-
公开(公告)号:AR055392A1
公开(公告)日:2007-08-22
申请号:ARP060103686
申请日:2006-08-24
Applicant: QUALCOMM INC
Inventor: ROSE GREGORY G , GANTMAN ALEXANDER , XIAO LU
IPC: H04L9/22
Abstract: Se configura un generador de numeros seudo aleatorios criptográficamente seguro para obtener una o más fuentes no impredecibles de entropía que proveen una semilla. Se modifica un estado interior actual del generador de numeros como una funcion del estado interior actual y de la semilla para acumular entropía. El estado interior modificado puede obtenerse mediante la utilizacion de operaciones de registros de corrimientos de retroalimentacion no lineales sobre el estado interior y sobre la semilla. A continuacion se genera un numero seudo aleatorio sobre la base del estado interior modificado del generador de numeros. Las una o más fuentes impredecibles de entropía pueden combinarse en la semilla. El estado interior del generador de numeros puede modificase de manera continua con semillas adicionales obtenidas a partir de las unas o más fuentes impredecibles y el estado interior actual. De manera adicional, el estado interior del generador de numeros puede modificarse a pedido con una nueva semilla recibida procedente de una aplicacion de llamada.
-
公开(公告)号:DK1197035T3
公开(公告)日:2006-07-31
申请号:DK00945266
申请日:2000-07-07
Applicant: QUALCOMM INC
Inventor: ROSE GREGORY G
Abstract: The method and apparatus updates a binary number that will be used in cellular telephone system authentication procedures by applying a first algorithm to a plurality of most significant bits of a first binary number to obtain a second binary number; operates on a plurality of least significant bits of the first binary number with a second algorithm to obtain a third binary number, and applies a block cipher to the concatenation of the second and third numbers to obtain the updated binary number. When the most significant bits of the updated binary number comprise an all-zeroes number they are replaced with the most significant bits of the concatenation of the second and third numbers.
-
公开(公告)号:AT322113T
公开(公告)日:2006-04-15
申请号:AT00945266
申请日:2000-07-07
Applicant: QUALCOMM INC
Inventor: ROSE GREGORY G
Abstract: The method and apparatus updates a binary number that will be used in cellular telephone system authentication procedures by applying a first algorithm to a plurality of most significant bits of a first binary number to obtain a second binary number; operates on a plurality of least significant bits of the first binary number with a second algorithm to obtain a third binary number, and applies a block cipher to the concatenation of the second and third numbers to obtain the updated binary number. When the most significant bits of the updated binary number comprise an all-zeroes number they are replaced with the most significant bits of the concatenation of the second and third numbers.
-
公开(公告)号:CA2544967A1
公开(公告)日:2005-05-26
申请号:CA2544967
申请日:2004-11-10
Applicant: QUALCOMM INC
Inventor: PADDON MICHAEL , ROSE GREGORY G , HAWKES PHILIP M , SEMPLE JAMES F
Abstract: Systems and methods of securing GSM wireless communications between a networ k and a subscriber station are disclosed. One embodiment creates authenticatio n triplets due to expire after a certain amount of time such that they may not be used indefinitely by an attacker who intercepts them.
-
公开(公告)号:CA2537470A1
公开(公告)日:2005-03-31
申请号:CA2537470
申请日:2004-09-02
Applicant: QUALCOMM INC
Inventor: ROSE GREGORY G , SEMPLE JAMES
Abstract: A method and apparatus for secure generation of a short-term key SK for viewing information content in a Multicast-broadcast-multimedia system are described. A short-term key is generated by a memory module residing in user equipment (UE) only when the source of the information used to generate the short-term key can be validated. A short-term key can be generated by a Broadcast Access Key (BAK) or a derivative of BAK and a changing value with a Message Authentication Code (MAC) appended to the changing value. A short-te rm key (SK) can also be generated by using a private key and a short-term key (SK) manager with a corresponding public key distributed to the memory modul e residing in the user equipment (UE), using a digital signature.
-
公开(公告)号:AU2004258561A1
公开(公告)日:2005-01-27
申请号:AU2004258561
申请日:2004-07-08
Applicant: QUALCOMM INC
Inventor: SEMPLE JAMES , QUICK ROY FRANKLIN , ROSE GREGORY G
Abstract: Apparatus and method for provisioning an access key used for a controlled access broadcast service is disclosed. In one aspect, a method for secure processing in a device that securely stores a secret key comprises receiving a plurality of challenges from a network, generating a plurality of ciphering keys based on the secret key and the plurality of challenges, and generating an access key based on the plurality of ciphering keys.
-
公开(公告)号:CA2493569A1
公开(公告)日:2004-05-06
申请号:CA2493569
申请日:2003-07-24
Applicant: QUALCOMM INC
Inventor: ROSE GREGORY G , HAWKES PHILIP MICHAEL
Abstract: Methods and apparatus are presented herein for encrypting and authentication data, such that some of data can be transmitted in the clear but still be authenticated by the sender. A set of cleartext positions and/or a set of ciphertext positions are used to specify which data blocks will be used to generate an input checksum value (470) and an output checksum value (475). These checksums are then used to generate an authentication tag. (490)
-
公开(公告)号:AU2003270024A1
公开(公告)日:2004-03-19
申请号:AU2003270024
申请日:2003-08-26
Applicant: QUALCOMM INC
Inventor: HSU RAYMOND T , REZAIIFAR RAMIN , ROSE GREGORY G , BENDER PAUL E , WANG JUN , QUICK ROY FRANKLIN JR , MAHENDRAN ARUNGUNDRAM C , AGASHE PARAG A , HAWKES PHILIP MICHAEL
IPC: H04L9/08 , G06F21/00 , H04L9/30 , H04L29/06 , H04W4/06 , H04W12/02 , H04W12/04 , H04W12/06 , G06F1/00
Abstract: Method and apparatus for secure transmissions. Each user is provided a registration key. A long-time updated broadcast key is encrypted using the registration key and provided periodically to a user. A short-time updated key is encrypted using the broadcast key and provided periodically to a user. Broadcasts are then encrypted using the short-time key, wherein the user decrypts the broadcast message using the short-time key. One embodiment provides link layer content encryption. Another embodiment provides end-to-end encryption.
-
公开(公告)号:AU2003219752A1
公开(公告)日:2003-09-09
申请号:AU2003219752
申请日:2003-02-12
Applicant: QUALCOMM INC
Inventor: ROSE GREGORY G , GANTMAN ALEXANDER
Abstract: Apparatus and method are disclosed for digital authentication and verification. In one embodiment, authentication involves storing a cryptographic key and a look up table (LUT), generating an access code using the cryptographic key; generating multiple parallel BPSK symbols based upon the access code; converting the BPSK symbols into multiple tones encoded with the access code using the LUT; and outputting the multiple tones encoded with the access code for authentication. In another embodiment, verification involves receiving multiple tones encoded with an access code; generating multiple parallel BPSK symbols from the multiple tones; converting the BPSK symbols into an encoded interleaved bit stream of the access code; de-interleaving the encoded interleaved bit stream; and recovering the access code from the encoded de-interleaved bit stream.
-
公开(公告)号:CA2476485A1
公开(公告)日:2003-08-28
申请号:CA2476485
申请日:2003-02-12
Applicant: QUALCOMM INC
Inventor: GANTMAN ALEXANDER , ROSE GREGORY G
Abstract: A hand-held token can be operated to generate an acoustic or other wireless signal representing a digital signature produced from the private key of a public key pair (44), with the public key being confidential in that it is known only to authorized entities, such as bank computers. The signal from t he token can be received by, e.g., a receiver at a bank ATM (46) that also requires a PIN for account access. The user enters the PIN into the ATM (48) , and the ATM (52) encrypts the signal from the token with the PIN and sends i t on to the bank computer (54) over a link that need not be secure, since even if the PIN is guessed there is no way to verify that it is the correct PIN without also knowing the confidential public key held by the bank computer.
-
-
-
-
-
-
-
-
-