METHOD AND APPARATUS FOR SECURITY IN A DATA PROCESSING SYSTEM

    公开(公告)号:CA2463542A1

    公开(公告)日:2003-04-17

    申请号:CA2463542

    申请日:2002-10-08

    Applicant: QUALCOMM INC

    Abstract: Method and apparatus for secure transmissions. Each user is provided a registration key. A long-time updated broadcast key is encrypted using the registration key and provided periodically to a user. A short-time updatedke y is encrypted using the broadcast key. The short-time key is available with each broadcast message,wherein sufficient information to calculate the short - time key is provided in an Internet protocol headerpreceding the broadcast content. Broadcasts are then encrypted using the short-time key, wherein the user decrypts the broadcast message using the short-time key.

    83.
    发明专利
    未知

    公开(公告)号:NO20030046L

    公开(公告)日:2003-02-21

    申请号:NO20030046

    申请日:2003-01-06

    Applicant: QUALCOMM INC

    Abstract: Method and apparatus for allowing persons to securely identify themselves in electronic commerce and transactions involving other parties. A token stores or determines a set of cryptographic signatures and uses a sound component to generate a unique audible tone representative of a cryptographic signature. The audible tone is conveyed to a party requesting authentication of the token holder, whereupon the party determines whether the information conveyed by the audible tone exists in a database of identities.

    Method and apparatus for generating a message authentication code.

    公开(公告)号:HK1046795A1

    公开(公告)日:2003-01-24

    申请号:HK02108158

    申请日:2002-11-11

    Applicant: QUALCOMM INC

    Abstract: A method for generating a message authentication code (MAC) includes the steps of distributing the bits of a message into a larger message in accordance with a pseudorandom number distribution format. The cyclic redundancy check (CRC) bits of the larger message are computed and used as the MAC for the message. The larger message need not be created. The remainder modulo the CRC polynomial of a polynomial x , where i is the intended bit position in the "larger message", is calculated. An exclusive-OR(XOR) operation is performed, bit by bit, on the CRC and the calculated remainder to derive the new CRC.

    85.
    发明专利
    未知

    公开(公告)号:BR0015479A

    公开(公告)日:2002-10-08

    申请号:BR0015479

    申请日:2000-11-13

    Applicant: QUALCOMM INC

    Inventor: ROSE GREGORY G

    Abstract: A method and apparatus for efficiently synchronizing a stream cipher. State information is transmitted that will allow the intended recipient of the encrypted data stream to set a stream cipher generator to the correct state from which to start generating the stream cipher. A cycle number indicating the current state of a linear feedback shift register and a stutter number indicating whether an output of the linear feedback shift register is dropped are both transmitted to a remote station along with the encrypted data stream.

    Method and apparatus for securely transmitting distributed rand signals for use in mobile station authentication

    公开(公告)号:AU5923800A

    公开(公告)日:2001-01-30

    申请号:AU5923800

    申请日:2000-07-07

    Applicant: QUALCOMM INC

    Inventor: ROSE GREGORY G

    Abstract: The method and apparatus updates a binary number that will be used in cellular telephone system authentication procedures by applying a first algorithm to a plurality of most significant bits of a first binary number to obtain a second binary number; operates on a plurality of least significant bits of the first binary number with a second algorithm to obtain a third binary number, and applies a block cipher to the concatenation of the second and third numbers to obtain the updated binary number. When the most significant bits of the updated binary number comprise an all-zeroes number they are replaced with the most significant bits of the concatenation of the second and third numbers.

    87.
    发明专利
    未知

    公开(公告)号:BR9808232A

    公开(公告)日:2000-05-16

    申请号:BR9808232

    申请日:1998-03-04

    Applicant: QUALCOMM INC

    Inventor: ROSE GREGORY G

    Abstract: In a communications system, a method of transforming a set of message signals representing a message comprising the steps of first encoding one of the set of message signals in accordance with a first keyed transformation, a second encoding of the one of the set of message signals in accordance with at least one additional keyed transformation, a third encoding of the one of the set of message signals in accordance with a self-inverting transformation in which at least one of the set of message signals is altered, a fourth encoding of the one of the set of message signals in accordance with at least one additional inverse keyed transformation wherein each of the at least one additional inverse keyed transformation is a corresponding inverse of at least one additional keyed transformation, and fifth encoding the one of the set of message signals in accordance with first inverse keyed transformation wherein the first inverse keyed transformation is the inverse of the first keyed transformation.

    Method and apparatus for providing authentication security in a wireless communication system

    公开(公告)号:AU5901498A

    公开(公告)日:1998-08-07

    申请号:AU5901498

    申请日:1997-12-19

    Applicant: QUALCOMM INC

    Abstract: An apparatus for providing authentication of a mobile station in a wireless communication system. The present invention takes the number dialed by the mobile station user and computes the 24 bit number (AUTH-DATA) for authentication in accordance with a hashing function that has the following characteristics. The hashing function takes as its input at least the entire dialed digit string contained in the request for service and the number of digits. In a preferred embodiment, the ordering of the digits affects the result, as well as, the values of the digits. The preferred embodiment of the hashing function also accepts some or all of the mobile station identifier data. The function provides as output a number of suitable size for input to a second calculation of an authentication signature, such as the 24 bits required for AUTH-DATA. The output number is created in such a way that there is a minimum likelihood that other sets of dialed digits may create the same result.

Patent Agency Ranking