-
公开(公告)号:CA2991786A1
公开(公告)日:2017-03-02
申请号:CA2991786
申请日:2016-07-29
Applicant: QUALCOMM INC
Inventor: GRANZOW WOLFGANG , BLANZ JOSEF JOHANNES , UCHIDA NOBUYUKI , HAWKES PHILIP MICHAEL
Abstract: Techniques are described for providing and using customized resource types for machine-to-machine (M2M) communication. Through the use of customized resource types, machine type communication (MTC) devices may be provided with flexibility to receive and process request messages without prior knowledge of a resource type associated with the request messages. A receiving MTC device or infrastructure node, may receive a request to create a resource from a requesting MTC device via wireless or wired communications technologies. The resource type of the request may be a customized resource type, and the request to create the resource may include a resource reference and a content parameter. The resource reference may include, for example, a Uniform Resource Indicator or a Uniform Resource Locator that may be used by the receiving MTC device to retrieve the data associated with the resource. The receiving MTC device may generate the resource using the retrieved data.
-
公开(公告)号:CA2591933C
公开(公告)日:2014-01-21
申请号:CA2591933
申请日:2005-12-21
Applicant: QUALCOMM INC
Inventor: PADDON MICHAEL , HAWKES PHILIP MICHAEL , ROSE GREGORY GORDON
IPC: H04L29/06
Abstract: Embodiments describe techniques in connection with configuring a firewall and/or reducing network traffic. According to an embodiment is a method for configuring a firewall to reduce unwanted network traffic. The method includes executing a web-server and detecting a passive socket has been created. The method also includes establishing contact with a firewall and requesting the firewall to permit flows directed to the passive socket. According to some embodiments, the method can include closing the web-server and destroying the passive socket. The firewall can be contacted with the destroyed passive socket information and can be sent a request to deny flows directed to the destroyed passive socket. If the passive socket is closed, the method can automatically revoke the request to the firewall to permit flows directed to the passive socket.
-
公开(公告)号:DE602005011639D1
公开(公告)日:2009-01-22
申请号:DE602005011639
申请日:2005-09-06
Applicant: QUALCOMM INC
Inventor: SEMPLE JAMES , ROSE GREGORY GORDON , PADDON MICHAEL , HAWKES PHILIP MICHAEL
Abstract: A communications system and method of bootstrapping mobile station authentication and establishing a secure encryption key are disclosed. In one embodiment of the communications network, a distinguished random challenge is reserved for generation of a secure encryption key, wherein the distinguished random challenge is not used for authentication of a mobile station. The distinguished random challenge is stored at a mobile station's mobile equipment and used to generate a secure encryption key, and a bootstrapping function in the network uses a normal random challenge to authenticate the mobile station and the distinguished random challenge to generate the secure encryption key.
-
公开(公告)号:AT405050T
公开(公告)日:2008-08-15
申请号:AT03809499
申请日:2003-07-24
Applicant: QUALCOMM INC
Inventor: HAWKES PHILIP MICHAEL , ROSE GREGORY G
Abstract: Methods and apparatus are presented herein for encrypting and authentication data, such that some of data can be transmitted in the clear but still be authenticated by the sender. A set of cleartext positions and/or a set of ciphertext positions are used to specify which data blocks will be used to generate an input checksum value and an output checksum value. These checksums are then used to generate an authentication tag.
-
公开(公告)号:AU2003296887B2
公开(公告)日:2008-04-17
申请号:AU2003296887
申请日:2003-07-24
Applicant: QUALCOMM INC
Inventor: HAWKES PHILIP MICHAEL , ROSE GREGORY G
Abstract: Methods and apparatus are presented for encrypting and authenticating data, wherein some data is encrypted and some data is not encrypted, but all of the data is authenticated. Different formulations for authentication blocks are used according to whether a block of data occupies a cleartext position or ciphertext position. The authentication blocks are then combined to form a checksum, which is encrypted to form an authentication tag.
-
公开(公告)号:CA2649864A1
公开(公告)日:2008-02-14
申请号:CA2649864
申请日:2007-05-04
Applicant: QUALCOMM INC
Inventor: HAWKES PHILIP MICHAEL , AGGARWAL POOJA , WINGERT CHRISTOPHER R
Abstract: Methods and systems for blackout provisioning in a communication network. In an aspect, a method is provided for blackout provisioning in a distribut ion network. The method includes determining one or more affected regions, a nd generating a blackout key based an original key and the affected regions. The method also includes encrypting content with the blackout key to produc e encrypted content, and transmitting the encrypted content and an encrypted version of the original key over the distribution network. An apparatus is provided for blackout provisioning that includes provisioning logic to deter mine one or more affected regions, a key generator to generate a blackout ke y based an original key and the affected regions, encryption logic to encryp t content with the blackout key to produce encrypted content, and a transmit ter to transmit the encrypted content and an encrypted version of the origin al key over the distribution network.
-
公开(公告)号:HK1104136A1
公开(公告)日:2008-01-04
申请号:HK07112483
申请日:2007-11-15
Applicant: QUALCOMM INC
Inventor: HAWKES PHILIP MICHAEL , SEMPLE JAMES , ROSE GREGORY G
IPC: H04L20060101 , H04L9/08 , H04L9/30 , H04W4/24
Abstract: Method and apparatus for secure transmissions. Each user is provided a registration key. A long-time updated broadcast key is encrypted using the registration key and provided periodically to a user. A short-time updated key is encrypted using the broadcast key and provided periodically to a user. Broadcasts are then encrypted using the short-time key, wherein the user decrypts the broadcast message using the short-time key. One embodiment provides link layer content encryption. Another embodiment provides end-to-end encryption.
-
公开(公告)号:NO20074571L
公开(公告)日:2007-11-08
申请号:NO20074571
申请日:2007-09-10
Applicant: QUALCOMM INC
Inventor: ROSE GREGORY GORDON , SEMPLE JAMES , PADDON MICHAEL , HAWKES PHILIP MICHAEL
Abstract: In a communication system in which two communication entities seek to have a private or confidential communication session, a trust relationship needs first be established. The trust relationship is based on the determination of a shared secret which in turn is generated from contextual information. The contextual information can be derived from the circumstances surrounding the communication session. For example, the contextual information can include topological information, time-based information, and transactional information. The shared secret may be self-generated or received from a third party. In either event, the shared secret may be used as key material for any cryptographic protocol used between the communication entities.
-
公开(公告)号:BR0312866A
公开(公告)日:2007-07-10
申请号:BR0312866
申请日:2003-07-24
Applicant: QUALCOMM INC
Inventor: HAWKES PHILIP MICHAEL , ROSE GREGORY G
Abstract: Methods and apparatus are presented for encrypting and authenticating data, wherein some data is encrypted and some data is not encrypted, but all of the data is authenticated. Different formulations for authentication blocks are used according to whether a block of data occupies a cleartext position or ciphertext position. The authentication blocks are then combined to form a checksum, which is encrypted to form an authentication tag.
-
公开(公告)号:BRPI0412398A
公开(公告)日:2006-09-19
申请号:BRPI0412398
申请日:2004-07-08
Applicant: QUALCOMM INC
Inventor: HAWKES PHILIP MICHAEL , SEMPLE JAMES , ROSE GREGORY G
IPC: H04L9/08 , H04L9/30 , H04W4/24 , H04L9/00 , H04M15/00 , H04N7/167 , H04K1/04 , H04K1/06 , G06F11/30 , G06F12/14 , G06F9/32
Abstract: Method and apparatus for secure transmissions. Each user is provided a registration key. A long-time updated broadcast key is encrypted using the registration key and provided periodically to a user. A short-time updated key is encrypted using the broadcast key and provided periodically to a user. Broadcasts are then encrypted using the short-time key, wherein the user decrypts the broadcast message using the short-time key. One embodiment provides link layer content encryption. Another embodiment provides end-to-end encryption.
-
-
-
-
-
-
-
-
-