-
公开(公告)号:CA2603161A1
公开(公告)日:1998-09-17
申请号:CA2603161
申请日:1998-03-04
Applicant: QUALCOMM INC
Inventor: ROSE GREGORY G
-
公开(公告)号:ZA9802022B
公开(公告)日:1998-09-08
申请号:ZA9802022
申请日:1998-03-10
Applicant: QUALCOMM INC
Inventor: ROSE GREGORY G
CPC classification number: H04L9/06 , H04L9/0618
-
公开(公告)号:ES2791681T3
公开(公告)日:2020-11-05
申请号:ES10004388
申请日:2002-10-08
Applicant: QUALCOMM INC
Inventor: HAWKES PHILIP , LEUNG NIKOLAI K , ROSE GREGORY G
Abstract: Un procedimiento para la recepción segura de una transmisión en un canal de radiodifusión, comprendiendo el procedimiento: recibir (752) una transmisión en el canal de radiodifusión que incluye un identificador de clave de acceso (804), un valor aleatorio (806) y un contenido cifrado; determinar (762) una clave de acceso de radiodifusión basada en el identificador de clave de acceso (804); generar (764) una clave a corto plazo basada en la clave de acceso de radiodifusión y el valor aleatorio; y descifrar (766) el contenido cifrado en la transmisión usando la clave a corto plazo.
-
公开(公告)号:CA2442656C
公开(公告)日:2012-02-07
申请号:CA2442656
申请日:2002-03-28
Applicant: QUALCOMM INC
Inventor: HAWKES PHILIP , ROSE GREGORY G , HSU RAYMOND T , REZAIIFAR RAMIN
IPC: H04L9/16 , H04W12/04 , G06F21/00 , H04B7/26 , H04L9/08 , H04L9/30 , H04L12/18 , H04L12/56 , H04L29/06 , H04L29/08 , H04W4/00 , H04W12/02 , H04W28/04 , H04W28/06 , H04W28/18 , H04W52/02 , H04W72/04 , H04W80/00 , H04W92/10
Abstract: Method and apparatus for secure transmissions. Each user is provided a registration key. A long-time updated broadcast key is encrypted using the registration key and provided periodically to a user. A short-time updated key is encrypted using the broadcast key and provided periodically to a user. Broadcasts are then encrypted using the short-time key, wherein the user decrypts the broadcast message using the short-time key.
-
公开(公告)号:MY142729A
公开(公告)日:2010-12-31
申请号:MYPI20054218
申请日:2005-09-07
Applicant: QUALCOMM INC
Inventor: JAMES SEMPLE , MICHAEL PADDON , ROSE GREGORY G , PHILIP HAWKERS
Abstract: 040954 19 BOOTSTRAPPFNG AUTHENTICATION USING DISTFNGUISILED RANDOM CHALLENGES ABSTRACT A COMMUNICATIONS SYSTEM AND METHOD OF BOOTSTRAPPING MOBILE STATION AUTHEATICATION AND ESTABLISHING A SECURE ENCRYPTION KEY ARE DISCLOSED. IN ONE EMBODIMENT OF THE CARRIMUNICATIOAS NETWORK, A DISTINGUISHED RANDOM CHALLENGE IS RESERVED FOR GENERATION OF A SECURE ENCRYPTION KEY, WHEREIN THE DISTINGUISHED RANDOM CHALLCRIGE IS NOT USED FOR AUTHENTICATION OF A MOBILE STATION. THE DISTING:UI@HCD RANDOM CHALLENGE IS STORED AT A MOBILE STATION'S MOBILE EQUIPMENT AND USED TO GENERATE A SECURE ENCRYPTION KEY, AND A BOOTSTRAPPING FUNCTION IN THE NETWORK USES A NORMAL RANDOM CHALLENGE TO AUTHENTICATE THE MOBILE STATION AND THE DISTINGUISHED RANDOM CHALLENGE TO GENERATE THE SECLVE CRICRYPTIOO KEY. 0
-
公开(公告)号:DE60331817D1
公开(公告)日:2010-05-06
申请号:DE60331817
申请日:2003-02-12
Applicant: QUALCOMM INC
Inventor: GANTMAN ALEXANDER , ROSE GREGORY G
IPC: G06F21/20 , H04M3/38 , G06F1/04 , G06F1/06 , G06F1/08 , G07F7/10 , G09C1/00 , H04K1/00 , H04L9/32
Abstract: Apparatus and method are disclosed for digital authentication and verification. In one embodiment, authentication involves storing a cryptographic key and a look up table (LUT), generating an access code using the cryptographic key; generating multiple parallel BPSK symbols based upon the access code; converting the BPSK symbols into multiple tones encoded with the access code using the LUT; and outputting the multiple tones encoded with the access code for authentication. In another embodiment, verification involves receiving multiple tones encoded with an access code; generating multiple parallel BPSK symbols from the multiple tones; converting the BPSK symbols into an encoded interleaved bit stream of the access code; de-interleaving the encoded interleaved bit stream; and recovering the access code from the encoded de-interleaved bit stream.
-
公开(公告)号:DE60329530D1
公开(公告)日:2009-11-12
申请号:DE60329530
申请日:2003-12-30
Applicant: QUALCOMM INC
Inventor: ROSE GREGORY G , GANTMAN ALEXANDER , NOERENBERG JOHN W
Abstract: Embodiments describe a method and / or system (200) whereby a secret key in a cryptographic system may be replaced without revealing the secret key. One embodiment comprises creating a first private key (210) and corresponding first public key. A second private key associated with the first private key and a second public key corresponding to the second private key are also created (220). The second private key is output once (230) such that it can be re-created and the second public key is output when outputting the first public key (240). The first private key is used for authentication (260). The method further comprises re-creating the second private key; and using the second private key for authentication. Another embodiment comprises creating a private key and corresponding public key with associated system parameter (410); outputting the system parameter when outputting the public key (430); and using the private key for authentication (460). The method may further comprise creating a new private key using the previous key and the system parameter (470).
-
公开(公告)号:AT444617T
公开(公告)日:2009-10-15
申请号:AT03800318
申请日:2003-12-30
Applicant: QUALCOMM INC
Inventor: ROSE GREGORY G , GANTMAN ALEXANDER , NOERENBERG JOHN W
Abstract: Embodiments describe a method and / or system (200) whereby a secret key in a cryptographic system may be replaced without revealing the secret key. One embodiment comprises creating a first private key (210) and corresponding first public key. A second private key associated with the first private key and a second public key corresponding to the second private key are also created (220). The second private key is output once (230) such that it can be re-created and the second public key is output when outputting the first public key (240). The first private key is used for authentication (260). The method further comprises re-creating the second private key; and using the second private key for authentication. Another embodiment comprises creating a private key and corresponding public key with associated system parameter (410); outputting the system parameter when outputting the public key (430); and using the private key for authentication (460). The method may further comprise creating a new private key using the previous key and the system parameter (470).
-
公开(公告)号:CA2603161C
公开(公告)日:2009-06-16
申请号:CA2603161
申请日:1998-03-04
Applicant: QUALCOMM INC
Inventor: ROSE GREGORY G
Abstract: In a communications system, a method of transforming a set of message signals representing a message comprising the steps of first encoding one of the set of message signals in accordance with a first keyed transformation, a second encoding of the one of the set of message signals in accordance with at least one additional keyed transformation, a third encoding of the one of the set of message signals in accordance with a self-inverting transformation in which at least one of the set of message signals is altered, a fourth encoding of the one of the set of message signals in accordance with at least one additional inverse keyed transformation wherein each of the at least one additional inverse keyed transformation is a corresponding inverse of at least one additional keyed transformation, and fifth encoding the one of the set of message signals in accordance with first inverse keyed transformation wherein the first inverse keyed transformation is the inverse of the first keyed transformation.
-
公开(公告)号:AU2002342014C1
公开(公告)日:2008-10-30
申请号:AU2002342014
申请日:2002-10-08
Applicant: QUALCOMM INC
Inventor: LEUNG NIKOLAI K N , ROSE GREGORY G , HAWKES PHILIP
Abstract: Method and apparatus for secure transmissions. Each user is provided a registration key. A long-time updated broadcast key is encrypted using the registration key and provided periodically to a user. A short-time updatedkey is encrypted using the broadcast key. The short-time key is available with each broadcast message,wherein sufficient information to calculate the short-time key is provided in an Internet protocol headerpreceding the broadcast content. Broadcasts are then encrypted using the short-time key, wherein the user decrypts the broadcast message using the short-time key.
-
-
-
-
-
-
-
-
-