Patents by Inventor John W. Noerenberg

John W. Noerenberg has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8799664
    Abstract: Embodiments disclosed allow authentication between two entities having agreed on the use of a common modulus N. The authentication includes generating a pseudorandom string value; generating a public key value based on the modulus N and the pseudorandom string value; generating a private key value corresponding to the public key value; receiving a verifier's public key value; generating a shared secret value based on the modulus N, the private key value and the verifier's public key value; calculating an authentication signature value using the shared secret value; and transmitting the authentication signature value for authentication. When the authentication signature is received, the public key value and the shared value are generated to calculate an authentication signature value. Thereafter, the authentication signature values are compared and authenticated.
    Type: Grant
    Filed: April 9, 2013
    Date of Patent: August 5, 2014
    Assignee: QUALCOMM Incorporated
    Inventors: Alexander Gantman, Gregory Gordon Rose, John W. Noerenberg, II, Philip Michael Hawkes
  • Patent number: 8712848
    Abstract: Software for use on a client device that is configured for communications via a communications network instantiates a communications function that effects an advertisement download communication link between the client device and an advertisement distribution server system via the communications network, at selected advertisement download times, an advertisement download function that downloads advertisements identified in a playlist(s) generated by at least one playlist server, via the advertisement download communication link, at the selected advertisement download times, an advertisement storage function for storing the downloaded advertisements on a storage medium associated with the client device, and an advertisement display function that effects display of at least selected ones of the stored advertisements.
    Type: Grant
    Filed: September 6, 2006
    Date of Patent: April 29, 2014
    Assignee: QUALCOMM Incorporated
    Inventors: Paul E. Jacobs, Franklin P. Antonio, Steve Dorner, John W. Noerenberg, Jeffrey K. Belk, Benjamin P. Ogdon, Jeffrey D. Beckley, Alan Bird, John D. Boyd, John Sam Purlia, William J. Rhodes, David Jonathan Ross, Matthew J. Dudziak
  • Publication number: 20140016780
    Abstract: A small form-factor security device is provided that may be inserted in series with a telephone line to encrypt dual tone multi-frequency (DTMF) tones from a telephone to prevent unauthorized disclosure of sensitive information. A receiving device decrypts the encrypted DTMF tones to receive the original information sent by the telephone. The security device acts as a second factor in a two-factor authentication scheme with a tele-services security server that authenticates the security device.
    Type: Application
    Filed: September 12, 2013
    Publication date: January 16, 2014
    Applicant: Qualcomm Incorporated
    Inventors: Alexander GANTMAN, Gregory Gordon Rose, Jae-Hee Choi, John W. Noerenberg
  • Patent number: 8571188
    Abstract: A small form-factor security device is provided that may be inserted in series with a telephone line to encrypt dual tone multi-frequency (DTMF) tones from a telephone to prevent unauthorized disclosure of sensitive information. A receiving device decrypts the encrypted DTMF tones to receive the original information sent by the telephone. The security device acts as a second factor in a two-factor authentication scheme with a tele-services security server that authenticates the security device.
    Type: Grant
    Filed: December 15, 2006
    Date of Patent: October 29, 2013
    Assignee: QUALCOMM Incorporated
    Inventors: Alexander Gantman, Gregory G. Rose, Jae-Hee Choi, John W. Noerenberg, II
  • Patent number: 8437473
    Abstract: Embodiments disclosed allow authentication between two entities having agreed on the use of a common modulus N. The authentication includes generating a pseudorandom string value; generating a public key value based on the modulus N and the pseudorandom string value; generating a private key value corresponding to the public key value; receiving a verifier's public key value; generating a shared secret value based on the modulus N, the private key value and the verifier's public key value; calculating an authentication signature value using the shared secret value; and transmitting the authentication signature value for authentication. When the authentication signature is received, the public key value and the shared value are generated to calculate an authentication signature value. Thereafter, the authentication signature values are compared and authenticated.
    Type: Grant
    Filed: February 24, 2006
    Date of Patent: May 7, 2013
    Assignee: QUALCOMM Incorporated
    Inventors: Alexander Gantman, Gregory Gordon Rose, John W. Noerenberg, II, Philip Michael Hawkes
  • Patent number: 8428098
    Abstract: A scheme is provided for determining the geographical location of an active IP device coupled to an IP network. A network path to the user device is obtained to identify a last hop device having a known first geographical location. A last leg distance between the last hop device and the user device is calculated. The last leg bandwidth, propagation time, and propagation speed are also characterized to more accurately determine the last leg distance. By combining the known first geographical location and the distance of the last hop device and user device, a geographical location for the user device is obtained. To improve the accuracy of the geographical location of the user device, multiple last hop devices with known geographical locations are employed to obtain multiple geographical areas for the user device. The intersection or overlap of these geographical areas indicates a refined geographical location of the user device.
    Type: Grant
    Filed: July 6, 2006
    Date of Patent: April 23, 2013
    Assignee: QUALCOMM Incorporated
    Inventors: Liren Chen, Jack Steenstra, Kirk S. Taylor, John W. Noerenberg, II
  • Patent number: 8391480
    Abstract: Apparatus and method are disclosed for digital authentication and verification. In one embodiment, authentication involves storing a cryptographic key and a look up table (LUT), generating an access code using the cryptographic key; generating multiple parallel BPSK symbols based upon the access code; converting the BPSK symbols into multiple tones encoded with the access code using the LUT; and outputting the multiple tones encoded with the access code for authentication. In another embodiment, verification involves receiving multiple tones encoded with an access code; generating multiple parallel BPSK symbols from the multiple tones; converting the BPSK symbols into an encoded interleaved bit stream of the access code; de-interleaving the encoded interleaved bit stream; and recovering the access code from the encoded de-interleaved bit stream.
    Type: Grant
    Filed: February 3, 2009
    Date of Patent: March 5, 2013
    Assignee: QUALCOMM Incorporated
    Inventors: Jack Steenstra, Alexander Gantman, John W. Noerenberg, II, Ahmad Jalali, Gregory Rose
  • Patent number: 8290162
    Abstract: Another feature provides an efficient encryption method that safeguards the security of encrypted symbols. Each plaintext symbol is encrypted by using a separate pseudorandomly selected translation table. Rather than pre-storing every possible permutation of symbols as translation tables, the translation tables may be efficiently generated on-the-fly based on a pseudorandom number and a symbol shuffling algorithm. A receiving device may similarly generate reverse translation tables on-the-fly to decrypt received encrypted symbols.
    Type: Grant
    Filed: December 15, 2006
    Date of Patent: October 16, 2012
    Assignee: QUALCOMM Incorporated
    Inventors: Alexander Gantman, Gregory G. Rose, Jae-Hee Choi, John W. Noerenberg, II
  • Patent number: 8259947
    Abstract: Embodiments describe a method and/or system whereby a secret key in a cryptographic system may be replaced without revealing the secret key. One embodiment comprises creating a first private key and corresponding first public key. A second private key associated with the first private key and a second public key corresponding to the second private key are also created. The second private key is output once such that it can be re-created and the second public key is output when outputting the first public key. The first private key is used for authentication. The method further comprises re-creating the second private key; and using the second private key for authentication. Another embodiment comprises creating a private key and corresponding public key with associated system parameter; outputting the system parameter when outputting the public key; and using the private key for authentication. The method may further comprise creating a new private key using the previous key and the system parameter.
    Type: Grant
    Filed: January 5, 2004
    Date of Patent: September 4, 2012
    Assignee: QUALCOMM Incorporated
    Inventors: Gregory Gordon Rose, Alexander Gantman, John W. Noerenberg, II
  • Patent number: 7836308
    Abstract: Apparatus and method for authentication is disclosed. In one embodiment, an apparatus for performing authentication using removeably coupled external authentication module comprises a module configured to receive the authentication module. The authentication module is configured to generate authentication information. The module may comprises an input unit configured to receive and couple the authentication module, and an output unit configured to receive the authentication information from the authentication module and to transmit the authentication information.
    Type: Grant
    Filed: June 21, 2004
    Date of Patent: November 16, 2010
    Assignee: Qualcomm Incorporated
    Inventors: Alexander Gantman, Gregory G. Rose, Jack Steenstra, John W. Noerenberg
  • Publication number: 20100034385
    Abstract: Another feature provides an efficient encryption method that safeguards the security of encrypted symbols. Each plaintext symbol is encrypted by using a separate pseudorandomly selected translation table. Rather than pre-storing every possible permutation of symbols as translation tables, the translation tables may be efficiently generated on-the-fly based on a pseudorandom number arid a symbol shuffling algorithm. A receiving device may similarly generate reverse translation tables on-the-fly to decrypt received encrypted symbols.
    Type: Application
    Filed: December 15, 2006
    Publication date: February 11, 2010
    Inventors: Alexander Gantman, Gregory G. Rose, Jae-Hee Choi, John W. Noerenberg, II
  • Publication number: 20090141890
    Abstract: Apparatus and method are disclosed for digital authentication and verification. In one embodiment, authentication involves storing a cryptographic key and a look up table (LUT), generating an access code using the cryptographic key; generating multiple parallel BPSK symbols based upon the access code; converting the BPSK symbols into multiple tones encoded with the access code using the LUT; and outputting the multiple tones encoded with the access code for authentication. In another embodiment, verification involves receiving multiple tones encoded with an access code; generating multiple parallel BPSK symbols from the multiple tones; converting the BPSK symbols into an encoded interleaved bit stream of the access code; de-interleaving the encoded interleaved bit stream; and recovering the access code from the encoded de-interleaved bit stream.
    Type: Application
    Filed: February 3, 2009
    Publication date: June 4, 2009
    Applicant: Qualcomm Incorporated
    Inventors: Jack Steenstra, Alexander Gantman, John W. Noerenberg, II, Ahmad Jalali, Gregory G. Rose
  • Patent number: 7487362
    Abstract: Apparatus and method are disclosed for digital authentication and verification. In one embodiment, authentication involves storing a cryptographic key and a look up table (LUT), generating an access code using the cryptographic key; generating multiple parallel BPSK symbols based upon the access code; converting the BPSK symbols into multiple tones encoded with the access code using the LUT; and outputting the multiple tones encoded with the access code for authentication. In another embodiment, verification involves receiving multiple tones encoded with an access code; generating multiple parallel BPSK symbols from the multiple tones; converting the BPSK symbols into an encoded interleaved bit stream of the access code; de-interleaving the encoded interleaved bit stream; and recovering the access code from the encoded de-interleaved bit stream.
    Type: Grant
    Filed: February 23, 2004
    Date of Patent: February 3, 2009
    Assignee: Qualcomm, Inc.
    Inventors: Jack Steenstra, Alexander Gantman, John W. Noerenberg, II, Ahmad Jalali, Gregory G. Rose
  • Publication number: 20090003597
    Abstract: Embodiments disclosed allow authentication between two entities having agreed on the use of a common modulus N. The authentication includes generating a pseudorandom string value; generating a public key value based on the modulus N and the pseudorandom string value; generating a private key value corresponding to the public key value; receiving a verifier's public key value; generating a shared secret value based on the modulus N, the private key value and the verifier's public key value; calculating an authentication signature value using the shared secret value; and transmitting the authentication signature value for authentication. When the authentication signature is received, the public key value and the shared value are generated to calculate an authentication signature value. Thereafter, the authentication signature values are compared and authenticated.
    Type: Application
    Filed: February 24, 2006
    Publication date: January 1, 2009
    Applicant: QUALCOMM INCORPORATED
    Inventors: Alexander Gantman, Gregory Gordon Rose, John W. Noerenberg, II, Philip Michael Hawkes
  • Publication number: 20080144787
    Abstract: A small form-factor security device is provided that may be inserted in series with a telephone line to encrypt dual tone multi-frequency (DTMF) tones from a telephone to prevent unauthorized disclosure of sensitive information. A receiving device decrypts the encrypted DTMF tones to receive the original information sent by the telephone. The security device acts as a second factor in a two-factor authentication scheme with a tele-services security server that authenticates the security device.
    Type: Application
    Filed: December 15, 2006
    Publication date: June 19, 2008
    Inventors: Alexander Gantman, Gregory G. Rose, Jae-Hee Choi, John W. Noerenberg
  • Publication number: 20080010367
    Abstract: A scheme is provided for determining the geographical location of an active IP device coupled to an IP network. A network path to the user device is obtained to identify a last hop device having a known first geographical location. A last leg distance between the last hop device and the user device is calculated. The last leg bandwidth, propagation time, and propagation speed are also characterized to more accurately determine the last leg distance. By combining the known first geographical location and the distance of the last hop device and user device, a geographical location for the user device is obtained. To improve the accuracy of the geographical location of the user device, multiple last hop devices with known geographical locations are employed to obtain multiple geographical areas for the user device. The intersection or overlap of these geographical areas indicates a refined geographical location of the user device.
    Type: Application
    Filed: July 6, 2006
    Publication date: January 10, 2008
    Inventors: Liren Chen, Jack Steenstra, Kirk S. Taylor, John W. Noerenberg
  • Patent number: 7103643
    Abstract: Software for use on a client device that is configured for communications via a communications network instantiates a communications function that effects an advertisement download communication link between the client device and an advertisement distribution server system via the communications network, at selected advertisement download times, an advertisement download function that downloads advertisements identified in a playlist(s) generated by at least one playlist server, via the advertisement download communication link, at the selected advertisement download times, an advertisement storage function for storing the downloaded advertisements on a storage medium associated with the client device, and an advertisement display function that effects display of at least selected ones of the stored advertisements.
    Type: Grant
    Filed: September 22, 2000
    Date of Patent: September 5, 2006
    Assignee: Qualcomm INC
    Inventors: Paul E. Jacobs, Franklin P. Antonio, Steven Dorner, John W. Noerenberg, Jeffrey K. Belk, Benjamin P. Ogdon, Jeffrey D. Beckley, Alan Bird, John D. Boyd, John S. Purlia, David J. Ross, Matthew J. Dudziak, William J. Rhodes
  • Publication number: 20040249708
    Abstract: Software for use on a client device that is configured for communications with at least one remote source of advertisements via a communications network instantiates an advertisement download function that downloads advertisements from the at least one remote source, during one or more advertisement download sessions, an advertisement storage function that stores the downloaded advertisements on a storage medium associated with the client device, an advertisement display function that effects display of at least selected ones of the stored advertisements on a display associated with the client device, an obscured ad monitor function that determines whether an obscured ad condition has occurred, whereby the obscured ad condition occurs when an advertisement currently being displayed on the display associated with the client device is being obscured by one or more other items currently being displayed on the display, and an obscured ad nag function that generates an obscured ad nag display in response to detect
    Type: Application
    Filed: August 20, 2003
    Publication date: December 9, 2004
    Inventors: Paul E. Jacobs, Franklin P. Antonio, Steven Dorner, John W. Noerenberg, Jeffrey K. Belk, Benjamin P. Ogdon, Jeffrey D. Beckley, Alan Bird, John D. Boyd, John S. Purlia, William J. Rhodes, David J. Ross, Matthew J. Dudziak
  • Publication number: 20040221166
    Abstract: Apparatus and method are disclosed for digital authentication and verification. In one embodiment, authentication involves storing a cryptographic key and a look up table (LUT), generating an access code using the cryptographic key; generating multiple parallel BPSK symbols based upon the access code; converting the BPSK symbols into multiple tones encoded with the access code using the LUT; and outputting the multiple tones encoded with the access code for authentication. In another embodiment, verification involves receiving multiple tones encoded with an access code; generating multiple parallel BPSK symbols from the multiple tones; converting the BPSK symbols into an encoded interleaved bit stream of the access code; de-interleaving the encoded interleaved bit stream; and recovering the access code from the encoded de-interleaved bit stream.
    Type: Application
    Filed: February 23, 2004
    Publication date: November 4, 2004
    Inventors: Jack Steenstra, Alexander Gantman, John W. Noerenberg, Ahmad Jalali, Gregory G. Rose
  • Publication number: 20040218763
    Abstract: Embodiments describe a method and/or system whereby a secret key in a cryptographic system may be replaced without revealing the secret key. One embodiment comprises creating a first private key and corresponding first public key. A second private key associated with the first private key and a second public key corresponding to the second private key are also created. The second private key is output once such that it can be re-created and the second public key is output when outputting the first public key. The first private key is used for authentication. The method further comprises re-creating the second private key; and using the second private key for authentication. Another embodiment comprises creating a private key and corresponding public key with associated system parameter; outputting the system parameter when outputting the public key; and using the private key for authentication. The method may further comprise creating a new private key using the previous key and the system parameter.
    Type: Application
    Filed: January 5, 2004
    Publication date: November 4, 2004
    Inventors: Gregory Gordon Rose, Alexander Gantman, John W. Noerenberg