-
公开(公告)号:HUE035780T2
公开(公告)日:2018-05-28
申请号:HUE14183535
申请日:2012-09-12
Applicant: QUALCOMM INC
Inventor: CHERIAN GEORGE , HAWKES PHILIP MICHAEL , ABRAHAM SANTOSH PAUL , SAMPATH HEMANTH
-
公开(公告)号:CA2913620C
公开(公告)日:2017-11-07
申请号:CA2913620
申请日:2014-07-15
Applicant: QUALCOMM INC
Inventor: HAWKES PHILIP MICHAEL , CHERIAN GEORGE
Abstract: A method of operation of a mobile device to reduce link setup time includes initiating a link setup procedure with a first access point. The link setup procedure includes receiving dynamic host configuration protocol (DHCP) information via the first access point. The method further includes communicating with the first access point using the DHCP information and initiating communication with a second access point after communicating with the first access point. The method further includes receiving an indication from the second access point identifying whether the mobile device is able to communicate with the second access point using the DHCP information. A value of the indication identifies whether the mobile device is able to reduce link setup time with the second access point by avoiding DHCP reconfiguration with the second access point.
-
公开(公告)号:HUE031473T2
公开(公告)日:2017-07-28
申请号:HUE12766259
申请日:2012-09-12
Applicant: QUALCOMM INC
Inventor: HAWKES PHILIP MICHAEL , CHERIAN GEORGE
-
公开(公告)号:CA2846239A1
公开(公告)日:2013-03-21
申请号:CA2846239
申请日:2012-09-12
Applicant: QUALCOMM INC
Inventor: CHERIAN GEORGE , HAWKES PHILIP MICHAEL , MALINEN JOUNI , ABRAHAM SANTOSH PAUL , PALANIGOUNDER ANAND , WENTINK MAARTEN MENZO
IPC: H04W12/06
Abstract: A method includes generating at least one of a re-authorization request or a re-authentication with an extensible authentication protocol. The method also includes generating an upper layer message. The method further includes bundling the upper layer message and the least one of the re-authorization request or the re-authentication request as an association request. The method further includes transmitting the association request to an access point.
-
公开(公告)号:BRPI0707379A2
公开(公告)日:2011-05-03
申请号:BRPI0707379
申请日:2007-02-02
Applicant: QUALCOMM INC
Inventor: LO CHARLES N , WANG JUN , DONDETI LAKJSHMINATH REDDY , HAWKES PHILIP MICHAEL
Abstract: Disclosed is a method for securely presenting content in a mobile station. The mobile station may have a smart module, a security agent, and an air interface for communicating with a content provider and with a remote content rights manager. The smart module stores content presentation units and has a proxy content rights manager for when the mobile station is unable to receive secure content keys from the remote content rights manager using the air interface. In the method, content presentation units are transferred from the remote rights manager to the smart module for storage. Secure content keys are requested from the smart module for allowing presentation of content requested while the mobile station is unable to communicate with the remote rights manager. The secure content keys are transferred, based on a stored content presentation unit, from the proxy content rights manager to the security agent for allowing content presentation.
-
公开(公告)号:AU2004300912B2
公开(公告)日:2010-07-22
申请号:AU2004300912
申请日:2004-07-08
Applicant: QUALCOMM INC
Inventor: SEMPLE JAMES , ROSE GREGORY G , HAWKES PHILIP MICHAEL
Abstract: Method and apparatus for secure transmissions. Each user is provided a registration key. A long-time updated broadcast key is encrypted using the registration key and provided periodically to a user. A short-time updated key is encrypted using the broadcast key and provided periodically to a user. Broadcasts are then encrypted using the short-time key, wherein the user decrypts the broadcast message using the short-time key. One embodiment provides link layer content encryption. Another embodiment provides end-to-end encryption.
-
公开(公告)号:BRPI0519544A2
公开(公告)日:2009-02-17
申请号:BRPI0519544
申请日:2005-12-21
Applicant: QUALCOMM INC
Inventor: PADDON MICHAEL , HAWKES PHILIP MICHAEL , ROSE GREGORY GORDON
IPC: H04L29/06
Abstract: Embodiments describe techniques in connection with configuring a firewall and/or reducing network traffic. According to an embodiment is a method for configuring a firewall to reduce unwanted network traffic. The method includes executing a web-server and detecting a passive socket has been created. The method also includes establishing contact with a firewall and requesting the firewall to permit flows directed to the passive socket. According to some embodiments, the method can include closing the web-server and destroying the passive socket. The firewall can be contacted with the destroyed passive socket information and can be sent a request to deny flows directed to the destroyed passive socket. If the passive socket is closed, the method can automatically revoke the request to the firewall to permit flows directed to the passive socket.
-
公开(公告)号:CA2598811A1
公开(公告)日:2006-08-31
申请号:CA2598811
申请日:2006-02-24
Applicant: QUALCOMM INC
IPC: H04L9/32
Abstract: Embodiments disclosed allow authentication between two entities having agreed on the use of a common modulus N. The authentication includes generating a pseudorandom string value; generating a public key value based on the modulus N and the pseudorandom string value; generating a private key value corresponding to the public key value; receiving a verifier's public key value; generating a shared secret value based on the modulus N, the private key value and the verifier's public key value; calculating an authentication signature value using the shared secret value; and transmitting the authentication signature value for authentication. When the authentication signature is received, the public key value and the shared value are generated to calculate an authentication signature value. Thereafter, the authentication signature values are compared and authenticated.
-
公开(公告)号:AU2006216517A1
公开(公告)日:2006-08-31
申请号:AU2006216517
申请日:2006-02-24
Applicant: QUALCOMM INC
IPC: H04L9/32
Abstract: Embodiments disclosed allow authentication between two entities having agreed on the use of a common modulus N. The authentication includes generating a pseudorandom string value; generating a public key value based on the modulus N and the pseudorandom string value; generating a private key value corresponding to the public key value; receiving a verifier's public key value; generating a shared secret value based on the modulus N, the private key value and the verifier's public key value; calculating an authentication signature value using the shared secret value; and transmitting the authentication signature value for authentication. When the authentication signature is received, the public key value and the shared value are generated to calculate an authentication signature value. Thereafter, the authentication signature values are compared and authenticated.
-
公开(公告)号:MXPA06000150A
公开(公告)日:2006-03-21
申请号:MXPA06000150
申请日:2004-07-08
Applicant: QUALCOMM INC
Inventor: HAWKES PHILIP MICHAEL
IPC: G06F11/30 , G06F9/32 , G06F12/14 , H04K1/04 , H04K1/06 , H04L9/00 , H04L9/08 , H04L9/30 , H04M15/00 , H04N7/167 , H04W4/24
Abstract: Metodo y aparato para transmisiones seguras. Se abastece a cada usuario con una clave de registro. Se encripta una clave de transmision actualizada por un periodo de tiempo largo, utilizando la clave de registro y se proporciona al usuario en forma periodica. Se encripta una clave actualizada por un periodo de tiempo corto, utilizando la clave de transmision y se proporciona al usuario en forma periodica. Posteriormente se encriptan las transmisiones utilizando la clave del periodo de tiempo corto, en donde el usuario des-encripta el mensaje de transmision utilizando la clave del periodo de tiempo corto. Una modalidad proporciona la encriptacion del contenido de la capa de enlace. Otra modalidad proporciona encriptacion extremo a extremo.
-
-
-
-
-
-
-
-
-