Procedimiento y aparato de seguridad en un sistema de procesamiento de datos

    公开(公告)号:ES2791681T3

    公开(公告)日:2020-11-05

    申请号:ES10004388

    申请日:2002-10-08

    Applicant: QUALCOMM INC

    Abstract: Un procedimiento para la recepción segura de una transmisión en un canal de radiodifusión, comprendiendo el procedimiento: recibir (752) una transmisión en el canal de radiodifusión que incluye un identificador de clave de acceso (804), un valor aleatorio (806) y un contenido cifrado; determinar (762) una clave de acceso de radiodifusión basada en el identificador de clave de acceso (804); generar (764) una clave a corto plazo basada en la clave de acceso de radiodifusión y el valor aleatorio; y descifrar (766) el contenido cifrado en la transmisión usando la clave a corto plazo.

    BOOTSTRAPPING AUTHENTICATION USING DISTINGUISHED RANDOM CHALLENGES

    公开(公告)号:MY142729A

    公开(公告)日:2010-12-31

    申请号:MYPI20054218

    申请日:2005-09-07

    Applicant: QUALCOMM INC

    Abstract: 040954 19 BOOTSTRAPPFNG AUTHENTICATION USING DISTFNGUISILED RANDOM CHALLENGES ABSTRACT A COMMUNICATIONS SYSTEM AND METHOD OF BOOTSTRAPPING MOBILE STATION AUTHEATICATION AND ESTABLISHING A SECURE ENCRYPTION KEY ARE DISCLOSED. IN ONE EMBODIMENT OF THE CARRIMUNICATIOAS NETWORK, A DISTINGUISHED RANDOM CHALLENGE IS RESERVED FOR GENERATION OF A SECURE ENCRYPTION KEY, WHEREIN THE DISTINGUISHED RANDOM CHALLCRIGE IS NOT USED FOR AUTHENTICATION OF A MOBILE STATION. THE DISTING:UI@HCD RANDOM CHALLENGE IS STORED AT A MOBILE STATION'S MOBILE EQUIPMENT AND USED TO GENERATE A SECURE ENCRYPTION KEY, AND A BOOTSTRAPPING FUNCTION IN THE NETWORK USES A NORMAL RANDOM CHALLENGE TO AUTHENTICATE THE MOBILE STATION AND THE DISTINGUISHED RANDOM CHALLENGE TO GENERATE THE SECLVE CRICRYPTIOO KEY. 0

    36.
    发明专利
    未知

    公开(公告)号:DE60331817D1

    公开(公告)日:2010-05-06

    申请号:DE60331817

    申请日:2003-02-12

    Applicant: QUALCOMM INC

    Abstract: Apparatus and method are disclosed for digital authentication and verification. In one embodiment, authentication involves storing a cryptographic key and a look up table (LUT), generating an access code using the cryptographic key; generating multiple parallel BPSK symbols based upon the access code; converting the BPSK symbols into multiple tones encoded with the access code using the LUT; and outputting the multiple tones encoded with the access code for authentication. In another embodiment, verification involves receiving multiple tones encoded with an access code; generating multiple parallel BPSK symbols from the multiple tones; converting the BPSK symbols into an encoded interleaved bit stream of the access code; de-interleaving the encoded interleaved bit stream; and recovering the access code from the encoded de-interleaved bit stream.

    37.
    发明专利
    未知

    公开(公告)号:DE60329530D1

    公开(公告)日:2009-11-12

    申请号:DE60329530

    申请日:2003-12-30

    Applicant: QUALCOMM INC

    Abstract: Embodiments describe a method and / or system (200) whereby a secret key in a cryptographic system may be replaced without revealing the secret key. One embodiment comprises creating a first private key (210) and corresponding first public key. A second private key associated with the first private key and a second public key corresponding to the second private key are also created (220). The second private key is output once (230) such that it can be re-created and the second public key is output when outputting the first public key (240). The first private key is used for authentication (260). The method further comprises re-creating the second private key; and using the second private key for authentication. Another embodiment comprises creating a private key and corresponding public key with associated system parameter (410); outputting the system parameter when outputting the public key (430); and using the private key for authentication (460). The method may further comprise creating a new private key using the previous key and the system parameter (470).

    38.
    发明专利
    未知

    公开(公告)号:AT444617T

    公开(公告)日:2009-10-15

    申请号:AT03800318

    申请日:2003-12-30

    Applicant: QUALCOMM INC

    Abstract: Embodiments describe a method and / or system (200) whereby a secret key in a cryptographic system may be replaced without revealing the secret key. One embodiment comprises creating a first private key (210) and corresponding first public key. A second private key associated with the first private key and a second public key corresponding to the second private key are also created (220). The second private key is output once (230) such that it can be re-created and the second public key is output when outputting the first public key (240). The first private key is used for authentication (260). The method further comprises re-creating the second private key; and using the second private key for authentication. Another embodiment comprises creating a private key and corresponding public key with associated system parameter (410); outputting the system parameter when outputting the public key (430); and using the private key for authentication (460). The method may further comprise creating a new private key using the previous key and the system parameter (470).

    METHOD OF AND APPARATUS FOR ENCRYPTING SIGNALS FOR TRANSMISSION

    公开(公告)号:CA2603161C

    公开(公告)日:2009-06-16

    申请号:CA2603161

    申请日:1998-03-04

    Applicant: QUALCOMM INC

    Inventor: ROSE GREGORY G

    Abstract: In a communications system, a method of transforming a set of message signals representing a message comprising the steps of first encoding one of the set of message signals in accordance with a first keyed transformation, a second encoding of the one of the set of message signals in accordance with at least one additional keyed transformation, a third encoding of the one of the set of message signals in accordance with a self-inverting transformation in which at least one of the set of message signals is altered, a fourth encoding of the one of the set of message signals in accordance with at least one additional inverse keyed transformation wherein each of the at least one additional inverse keyed transformation is a corresponding inverse of at least one additional keyed transformation, and fifth encoding the one of the set of message signals in accordance with first inverse keyed transformation wherein the first inverse keyed transformation is the inverse of the first keyed transformation.

    Method and apparatus for security in a data processing system

    公开(公告)号:AU2002342014C1

    公开(公告)日:2008-10-30

    申请号:AU2002342014

    申请日:2002-10-08

    Applicant: QUALCOMM INC

    Abstract: Method and apparatus for secure transmissions. Each user is provided a registration key. A long-time updated broadcast key is encrypted using the registration key and provided periodically to a user. A short-time updatedkey is encrypted using the broadcast key. The short-time key is available with each broadcast message,wherein sufficient information to calculate the short-time key is provided in an Internet protocol headerpreceding the broadcast content. Broadcasts are then encrypted using the short-time key, wherein the user decrypts the broadcast message using the short-time key.

Patent Agency Ranking