Patents by Inventor Roy Quick

Roy Quick has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20070116282
    Abstract: Method and apparatus for secure transmissions. Each user is provided a registration key. A long-time updated broadcast key is encrypted using the registration key and provided periodically to a user. A short-time updated key is encrypted using the broadcast key and provided periodically to a user. Broadcasts are then encrypted using the short-time key, wherein the user decrypts the broadcast message using the short-time key. One embodiment provides link layer content encryption. Another embodiment provides end-to-end encryption.
    Type: Application
    Filed: January 24, 2007
    Publication date: May 24, 2007
    Applicant: QUALCOMM, INC.
    Inventors: Philip Hawkes, Raymond Hsu, Ramin Rezaiifar, Gregory Rose, Paul Bender, Jun Wang, Roy Quick, Arungundram Mahendran, Parag Agashe
  • Publication number: 20070038613
    Abstract: Techniques for efficient storage and retrieval of Preferred Roaming Lists are disclosed. In one aspect, PRL entries are stored in two tables. One table contains records that are common to two or more PRL entries. Another table stores any information that is unique to a PRL entry, as well as an indicator of which common record is associated with it. The common record is concatenated with the unique information to generate the uncompressed PRL entry. Various other aspects of the invention are also presented. These aspects have the benefit of reducing the memory requirements for storing a PRL. In addition, time required to download the compressed PRL is reduced.
    Type: Application
    Filed: October 24, 2006
    Publication date: February 15, 2007
    Inventors: Don Andrus, Roy Quick, Ramin Rezaiifar, Paul Bender, Rotem Cooper
  • Publication number: 20060246923
    Abstract: A system and method for performing base station initiated call setup is provided. A base station initiated call setup may be utilized to establish a test call, to deliver a packet data services call to a subscriber unit, or to reactivate a dormant packet call. The base station transmits a BS Service Request message to the mobile switching center, requesting initiation of the call. The mobile switching center will authorize the call if the call to be set up is directed to a subscriber unit located within the service area of the base station and if the service option to be used is authorized for the particular subscriber unit. The mobile switching center will allow or disallow the call depending on the state of the subscriber unit. The mobile switching center transmits a BS Service Response message to the base station, conveying the result of processing the BS Service Request message.
    Type: Application
    Filed: June 26, 2006
    Publication date: November 2, 2006
    Inventors: Rajeev Krishnamurthi, Roy Quick, Bibhu Mohanty, Robert Kimball
  • Publication number: 20060056637
    Abstract: Method and apparatus for encrypting transmission traffic at separate protocol layers L1, L2, and L3 so that separate encryption elements can be assigned to separate types of transmission traffic, which allows the implementation of different levels of encryption according to service requirements. Encryption elements use variable value inputs, called crypto-syncs, along with semi-permanent encryption keys to protect from replay attacks from rogue mobile stations. Since crypto-sync values vary, a method for synchronizing crypto-syncs at the mobile station and base station is also presented.
    Type: Application
    Filed: November 7, 2005
    Publication date: March 16, 2006
    Inventors: Ramin Rezaiifar, Roy Quick, Paul Williamson, Jun Wang, Edward Tiedemann
  • Publication number: 20060046690
    Abstract: Pseudo-secret key generation in a communications system. A subscriber station may be configured with a processing system having first and second security protocols. The processing system uses the first security protocol to generate a pseudo-secret key from a challenge received from a service provider, and uses the second security protocol to generate a response to the challenge from the pseudo-secret key.
    Type: Application
    Filed: January 6, 2005
    Publication date: March 2, 2006
    Inventors: Gregory Rose, Roy Quick, John Nasielski, James Semple
  • Publication number: 20060048235
    Abstract: An authentication system is disclosed. The authentication system includes a content provider configured to distribute encrypted content, wherein the encrypted content is generated using a content key, and a client having a symmetric key and configured to store the encrypted content received from the content provider and issue a request to the content provider, wherein the request includes a cryptographic function configured to have the symmetric key and the encrypted content as input, wherein the content provider is further configured to verify the client via the request to ensure that the client has received the encrypted content.
    Type: Application
    Filed: January 6, 2005
    Publication date: March 2, 2006
    Inventors: Gregory Rose, James Semple, Roy Quick, Philip Hawkes
  • Publication number: 20050257255
    Abstract: Methods and apparatus are presented for providing local authentication of subscribers traveling outside their home systems. A subscriber identification token 230 provides authentication support by generating a signature 370 based upon a key that is held secret from a mobile unit 220. A mobile unit 220 that is programmed to wrongfully retain keys from a subscriber identification token 230 after a subscriber has removed his or her token is prevented from subsequently accessing the subscriber's account.
    Type: Application
    Filed: June 1, 2005
    Publication date: November 17, 2005
    Inventors: Roy Quick, Gregory Rose
  • Publication number: 20050207384
    Abstract: Methods and mobile stations for transmitting, receiving and processing peer-to-peer communication signals without a base station or network element. A transmitting mobile station may alternate two or more long code masks to generate one or more pseudorandom noise (PN) codes to spread data for transmission. A receiving mobile station receives the spread data and achieves synchronization with the transmitting mobile station.
    Type: Application
    Filed: March 14, 2005
    Publication date: September 22, 2005
    Inventors: Roy Quick, Henry Pfister
  • Publication number: 20050174970
    Abstract: Information Message signal between a mobile switching center and a base station in a cellular communication system. The invention recognizes that current provisions of the IS-634 standard lack support for certain required functionality on the interface between a mobile switching center and a base station, or the A-Interface. An Alert With Information Message signal is introduced on the A-Interface to support the required functionality. Introduction of the Alert With Information Message provides support for reliable call processing on the A-Interface for the call waiting procedure, the hard handoff procedure, and the resolution of a glare condition.
    Type: Application
    Filed: March 17, 2005
    Publication date: August 11, 2005
    Inventors: Rajeev Krishnamurthi, Bibhu Mohanty, Roy Quick
  • Publication number: 20050117743
    Abstract: A method and apparatus for time-based charging for viewing content from a broadcast-multicast service (BCMCS) at a mobile station of a wireless communication system is disclosed. A count value (SKCount) is determined based upon the number of generated short-term keys (SK) that are used to decrypt particular content from the BCMCS. The amount of time the particular content is viewed at the mobile station may be determined as a function of the count value (SKCount) and the period (SKPeriod) between the generation of the short-term keys. This provides information about a user's actual content view time since the short-term key is needed to view the particular content broadcast to the mobile station.
    Type: Application
    Filed: August 17, 2004
    Publication date: June 2, 2005
    Inventors: Paul Bender, Roy Quick, Parag Agashe
  • Publication number: 20050096046
    Abstract: Techniques for efficient storage and retrieval of Preferred Roaming Lists are disclosed. In one aspect, PRL entries are stored in two tables. One table contains records that are common to two or more PRL entries. Another table stores any information that is unique to a PRL entry, as well as an indicator of which common record is associated with it. The common record is concatenated with the unique information to generate the uncompressed PRL entry. Various other aspects of the invention are also presented. These aspects have the benefit of reducing the memory requirements for storing a PRL. In addition, time required to download the compressed PRL is reduced.
    Type: Application
    Filed: December 9, 2004
    Publication date: May 5, 2005
    Inventors: Don Andrus, Roy Quick, Ramin Rezaiifar, Paul Bender, Rotem Cooper
  • Publication number: 20050010774
    Abstract: Apparatus and method for provisioning an access key used for a controlled access broadcast service is disclosed. In one aspect, a method for secure processing in a device that securely stores a secret key comprises receiving a plurality of challenges from a network, generating a plurality of ciphering keys based on the secret key and the plurality of challenges, and generating an access key based on the plurality of ciphering keys.
    Type: Application
    Filed: June 16, 2004
    Publication date: January 13, 2005
    Inventors: Gregory Rose, James Semple, Roy Quick