CUSTOMIZED RESOURCE TYPES FOR MACHINE-TO-MACHINE COMMUNICATION

    公开(公告)号:CA2991786A1

    公开(公告)日:2017-03-02

    申请号:CA2991786

    申请日:2016-07-29

    Applicant: QUALCOMM INC

    Abstract: Techniques are described for providing and using customized resource types for machine-to-machine (M2M) communication. Through the use of customized resource types, machine type communication (MTC) devices may be provided with flexibility to receive and process request messages without prior knowledge of a resource type associated with the request messages. A receiving MTC device or infrastructure node, may receive a request to create a resource from a requesting MTC device via wireless or wired communications technologies. The resource type of the request may be a customized resource type, and the request to create the resource may include a resource reference and a content parameter. The resource reference may include, for example, a Uniform Resource Indicator or a Uniform Resource Locator that may be used by the receiving MTC device to retrieve the data associated with the resource. The receiving MTC device may generate the resource using the retrieved data.

    CLIENT ASSISTED FIREWALL CONFIGURATION

    公开(公告)号:CA2591933C

    公开(公告)日:2014-01-21

    申请号:CA2591933

    申请日:2005-12-21

    Applicant: QUALCOMM INC

    Abstract: Embodiments describe techniques in connection with configuring a firewall and/or reducing network traffic. According to an embodiment is a method for configuring a firewall to reduce unwanted network traffic. The method includes executing a web-server and detecting a passive socket has been created. The method also includes establishing contact with a firewall and requesting the firewall to permit flows directed to the passive socket. According to some embodiments, the method can include closing the web-server and destroying the passive socket. The firewall can be contacted with the destroyed passive socket information and can be sent a request to deny flows directed to the destroyed passive socket. If the passive socket is closed, the method can automatically revoke the request to the firewall to permit flows directed to the passive socket.

    43.
    发明专利
    未知

    公开(公告)号:DE602005011639D1

    公开(公告)日:2009-01-22

    申请号:DE602005011639

    申请日:2005-09-06

    Applicant: QUALCOMM INC

    Abstract: A communications system and method of bootstrapping mobile station authentication and establishing a secure encryption key are disclosed. In one embodiment of the communications network, a distinguished random challenge is reserved for generation of a secure encryption key, wherein the distinguished random challenge is not used for authentication of a mobile station. The distinguished random challenge is stored at a mobile station's mobile equipment and used to generate a secure encryption key, and a bootstrapping function in the network uses a normal random challenge to authenticate the mobile station and the distinguished random challenge to generate the secure encryption key.

    44.
    发明专利
    未知

    公开(公告)号:AT405050T

    公开(公告)日:2008-08-15

    申请号:AT03809499

    申请日:2003-07-24

    Applicant: QUALCOMM INC

    Abstract: Methods and apparatus are presented herein for encrypting and authentication data, such that some of data can be transmitted in the clear but still be authenticated by the sender. A set of cleartext positions and/or a set of ciphertext positions are used to specify which data blocks will be used to generate an input checksum value and an output checksum value. These checksums are then used to generate an authentication tag.

    Efficient encryption and authentication for data processing systems

    公开(公告)号:AU2003296887B2

    公开(公告)日:2008-04-17

    申请号:AU2003296887

    申请日:2003-07-24

    Applicant: QUALCOMM INC

    Abstract: Methods and apparatus are presented for encrypting and authenticating data, wherein some data is encrypted and some data is not encrypted, but all of the data is authenticated. Different formulations for authentication blocks are used according to whether a block of data occupies a cleartext position or ciphertext position. The authentication blocks are then combined to form a checksum, which is encrypted to form an authentication tag.

    METHODS AND SYSTEMS FOR BLACKOUT PROVISIONING IN A DISTRIBUTION NETWORK

    公开(公告)号:CA2649864A1

    公开(公告)日:2008-02-14

    申请号:CA2649864

    申请日:2007-05-04

    Applicant: QUALCOMM INC

    Abstract: Methods and systems for blackout provisioning in a communication network. In an aspect, a method is provided for blackout provisioning in a distribut ion network. The method includes determining one or more affected regions, a nd generating a blackout key based an original key and the affected regions. The method also includes encrypting content with the blackout key to produc e encrypted content, and transmitting the encrypted content and an encrypted version of the original key over the distribution network. An apparatus is provided for blackout provisioning that includes provisioning logic to deter mine one or more affected regions, a key generator to generate a blackout ke y based an original key and the affected regions, encryption logic to encryp t content with the blackout key to produce encrypted content, and a transmit ter to transmit the encrypted content and an encrypted version of the origin al key over the distribution network.

    METHOD AND APPARATUS FOR SECURITY IN A DATA PROCESSING SYSTEM

    公开(公告)号:HK1104136A1

    公开(公告)日:2008-01-04

    申请号:HK07112483

    申请日:2007-11-15

    Applicant: QUALCOMM INC

    Abstract: Method and apparatus for secure transmissions. Each user is provided a registration key. A long-time updated broadcast key is encrypted using the registration key and provided periodically to a user. A short-time updated key is encrypted using the broadcast key and provided periodically to a user. Broadcasts are then encrypted using the short-time key, wherein the user decrypts the broadcast message using the short-time key. One embodiment provides link layer content encryption. Another embodiment provides end-to-end encryption.

    48.
    发明专利
    未知

    公开(公告)号:NO20074571L

    公开(公告)日:2007-11-08

    申请号:NO20074571

    申请日:2007-09-10

    Applicant: QUALCOMM INC

    Abstract: In a communication system in which two communication entities seek to have a private or confidential communication session, a trust relationship needs first be established. The trust relationship is based on the determination of a shared secret which in turn is generated from contextual information. The contextual information can be derived from the circumstances surrounding the communication session. For example, the contextual information can include topological information, time-based information, and transactional information. The shared secret may be self-generated or received from a third party. In either event, the shared secret may be used as key material for any cryptographic protocol used between the communication entities.

    49.
    发明专利
    未知

    公开(公告)号:BR0312866A

    公开(公告)日:2007-07-10

    申请号:BR0312866

    申请日:2003-07-24

    Applicant: QUALCOMM INC

    Abstract: Methods and apparatus are presented for encrypting and authenticating data, wherein some data is encrypted and some data is not encrypted, but all of the data is authenticated. Different formulations for authentication blocks are used according to whether a block of data occupies a cleartext position or ciphertext position. The authentication blocks are then combined to form a checksum, which is encrypted to form an authentication tag.

    50.
    发明专利
    未知

    公开(公告)号:BRPI0412398A

    公开(公告)日:2006-09-19

    申请号:BRPI0412398

    申请日:2004-07-08

    Applicant: QUALCOMM INC

    Abstract: Method and apparatus for secure transmissions. Each user is provided a registration key. A long-time updated broadcast key is encrypted using the registration key and provided periodically to a user. A short-time updated key is encrypted using the broadcast key and provided periodically to a user. Broadcasts are then encrypted using the short-time key, wherein the user decrypts the broadcast message using the short-time key. One embodiment provides link layer content encryption. Another embodiment provides end-to-end encryption.

Patent Agency Ranking