-
公开(公告)号:CA2496677A1
公开(公告)日:2004-03-11
申请号:CA2496677
申请日:2003-08-26
Applicant: QUALCOMM INC
Inventor: BENDER PAUL E , WANG JUN , MAHENDRAN ARUNGUNDRAM C , QUICK ROY FRANKLIN JR , HAWKES PHILIP MICHAEL , HSU RAYMOND T , REZAIIFAR RAMIN , AGASHE PARAG A , ROSE GREGORY G
IPC: H04L9/08 , G06F21/00 , H04L9/30 , H04L29/06 , H04W4/06 , H04W12/02 , H04W12/04 , H04W12/06 , H04L9/00 , H04L9/32
Abstract: Method and apparatus for secure transmissions. Each user is provided a registration key. A long-time updated broadcast key is encrypted using the registration key and provided periodically to a user. A short-time updated k ey is encrypted using the broadcast key and provided periodically to a user. Broadcasts are then encrypted using the short-time key, wherein the user decrypts the broadcast message using the short-time key. One embodiment provides link layer content encryption. Another embodiment provides end-to-e nd encryption.
-
公开(公告)号:MY169634A
公开(公告)日:2019-04-24
申请号:MYPI2014000438
申请日:2012-09-12
Applicant: QUALCOMM INC
Inventor: CHERIAN GEORGE , HAWKES PHILIP MICHAEL , MALINEN JOUNI , ABRAHAM SANTOSH PAUL , PALANIGOUNDER ANAND , WENTIK MAARTEN MENZO
Abstract: A method includes generating at least one of a re-authorization request or a re- authentication with an extensible authentication protocol. The method also includes generating an upper layer message. The method further includes bundling the upper layer message and the least one of the re-authorization request or the re-authentication request as an association request. The method further includes transmitting the association request to an access point (102, 304, 304A, 304B). Figure 4
-
公开(公告)号:CA2846239C
公开(公告)日:2018-02-13
申请号:CA2846239
申请日:2012-09-12
Applicant: QUALCOMM INC
Inventor: CHERIAN GEORGE , HAWKES PHILIP MICHAEL , MALINEN JOUNI , ABRAHAM SANTOSH PAUL , PALANIGOUNDER ANAND , WENTINK MAARTEN MENZO
IPC: H04W12/06
Abstract: A method includes generating at least one of a re-authorization request or a re-authentication with an extensible authentication protocol. The method also includes generating an upper layer message. The method further includes bundling the upper layer message and the least one of the re-authorization request or the re-authentication request as an association request. The method further includes transmitting the association request to an access point.
-
54.
公开(公告)号:ES2555169T3
公开(公告)日:2015-12-29
申请号:ES13707947
申请日:2013-02-08
Applicant: QUALCOMM INC
Inventor: HAWKES PHILIP MICHAEL , WACHTER ANDREAS KLAUS , BURROUGHS KIRK ALLAN , EDGE STEPHEN WILLIAM
Abstract: Un procedimiento para obtener un acceso autorizado desde un terminal a un servidor de localización descubierto, comprendiendo el procedimiento: conmutar (502, 542, 572) desde una primera red, que no soporta un acceso autenticado a un servidor de localización local el terminal, a una segunda red que soporta el acceso autenticado al servidor de localización local por el terminal; obtener (504, 544, 574) un acceso autenticado al servidor de localización local usando la segunda red; obtener (506, 546, 576) autorización para el servidor de localización descubierto a partir del servidor de localización local; conmutar (508, 548, 578) desde la segunda red de vuelta a la primera red, y acceder (510, 550, 578) al servidor de localización descubierto usando la primera red en función de la autorización obtenida del servidor de localización local.
-
公开(公告)号:IN1517MUN2014A
公开(公告)日:2015-05-01
申请号:IN1517MUN2014
申请日:2014-07-28
Applicant: QUALCOMM INC
Inventor: EDGE STEPHEN WILLIAM , WACHTER ANDREAS KLAUS , HAWKES PHILIP MICHAEL
Abstract: A method for obtaining a secure connection between a first server and a client. The method may comprise establishing a secure communication session between a second server and the client wherein the second server is trusted by the first server and the second server is configured to authenticate the client. The client may receive a client token wherein the client token contains data associated with the first server the second server the client and a digital signature. Then the client may request secure communication access to the first server wherein the request includes transferring the client token to the first server. Finally the client may receive a grant of secure communication access to the first server based on authentication of the client by the first server wherein the authentication is based on the client token validating the client and the digital signature validating the client token.
-
公开(公告)号:CA2531502C
公开(公告)日:2014-08-19
申请号:CA2531502
申请日:2004-07-08
Applicant: QUALCOMM INC
Inventor: HAWKES PHILIP MICHAEL , SEMPLE JAMES , ROSE GREGORY G
IPC: H04L9/00 , G06F9/32 , G06F11/30 , G06F12/14 , H04K1/04 , H04K1/06 , H04L9/08 , H04L9/30 , H04M15/00 , H04W4/24
Abstract: Method and apparatus for secure transmissions. Each user is provided a registration key. A long-time updated broadcast key is encrypted using the registration key and provided periodically to a user. A short-time updated key is encrypted using the broadcast key and provided periodically to a user. Broadcasts are then encrypted using the short-time key, wherein the user decrypts the broadcast message using the short-time key. One embodiment provides link layer content encryption. Another embodiment provides end-to-end encryption.
-
公开(公告)号:BRPI0711438A2
公开(公告)日:2011-11-16
申请号:BRPI0711438
申请日:2007-05-04
Applicant: QUALCOMM INC
Inventor: WINGERT CHRISTOPHER R , AGGARWAL POOJA , HAWKES PHILIP MICHAEL
Abstract: Methods and systems for blackout provisioning in a communication network. In an aspect, a method is provided for blackout provisioning in a distribution network. The method includes determining one or more affected regions, and generating a blackout key based an original key and the affected regions. The method also includes encrypting content with the blackout key to produce encrypted content, and transmitting the encrypted content and an encrypted version of the original key over the distribution network. An apparatus is provided for blackout provisioning that includes provisioning logic to determine one or more affected regions, a key generator to generate a blackout key based an original key and the affected regions, encryption logic to encrypt content with the blackout key to produce encrypted content, and a transmitter to transmit the encrypted content and an encrypted version of the original key over the distribution network.
-
公开(公告)号:HK1145376A1
公开(公告)日:2011-04-15
申请号:HK10111748
申请日:2010-12-16
Applicant: QUALCOMM INC
Inventor: HAWKES PHILIP MICHAEL , SEMPLE JAMES , ROSE GREGORY G
IPC: H04L20060101 , H04L9/08 , H04L9/30 , H04W20090101 , H04W4/24
Abstract: Method and apparatus for secure transmissions. Each user is provided a registration key. A long-time updated broadcast key is encrypted using the registration key and provided periodically to a user. A short-time updated key is encrypted using the broadcast key and provided periodically to a user. Broadcasts are then encrypted using the short-time key, wherein the user decrypts the broadcast message using the short-time key. One embodiment provides link layer content encryption. Another embodiment provides end-to-end encryption.
-
公开(公告)号:DE60322909D1
公开(公告)日:2008-09-25
申请号:DE60322909
申请日:2003-07-24
Applicant: QUALCOMM INC
Inventor: HAWKES PHILIP MICHAEL , ROSE GREGORY G
Abstract: Methods and apparatus are presented herein for encrypting and authentication data, such that some of data can be transmitted in the clear but still be authenticated by the sender. A set of cleartext positions and/or a set of ciphertext positions are used to specify which data blocks will be used to generate an input checksum value and an output checksum value. These checksums are then used to generate an authentication tag.
-
公开(公告)号:CA2597763A1
公开(公告)日:2006-08-17
申请号:CA2597763
申请日:2006-02-10
Applicant: QUALCOMM INC
Inventor: HAWKES PHILIP MICHAEL , SEMPLE JAMES , ROSE GREGORY GORDON , PADDON MICHAEL
Abstract: In a communication system in which two communication entities seek to have a private or confidential communication session, a trust relationship needs first be established. The trust relationship is based on the determination of a shared secret which in turn is generated from contextual information. The contextual information can be derived from the circumstances surrounding the communication session. For example, the contextual information can include topological information, time-based information, and transactional information. The shared secret may be self-generated or received from a third party. In either event, the shared secret may be used as key material for any cryptographic protocol used between the communication entities.
-
-
-
-
-
-
-
-
-