a first session key and a first response value as a function of the random value, then calculating a second session key and a second response value as a function of the random value, first session key and first response value. The two levels of session keys and response values may be used by upgraded subscriber stations and network access points to prevent attackers from intercepting authentication triplets.

    123.
    发明专利
    未知

    公开(公告)号:DE69937200D1

    公开(公告)日:2007-11-08

    申请号:DE69937200

    申请日:1999-12-17

    Applicant: QUALCOMM INC

    Inventor: ROSE GREGORY G

    Abstract: A method for permitting encrypted communications between two stations which are operable with compatible encryption algorithms that accept encryption keys having work factors with respectively different values, comprising: determining a lowest one of the different work factor values: providing an initial encryption key with a given work factor value; comparing the given work factor value with the lowest one of the different work factor values; and wherein, if the given work factor value is greater than the lowest one of the different work factor values, the method further comprises: deriving from the initial encryption key a final encryption key having a work factor value not greater than the lowest one of the different work factor values; and using the final encryption key for the encrypted communications.

    124.
    发明专利
    未知

    公开(公告)号:BRPI0416233A

    公开(公告)日:2007-01-02

    申请号:BRPI0416233

    申请日:2004-11-01

    Applicant: QUALCOMM INC

    Abstract: Systems and methods of securing wireless communications between a network and a subscriber station include inserting a marker denoting an encryption type within a random value used for authentication, calculating a first session key and a first response value as a function of the random value, then calculating a second session key and a second response value as a function of the random value, first session key and first response value. The two levels of session keys and response values may be used by upgraded subscriber stations and network access points to prevent attackers from intercepting authentication triplets.

    125.
    发明专利
    未知

    公开(公告)号:AT342539T

    公开(公告)日:2006-11-15

    申请号:AT00989414

    申请日:2000-12-21

    Applicant: QUALCOMM INC

    Abstract: A method of authenticating anonymous users while reducing potential for "middleman" fraud includes the step of constructing a puzzle in response to information received from a software user. The puzzle includes the received information. The puzzle is sent to the user by a software provider. The user solves the puzzle and returns the solution to the provider. The puzzle includes a portion of a value derived from an encrypted "cookie" and an exponentiation of the derived value. The cookie includes information about the user.

    METHOD AND APPARATUS FOR AUTHENTICATION IN WIRELESS COMMUNICATIONS

    公开(公告)号:CA2544665A1

    公开(公告)日:2005-05-26

    申请号:CA2544665

    申请日:2004-11-01

    Applicant: QUALCOMM INC

    Abstract: Systems and methods of securing wireless communications between a network and a subscriber station include inserting a marker denoting an encryption type within a random value used for authentication, calculating a first session key and a first response value as a function of the random value, then calculating a second session key and a second response value as a function of the random value, first session key and first response value. The two levels of session keys and response values may be used by upgraded subscriber stations and network access points to prevent attackers from intercepting authentication triplets.

    128.
    发明专利
    未知

    公开(公告)号:BR0307657A

    公开(公告)日:2005-04-26

    申请号:BR0307657

    申请日:2003-02-12

    Applicant: QUALCOMM INC

    Abstract: Apparatus and method are disclosed for digital authentication and verification. In one embodiment, authentication involves storing a cryptographic key and a look up table (LUT), generating an access code using the cryptographic key; generating multiple parallel BPSK symbols based upon the access code; converting the BPSK symbols into multiple tones encoded with the access code using the LUT; and outputting the multiple tones encoded with the access code for authentication. In another embodiment, verification involves receiving multiple tones encoded with an access code; generating multiple parallel BPSK symbols from the multiple tones; converting the BPSK symbols into an encoded interleaved bit stream of the access code; de-interleaving the encoded interleaved bit stream; and recovering the access code from the encoded de-interleaved bit stream.

    DIGITAL AUTHENTICATION OVER ACOUSTIC CHANNEL

    公开(公告)号:CA2532812A1

    公开(公告)日:2005-02-10

    申请号:CA2532812

    申请日:2004-07-21

    Applicant: QUALCOMM INC

    Abstract: Apparatus and method are disclosed for digital authentication and verification. In one embodiment, authentication involves storing a cryptographic key and a look up table (LUT), generating an access code using the cryptographic key; generating multiple parallel BPSK symbols based upon the access code; converting the BPSK symbols into multiple tones encoded wit h the access code using the LUT; and outputting the multiple tones encoded wit h the access code for authentication. In another embodiment, verification involves receiving multiple tones encoded with an access code; generating multiple parallel BPSK symbols from the multiple tones; converting the BPSK symbols into an encoded interleaved bit stream of the access code; de- interleaving the encoded interleaved bit stream; and recovering the access code from the encoded de-interleaved bit stream.

Patent Agency Ranking