GENERADOR DE NUMERO SEUDO - ALEATORIO CRIPTOGRAFICAMENTE SEGURO

    公开(公告)号:AR055392A1

    公开(公告)日:2007-08-22

    申请号:ARP060103686

    申请日:2006-08-24

    Applicant: QUALCOMM INC

    Abstract: Se configura un generador de numeros seudo aleatorios criptográficamente seguro para obtener una o más fuentes no impredecibles de entropía que proveen una semilla. Se modifica un estado interior actual del generador de numeros como una funcion del estado interior actual y de la semilla para acumular entropía. El estado interior modificado puede obtenerse mediante la utilizacion de operaciones de registros de corrimientos de retroalimentacion no lineales sobre el estado interior y sobre la semilla. A continuacion se genera un numero seudo aleatorio sobre la base del estado interior modificado del generador de numeros. Las una o más fuentes impredecibles de entropía pueden combinarse en la semilla. El estado interior del generador de numeros puede modificase de manera continua con semillas adicionales obtenidas a partir de las unas o más fuentes impredecibles y el estado interior actual. De manera adicional, el estado interior del generador de numeros puede modificarse a pedido con una nueva semilla recibida procedente de una aplicacion de llamada.

    72.
    发明专利
    未知

    公开(公告)号:DK1197035T3

    公开(公告)日:2006-07-31

    申请号:DK00945266

    申请日:2000-07-07

    Applicant: QUALCOMM INC

    Inventor: ROSE GREGORY G

    Abstract: The method and apparatus updates a binary number that will be used in cellular telephone system authentication procedures by applying a first algorithm to a plurality of most significant bits of a first binary number to obtain a second binary number; operates on a plurality of least significant bits of the first binary number with a second algorithm to obtain a third binary number, and applies a block cipher to the concatenation of the second and third numbers to obtain the updated binary number. When the most significant bits of the updated binary number comprise an all-zeroes number they are replaced with the most significant bits of the concatenation of the second and third numbers.

    73.
    发明专利
    未知

    公开(公告)号:AT322113T

    公开(公告)日:2006-04-15

    申请号:AT00945266

    申请日:2000-07-07

    Applicant: QUALCOMM INC

    Inventor: ROSE GREGORY G

    Abstract: The method and apparatus updates a binary number that will be used in cellular telephone system authentication procedures by applying a first algorithm to a plurality of most significant bits of a first binary number to obtain a second binary number; operates on a plurality of least significant bits of the first binary number with a second algorithm to obtain a third binary number, and applies a block cipher to the concatenation of the second and third numbers to obtain the updated binary number. When the most significant bits of the updated binary number comprise an all-zeroes number they are replaced with the most significant bits of the concatenation of the second and third numbers.

    METHOD AND APPARATUS FOR PROVIDING AUTHENTICATED CHALLENGES FOR BROADCAST-MULTICAST COMMUNICATIONS IN A COMMUNICATION SYSTEM

    公开(公告)号:CA2537470A1

    公开(公告)日:2005-03-31

    申请号:CA2537470

    申请日:2004-09-02

    Applicant: QUALCOMM INC

    Abstract: A method and apparatus for secure generation of a short-term key SK for viewing information content in a Multicast-broadcast-multimedia system are described. A short-term key is generated by a memory module residing in user equipment (UE) only when the source of the information used to generate the short-term key can be validated. A short-term key can be generated by a Broadcast Access Key (BAK) or a derivative of BAK and a changing value with a Message Authentication Code (MAC) appended to the changing value. A short-te rm key (SK) can also be generated by using a private key and a short-term key (SK) manager with a corresponding public key distributed to the memory modul e residing in the user equipment (UE), using a digital signature.

    EFFICIENT ENCRYPTION AND AUTHENTICATION FOR DATA PROCESSING SYSTEMS

    公开(公告)号:CA2493569A1

    公开(公告)日:2004-05-06

    申请号:CA2493569

    申请日:2003-07-24

    Applicant: QUALCOMM INC

    Abstract: Methods and apparatus are presented herein for encrypting and authentication data, such that some of data can be transmitted in the clear but still be authenticated by the sender. A set of cleartext positions and/or a set of ciphertext positions are used to specify which data blocks will be used to generate an input checksum value (470) and an output checksum value (475). These checksums are then used to generate an authentication tag. (490)

    SYSTEM AND METHOD FOR ACOUSTIC TWO FACTOR AUTHENTICATION

    公开(公告)号:AU2003219752A1

    公开(公告)日:2003-09-09

    申请号:AU2003219752

    申请日:2003-02-12

    Applicant: QUALCOMM INC

    Abstract: Apparatus and method are disclosed for digital authentication and verification. In one embodiment, authentication involves storing a cryptographic key and a look up table (LUT), generating an access code using the cryptographic key; generating multiple parallel BPSK symbols based upon the access code; converting the BPSK symbols into multiple tones encoded with the access code using the LUT; and outputting the multiple tones encoded with the access code for authentication. In another embodiment, verification involves receiving multiple tones encoded with an access code; generating multiple parallel BPSK symbols from the multiple tones; converting the BPSK symbols into an encoded interleaved bit stream of the access code; de-interleaving the encoded interleaved bit stream; and recovering the access code from the encoded de-interleaved bit stream.

    SYSTEM AND METHOD FOR ACOUSTIC TWO FACTOR AUTHENTICATION

    公开(公告)号:CA2476485A1

    公开(公告)日:2003-08-28

    申请号:CA2476485

    申请日:2003-02-12

    Applicant: QUALCOMM INC

    Abstract: A hand-held token can be operated to generate an acoustic or other wireless signal representing a digital signature produced from the private key of a public key pair (44), with the public key being confidential in that it is known only to authorized entities, such as bank computers. The signal from t he token can be received by, e.g., a receiver at a bank ATM (46) that also requires a PIN for account access. The user enters the PIN into the ATM (48) , and the ATM (52) encrypts the signal from the token with the PIN and sends i t on to the bank computer (54) over a link that need not be secure, since even if the PIN is guessed there is no way to verify that it is the correct PIN without also knowing the confidential public key held by the bank computer.

Patent Agency Ranking