Mecanismo de seguridad para obtener una autorización para un servidor de localización descubierto

    公开(公告)号:ES2555169T3

    公开(公告)日:2015-12-29

    申请号:ES13707947

    申请日:2013-02-08

    Applicant: QUALCOMM INC

    Abstract: Un procedimiento para obtener un acceso autorizado desde un terminal a un servidor de localización descubierto, comprendiendo el procedimiento: conmutar (502, 542, 572) desde una primera red, que no soporta un acceso autenticado a un servidor de localización local el terminal, a una segunda red que soporta el acceso autenticado al servidor de localización local por el terminal; obtener (504, 544, 574) un acceso autenticado al servidor de localización local usando la segunda red; obtener (506, 546, 576) autorización para el servidor de localización descubierto a partir del servidor de localización local; conmutar (508, 548, 578) desde la segunda red de vuelta a la primera red, y acceder (510, 550, 578) al servidor de localización descubierto usando la primera red en función de la autorización obtenida del servidor de localización local.

    ENABLING SECURE ACCESS TO A DISCOVERED LOCATION SERVER FOR A MOBILE DEVICE

    公开(公告)号:IN1517MUN2014A

    公开(公告)日:2015-05-01

    申请号:IN1517MUN2014

    申请日:2014-07-28

    Applicant: QUALCOMM INC

    Abstract: A method for obtaining a secure connection between a first server and a client. The method may comprise establishing a secure communication session between a second server and the client wherein the second server is trusted by the first server and the second server is configured to authenticate the client. The client may receive a client token wherein the client token contains data associated with the first server the second server the client and a digital signature. Then the client may request secure communication access to the first server wherein the request includes transferring the client token to the first server. Finally the client may receive a grant of secure communication access to the first server based on authentication of the client by the first server wherein the authentication is based on the client token validating the client and the digital signature validating the client token.

    57.
    发明专利
    未知

    公开(公告)号:BRPI0711438A2

    公开(公告)日:2011-11-16

    申请号:BRPI0711438

    申请日:2007-05-04

    Applicant: QUALCOMM INC

    Abstract: Methods and systems for blackout provisioning in a communication network. In an aspect, a method is provided for blackout provisioning in a distribution network. The method includes determining one or more affected regions, and generating a blackout key based an original key and the affected regions. The method also includes encrypting content with the blackout key to produce encrypted content, and transmitting the encrypted content and an encrypted version of the original key over the distribution network. An apparatus is provided for blackout provisioning that includes provisioning logic to determine one or more affected regions, a key generator to generate a blackout key based an original key and the affected regions, encryption logic to encrypt content with the blackout key to produce encrypted content, and a transmitter to transmit the encrypted content and an encrypted version of the original key over the distribution network.

    59.
    发明专利
    未知

    公开(公告)号:DE60322909D1

    公开(公告)日:2008-09-25

    申请号:DE60322909

    申请日:2003-07-24

    Applicant: QUALCOMM INC

    Abstract: Methods and apparatus are presented herein for encrypting and authentication data, such that some of data can be transmitted in the clear but still be authenticated by the sender. A set of cleartext positions and/or a set of ciphertext positions are used to specify which data blocks will be used to generate an input checksum value and an output checksum value. These checksums are then used to generate an authentication tag.

    CONTEXT LIMITED SHARED SECRET
    60.
    发明专利

    公开(公告)号:CA2597763A1

    公开(公告)日:2006-08-17

    申请号:CA2597763

    申请日:2006-02-10

    Applicant: QUALCOMM INC

    Abstract: In a communication system in which two communication entities seek to have a private or confidential communication session, a trust relationship needs first be established. The trust relationship is based on the determination of a shared secret which in turn is generated from contextual information. The contextual information can be derived from the circumstances surrounding the communication session. For example, the contextual information can include topological information, time-based information, and transactional information. The shared secret may be self-generated or received from a third party. In either event, the shared secret may be used as key material for any cryptographic protocol used between the communication entities.

Patent Agency Ranking