-
公开(公告)号:CA2533316A1
公开(公告)日:2005-02-03
申请号:CA2533316
申请日:2004-07-21
Applicant: QUALCOMM INC
Inventor: ROSE GREGORY G , GANTMAN ALEXANDER
IPC: G06F21/20 , H04L9/00 , G06F11/30 , G06F12/14 , G06F21/00 , G07C9/00 , G07F7/10 , G09C1/00 , H04L9/32
Abstract: Method and apparatus for controlling access to a secure network, system or application is disclosed. In one embodiment, an apparatus for requesting authentication (210) includes a storage medium (211) that stores a cryptographic key, a processor (215) that generates an access code using the cryptographic key, a converter (217) that converts the access code into soun d waves, and an audio output unit (219) that outputs the sound waves encoded with the access code for authentication. An apparatus for granting authentication (250) includes a storage medium (251) that stores a cryptographic key, an audio input unit (257) that receives sound waves encod ed with a access code, a converter that recovers the access code from the sound waves, and a processor (255) that generates a second access code using the cryptographic key and grants authentication if the access code corresponds t o the second access code.
-
公开(公告)号:AU2004300912A1
公开(公告)日:2005-01-20
申请号:AU2004300912
申请日:2004-07-08
Applicant: QUALCOMM INC
Inventor: SEMPLE JAMES , ROSE GREGORY G , HAWKES PHILIP MICHAEL
IPC: H04L9/00 , G06F9/32 , G06F11/30 , G06F12/14 , H04K1/04 , H04K1/06 , H04L9/08 , H04L9/30 , H04M15/00 , H04N7/167 , H04W4/24
Abstract: Method and apparatus for secure transmissions. Each user is provided a registration key. A long-time updated broadcast key is encrypted using the registration key and provided periodically to a user. A short-time updated key is encrypted using the broadcast key and provided periodically to a user. Broadcasts are then encrypted using the short-time key, wherein the user decrypts the broadcast message using the short-time key. One embodiment provides link layer content encryption. Another embodiment provides end-to-end encryption.
-
公开(公告)号:AU2003270024A8
公开(公告)日:2004-03-19
申请号:AU2003270024
申请日:2003-08-26
Applicant: QUALCOMM INC
Inventor: HAWKES PHILIP MICHAEL , REZAIIFAR RAMIN , BENDER PAUL E , MAHENDRAN ARUNGUNDRAM C , HSU RAYMOND T , QUICK ROY FRANKLIN JR , AGASHE PARAG A , ROSE GREGORY G , WANG JUN
IPC: H04L9/08 , G06F21/00 , H04L9/30 , H04L29/06 , H04W4/06 , H04W12/02 , H04W12/04 , H04W12/06 , G06F1/00
Abstract: Method and apparatus for secure transmissions. Each user is provided a registration key. A long-time updated broadcast key is encrypted using the registration key and provided periodically to a user. A short-time updated key is encrypted using the broadcast key and provided periodically to a user. Broadcasts are then encrypted using the short-time key, wherein the user decrypts the broadcast message using the short-time key. One embodiment provides link layer content encryption. Another embodiment provides end-to-end encryption.
-
公开(公告)号:AU2003279878A1
公开(公告)日:2004-01-19
申请号:AU2003279878
申请日:2003-06-26
Applicant: QUALCOMM INC
Inventor: HAWKES PHILIP , ROSE GREGORY G
IPC: G07B11/00 , G06F21/00 , G06K17/00 , G06Q20/32 , G06Q20/34 , G06Q30/06 , G07B15/00 , G07F7/02 , G07F7/10 , H04L9/32
Abstract: A system and method for digital tickets. An issuer provides a digital ticket to a portable wireless devices such as a sonic token, e.g., acoustic key fob or wireless telephone. The ticket can include a ticket index that may be encrypted. When entry is desired into an entity (such as a movie theater) whose access is controlled by a verifier, a user manipulates the token to wirelessly (e.g., acoustically) transmit the ticket index to the verifier, which grants access if the ticket is valid and has not previously been used or voided.
-
公开(公告)号:CA2490787A1
公开(公告)日:2004-01-08
申请号:CA2490787
申请日:2003-06-26
Applicant: QUALCOMM INC
Inventor: ROSE GREGORY G , HAWKES PHILIP
IPC: G07B11/00 , G06F21/00 , G06K17/00 , G06Q20/32 , G06Q20/34 , G06Q30/06 , G07B15/00 , G07F7/02 , G07F7/10 , H04L9/32 , H04L9/00
Abstract: A system (110) and method for securing (108) digital tickets via acoustical (114) transmissions.
-
公开(公告)号:AU2002364095A1
公开(公告)日:2003-07-15
申请号:AU2002364095
申请日:2002-12-19
Applicant: QUALCOMM INC
Inventor: ROSE GREGORY G , QUICK ROY FRANKLIN JR , GANTMAN ALEXANDER
Abstract: An apparatus and method for authentication having a processor and at least one activator coupled to the processor is claimed. A signature generator is coupled to the processor and capable of generating a secure identifier. An emitter coupled to the signal generator capable of emitting the secure identifier. A receiver receives the emitted secure identifier and verifies that the secure identifier was appropriately transmitted. The public key corresponding to the key identifier transmitted is accessed to determine the validity of the secure identifier using the accessed key and that the time indicated in the received secure identifier is verified to be within acceptable time tolerances.
-
公开(公告)号:NO20030046D0
公开(公告)日:2003-01-06
申请号:NO20030046
申请日:2003-01-06
Applicant: QUALCOMM INC
Inventor: ROSE GREGORY G , ANTONIO FRANKLIN P
Abstract: Method and apparatus for allowing persons to securely identify themselves in electronic commerce and transactions involving other parties. A token stores or determines a set of cryptographic signatures and uses a sound component to generate a unique audible tone representative of a cryptographic signature. The audible tone is conveyed to a party requesting authentication of the token holder, whereupon the party determines whether the information conveyed by the audible tone exists in a database of identities.
-
公开(公告)号:BR0016507A
公开(公告)日:2002-12-24
申请号:BR0016507
申请日:2000-12-21
Applicant: QUALCOMM INC
Inventor: ROSE GREGORY G , HAWKES PHILIP
Abstract: A method of authenticating anonymous users while reducing potential for "middleman" fraud includes the step of constructing a puzzle in response to information received from a software user. The puzzle includes the received information. The puzzle is sent to the user by a software provider. The user solves the puzzle and returns the solution to the provider. The puzzle includes a portion of a value derived from an encrypted "cookie" and an exponentiation of the derived value. The cookie includes information about the user.
-
公开(公告)号:NO20022234D0
公开(公告)日:2002-05-10
申请号:NO20022234
申请日:2002-05-10
Applicant: QUALCOMM INC
Inventor: ROSE GREGORY G
Abstract: A method and apparatus for efficiently synchronizing a stream cipher. State information is transmitted that will allow the intended recipient of the encrypted data stream to set a stream cipher generator to the correct state from which to start generating the stream cipher. A cycle number indicating the current state of a linear feedback shift register and a stutter number indicating whether an output of the linear feedback shift register is dropped are both transmitted to a remote station along with the encrypted data stream.
-
公开(公告)号:AU5748901A
公开(公告)日:2001-11-12
申请号:AU5748901
申请日:2001-05-01
Applicant: QUALCOMM INC
Inventor: HAWKES PHILIP , ROSE GREGORY G , QUICK ROY FRANKLIN
Abstract: A method for constructing keyed integer permutations over the set Z N . where N can be factored into p and q, or N can be prime. N bits are permuted by deriving a keyed permutation of representative indices. When N is factorable into p and q, the set of indices are divided into two portions. The portions undergo iterative processing called "rounds," and in each round, a first half-round function operates on the first portion to form a first half-round value; the first half-round value and the second portion are added together by a modulo-p adder to form a first output value; a second half-round function operates on the second portion to form a second half-round value; and the second half-round value and the first portion are added together by a modulo-q adder to form a second output value. In this manner, outputs of the rounds are reordered. If N is prime and not less than 13, then N is separated into composite values s and t, and two sets are formed with s and t elements, respectively. Each set is then permuted using the method for when N is not prime. At the end of each round, the two blocks are combined using a mixing operation.
-
-
-
-
-
-
-
-
-