-
公开(公告)号:BRPI0608201A2
公开(公告)日:2009-12-01
申请号:BRPI0608201
申请日:2006-02-10
Applicant: QUALCOMM INC
Inventor: PADDON MICHAEL , ROSE GREGORY GORDON , SEMPLE JAMES , HAWKES PHILIP MICHAEL
Abstract: In a communication system in which two communication entities seek to have a private or confidential communication session, a trust relationship needs first be established. The trust relationship is based on the determination of a shared secret which in turn is generated from contextual information. The contextual information can be derived from the circumstances surrounding the communication session. For example, the contextual information can include topological information, time-based information, and transactional information. The shared secret may be self-generated or received from a third party. In either event, the shared secret may be used as key material for any cryptographic protocol used between the communication entities.
-
公开(公告)号:DE602004016510D1
公开(公告)日:2008-10-23
申请号:DE602004016510
申请日:2004-07-01
Applicant: QUALCOMM INC
Inventor: GRILLI FRANCESCO , CASACCIA LORENZO , SEMPLE JAMES , AGASHE PARAG A
Abstract: A method and an apparatus for secure registration for a multicast-broadcast-multimedia system (MBMS) are disclosed. A random number is generated by a broadcast-multicast-service center (BM-SC) and broadcast to user equipment in the coverage area of a radio access network (RAN). A memory module or smart card (UICC) in the user equipment generates a radio access network key (RAK) which is a function of the random number and a key selected from the group consisting of a public land mobile network key (PK) and a broadcast access key (BAK), and then generates a temporary registration key (RGK) as a function of the RAK, a service identification number and a user identification number, for example, P-TMSI, which may be extracted by the RAN to authenticate the registration as legitimate.
-
公开(公告)号:NO20074571A
公开(公告)日:2007-11-08
申请号:NO20074571
申请日:2007-09-10
Applicant: QUALCOMM INC
Inventor: ROSE GREGORY GORDON , SEMPLE JAMES , PADDON MICHAEL , HAWKES PHILIP MICHAEL
CPC classification number: H04L9/085
-
公开(公告)号:MX2007009790A
公开(公告)日:2007-11-06
申请号:MX2007009790
申请日:2006-02-10
Applicant: QUALCOMM INC
Inventor: SEMPLE JAMES , HAWKES PHILIP MICHAEL , PADDON MICHAEL , ROSE GREGORY GORDON
Abstract: En un sistema de comunicacion en el cual dos entidades de comunicacion buscan tener una sesion de comunicacion confidencial o privada, se necesita establecer primero una relacion confiable; la relacion confiable esta basada en la determinacion de un secreto compartido el cual, a su vez, es generado a partir de informacion contextual; la informacion contextual se puede derivar de las circunstancias que rodean la sesion de comunicacion; por ejemplo, la informacion contextual puede incluir informacion topologica, informacion basada en tiempo, e informacion transaccional; el secreto compartido puede ser auto-generado o recibido de una tercera parte; en cualquier caso, el secreto compartido se puede utilizar como material clave para cualquier protocolo criptografico utilizado entre las entidades de comunicacion.
-
公开(公告)号:NO20074472A
公开(公告)日:2007-10-08
申请号:NO20074472
申请日:2007-09-03
Applicant: QUALCOMM INC
Inventor: ROSE GREGORY GORDON , SEMPLE JAMES , NASIELSKI JOHN WALLACE
CPC classification number: H04L63/0869 , H04L63/0853 , H04W12/06
-
公开(公告)号:BRPI0412397A
公开(公告)日:2006-09-19
申请号:BRPI0412397
申请日:2004-07-08
Applicant: QUALCOMM INC
Inventor: ROSE GREGORY G , SEMPLE JAMES , QUICK ROY FRANKLIN
Abstract: Apparatus and method for provisioning an access key used for a controlled access broadcast service is disclosed. In one aspect, a method for secure processing in a device that securely stores a secret key comprises receiving a plurality of challenges from a network, generating a plurality of ciphering keys based on the secret key and the plurality of challenges, and generating an access key based on the plurality of ciphering keys.
-
公开(公告)号:AU2006213650A1
公开(公告)日:2006-08-17
申请号:AU2006213650
申请日:2006-02-10
Applicant: QUALCOMM INC
Inventor: SEMPLE JAMES , HAWKES PHILIP MICHAEL , ROSE GREGORY GORDON , PADDON MICHAEL
Abstract: In a communication system in which two communication entities seek to have a private or confidential communication session, a trust relationship needs first be established. The trust relationship is based on the determination of a shared secret which in turn is generated from contextual information. The contextual information can be derived from the circumstances surrounding the communication session. For example, the contextual information can include topological information, time-based information, and transactional information. The shared secret may be self-generated or received from a third party. In either event, the shared secret may be used as key material for any cryptographic protocol used between the communication entities.
-
公开(公告)号:CA2579275A1
公开(公告)日:2006-03-16
申请号:CA2579275
申请日:2005-09-02
Applicant: QUALCOMM INC
Inventor: QUICK ROY FRANKLIN JR , SEMPLE JAMES , HAWKES PHILIP MICHAEL , ROSE GREGORY GORDON
-
公开(公告)号:CA2579272A1
公开(公告)日:2006-03-16
申请号:CA2579272
申请日:2005-09-02
Applicant: QUALCOMM INC
Inventor: NASIELSKI JOHN WALLACE , SEMPLE JAMES , QUICK ROY FRANKLIN JR , ROSE GREGORY GORDON
Abstract: A subscriber station (110, 112) may be configured with a processing system having first and second security protocols (210, f2). The processing system uses the first security protocol (210) to generate a pseudo-secret key from a challenge received from a service provider, and uses the second security protocol (f2) to generate a response to the challenge from the pseudo-secret key.
-
公开(公告)号:CA2531590A1
公开(公告)日:2005-01-27
申请号:CA2531590
申请日:2004-07-08
Applicant: QUALCOMM INC
Inventor: ROSE GREGORY G , QUICK ROY FRANKLIN , SEMPLE JAMES
Abstract: Apparatus and method for provisioning an access key used for a controlled access broadcast service is disclosed. In one aspect, a method for secure processing in a device (figure 4, unit 430) that securely stores a secret ke y (figure 4, Kc) comprises receiving a plurality of challenges from a network, generating a plurality of ciphering keys based on the secret key and the plurality of challenges, and generating an access key based on the plurality of ciphering keys.
-
-
-
-
-
-
-
-
-