Patents by Inventor Gregory G. Rose

Gregory G. Rose has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7668315
    Abstract: Methods and apparatus are presented for providing local authentication of subscribers travelling outside their home systems. A subscriber identification token 230 provides authentication support by generating a signature 370 based upon a key that is held secret from a mobile unit 220. A mobile unit 220 that is programmed to wrongfully retain keys from a subscriber identification token 230 after a subscriber has removed his or her token is prevented from subsequently accessing the subscriber's account.
    Type: Grant
    Filed: May 22, 2001
    Date of Patent: February 23, 2010
    Assignee: QUALCOMM Incorporated
    Inventors: Roy F. Quick, Jr., Gregory G. Rose
  • Publication number: 20100034385
    Abstract: Another feature provides an efficient encryption method that safeguards the security of encrypted symbols. Each plaintext symbol is encrypted by using a separate pseudorandomly selected translation table. Rather than pre-storing every possible permutation of symbols as translation tables, the translation tables may be efficiently generated on-the-fly based on a pseudorandom number arid a symbol shuffling algorithm. A receiving device may similarly generate reverse translation tables on-the-fly to decrypt received encrypted symbols.
    Type: Application
    Filed: December 15, 2006
    Publication date: February 11, 2010
    Inventors: Alexander Gantman, Gregory G. Rose, Jae-Hee Choi, John W. Noerenberg, II
  • Publication number: 20100002870
    Abstract: Methods and apparatus are presented for encrypting and authenticating data, wherein some data is encrypted and some data is not encrypted, but all of the data is authenticated. Masking modules (410) are used in a partial-block encryption mode to indicate which bits of a data block are to be encrypted.
    Type: Application
    Filed: July 16, 2008
    Publication date: January 7, 2010
    Applicant: QUALCOMM Incorporated
    Inventors: Gregory G. Rose, Philip Michael Hawkes
  • Publication number: 20090141890
    Abstract: Apparatus and method are disclosed for digital authentication and verification. In one embodiment, authentication involves storing a cryptographic key and a look up table (LUT), generating an access code using the cryptographic key; generating multiple parallel BPSK symbols based upon the access code; converting the BPSK symbols into multiple tones encoded with the access code using the LUT; and outputting the multiple tones encoded with the access code for authentication. In another embodiment, verification involves receiving multiple tones encoded with an access code; generating multiple parallel BPSK symbols from the multiple tones; converting the BPSK symbols into an encoded interleaved bit stream of the access code; de-interleaving the encoded interleaved bit stream; and recovering the access code from the encoded de-interleaved bit stream.
    Type: Application
    Filed: February 3, 2009
    Publication date: June 4, 2009
    Applicant: Qualcomm Incorporated
    Inventors: Jack Steenstra, Alexander Gantman, John W. Noerenberg, II, Ahmad Jalali, Gregory G. Rose
  • Patent number: 7515713
    Abstract: In a disclosed embodiment, a visitor location register first initializes an assignment table to store N entries. Next, the visitor location register waits until a TMSI assignment is needed. Then, a counter is maintained in memory and is incremented. The value of the counter is then hashed to produce an assignment table index. Beginning at the assignment table index, the assignment table is searched for an available entry. The counter is then encrypted to produce a TMSI. The IMSI corresponding to the TMSI assignment is then stored in the assignment table.
    Type: Grant
    Filed: December 17, 2001
    Date of Patent: April 7, 2009
    Assignee: QUALCOMM Incorporated
    Inventors: Roy Franklin Quick, Jr., Gregory G. Rose
  • Publication number: 20090044015
    Abstract: A hand-held token can be operated to generate an acoustic signal representing the digital signature generated by a private key of a public key/private key pair. Verifiers that might be located at, e.g. buildings, in vehicles, at bank ATMs, etc. receive the signal and retrieve the corresponding public key to selectively grant access authorization to components served by the verifiers. Methods and systems permit adding and removing a token from the access list of a verifier. Other methods and systems enable the token to be used with several verifiers that are nearby each other, such as might be the case with multiple vehicles owned by the same user and parked nearby each other, without more than one verifier being operated to grant access.
    Type: Application
    Filed: July 14, 2008
    Publication date: February 12, 2009
    Applicant: QUALCOMM INCORPORATED
    Inventors: Alexander Gantman, Gregory G. Rose
  • Patent number: 7487362
    Abstract: Apparatus and method are disclosed for digital authentication and verification. In one embodiment, authentication involves storing a cryptographic key and a look up table (LUT), generating an access code using the cryptographic key; generating multiple parallel BPSK symbols based upon the access code; converting the BPSK symbols into multiple tones encoded with the access code using the LUT; and outputting the multiple tones encoded with the access code for authentication. In another embodiment, verification involves receiving multiple tones encoded with an access code; generating multiple parallel BPSK symbols from the multiple tones; converting the BPSK symbols into an encoded interleaved bit stream of the access code; de-interleaving the encoded interleaved bit stream; and recovering the access code from the encoded de-interleaved bit stream.
    Type: Grant
    Filed: February 23, 2004
    Date of Patent: February 3, 2009
    Assignee: Qualcomm, Inc.
    Inventors: Jack Steenstra, Alexander Gantman, John W. Noerenberg, II, Ahmad Jalali, Gregory G. Rose
  • Publication number: 20080260164
    Abstract: Systems and methods of securing wireless communications between a network and a subscriber station are disclosed. One embodiment creates authentication triplets due to expire after a certain amount of time such that they may not be used indefinitely by an attacker who intercepts them.
    Type: Application
    Filed: October 18, 2007
    Publication date: October 23, 2008
    Applicant: QUALCOMM Incorporated
    Inventors: Michael Paddon, Gregory G. Rose, Philip M. Hawkes, James F. Semple
  • Patent number: 7428305
    Abstract: A method for constructing keyed integer permutations over the set ZN. where N can be factored into p and q, or N can be prime. N bits are permuted by deriving a keyed permutation of representative indices. When N is factorable into p and q, the set of indices are divided into two portions. The portions undergo iterative processing called “rounds,” and in each round, a first half-round function operates on the first portion to form a first half-round value; the first half-round value and the second portion are added together by a modulo-p adder to form a first output value; a second half-round function operates on the second portion to form a second half-round value; and the second half-round value and the first portion are added together by a modulo-q adder to form a second output value. In this manner, outputs of the rounds are reordered. If N is prime and not less than 13, then N is separated into composite values s and t, and two sets are formed with s and t elements, respectively.
    Type: Grant
    Filed: May 2, 2000
    Date of Patent: September 23, 2008
    Assignee: QUALCOMM Incorporated
    Inventors: Philip Hawkes, Gregory G. Rose, Roy Franklin Quick, Jr.
  • Publication number: 20080226073
    Abstract: Method and apparatus for secure transmissions. Each user is provided a registration key. A long-time updated broadcast key is encrypted using the registration key and provided periodically to a user. A short-time updated key is encrypted using the broadcast key. The short-time key is available with each broadcast message, wherein sufficient information to calculate the short-time key is provided in an Internet protocol header preceding the broadcast content. Broadcasts are then encrypted using the short-time key, wherein the user decrypts the broadcast message using the short-time key.
    Type: Application
    Filed: February 28, 2008
    Publication date: September 18, 2008
    Applicant: QUALCOMM Incorporated
    Inventors: Philip Hawkes, Nikolai K.N. Leung, Gregory G. Rose
  • Publication number: 20080229109
    Abstract: A visual authentication scheme for websites is provided that binds an image to a website so that a user can by visually authenticate whether he/she is viewing an intended/trusted website. An authentication or cryptographic key (associated with a web page) is rendered as a unique key-identifying image or unique sequence of images. This key-identifying image(s) is then displayed to the user. The user associates this key-identifying image with the originator or source of the web page so that the user can easily recognize the originator by glancing at the key-identifying image. The association between the key-identifying image and the cryptographic/authentication key (and thereby the source of the web page) can be achieved similarly to brand awareness.
    Type: Application
    Filed: March 12, 2007
    Publication date: September 18, 2008
    Inventors: Alexander Gantman, Gregory G. Rose
  • Patent number: 7415109
    Abstract: Methods and apparatus are presented for encrypting and authenticating data, wherein some data is encrypted and some data is not encrypted, but all of the data is authenticated. Masking modules (410) are used in a partial-block encryption mode to indicate which bits of a data block are to be encrypted.
    Type: Grant
    Filed: August 23, 2002
    Date of Patent: August 19, 2008
    Assignee: QUALCOMM Incorporated
    Inventors: Gregory G. Rose, Philip Michael Hawkes
  • Publication number: 20080196095
    Abstract: A process and device for uniquely identifying an Internet enabled device with a unique identification. The process can include receiving an identification when an Internet user accesses an Internet resource, and determining position-based information for at least one of an Internet user and an Internet enabled device based on the identification. The identification may be authenticated, to reduce fraud. The identification may further be used to determine whether or not the device is in a particular geographic area of interest.
    Type: Application
    Filed: November 16, 2007
    Publication date: August 14, 2008
    Applicant: Qualcomm Incorporated
    Inventors: Leonid Sheynblat, Elio J. Oliva, Gregory G. Rose
  • Patent number: 7401224
    Abstract: A hand-held token can be operated to generate an acoustic signal representing the digital signature generated by a private key of a public key/private key pair. Verifiers that might be located at, e.g., buildings, in vehicles, at bank ATMs, etc. receive the signal and retrieve the corresponding public key to selectively grant access authorization to components served by the verifiers. Methods and systems permit adding and removing a token from the access list of a verifier. Other methods and systems enable the token to be used with several verifiers that are nearby each other, such as might be the case with multiple vehicles owned by the same user and parked nearby each other, without more than one verifier being operated to grant access.
    Type: Grant
    Filed: June 13, 2002
    Date of Patent: July 15, 2008
    Assignee: Qualcomm Incorporated
    Inventors: Alexander Gantman, Gregory G. Rose
  • Publication number: 20080144787
    Abstract: A small form-factor security device is provided that may be inserted in series with a telephone line to encrypt dual tone multi-frequency (DTMF) tones from a telephone to prevent unauthorized disclosure of sensitive information. A receiving device decrypts the encrypted DTMF tones to receive the original information sent by the telephone. The security device acts as a second factor in a two-factor authentication scheme with a tele-services security server that authenticates the security device.
    Type: Application
    Filed: December 15, 2006
    Publication date: June 19, 2008
    Inventors: Alexander Gantman, Gregory G. Rose, Jae-Hee Choi, John W. Noerenberg
  • Publication number: 20080104397
    Abstract: Prior to transmission, a message is divided into multiple transmission units. A sub-message authentication code is obtained for each of the transmission units. A composed message authentication code is obtained for the whole message based on the sub-message authentication codes of the multiple transmission units. The multiple transmission units and the composed message authentication code are then transmitted. A receiver of the message receives a plurality of transmission units corresponding to the message. A local sub-message authentication code is calculated by the receiver for each transmission unit. A local composed message authentication code is calculated by the receiver based on the local sub-message authentication codes for the plurality of transmission units. The local composed message authentication code is compared to a received composed message authentication code to determine the integrity and/or authenticity of the received message.
    Type: Application
    Filed: March 1, 2007
    Publication date: May 1, 2008
    Inventors: Michael Paddon, Adrian Escott, Gregory G. Rose, Philip Hawkes
  • Patent number: 7366895
    Abstract: A method for permitting encrypted communications between two stations which are operable with encryption algorithms that accept encryption keys having work factors with different values, by: in a first determining step, determining the lower one of the different values; providing an initial encryption key having a first work factor value; comparing the first work factor value with the lower one of the work factors determined in the determining step; when, in the comparing step, the first work factor value is greater than the lower one of the work factor values determined in the determining step, performing the following steps: performing a first hash function on the initial encryption key to produce a first output, and deriving from the first output a first intermediate key having a work factor value not greater than the lower one of the different work factor values determined in the determining step; performing the first hash function on the first intermediate key to produce a second output, and deriving fro
    Type: Grant
    Filed: January 21, 2004
    Date of Patent: April 29, 2008
    Assignee: QUALCOMM Incorporated
    Inventor: Gregory G. Rose
  • Publication number: 20080095370
    Abstract: A stream stretcher is provided for securely expanding a key stream to match fee length of a data block to be encrypted and/or decrypted. A key stream is obtained having a length of LZ bits. A length LD corresponding, to a data block to be encrypted/decrypted is obtained, where LD>LZ. LD?LZ new bits are recursively generated by combining at least two bits of the key stream. The LD?LZ new bits are appended to the key stream to generate a stretched key stream. The data block may then be encrypted/decrypted with the stretched key stream. The at least two bits are selected to have offsets that form a full positive difference set.
    Type: Application
    Filed: October 18, 2006
    Publication date: April 24, 2008
    Inventors: Gregory G. Rose, Philip M. Hawkes
  • Patent number: 7352868
    Abstract: Method and apparatus for secure transmissions. Each user is provided a registration key. A long-time updated broadcast key is encrypted using the registration key and provided periodically to a user. A short-time updated key is encrypted using the broadcast key. The short-time key is available with each broadcast message, wherein sufficient information to calculate the short-time key is provided in an Internet protocol header preceding the broadcast content. Broadcasts are then encrypted using the short-time key, wherein the user decrypts the broadcast message using the short-time key.
    Type: Grant
    Filed: October 9, 2001
    Date of Patent: April 1, 2008
    Inventors: Philip Hawkes, Nikolai K. N. Leung, Gregory G. Rose
  • Patent number: 7305084
    Abstract: Methods and apparatus are presented for secure, authenticated communication and data storage. The methods can be based on other methods such as IAPM, in which the encryption and authentication keys are of the same strength. In the HR-IAPM mode, a sender encrypts the data as in the IAPM mode using two encryption keys K0 and K1. The sender then XORs the plaintexts with corresponding ciphertexts, and combines the results to form a checksum This checksum is encrypted under the authentication key K2, this value is appended to the encrypted message as a message authentication code (MAC). The receiver decrypts as with IAPM, XORs the plaintexts with the corresponding ciphertexts and combines these values to form a checksum. The receiver then encrypts the checksum under the authentication key K2 and verifies that the resulting value agrees with the MAC. The HR mode allows blocks to be sent un-encrypted if desired.
    Type: Grant
    Filed: July 24, 2002
    Date of Patent: December 4, 2007
    Assignee: QUALCOMM Incorporated
    Inventors: Philip Michael Hawkes, Gregory G. Rose