-
公开(公告)号:DE69734209D1
公开(公告)日:2005-10-20
申请号:DE69734209
申请日:1997-12-19
Applicant: QUALCOMM INC
Abstract: An apparatus for providing authentication of a mobile station in a wireless communication system. The present invention takes the number dialed by the mobile station user and computes the 24 bit number (AUTH-DATA) for authentication in accordance with a hashing function that has the following characteristics. The hashing function takes as its input at least the entire dialed digit string contained in the request for service and the number of digits. In a preferred embodiment, the ordering of the digits affects the result, as well as, the values of the digits. The preferred embodiment of the hashing function also accepts some or all of the mobile station identifier data. The function provides as output a number of suitable size for input to a second calculation of an authentication signature, such as the 24 bits required for AUTH-DATA. The output number is created in such a way that there is a minimum likelihood that other sets of dialed digits may create the same result.
-
公开(公告)号:DE60217106D1
公开(公告)日:2007-02-08
申请号:DE60217106
申请日:2002-05-21
Applicant: QUALCOMM INC
Abstract: Methods and apparatus are presented for providing local authentication of subscribers traveling outside their home systems. A subscriber identification token 230 provides authentication support by generating a signature 370 based upon a key that is held secret from a mobile unit 220. A mobile unit 220 that is programmed to wrongfully retain keys from a subscriber identification token 230 after a subscriber has removed his or her token is prevented from subsequently accessing the subscriber's account.
-
公开(公告)号:DE60027006T2
公开(公告)日:2007-01-11
申请号:DE60027006
申请日:2000-07-07
Applicant: QUALCOMM INC
Inventor: ROSE G
Abstract: The method and apparatus updates a binary number that will be used in cellular telephone system authentication procedures by applying a first algorithm to a plurality of most significant bits of a first binary number to obtain a second binary number; operates on a plurality of least significant bits of the first binary number with a second algorithm to obtain a third binary number, and applies a block cipher to the concatenation of the second and third numbers to obtain the updated binary number. When the most significant bits of the updated binary number comprise an all-zeroes number they are replaced with the most significant bits of the concatenation of the second and third numbers.
-
公开(公告)号:DE60031304T3
公开(公告)日:2010-07-01
申请号:DE60031304
申请日:2000-12-21
Applicant: QUALCOMM INC
Inventor: ROSE G , HAWKES PHILIP
-
公开(公告)号:DE60126426D1
公开(公告)日:2007-03-22
申请号:DE60126426
申请日:2001-12-27
Applicant: QUALCOMM INC
Inventor: QUICK FRANKLIN , ROSE G
Abstract: Methods and apparatus are presented for providing local authentication of subscribers travelling outside their home systems. A subscriber identification token 230 provides authentication support by generating a signature 370 based upon a key that is held secret from a mobile unit 220. A mobile unit 220 that is programmed to wrongfully retain keys from a subscriber identification token 230 after a subscriber has removed his or her token is prevented from subsequently accessing the subscriber's account.
-
公开(公告)号:DE60031304D1
公开(公告)日:2006-11-23
申请号:DE60031304
申请日:2000-12-21
Applicant: QUALCOMM INC
Inventor: ROSE G , HAWKES PHILIP
Abstract: A method of authenticating anonymous users while reducing potential for "middleman" fraud includes the step of constructing a puzzle in response to information received from a software user. The puzzle includes the received information. The puzzle is sent to the user by a software provider. The user solves the puzzle and returns the solution to the provider. The puzzle includes a portion of a value derived from an encrypted "cookie" and an exponentiation of the derived value. The cookie includes information about the user.
-
公开(公告)号:DE60027006D1
公开(公告)日:2006-05-18
申请号:DE60027006
申请日:2000-07-07
Applicant: QUALCOMM INC
Inventor: ROSE G
Abstract: The method and apparatus updates a binary number that will be used in cellular telephone system authentication procedures by applying a first algorithm to a plurality of most significant bits of a first binary number to obtain a second binary number; operates on a plurality of least significant bits of the first binary number with a second algorithm to obtain a third binary number, and applies a block cipher to the concatenation of the second and third numbers to obtain the updated binary number. When the most significant bits of the updated binary number comprise an all-zeroes number they are replaced with the most significant bits of the concatenation of the second and third numbers.
-
公开(公告)号:DE60126426T2
公开(公告)日:2007-08-23
申请号:DE60126426
申请日:2001-12-27
Applicant: QUALCOMM INC
Inventor: QUICK FRANKLIN , ROSE G
Abstract: Methods and apparatus are presented for providing local authentication of subscribers travelling outside their home systems. A subscriber identification token 230 provides authentication support by generating a signature 370 based upon a key that is held secret from a mobile unit 220. A mobile unit 220 that is programmed to wrongfully retain keys from a subscriber identification token 230 after a subscriber has removed his or her token is prevented from subsequently accessing the subscriber's account.
-
公开(公告)号:DE60217106T2
公开(公告)日:2007-08-16
申请号:DE60217106
申请日:2002-05-21
Applicant: QUALCOMM INC
Abstract: Methods and apparatus are presented for providing local authentication of subscribers traveling outside their home systems. A subscriber identification token 230 provides authentication support by generating a signature 370 based upon a key that is held secret from a mobile unit 220. A mobile unit 220 that is programmed to wrongfully retain keys from a subscriber identification token 230 after a subscriber has removed his or her token is prevented from subsequently accessing the subscriber's account.
-
公开(公告)号:DE60031304T2
公开(公告)日:2007-05-24
申请号:DE60031304
申请日:2000-12-21
Applicant: QUALCOMM INC
Inventor: ROSE G , HAWKES PHILIP
Abstract: A method of authenticating anonymous users while reducing potential for "middleman" fraud includes the step of constructing a puzzle in response to information received from a software user. The puzzle includes the received information. The puzzle is sent to the user by a software provider. The user solves the puzzle and returns the solution to the provider. The puzzle includes a portion of a value derived from an encrypted "cookie" and an exponentiation of the derived value. The cookie includes information about the user.
-
-
-
-
-
-
-
-
-