-
公开(公告)号:PT1854263E
公开(公告)日:2011-07-05
申请号:PT06720264
申请日:2006-02-03
Applicant: QUALCOMM INC
Inventor: ROSE GREGORY GORDON , SEMPLE JAMES , NASIELSKI JOHN WALLACE
-
公开(公告)号:DE602005011639D1
公开(公告)日:2009-01-22
申请号:DE602005011639
申请日:2005-09-06
Applicant: QUALCOMM INC
Inventor: SEMPLE JAMES , ROSE GREGORY GORDON , PADDON MICHAEL , HAWKES PHILIP MICHAEL
Abstract: A communications system and method of bootstrapping mobile station authentication and establishing a secure encryption key are disclosed. In one embodiment of the communications network, a distinguished random challenge is reserved for generation of a secure encryption key, wherein the distinguished random challenge is not used for authentication of a mobile station. The distinguished random challenge is stored at a mobile station's mobile equipment and used to generate a secure encryption key, and a bootstrapping function in the network uses a normal random challenge to authenticate the mobile station and the distinguished random challenge to generate the secure encryption key.
-
公开(公告)号:HK1104136A1
公开(公告)日:2008-01-04
申请号:HK07112483
申请日:2007-11-15
Applicant: QUALCOMM INC
Inventor: HAWKES PHILIP MICHAEL , SEMPLE JAMES , ROSE GREGORY G
IPC: H04L20060101 , H04L9/08 , H04L9/30 , H04W4/24
Abstract: Method and apparatus for secure transmissions. Each user is provided a registration key. A long-time updated broadcast key is encrypted using the registration key and provided periodically to a user. A short-time updated key is encrypted using the broadcast key and provided periodically to a user. Broadcasts are then encrypted using the short-time key, wherein the user decrypts the broadcast message using the short-time key. One embodiment provides link layer content encryption. Another embodiment provides end-to-end encryption.
-
公开(公告)号:NO20074571L
公开(公告)日:2007-11-08
申请号:NO20074571
申请日:2007-09-10
Applicant: QUALCOMM INC
Inventor: ROSE GREGORY GORDON , SEMPLE JAMES , PADDON MICHAEL , HAWKES PHILIP MICHAEL
Abstract: In a communication system in which two communication entities seek to have a private or confidential communication session, a trust relationship needs first be established. The trust relationship is based on the determination of a shared secret which in turn is generated from contextual information. The contextual information can be derived from the circumstances surrounding the communication session. For example, the contextual information can include topological information, time-based information, and transactional information. The shared secret may be self-generated or received from a third party. In either event, the shared secret may be used as key material for any cryptographic protocol used between the communication entities.
-
公开(公告)号:BRPI0414061A
公开(公告)日:2006-10-24
申请号:BRPI0414061
申请日:2004-09-02
Applicant: QUALCOMM INC
Inventor: SEMPLE JAMES , ROSE GREGORY G
Abstract: A method and apparatus for secure generation of a short-term key SK for viewing information content in a Multicast-broadcast-multimedia system are described. A short-term key is generated by a memory module residing in user equipment (UE) only when the source of the information used to generate the short-term key can be validated. A short-term key can be generated by a Broadcast Access Key (BAK) or a derivative of BAK and a changing value with a Message Authentication Code (MAC) appended to the changing value. A short-term key (SK) can also be generated by using a private key and a short-term key (SK) manager with a corresponding public key distributed to the memory module residing in the user equipment (UE), using a digital signature.
-
公开(公告)号:BRPI0412398A
公开(公告)日:2006-09-19
申请号:BRPI0412398
申请日:2004-07-08
Applicant: QUALCOMM INC
Inventor: HAWKES PHILIP MICHAEL , SEMPLE JAMES , ROSE GREGORY G
IPC: H04L9/08 , H04L9/30 , H04W4/24 , H04L9/00 , H04M15/00 , H04N7/167 , H04K1/04 , H04K1/06 , G06F11/30 , G06F12/14 , G06F9/32
Abstract: Method and apparatus for secure transmissions. Each user is provided a registration key. A long-time updated broadcast key is encrypted using the registration key and provided periodically to a user. A short-time updated key is encrypted using the broadcast key and provided periodically to a user. Broadcasts are then encrypted using the short-time key, wherein the user decrypts the broadcast message using the short-time key. One embodiment provides link layer content encryption. Another embodiment provides end-to-end encryption.
-
公开(公告)号:BRPI0412375A
公开(公告)日:2006-09-19
申请号:BRPI0412375
申请日:2004-07-01
Applicant: QUALCOMM INC
Inventor: GRILLI FRANCESCO , CASACCIA LORENZO , SEMPLE JAMES , AGASHE PARAG A
Abstract: A method and an apparatus for secure registration for a multicast-broadcast-multimedia system (MBMS) are disclosed. A random number is generated by a broadcast-multicast-service center (BM-SC) and broadcast to user equipment in the coverage area of a radio access network (RAN). A memory module or smart card (UICC) in the user equipment generates a radio access network key (RAK) which is a function of the random number and a key selected from the group consisting of a public land mobile network key (PK) and a broadcast access key (BAK), and then generates a temporary registration key (RGK) as a function of the RAK, a service identification number and a user identification number, for example, P-TMSI, which may be extracted by the RAN to authenticate the registration as legitimate.
-
公开(公告)号:AU2010212432A1
公开(公告)日:2012-03-08
申请号:AU2010212432
申请日:2010-08-19
Applicant: QUALCOMM INC
Inventor: AGASHE PARAG ARUN , CASACCIA LORENZO , GRILLI FRANCESCO , SEMPLE JAMES
Abstract: A method and an apparatus for secure registration for a multicast-broadcast-multimedia system (MBMS) are disclosed. A random number is generated by a broadcast-multicast-service center 5 (BM-SC) and broadcast to user equipment in the coverage area of a radio access network (RAN). A memory module or smart card (UICC) in the user equipment generates a radio access network key (RAK) which is a function of the random number and a key selected from the group consisting of a public land mobile network key (PK) and a broadcast access key (BAK), and then generates a temporary registration key (RGK) as a function of the RAK, a service identification number and a user 0 identification number, for example, P-TM\lSI, which may be extracted by the RAN to authenticate the registration as legitimate. C>l A - 8
-
公开(公告)号:CA2579272C
公开(公告)日:2011-06-14
申请号:CA2579272
申请日:2005-09-02
Applicant: QUALCOMM INC
Inventor: ROSE GREGORY GORDON , QUICK ROY FRANKLIN JR , NASIELSKI JOHN WALLACE , SEMPLE JAMES
Abstract: A subscriber station (110, 112) may be configured with a processing system having first and second security protocols (210, f2). The processing system uses the first security protocol (210) to generate a pseudo-secret key from a challenge received from a service provider, and uses the second security protocol (f2) to generate a response to the challenge from the pseudo-secret key.
-
公开(公告)号:BRPI0706372A2
公开(公告)日:2011-03-22
申请号:BRPI0706372
申请日:2007-01-12
Applicant: QUALCOMM INC
Inventor: ESCOTT ADRIAN , SEMPLE JAMES
Abstract: Methods and apparatus for protecting user privacy in a shared key system. According to one aspect, a user generates a derived identity based on a key and a session variable, and sends the derived identity to an application. In one embodiment, a key server may be used to receive the derived identity from the application, and return a sub-key to the application to use for encrypting communications with the user.
-
-
-
-
-
-
-
-
-