-
21.
公开(公告)号:ES2920454T3
公开(公告)日:2022-08-04
申请号:ES18788947
申请日:2018-09-27
Applicant: QUALCOMM INC
Inventor: ACAR CAN , TURNER ROBERT , GANTMAN ALEXANDER
Abstract: Se proporciona un método para ejecutar el código generado dinámicamente de manera segura para evitar la posibilidad de un ataque en el espacio de memoria sin protección. Al determinar que se debe ejecutar el código generado dinámicamente, un circuito de procesamiento y/o el núcleo del sistema operativo restringe el código generado dinámicamente para usar una primera región de memoria dentro de un espacio de memoria sin protección, donde la primera región de memoria es distinta (por ejemplo, reservado) de Otras regiones de memoria utilizadas por otros procesos ejecutados por el circuito de procesamiento. Se mantiene una primera pila de procesamiento para el código generado dinámicamente dentro de la primera región de memoria. Esta primera pila de procesamiento está separada de una pila de procesamiento general utilizada por otros procesos ejecutados por el circuito de procesamiento. Se cambia/apunta un puntero de pila a la primera pila de procesamiento cuando se ejecuta el código generado dinámicamente y el puntero de la pila se cambia/apunta a la pila de procesamiento general cuando finaliza el código generado dinámicamente. (Traducción automática con Google Translate, sin valor legal)
-
公开(公告)号:MXPA06000804A
公开(公告)日:2006-04-18
申请号:MXPA06000804
申请日:2004-07-21
Applicant: QUALCOMM INC
Inventor: GANTMAN ALEXANDER
IPC: G06F11/30 , G06F21/20 , G06F12/14 , G06F21/00 , G07C9/00 , G07F7/10 , G09C1/00 , H04L9/00 , H04L9/32
Abstract: Se describe un metodo y aparato para controlar el acceso a una red, sistema o aplicacion segura. En una modalidad, un aparato para solicitar autentificacion (210) incluye un medio (211) de almacenaje que almacena una clave criptografica, un procesador (215) que genera un codigo de acceso utilizando la clave criptografica, un convertidor (217) que convierte el codigo de acceso en ondas sonoras, y una unidad (219) de salida de audio que produce las ondas sonoras codificadas con el codigo de acceso para autentificacion. Un aparato para conceder autentificacion (250) incluye un medio (251) de almacenaje que almacena una clave criptografica, una unidad (257) de entrada de audio que recibe ondas sonoras codificadas con un codigo de acceso, un convertidor que recupera el codigo de acceso de las ondas sonoras, y un procesador (255) que genera un segundo codigo de acceso utilizando la clave criptografica y concede autentificacion si el codigo de acceso corresponde con el segundo codigo de acceso.
-
公开(公告)号:BR0307657A
公开(公告)日:2005-04-26
申请号:BR0307657
申请日:2003-02-12
Applicant: QUALCOMM INC
Inventor: GANTMAN ALEXANDER , ROSE GREGORY G
Abstract: Apparatus and method are disclosed for digital authentication and verification. In one embodiment, authentication involves storing a cryptographic key and a look up table (LUT), generating an access code using the cryptographic key; generating multiple parallel BPSK symbols based upon the access code; converting the BPSK symbols into multiple tones encoded with the access code using the LUT; and outputting the multiple tones encoded with the access code for authentication. In another embodiment, verification involves receiving multiple tones encoded with an access code; generating multiple parallel BPSK symbols from the multiple tones; converting the BPSK symbols into an encoded interleaved bit stream of the access code; de-interleaving the encoded interleaved bit stream; and recovering the access code from the encoded de-interleaved bit stream.
-
公开(公告)号:CA2532812A1
公开(公告)日:2005-02-10
申请号:CA2532812
申请日:2004-07-21
Applicant: QUALCOMM INC
Inventor: NOERENBERG JOHN W II , ROSE GREGORY G , JALALI AHMAD , GANTMAN ALEXANDER , STEENSTRA JACK
IPC: H04L9/32 , G06K20060101 , G07F7/10 , H04L9/28 , H04L27/18
Abstract: Apparatus and method are disclosed for digital authentication and verification. In one embodiment, authentication involves storing a cryptographic key and a look up table (LUT), generating an access code using the cryptographic key; generating multiple parallel BPSK symbols based upon the access code; converting the BPSK symbols into multiple tones encoded wit h the access code using the LUT; and outputting the multiple tones encoded wit h the access code for authentication. In another embodiment, verification involves receiving multiple tones encoded with an access code; generating multiple parallel BPSK symbols from the multiple tones; converting the BPSK symbols into an encoded interleaved bit stream of the access code; de- interleaving the encoded interleaved bit stream; and recovering the access code from the encoded de-interleaved bit stream.
-
公开(公告)号:AU2004261995A1
公开(公告)日:2005-02-10
申请号:AU2004261995
申请日:2004-07-28
Applicant: QUALCOMM INC
Inventor: GANTMAN ALEXANDER , ROSE GREGORY G
-
公开(公告)号:CA2533316A1
公开(公告)日:2005-02-03
申请号:CA2533316
申请日:2004-07-21
Applicant: QUALCOMM INC
Inventor: ROSE GREGORY G , GANTMAN ALEXANDER
IPC: G06F21/20 , H04L9/00 , G06F11/30 , G06F12/14 , G06F21/00 , G07C9/00 , G07F7/10 , G09C1/00 , H04L9/32
Abstract: Method and apparatus for controlling access to a secure network, system or application is disclosed. In one embodiment, an apparatus for requesting authentication (210) includes a storage medium (211) that stores a cryptographic key, a processor (215) that generates an access code using the cryptographic key, a converter (217) that converts the access code into soun d waves, and an audio output unit (219) that outputs the sound waves encoded with the access code for authentication. An apparatus for granting authentication (250) includes a storage medium (251) that stores a cryptographic key, an audio input unit (257) that receives sound waves encod ed with a access code, a converter that recovers the access code from the sound waves, and a processor (255) that generates a second access code using the cryptographic key and grants authentication if the access code corresponds t o the second access code.
-
公开(公告)号:CA2502545A1
公开(公告)日:2004-04-29
申请号:CA2502545
申请日:2003-10-17
Applicant: QUALCOMM INC
Inventor: GANTMAN ALEXANDER
IPC: G08B13/196 , G08B15/00
Abstract: A secure signal transmitter, such as an LED, is disposed in an intended observation scope of a secure stream capture device, such as a video camera. The secure signal transmitter continuously transmits a secure signal that an observer/processor in a remote location can verify, to thereby confirm that the video being sent from the camera actually encompasses the intended scope .
-
公开(公告)号:AU2002364095A1
公开(公告)日:2003-07-15
申请号:AU2002364095
申请日:2002-12-19
Applicant: QUALCOMM INC
Inventor: ROSE GREGORY G , QUICK ROY FRANKLIN JR , GANTMAN ALEXANDER
Abstract: An apparatus and method for authentication having a processor and at least one activator coupled to the processor is claimed. A signature generator is coupled to the processor and capable of generating a secure identifier. An emitter coupled to the signal generator capable of emitting the secure identifier. A receiver receives the emitted secure identifier and verifies that the secure identifier was appropriately transmitted. The public key corresponding to the key identifier transmitted is accessed to determine the validity of the secure identifier using the accessed key and that the time indicated in the received secure identifier is verified to be within acceptable time tolerances.
-
公开(公告)号:AT542351T
公开(公告)日:2012-02-15
申请号:AT09743607
申请日:2009-05-06
Applicant: QUALCOMM INC
Inventor: ROSE GREGORY , GANTMAN ALEXANDER , WIGGERS DE VRIES MIRIAM , PADDON MICHAEL , HAWKES PHILIP
IPC: H04L29/06
Abstract: A puzzle-based protocol is provided that allows a token and verifier to agree on a secure symmetric key for authentication between the token and verifier. A token stores a secret key and one or more puzzle-generating algorithms. The verifier independently obtains a plurality of puzzles associated with the token, pseudorandomly selects at least one of the puzzles, and solves it to obtain a puzzle secret and a puzzle identifier. The verifier generates a verifier key based on the puzzle secret. The verifier sends the puzzle identifier and an encoded version of the verifier key to the token. The token regenerates the puzzle secret using its puzzle-generating algorithms and the puzzle identifier. The token sends an encoded response to the verifier indicating that it knows the verifier key. The token and verifier may use the verifier key as a symmetric key for subsequent authentications.
-
公开(公告)号:AU2003229316C1
公开(公告)日:2009-08-27
申请号:AU2003229316
申请日:2003-05-15
Applicant: QUALCOMM INC
Inventor: GANTMAN ALEXANDER
Abstract: A hand-held sonic token can be used as a pseudorandom oracle for a requesting application, which can generate a challenge that is sent to the token. The user of the token decides whether to allow the token to function as an oracle, and if so, the user causes the token to digitally sign the challenge and send it back to the requesting application, for use of the digitally signed challenge as an encryption key. After encryption the requesting application deletes the signed challenge, with subsequent decryption essentially following the encryption process.
-
-
-
-
-
-
-
-
-