Patents by Inventor Gregory G. Rose

Gregory G. Rose has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190108517
    Abstract: Cash-like anonymous transactions are facilitated using digital cash that cannot be traced to the payor. A payor requests a (payor) bank to issue a digital cash certificate be generated for a particular amount. The bank generates the digital cash certificate and associates a unique note identifier with the digital cash certificate. The digital cash certificate, including the denomination and the unique note identifier, are obscured/blinded using a payor public key for to obtain an encrypted digital cash certificate. The bank may cryptographically sign the encrypted digital cash certificate, using a denomination-specific private key, and returns the signed and encrypted digital cash certificate to the payor. The payor may decrypt the encrypted digital cash certificate to obtain a cryptographically signed digital cash certificate. The payor can a representation of the signed digital cash certificate to a payee. The payee can the signed digital cash certificate to a (payee) bank for redemption.
    Type: Application
    Filed: October 5, 2018
    Publication date: April 11, 2019
    Inventor: Gregory G. Rose
  • Publication number: 20180254093
    Abstract: A diagnostic device is provided that obtains test results and transmits a cryptographically secure version of such test results. The diagnostic device may be provisioned with a unique first public key and first private key pair and a unique device identifier for the diagnostic device. A link may be established with a mobile communication device associated with a unique patient identifier. A test request may be received from the mobile communication device including the patient identifier. The diagnostic device may then verify whether the requested test can or should be performed based, at least partially, on the patient identifier. If the patient identifier is verified, the diagnostic device may perform the requested test to obtain a test result. The test result may be encrypt/signed using the first private key and a first authorized receiver public key to obtain a first encrypted result that is transmitted to the mobile communication device.
    Type: Application
    Filed: March 2, 2018
    Publication date: September 6, 2018
    Inventor: Gregory G. Rose
  • Publication number: 20150373002
    Abstract: Systems and methods can support change management thresholds within human machine interfaces. An operation or feature may be introduced into a multi-user information system where a benefit is conveyed to specific benefited instances of events. A user indication associated with the specific benefited instances may be initially disabled. A quantity of the specific benefited instances may be calculated or counted. The calculated quantity may be compared to a threshold quantity. The user indication associated with the specific benefited instances may be enabled in response to the comparison indicating that the threshold has been exceeded. The user indication may be presented via a user interface mechanism associated with the multi-user information system. According to certain examples, sender authentication may be added to an email system such that instances of authentication are not displayed until a certain number or percentage of messages is being authenticated.
    Type: Application
    Filed: June 21, 2015
    Publication date: December 24, 2015
    Applicant: TARGETPROOF, LLC
    Inventors: Steven M. Siebert, Gregory G. Rose, Thomas M. Stone, Andrew C. Schenkel
  • Patent number: 8989390
    Abstract: A feature is provided that facilitates securely creating and/or replacing cryptographic keys. A first key pair is created comprising first private key and first public key. A second (spare) key pair is created comprising second private key and second public key. The second key pair is associated with the first private key. The second key pair is divided into shares and distributed to at least two shareholders. When the first key pair is to be replace, the second key pair is recreated and authenticated with at least a portion of the distributed shares. A trust level is associated with the second key pair corresponding to a trust level of the first key pair. The first key pair may be invalidated upon authentication of the second key pair. Further configurations provide for the creation of additional spare key pairs.
    Type: Grant
    Filed: December 11, 2006
    Date of Patent: March 24, 2015
    Assignee: QUALCOMM Incorporated
    Inventors: Alexander Gantman, Gregory G. Rose
  • Patent number: 8949600
    Abstract: Prior to transmission, a message is divided into multiple transmission units. A sub-message authentication code is obtained for each of the transmission units. A composed message authentication code is obtained for the whole message based on the sub-message authentication codes of the multiple transmission units. The multiple transmission units and the composed message authentication code are then transmitted. A receiver of the message receives a plurality of transmission units corresponding to the message. A local sub-message authentication code is calculated by the receiver for each transmission unit. A local composed message authentication code is calculated by the receiver based on the local sub-message authentication codes for the plurality of transmission units. The local composed message authentication code is compared to a received composed message authentication code to determine the integrity and/or authenticity of the received message.
    Type: Grant
    Filed: March 1, 2007
    Date of Patent: February 3, 2015
    Assignee: QUALCOMM Incorporated
    Inventors: Michael Paddon, Adrian Escott, Gregory G. Rose, Philip Hawkes
  • Patent number: 8943583
    Abstract: A hand-held token can be operated to generate an acoustic signal representing the digital signature generated by a private key of a public key/private key pair. Verifiers that might be located at, e.g., buildings, in vehicles, at bank ATMs, etc. receive the signal and retrieve the corresponding public key to selectively grant access authorization to components served by the verifiers. Methods and systems permit adding and removing a token from the access list of a verifier. Other methods and systems enable the token to be used with several verifiers that are nearby each other, such as might be the case with multiple vehicles owned by the same user and parked nearby each other, without more than one verifier being operated to grant access.
    Type: Grant
    Filed: July 14, 2008
    Date of Patent: January 27, 2015
    Assignee: QUALCOMM Incorporated
    Inventors: Alexander Gantman, Gregory G. Rose
  • Patent number: 8914302
    Abstract: The mobile commerce authentication and authorization system allows a user of a currently existing mobile wireless communications instrument to conduct financial transactions, including purchases, across a wireless communications system using location data to authorize and authenticate the user and the transaction. The location of the mobile wireless communications instrument and the location of a vendor point-of-sale device are matched with a payment sum. Authentication of the mobile wireless communications instrument user is achieved at least by application of the position and/or location determinable features of the mobile wireless communications instrument, the position and/or location of a point-of-sale device of a vendor or merchant where the instrument user seeks to purchase goods or services, and the payment sum entered on the point-of-sale device.
    Type: Grant
    Filed: May 15, 2012
    Date of Patent: December 16, 2014
    Assignee: QUALCOMM Incorporated
    Inventors: Gregory G. Rose, Craig B. Lauer, Alexander Gantman, Joan T. Waltman
  • Patent number: 8839459
    Abstract: A system is provided for inside-to-outside or outside-to-inside cryptographic coding that facilitates product authentication along a distribution channel. An association of authenticated, secured codes is generated between inner items (e.g., pharmaceutical doses such as pills, capsules, tablets) and outer items (e.g., packaging containing inner items). For instance, an inner code associated with a first item is used to generate (at least partially) an outer code associated with a second item that contains one or more first items. This process may be repeated multiple times with codes for outer items being a function of codes for inner items. The sequence of items may be authenticated by the dependent relationship between their codes.
    Type: Grant
    Filed: September 22, 2010
    Date of Patent: September 16, 2014
    Assignee: QUALCOMM Incorporated
    Inventors: John Jozwiak, Gregory G. Rose, Alexander Gantman
  • Patent number: 8839429
    Abstract: Methods, devices, and systems for detecting return-oriented programming (ROP) exploits are disclosed. A system includes a processor, a main memory, and a cache memory. A cache monitor develops an instruction loading profile by monitoring accesses to cached instructions found in the cache memory and misses to instructions not currently in the cache memory. A remedial action unit terminates execution of one or more of the valid code sequences if the instruction loading profile is indicative of execution of an ROP exploit involving one or more valid code sequences. The instruction loading profile may be a hit/miss ratio derived from monitoring cache hits relative to cache misses. The ROP exploits may include code snippets that each include an executable instruction and a return instruction from valid code sequences.
    Type: Grant
    Filed: November 7, 2011
    Date of Patent: September 16, 2014
    Assignee: QUALCOMM Incorporated
    Inventors: Daniel Komaromy, Alex Gantman, Brian M. Rosenberg, Arun Balakrishnan, Renwei Ge, Gregory G. Rose, Anand Palanigounder
  • Patent number: 8611536
    Abstract: A communications system and method of bootstrapping mobile station authentication and establishing a secure encryption key are disclosed. In one embodiment of the communications network, a distinguished random challenge is reserved for generation of a secure encryption key, wherein the distinguished random challenge is not used for authentication of a mobile station. The distinguished random challenge is stored at a mobile station's mobile equipment and used to generate a secure encryption key, and a bootstrapping function in the network uses a normal random challenge to authenticate the mobile station and the distinguished random challenge to generate the secure encryption key.
    Type: Grant
    Filed: September 2, 2005
    Date of Patent: December 17, 2013
    Assignee: QUALCOMM Incorporated
    Inventors: James Semple, Gregory G. Rose, Michael Paddon, Philip Michael Hawkes
  • Patent number: 8571188
    Abstract: A small form-factor security device is provided that may be inserted in series with a telephone line to encrypt dual tone multi-frequency (DTMF) tones from a telephone to prevent unauthorized disclosure of sensitive information. A receiving device decrypts the encrypted DTMF tones to receive the original information sent by the telephone. The security device acts as a second factor in a two-factor authentication scheme with a tele-services security server that authenticates the security device.
    Type: Grant
    Filed: December 15, 2006
    Date of Patent: October 29, 2013
    Assignee: QUALCOMM Incorporated
    Inventors: Alexander Gantman, Gregory G. Rose, Jae-Hee Choi, John W. Noerenberg, II
  • Patent number: 8538024
    Abstract: A method and apparatus for re-synchronizing a stream cipher during soft handoff. Transmitted quasi-secret keying information is used with a secret key to reinitialize a stream cipher generator located in a base station and a stream cipher generator located in a travelling mobile station. Since the quasi-secret keying information is uniquely determined according to each base station in the wireless telephone system, a base station's quasi-secret keying information and a shared secret key can also be used to create a new key. Thus, as the mobile station travels from one base station to another base station, a unique new key is generated for each base station.
    Type: Grant
    Filed: December 22, 2006
    Date of Patent: September 17, 2013
    Assignee: QUALCOMM Incorporated
    Inventor: Gregory G. Rose
  • Patent number: 8521301
    Abstract: Methods and systems enable thermal treating a portion of a subject using microwave or other electromagnetic radiation without harming other portions of the subject. In an embodiment, a plurality of electromagnetic radiation transmitters are positioned within a thermal treatment system and coupled to a control processor. The electromagnetic radiation may be transmitted as a pseudorandom waveform and maybe microwave radiation. The control processor coordinates the transmitters so that emitted electromagnetic radiation constructively interferes within a treatment volume while radiation passing through the rest of the subject randomly interferes or appears as noise. As a result, in a volume in which the electromagnetic radiation waveforms arrive in phase the power of all the transmitters add constructively resulting in a significant temperature rise, while the rest of the subject is exposed to a much lower average power level and thus a lower temperature rise.
    Type: Grant
    Filed: June 10, 2009
    Date of Patent: August 27, 2013
    Assignee: QUALCOMM Incorporated
    Inventor: Gregory G. Rose
  • Publication number: 20130185214
    Abstract: Disclosed is a system and method that provides a merchant associated with a point of sale (“POS”) system and a consumer associated with a portable computing device (“PCD”) to complete a purchase transaction without transmitting or presenting confidential payment credentials. In an exemplary embodiment, sound is used to transmit data between the POS and the PCD. A payment request is rendered on the PCD. The consumer reviews and authorizes via a unique cryptographic signature. The merchant approves via addition of its unique cryptographic signature. A remote service in communication with the POS verifies the signatures via previously registered public keys. The transaction is then settled to a consumer account. Confirmation is returned to the POS and PCD. Advantageously, the transaction is commenced and completed without the PCD being online. Further, the consumer payment credentials are not stored on the PCD or transmitted from the PCD to the merchant POS system.
    Type: Application
    Filed: February 1, 2012
    Publication date: July 18, 2013
    Applicant: Firethorn Mobile Inc.
    Inventors: Jon Azen, Jose Menendez, Eric Kraar, Gregory G. Rose
  • Publication number: 20130117843
    Abstract: Methods, devices, and systems for detecting return-oriented programming (ROP) exploits are disclosed. A system includes a processor, a main memory, and a cache memory. A cache monitor develops an instruction loading profile by monitoring accesses to cached instructions found in the cache memory and misses to instructions not currently in the cache memory. A remedial action unit terminates execution of one or more of the valid code sequences if the instruction loading profile is indicative of execution of an ROP exploit involving one or more valid code sequences. The instruction loading profile may be a hit/miss ratio derived from monitoring cache hits relative to cache misses. The ROP exploits may include code snippets that each include an executable instruction and a return instruction from valid code sequences.
    Type: Application
    Filed: November 7, 2011
    Publication date: May 9, 2013
    Applicant: QUALCOMM Incorporated
    Inventors: Daniel KOMAROMY, Alex Gantman, Brian M. Rosenberg, Arun Balakrishan, Renwei Ge, Gregory G. Rose, Anand Palanigounder
  • Patent number: 8321680
    Abstract: Embodiments describe a system and/or method for multiple party digital signatures. According to a first aspect a method comprises establishing a first validity range for a first key, establishing a first validity range for at least a second key, and determining if the validity range of the first key overlaps the first validity range of the at least a second key. A certificate is signed with the first validity range of the first key and the first validity range of the at least a second key if the validity ranges overlap. According to another embodiment, signage of the certificate is refused if the first validity range of the first key does not overlap with the first validity range of the at least a second key.
    Type: Grant
    Filed: December 9, 2010
    Date of Patent: November 27, 2012
    Assignee: QUALCOMM Incorporated
    Inventors: Alexander Gantman, Aram Perez, Gregory G. Rose, Laurence G. Lundblade, Matthew W. Hohfeld, Michael W. Paddon, Oliver Michaelis, Ricardo Jorge Lopez
  • Patent number: 8290162
    Abstract: Another feature provides an efficient encryption method that safeguards the security of encrypted symbols. Each plaintext symbol is encrypted by using a separate pseudorandomly selected translation table. Rather than pre-storing every possible permutation of symbols as translation tables, the translation tables may be efficiently generated on-the-fly based on a pseudorandom number and a symbol shuffling algorithm. A receiving device may similarly generate reverse translation tables on-the-fly to decrypt received encrypted symbols.
    Type: Grant
    Filed: December 15, 2006
    Date of Patent: October 16, 2012
    Assignee: QUALCOMM Incorporated
    Inventors: Alexander Gantman, Gregory G. Rose, Jae-Hee Choi, John W. Noerenberg, II
  • Publication number: 20120249341
    Abstract: Disclosed is an apparatus, system, and method to communicate emergency messages utilizing road markers. The road marker may include: a light emitter to emit different light colors; a transmitter; and a receiver to receive an emergency message from an emergency vehicle, a road marker gateway, or another road marker. Further, the road marker may include a processor to: to command the light emitter to emit a light color based upon the emergency message received by the receiver; and command the transmitter to transmit the received emergency message to at least one other road marker.
    Type: Application
    Filed: March 30, 2011
    Publication date: October 4, 2012
    Applicant: QUALCOMM Incorporated
    Inventors: Craig M. Brown, Craig W. Northway, Jessica M. Purser, Gregory G. Rose
  • Patent number: 8260259
    Abstract: Methods and devices for instructing a subscriber identity module in a cellular communications network to process non-standard authentication information in a standard manner are disclosed. One embodiment of a method comprises receiving a first message authentication code (MAC) and an authentication management field (AMF) at a subscriber identity module as part of an authentication protocol, calculating a second MAC and determining whether the second MAC is equivalent to the first MAC. If the first and second MAC are not equivalent, the SIM calculates a third MAC and determines whether the first MAC is equivalent to the third MAC, and if so, the subscriber identity module processes the AMF in a predefined or standard manner.
    Type: Grant
    Filed: September 2, 2005
    Date of Patent: September 4, 2012
    Assignee: QUALCOMM Incorporated
    Inventors: James Semple, Gregory G. Rose, Michael Paddon, Philip Michael Hawkes
  • Publication number: 20120207304
    Abstract: In a communications system, a method of transforming a set of message signals representing a message comprising the steps of first encoding one of the set of message signals in accordance with a first keyed transformation, a second encoding of the one of the set of message signals in accordance with at least one additional keyed transformation, a third encoding of the one of the set of message signals in accordance with a self inverting transformation in which at least one of the set of message signals is altered, a fourth encoding of the one of the set of message signals in accordance with at least one additional inverse keyed transformation wherein each of the at least one additional inverse keyed transformation is a corresponding inverse of at least one additional keyed transformation, and fifth encoding the one of the set of message signals in accordance with first inverse keyed transformation wherein the first inverse keyed transformation is the inverse of the first keyed transformation.
    Type: Application
    Filed: August 9, 2011
    Publication date: August 16, 2012
    Applicant: QUALCOMM Incorporated
    Inventor: GREGORY G. ROSE