Patents by Inventor John W. Noerenberg
John W. Noerenberg has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8799664Abstract: Embodiments disclosed allow authentication between two entities having agreed on the use of a common modulus N. The authentication includes generating a pseudorandom string value; generating a public key value based on the modulus N and the pseudorandom string value; generating a private key value corresponding to the public key value; receiving a verifier's public key value; generating a shared secret value based on the modulus N, the private key value and the verifier's public key value; calculating an authentication signature value using the shared secret value; and transmitting the authentication signature value for authentication. When the authentication signature is received, the public key value and the shared value are generated to calculate an authentication signature value. Thereafter, the authentication signature values are compared and authenticated.Type: GrantFiled: April 9, 2013Date of Patent: August 5, 2014Assignee: QUALCOMM IncorporatedInventors: Alexander Gantman, Gregory Gordon Rose, John W. Noerenberg, II, Philip Michael Hawkes
-
Patent number: 8712848Abstract: Software for use on a client device that is configured for communications via a communications network instantiates a communications function that effects an advertisement download communication link between the client device and an advertisement distribution server system via the communications network, at selected advertisement download times, an advertisement download function that downloads advertisements identified in a playlist(s) generated by at least one playlist server, via the advertisement download communication link, at the selected advertisement download times, an advertisement storage function for storing the downloaded advertisements on a storage medium associated with the client device, and an advertisement display function that effects display of at least selected ones of the stored advertisements.Type: GrantFiled: September 6, 2006Date of Patent: April 29, 2014Assignee: QUALCOMM IncorporatedInventors: Paul E. Jacobs, Franklin P. Antonio, Steve Dorner, John W. Noerenberg, Jeffrey K. Belk, Benjamin P. Ogdon, Jeffrey D. Beckley, Alan Bird, John D. Boyd, John Sam Purlia, William J. Rhodes, David Jonathan Ross, Matthew J. Dudziak
-
Publication number: 20140016780Abstract: A small form-factor security device is provided that may be inserted in series with a telephone line to encrypt dual tone multi-frequency (DTMF) tones from a telephone to prevent unauthorized disclosure of sensitive information. A receiving device decrypts the encrypted DTMF tones to receive the original information sent by the telephone. The security device acts as a second factor in a two-factor authentication scheme with a tele-services security server that authenticates the security device.Type: ApplicationFiled: September 12, 2013Publication date: January 16, 2014Applicant: Qualcomm IncorporatedInventors: Alexander GANTMAN, Gregory Gordon Rose, Jae-Hee Choi, John W. Noerenberg
-
Patent number: 8571188Abstract: A small form-factor security device is provided that may be inserted in series with a telephone line to encrypt dual tone multi-frequency (DTMF) tones from a telephone to prevent unauthorized disclosure of sensitive information. A receiving device decrypts the encrypted DTMF tones to receive the original information sent by the telephone. The security device acts as a second factor in a two-factor authentication scheme with a tele-services security server that authenticates the security device.Type: GrantFiled: December 15, 2006Date of Patent: October 29, 2013Assignee: QUALCOMM IncorporatedInventors: Alexander Gantman, Gregory G. Rose, Jae-Hee Choi, John W. Noerenberg, II
-
Patent number: 8437473Abstract: Embodiments disclosed allow authentication between two entities having agreed on the use of a common modulus N. The authentication includes generating a pseudorandom string value; generating a public key value based on the modulus N and the pseudorandom string value; generating a private key value corresponding to the public key value; receiving a verifier's public key value; generating a shared secret value based on the modulus N, the private key value and the verifier's public key value; calculating an authentication signature value using the shared secret value; and transmitting the authentication signature value for authentication. When the authentication signature is received, the public key value and the shared value are generated to calculate an authentication signature value. Thereafter, the authentication signature values are compared and authenticated.Type: GrantFiled: February 24, 2006Date of Patent: May 7, 2013Assignee: QUALCOMM IncorporatedInventors: Alexander Gantman, Gregory Gordon Rose, John W. Noerenberg, II, Philip Michael Hawkes
-
Patent number: 8428098Abstract: A scheme is provided for determining the geographical location of an active IP device coupled to an IP network. A network path to the user device is obtained to identify a last hop device having a known first geographical location. A last leg distance between the last hop device and the user device is calculated. The last leg bandwidth, propagation time, and propagation speed are also characterized to more accurately determine the last leg distance. By combining the known first geographical location and the distance of the last hop device and user device, a geographical location for the user device is obtained. To improve the accuracy of the geographical location of the user device, multiple last hop devices with known geographical locations are employed to obtain multiple geographical areas for the user device. The intersection or overlap of these geographical areas indicates a refined geographical location of the user device.Type: GrantFiled: July 6, 2006Date of Patent: April 23, 2013Assignee: QUALCOMM IncorporatedInventors: Liren Chen, Jack Steenstra, Kirk S. Taylor, John W. Noerenberg, II
-
Patent number: 8391480Abstract: Apparatus and method are disclosed for digital authentication and verification. In one embodiment, authentication involves storing a cryptographic key and a look up table (LUT), generating an access code using the cryptographic key; generating multiple parallel BPSK symbols based upon the access code; converting the BPSK symbols into multiple tones encoded with the access code using the LUT; and outputting the multiple tones encoded with the access code for authentication. In another embodiment, verification involves receiving multiple tones encoded with an access code; generating multiple parallel BPSK symbols from the multiple tones; converting the BPSK symbols into an encoded interleaved bit stream of the access code; de-interleaving the encoded interleaved bit stream; and recovering the access code from the encoded de-interleaved bit stream.Type: GrantFiled: February 3, 2009Date of Patent: March 5, 2013Assignee: QUALCOMM IncorporatedInventors: Jack Steenstra, Alexander Gantman, John W. Noerenberg, II, Ahmad Jalali, Gregory Rose
-
Patent number: 8290162Abstract: Another feature provides an efficient encryption method that safeguards the security of encrypted symbols. Each plaintext symbol is encrypted by using a separate pseudorandomly selected translation table. Rather than pre-storing every possible permutation of symbols as translation tables, the translation tables may be efficiently generated on-the-fly based on a pseudorandom number and a symbol shuffling algorithm. A receiving device may similarly generate reverse translation tables on-the-fly to decrypt received encrypted symbols.Type: GrantFiled: December 15, 2006Date of Patent: October 16, 2012Assignee: QUALCOMM IncorporatedInventors: Alexander Gantman, Gregory G. Rose, Jae-Hee Choi, John W. Noerenberg, II
-
Patent number: 8259947Abstract: Embodiments describe a method and/or system whereby a secret key in a cryptographic system may be replaced without revealing the secret key. One embodiment comprises creating a first private key and corresponding first public key. A second private key associated with the first private key and a second public key corresponding to the second private key are also created. The second private key is output once such that it can be re-created and the second public key is output when outputting the first public key. The first private key is used for authentication. The method further comprises re-creating the second private key; and using the second private key for authentication. Another embodiment comprises creating a private key and corresponding public key with associated system parameter; outputting the system parameter when outputting the public key; and using the private key for authentication. The method may further comprise creating a new private key using the previous key and the system parameter.Type: GrantFiled: January 5, 2004Date of Patent: September 4, 2012Assignee: QUALCOMM IncorporatedInventors: Gregory Gordon Rose, Alexander Gantman, John W. Noerenberg, II
-
Patent number: 7836308Abstract: Apparatus and method for authentication is disclosed. In one embodiment, an apparatus for performing authentication using removeably coupled external authentication module comprises a module configured to receive the authentication module. The authentication module is configured to generate authentication information. The module may comprises an input unit configured to receive and couple the authentication module, and an output unit configured to receive the authentication information from the authentication module and to transmit the authentication information.Type: GrantFiled: June 21, 2004Date of Patent: November 16, 2010Assignee: Qualcomm IncorporatedInventors: Alexander Gantman, Gregory G. Rose, Jack Steenstra, John W. Noerenberg
-
Publication number: 20100034385Abstract: Another feature provides an efficient encryption method that safeguards the security of encrypted symbols. Each plaintext symbol is encrypted by using a separate pseudorandomly selected translation table. Rather than pre-storing every possible permutation of symbols as translation tables, the translation tables may be efficiently generated on-the-fly based on a pseudorandom number arid a symbol shuffling algorithm. A receiving device may similarly generate reverse translation tables on-the-fly to decrypt received encrypted symbols.Type: ApplicationFiled: December 15, 2006Publication date: February 11, 2010Inventors: Alexander Gantman, Gregory G. Rose, Jae-Hee Choi, John W. Noerenberg, II
-
Publication number: 20090141890Abstract: Apparatus and method are disclosed for digital authentication and verification. In one embodiment, authentication involves storing a cryptographic key and a look up table (LUT), generating an access code using the cryptographic key; generating multiple parallel BPSK symbols based upon the access code; converting the BPSK symbols into multiple tones encoded with the access code using the LUT; and outputting the multiple tones encoded with the access code for authentication. In another embodiment, verification involves receiving multiple tones encoded with an access code; generating multiple parallel BPSK symbols from the multiple tones; converting the BPSK symbols into an encoded interleaved bit stream of the access code; de-interleaving the encoded interleaved bit stream; and recovering the access code from the encoded de-interleaved bit stream.Type: ApplicationFiled: February 3, 2009Publication date: June 4, 2009Applicant: Qualcomm IncorporatedInventors: Jack Steenstra, Alexander Gantman, John W. Noerenberg, II, Ahmad Jalali, Gregory G. Rose
-
Patent number: 7487362Abstract: Apparatus and method are disclosed for digital authentication and verification. In one embodiment, authentication involves storing a cryptographic key and a look up table (LUT), generating an access code using the cryptographic key; generating multiple parallel BPSK symbols based upon the access code; converting the BPSK symbols into multiple tones encoded with the access code using the LUT; and outputting the multiple tones encoded with the access code for authentication. In another embodiment, verification involves receiving multiple tones encoded with an access code; generating multiple parallel BPSK symbols from the multiple tones; converting the BPSK symbols into an encoded interleaved bit stream of the access code; de-interleaving the encoded interleaved bit stream; and recovering the access code from the encoded de-interleaved bit stream.Type: GrantFiled: February 23, 2004Date of Patent: February 3, 2009Assignee: Qualcomm, Inc.Inventors: Jack Steenstra, Alexander Gantman, John W. Noerenberg, II, Ahmad Jalali, Gregory G. Rose
-
Publication number: 20090003597Abstract: Embodiments disclosed allow authentication between two entities having agreed on the use of a common modulus N. The authentication includes generating a pseudorandom string value; generating a public key value based on the modulus N and the pseudorandom string value; generating a private key value corresponding to the public key value; receiving a verifier's public key value; generating a shared secret value based on the modulus N, the private key value and the verifier's public key value; calculating an authentication signature value using the shared secret value; and transmitting the authentication signature value for authentication. When the authentication signature is received, the public key value and the shared value are generated to calculate an authentication signature value. Thereafter, the authentication signature values are compared and authenticated.Type: ApplicationFiled: February 24, 2006Publication date: January 1, 2009Applicant: QUALCOMM INCORPORATEDInventors: Alexander Gantman, Gregory Gordon Rose, John W. Noerenberg, II, Philip Michael Hawkes
-
Publication number: 20080144787Abstract: A small form-factor security device is provided that may be inserted in series with a telephone line to encrypt dual tone multi-frequency (DTMF) tones from a telephone to prevent unauthorized disclosure of sensitive information. A receiving device decrypts the encrypted DTMF tones to receive the original information sent by the telephone. The security device acts as a second factor in a two-factor authentication scheme with a tele-services security server that authenticates the security device.Type: ApplicationFiled: December 15, 2006Publication date: June 19, 2008Inventors: Alexander Gantman, Gregory G. Rose, Jae-Hee Choi, John W. Noerenberg
-
Publication number: 20080010367Abstract: A scheme is provided for determining the geographical location of an active IP device coupled to an IP network. A network path to the user device is obtained to identify a last hop device having a known first geographical location. A last leg distance between the last hop device and the user device is calculated. The last leg bandwidth, propagation time, and propagation speed are also characterized to more accurately determine the last leg distance. By combining the known first geographical location and the distance of the last hop device and user device, a geographical location for the user device is obtained. To improve the accuracy of the geographical location of the user device, multiple last hop devices with known geographical locations are employed to obtain multiple geographical areas for the user device. The intersection or overlap of these geographical areas indicates a refined geographical location of the user device.Type: ApplicationFiled: July 6, 2006Publication date: January 10, 2008Inventors: Liren Chen, Jack Steenstra, Kirk S. Taylor, John W. Noerenberg
-
Patent number: 7103643Abstract: Software for use on a client device that is configured for communications via a communications network instantiates a communications function that effects an advertisement download communication link between the client device and an advertisement distribution server system via the communications network, at selected advertisement download times, an advertisement download function that downloads advertisements identified in a playlist(s) generated by at least one playlist server, via the advertisement download communication link, at the selected advertisement download times, an advertisement storage function for storing the downloaded advertisements on a storage medium associated with the client device, and an advertisement display function that effects display of at least selected ones of the stored advertisements.Type: GrantFiled: September 22, 2000Date of Patent: September 5, 2006Assignee: Qualcomm INCInventors: Paul E. Jacobs, Franklin P. Antonio, Steven Dorner, John W. Noerenberg, Jeffrey K. Belk, Benjamin P. Ogdon, Jeffrey D. Beckley, Alan Bird, John D. Boyd, John S. Purlia, David J. Ross, Matthew J. Dudziak, William J. Rhodes
-
Publication number: 20040249708Abstract: Software for use on a client device that is configured for communications with at least one remote source of advertisements via a communications network instantiates an advertisement download function that downloads advertisements from the at least one remote source, during one or more advertisement download sessions, an advertisement storage function that stores the downloaded advertisements on a storage medium associated with the client device, an advertisement display function that effects display of at least selected ones of the stored advertisements on a display associated with the client device, an obscured ad monitor function that determines whether an obscured ad condition has occurred, whereby the obscured ad condition occurs when an advertisement currently being displayed on the display associated with the client device is being obscured by one or more other items currently being displayed on the display, and an obscured ad nag function that generates an obscured ad nag display in response to detectType: ApplicationFiled: August 20, 2003Publication date: December 9, 2004Inventors: Paul E. Jacobs, Franklin P. Antonio, Steven Dorner, John W. Noerenberg, Jeffrey K. Belk, Benjamin P. Ogdon, Jeffrey D. Beckley, Alan Bird, John D. Boyd, John S. Purlia, William J. Rhodes, David J. Ross, Matthew J. Dudziak
-
Publication number: 20040221166Abstract: Apparatus and method are disclosed for digital authentication and verification. In one embodiment, authentication involves storing a cryptographic key and a look up table (LUT), generating an access code using the cryptographic key; generating multiple parallel BPSK symbols based upon the access code; converting the BPSK symbols into multiple tones encoded with the access code using the LUT; and outputting the multiple tones encoded with the access code for authentication. In another embodiment, verification involves receiving multiple tones encoded with an access code; generating multiple parallel BPSK symbols from the multiple tones; converting the BPSK symbols into an encoded interleaved bit stream of the access code; de-interleaving the encoded interleaved bit stream; and recovering the access code from the encoded de-interleaved bit stream.Type: ApplicationFiled: February 23, 2004Publication date: November 4, 2004Inventors: Jack Steenstra, Alexander Gantman, John W. Noerenberg, Ahmad Jalali, Gregory G. Rose
-
Publication number: 20040218763Abstract: Embodiments describe a method and/or system whereby a secret key in a cryptographic system may be replaced without revealing the secret key. One embodiment comprises creating a first private key and corresponding first public key. A second private key associated with the first private key and a second public key corresponding to the second private key are also created. The second private key is output once such that it can be re-created and the second public key is output when outputting the first public key. The first private key is used for authentication. The method further comprises re-creating the second private key; and using the second private key for authentication. Another embodiment comprises creating a private key and corresponding public key with associated system parameter; outputting the system parameter when outputting the public key; and using the private key for authentication. The method may further comprise creating a new private key using the previous key and the system parameter.Type: ApplicationFiled: January 5, 2004Publication date: November 4, 2004Inventors: Gregory Gordon Rose, Alexander Gantman, John W. Noerenberg