SYSTEMS AND METHODS FOR REDUCED LATENCY DURING INITIAL LINK SETUP

    公开(公告)号:CA2913620A1

    公开(公告)日:2015-01-22

    申请号:CA2913620

    申请日:2014-07-15

    Applicant: QUALCOMM INC

    Abstract: A method of operation of a mobile device to reduce link setup time includes initiating a link setup procedure with a first access point. The link setup procedure includes receiving dynamic host configuration protocol (DHCP) information via the first access point. The method further includes communicating with the first access point using the DHCP information and initiating communication with a second access point after communicating with the first access point. The method further includes receiving an indication from the second access point identifying whether the mobile device is able to communicate with the second access point using the DHCP information. A value of the indication identifies whether the mobile device is able to reduce link setup time with the second access point by avoiding DHCP reconfiguration with the second access point.

    3.
    发明专利
    未知

    公开(公告)号:AT417470T

    公开(公告)日:2008-12-15

    申请号:AT05813278

    申请日:2005-09-06

    Applicant: QUALCOMM INC

    Abstract: A communications system and method of bootstrapping mobile station authentication and establishing a secure encryption key are disclosed. In one embodiment of the communications network, a distinguished random challenge is reserved for generation of a secure encryption key, wherein the distinguished random challenge is not used for authentication of a mobile station. The distinguished random challenge is stored at a mobile station's mobile equipment and used to generate a secure encryption key, and a bootstrapping function in the network uses a normal random challenge to authenticate the mobile station and the distinguished random challenge to generate the secure encryption key.

    FIRMAS DIGITALES BASADAS EN CLAVE PUBLICA PEQUENA PARA AUTENTICACION.

    公开(公告)号:MX2007010388A

    公开(公告)日:2007-10-18

    申请号:MX2007010388

    申请日:2006-02-24

    Applicant: QUALCOMM INC

    Abstract: Las modalidades descritas permiten la autenticacion entre dos entidades que han acordado el uso de un modulo comun N; la autenticacion comprende generar de un valor de secuencia pseudo aleatorio, generar un valor de clave publica basado en el modulo N y el valor de secuencia seudo-aleatorio; generar un valor de clave privada correspondiente al valor de clave publica; recibir un valor de clave publica del verificador; y generar un valor secreto compartido con base en los modulos N, el valor de clave privada y el valor de clave publica del verificador; calcular un valor de firma de autenticacion utilizando el valor secreto compartido; y transmitir el valor de firma de autenticacion para autenticacion; cuando la firma de autenticacion es recibida, el valor de clave publica y el valor compartido son generados para calcular un valor de firma de autenticacion; posteriormente, los valores de firma de autenticacion se comparan y autentican.

    METHOD AND APPARATUS FOR CONTENT PROTECTION IN WIRELESS COMMUNICATIONS

    公开(公告)号:CA2641558A1

    公开(公告)日:2007-08-16

    申请号:CA2641558

    申请日:2007-02-02

    Abstract: Disclosed is a method for securely presenting content in a mobile station. The mobile station may have a smart module, a security agent, and an air interface for communicating with a content provider and with a remote content rights manager. The smart module stores content presentation units and has a proxy content rights manager for when the mobile station is unable to receive secure content keys from the remote content rights manager using the air interface. In the method, content presentation units are transferred from the remote rights manager to the smart module for storage. Secure content keys are requested from the smart module for allowing presentation of content requested while the mobile station is unable to communicate with the remote rights manager. The secure content keys are transferred, based on a stored content presentation unit, from the proxy content rights manager to the security agent for allowing content presentation.

    METODO, APARATO Y MEDIO LEGIBLE POR MAQUINA PARA LA SEGURIDAD EN UN SISTEMA DE PROCESAMIENTO DE DATOS

    公开(公告)号:AR045904A1

    公开(公告)日:2005-11-16

    申请号:ARP040102442

    申请日:2004-07-08

    Applicant: QUALCOMM INC

    Abstract: Método y aparato para transmisiones seguras. A cada uno de los usuarios le es provista una clave de registro. Una clave de radiodifusión actualizada a largo plazo, es encriptada mediante la clave de registro, y provista periódicamente a un usuario. Una clave actualizada a corto plazo es encriptada mediante la clave de radiodifusión, y provista periódicamente a un usuario. Seguidamente las radiodifusiones son encriptadas mediante la clave a plazo breve, el usuario descripta el mensaje de radiodifusión mediante la clave a corto plazo. En una forma de realización se provee el encriptado del contenido de la capa de enlace. En otra forma de realización se provee un encriptado extremo-a-extremo.

    EFFICIENT ENCRYPTION AND AUTHENTICATION FOR DATA PROCESSING SYSTEMS

    公开(公告)号:AU2003296887A1

    公开(公告)日:2004-05-04

    申请号:AU2003296887

    申请日:2003-07-24

    Applicant: QUALCOMM INC

    Abstract: Methods and apparatus are presented for encrypting and authenticating data, wherein some data is encrypted and some data is not encrypted, but all of the data is authenticated. Different formulations for authentication blocks are used according to whether a block of data occupies a cleartext position or ciphertext position. The authentication blocks are then combined to form a checksum, which is encrypted to form an authentication tag.

    EFFICIENT ENCRYPTION AND AUTHENTICATION FOR DATA PROCESSING SYSTEMS

    公开(公告)号:CA2493567A1

    公开(公告)日:2004-04-22

    申请号:CA2493567

    申请日:2003-07-24

    Applicant: QUALCOMM INC

    Abstract: Methods and apparatus are presented for encrypting and authenticating data, wherein some data is encrypted and some data is not encrypted, but all of th e data is authenticated. Different formulations for authentication blocks are used according to whether a block of data occupies a cleartext position (442 A, 442B, 442C) or ciphertext position. (444A 444B, 444C, 444D) The authenticati on blocks are then combined to form a checksum, which is encrypted to form an authentication tag.

Patent Agency Ranking