Digital authentication over acoustic channel

    公开(公告)号:AU2004262288A1

    公开(公告)日:2005-02-10

    申请号:AU2004262288

    申请日:2004-07-21

    Applicant: QUALCOMM INC

    Abstract: Apparatus and method are disclosed for digital authentication and verification. In one embodiment, authentication involves storing a cryptographic key and a look up table (LUT), generating an access code using the cryptographic key; generating multiple parallel BPSK symbols based upon the access code; converting the BPSK symbols into multiple tones encoded with the access code using the LUT; and outputting the multiple tones encoded with the access code for authentication. In another embodiment, verification involves receiving multiple tones encoded with an access code; generating multiple parallel BPSK symbols from the multiple tones; converting the BPSK symbols into an encoded interleaved bit stream of the access code; de-interleaving the encoded interleaved bit stream; and recovering the access code from the encoded de-interleaved bit stream.

    Digital authentication over acoustic channel

    公开(公告)号:AU2004301642A1

    公开(公告)日:2005-02-03

    申请号:AU2004301642

    申请日:2004-07-21

    Applicant: QUALCOMM INC

    Abstract: Method and apparatus for controlling access to a secure network, system or application is disclosed. In one embodiment, an apparatus for requesting authentication includes a storage medium that stores a cryptographic key, a processor that generates an access code using the cryptographic key, a converter that converts the access code into sound waves, and an audio output unit that outputs the sound waves encoded with the access code for authentication. An apparatus for granting authentication includes a storage medium that stores a cryptographic key, an audio input unit that receives sound waves encoded with a access code, a converter that recovers the access code from the sound waves, and a processor that generates a second access code using the cryptographic key and grants authentication if the access code corresponds to the second access code.

    SYSTEM, APPARATUS AND METHOD FOR REPLACING A CRYPTOGRAPHIC KEY

    公开(公告)号:AU2003300058A1

    公开(公告)日:2004-08-10

    申请号:AU2003300058

    申请日:2003-12-30

    Applicant: QUALCOMM INC

    Abstract: Embodiments describe a method and / or system (200) whereby a secret key in a cryptographic system may be replaced without revealing the secret key. One embodiment comprises creating a first private key (210) and corresponding first public key. A second private key associated with the first private key and a second public key corresponding to the second private key are also created (220). The second private key is output once (230) such that it can be re-created and the second public key is output when outputting the first public key (240). The first private key is used for authentication (260). The method further comprises re-creating the second private key; and using the second private key for authentication. Another embodiment comprises creating a private key and corresponding public key with associated system parameter (410); outputting the system parameter when outputting the public key (430); and using the private key for authentication (460). The method may further comprise creating a new private key using the previous key and the system parameter (470).

    SYSTEM, APPARATUS AND METHOD FOR REPLACING A CRYPTOGRAPHIC KEY

    公开(公告)号:CA2512645A1

    公开(公告)日:2004-07-29

    申请号:CA2512645

    申请日:2003-12-30

    Applicant: QUALCOMM INC

    Abstract: Embodiments describe a method and/or system (200) whereby a secret key in a cryptographic system may be replaced without revealing the secret key. One embodiment comprises creating a first private key (210) and corresponding first public key. A second private key associated with the first private key and a second public key corresponding to the second private key are also created (220). The second private key is output once (230) such that it can be re-created and the second public key is output when outputting the first public key (240). The first private key is used for authentication (260). Th e method further comprises re-creating the second private key; and using the second private key for authentication. Another embodiment comprises creating a private key and corresponding public key with associated system parameter (410); outputting the system parameter when outputting the public key (430); and using the private key for authentication (460). The method may further comprise creating a new private key using the previous key and the system parameter (470).

    SYSTEM AND METHOD FOR MANAGING SONIC TOKEN VERIFIERS

    公开(公告)号:AU2003233560A1

    公开(公告)日:2003-12-02

    申请号:AU2003233560

    申请日:2003-05-15

    Applicant: QUALCOMM INC

    Abstract: A hand-held token can be operated to generate an acoustic signal representing the digital signature generated by a private key of a public key/private key pair. Verifiers that might be located at, e.g., buildings, in vehicles, at bank ATMs, etc. receive the signal and retrieve the corresponding public key to selectively grant access authorization to components served by the verifiers. Methods and systems permit adding and removing a token from the access list of a verifier. Other methods and systems enable the token to be used with several verifiers that are nearby each other, such as might be the case with multiple vehicles owned by the same user and parked nearby each other, without more than one verifier being operated to grant access.

    59.
    发明专利
    未知

    公开(公告)号:NO20022234L

    公开(公告)日:2002-07-05

    申请号:NO20022234

    申请日:2002-05-10

    Applicant: QUALCOMM INC

    Inventor: ROSE GREGORY G

    Abstract: A method and apparatus for efficiently synchronizing a stream cipher. State information is transmitted that will allow the intended recipient of the encrypted data stream to set a stream cipher generator to the correct state from which to start generating the stream cipher. A cycle number indicating the current state of a linear feedback shift register and a stutter number indicating whether an output of the linear feedback shift register is dropped are both transmitted to a remote station along with the encrypted data stream.

Patent Agency Ranking