Patents by Inventor Gregory G. Rose

Gregory G. Rose has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20040019783
    Abstract: Methods and apparatus are presented for secure, authenticated communication and data storage. The methods can be based on other methods such as IAPM, in which the encryption and authentication keys are of the same strength. In the HR-IAPM mode, a sender encrypts the data as in the IAPM mode using two encryption keys K0 and K1. The sender then XORs the plaintexts with corresponding ciphertexts, and combines the results to form a checksum This checksum is encrypted under the authentication key K2, this value is appended to the encrypted message as a message authentication code (MAC). The receiver decrypts as with IAPM, XORs the plaintexts with the corresponding ciphertexts and combines these values to form a checksum. The receiver then encrypts the checksum under the authentication key K2 and verifies that the resulting value agrees with the MAC. The HR mode allows blocks to be sent un-encrypted if desired.
    Type: Application
    Filed: July 24, 2002
    Publication date: January 29, 2004
    Inventors: Philip Michael Hawkes, Gregory G. Rose
  • Publication number: 20040019782
    Abstract: Methods and apparatus are presented for partially encrypting a data transmission, yet providing authentication for all of the data transmission. Plaintext blocks are combined with noise blocks and then either encrypted or decrypted to form ciphertext blocks and authentication blocks.
    Type: Application
    Filed: July 24, 2002
    Publication date: January 29, 2004
    Inventors: Philip Michael Hawkes, Gregory G. Rose
  • Publication number: 20040003260
    Abstract: A system and method for digital tickets. An issuer provides a digital ticket to a portable wireless devices such as a sonic token, e.g., acoustic key fob or wireless telephone. The ticket can include a ticket index that may be encrypted. When entry is desired into an entity (such as a movie theater) whose access is controlled by a verifier, a user manipulates the token to wirelessly (e.g., acoustically) transmit the ticket index to the verifier, which grants access if the ticket is valid and has not previously been used or voided.
    Type: Application
    Filed: June 27, 2002
    Publication date: January 1, 2004
    Inventors: Philip Hawkes, Gregory G. Rose
  • Publication number: 20030217269
    Abstract: A hand-held token can be operated to generate an acoustic signal representing the digital signature generated by a private key of a public key/private key pair. Verifiers that might be located at, e.g., buildings, in vehicles, at bank ATMs, etc. receive the signal and retrieve the corresponding public key to selectively grant access authorization to components served by the verifiers. Methods and systems permit adding and removing a token from the access list of a verifier. Other methods and systems enable the token to be used with several verifiers that are nearby each other, such as might be the case with multiple vehicles owned by the same user and parked nearby each other, without more than one verifier being operated to grant access.
    Type: Application
    Filed: June 13, 2002
    Publication date: November 20, 2003
    Inventors: Alexander Gantman, Gregory G. Rose
  • Publication number: 20030206634
    Abstract: A method and apparatus for generating encryption stream ciphers. The recurrence relation is designed to operate over finite fields larger than GF(2) and is maximal length. An output equation generates the output based on a plurality of elements in the shift register used to implement the recurrence relation. The recurrence relation and the output equation are selected to have distinct pair distances such that, as the shift register shifts, no particular pair of elements of the shift register are used twice in either the recurrence relation or the output equation.
    Type: Application
    Filed: April 30, 2001
    Publication date: November 6, 2003
    Inventor: Gregory G. Rose
  • Publication number: 20030185390
    Abstract: In a communications system, a method of transforming a set of message signals representing a message comprising the steps of first encoding one of the set of message signals in accordance with a first keyed transformation, a second encoding of the one of the set of message signals in accordance with at least one additional keyed transformation, a third encoding of the one of the set of message signals in accordance with a self inverting transformation in which at least one of the set of message signals is altered, a fourth encoding of the one of the set of message signals in accordance with at least one additional inverse keyed transformation wherein each of the at least one additional inverse keyed transformation is a corresponding inverse of at least one additional keyed transformation, and fifth encoding the one of the set of message signals in accordance with first inverse keyed transformation wherein the first inverse keyed transformation is the inverse of the first keyed transformation.
    Type: Application
    Filed: May 9, 2003
    Publication date: October 2, 2003
    Applicant: Qualcomm, Inc.
    Inventor: Gregory G. Rose
  • Publication number: 20030169882
    Abstract: Method and apparatus for permitting encrypted communications between two stations which are operable with encryption algorithms that accept encryption keys having work factors with different values, by determining the lower one of the values; providing an initial encryption key having a first work factor value; comparing the first work factor value with the lower one of the work factors when the first work factor value is greater than the lower one of the work factor values, performing a first hash function on the initial encryption key to produce a first output, and deriving from the first output a first intermediate key having a work factor value not greater than the lower one of the work factor values; performing the first hash function on the first intermediate key to produce a second output, and deriving from the second output a final encryption key having a work factor value not greater than the lower one of the work factor values; and using the final encryption key to encrypt communications between the
    Type: Application
    Filed: March 14, 2003
    Publication date: September 11, 2003
    Inventor: Gregory G. Rose
  • Publication number: 20030159050
    Abstract: A hand-held token can be operated to generate an acoustic or other wireless signal representing a digital signature produced from the private key of a public key/private key pair, with the public key being confidential in that it is known only to authorized entities, such as bank computers. The signal from the token can be received by, e.g., a receiver at a bank ATM that also requires a PIN for account access. The user enters the PIN into the ATM, and the ATM encrypts the signal from the token with the PIN and sends it on to the bank computer over a link that need not be secure, since even if the PIN is guessed there is no way to verify that it is the correct PIN without also knowing the confidential public key held by the bank computer.
    Type: Application
    Filed: May 6, 2002
    Publication date: August 21, 2003
    Inventors: Alexander Gantman, Gregory G. Rose
  • Publication number: 20030142644
    Abstract: The method and apparatus updates a binary number that will be used in cellular telephone system authentication procedures by applying a first algorithm to a plurality of most significant bits of a first binary number to obtain a second binary number; operates on a plurality of least significant bits of the first binary number with a second algorithm to obtain a third binary number, and applies a block cipher to the concatenation of the second and third numbers to obtain the updated binary number. When the most significant bits of the updated binary number comprise an all-zeroes number they are replaced with the most significant bits of the concatenation of the second and third numbers.
    Type: Application
    Filed: November 26, 2002
    Publication date: July 31, 2003
    Inventor: Gregory G. Rose
  • Publication number: 20030120925
    Abstract: An apparatus and method for authentication having a processor and at least one activator coupled to the processor is claimed. A signature generator is coupled to the processor and capable of generating a secure identifier. An emitter coupled to the signal generator capable of emitting the secure identifier. A receiver receives the emitted secure identifier and verifies that the secure identifier was appropriately transmitted. The public key corresponding to the key identifier transmitted is accessed to determine the validity of the secure identifier using the accessed key and that the time indicated in the received secure identifier is verified to be within acceptable time tolerances.
    Type: Application
    Filed: February 15, 2002
    Publication date: June 26, 2003
    Inventors: Gregory G. Rose, Roy Franklin Quick, Alexander Gantman
  • Publication number: 20030112976
    Abstract: In a disclosed embodiment, a visitor location register first initializes an assignment table to store N entries. Next, the visitor location register waits until a TMSI assignment is needed. Then, a counter is maintained in memory and is incremented. The value of the counter is then hashed to produce an assignment table index. Beginning at the assignment table index, the assignment table is searched for an available entry. The counter is then encrypted to produce a TMSI. The IMSI corresponding to the TMSI assignment is then stored in the assignment table.
    Type: Application
    Filed: December 17, 2001
    Publication date: June 19, 2003
    Inventors: Roy Franklin Quick, Gregory G. Rose
  • Patent number: 6578143
    Abstract: A method for permitting encrypted communications between two stations which are operable with encryption algorithms that accept encryption keys having work factors with different values, by: in a first determining step, determining the lower one of the different values; providing an initial encryption key having a first work factor value; comparing the first work factor value with the lower one of the work factors determined in the determining step; when, in the comparing step, the first work factor value is greater than the lower one of the work factor values determined in the determining step, performing the following steps: performing a first hash function on the initial encryption key to produce a first output, and deriving from the first output a first intermediate key having a work factor value not greater than the lower one of the different work factor values determined in the determining step; performing the first hash function on the first intermediate key to produce a second output, and deriving fro
    Type: Grant
    Filed: December 18, 1998
    Date of Patent: June 10, 2003
    Assignee: Qualcomm Incorporated
    Inventor: Gregory G. Rose
  • Patent number: 6560338
    Abstract: A method and an apparatus for generating encryption stream ciphers are based on a recurrence relation designed to operate over finite fields larger than GF(2). A non-linear output can be obtained by using one or a combination of non-linear processes to form an output function. The recurrence relation and the output function can be selected to have distinct pair distances such that, as the shift register is shifted, no identical pair of elements of the shift register are used twice in either the recurrence relation or the output function. Under these conditions, the recurrence relation and the output function also can be chosen to optimize cryptographic security or computational efficiency. Moreover, it is another object of the present invention to provide a method of assuring that the delay that results for the encryption process does not exceed predetermined bounds.
    Type: Grant
    Filed: February 8, 1999
    Date of Patent: May 6, 2003
    Assignee: Qualcomm Incorporated
    Inventors: Gregory G. Rose, Roy Franklin Quick, Jr.
  • Publication number: 20030070092
    Abstract: Method and apparatus for secure transmissions. Each user is provided a registration key. A long-time updated broadcast key is encrypted using the registration key and provided periodically to a user. A short-time updated key is encrypted using the broadcast key. The short-time key is available with each broadcast message, wherein sufficient information to calculate the short-time key is provided in an Internet protocol header preceding the broadcast content. Broadcasts are then encrypted using the short-time key, wherein the user decrypts the broadcast message using the short-time key.
    Type: Application
    Filed: October 9, 2001
    Publication date: April 10, 2003
    Inventors: Philip Hawkes, Nikolai K. N. Leung, Gregory G. Rose
  • Publication number: 20030059040
    Abstract: A method and apparatus for decrypting stream ciphers. An SSC2-type stream cipher is decrypted by utilizing the period of LFG output and the correlation of the LSBs of LSFR output. A dynamic probability of error for each bit of a data stream is calculated to determine whether a particular bit should be inverted.
    Type: Application
    Filed: August 22, 2002
    Publication date: March 27, 2003
    Inventors: Gregory G. Rose, Philip Michael Hawkes
  • Patent number: 6529487
    Abstract: A method and apparatus for generating and communicating random challenge values to mobile stations is disclosed that does not lose the unpredictability of a truly random number but can be simply and economically synchronized across cellular systems. The method and apparatus updates a binary number that will be used in cellular telephone system authentication procedures by applying a first algorithm to a plurality of most significant bits of a first binary number to obtain a second binary number; operates on a plurality of least significant bits of the first binary number with a second algorithm to obtain a third binary number, and applies a block cipher to the concatenation of the second and third numbers to obtain the updated binary number. When the most significant bits of the updated binary number comprise an all-zeroes number they are replaced with the most significant bits of the concatenation of the second and third numbers.
    Type: Grant
    Filed: July 9, 1999
    Date of Patent: March 4, 2003
    Assignee: Qualcomm Incorporated
    Inventor: Gregory G. Rose
  • Publication number: 20030039361
    Abstract: Method and apparatus for secure transmissions. Each user is provided a registration key. A long-time updated broadcast key is encrypted using the registration key and provided periodically to a user. A short-time updated key is encrypted using the broadcast key and provided periodically to a user. Broadcasts are then encrypted using the short-time key, wherein the user decrypts the broadcast message using the short-time key. One embodiment provides link layer content encryption. Another embodiment provides end-to-end encryption.
    Type: Application
    Filed: August 28, 2002
    Publication date: February 27, 2003
    Inventors: Philip Michael Hawkes, Raymond T. Hsu, Ramin Rezaiifar, Gregory G. Rose, Paul E. Bender, Jun Wang, Roy Franklin Quick, Arungundram C. Mahendran, Parag A. Agashe
  • Patent number: 6510228
    Abstract: A method and apparatus for generating encryption stream ciphers. The recurrence relation is designed to operate over finite fields larger than GF(2). The linear feedback shift register used to implement the recurrence relation can be implemented using a circular buffer or sliding a window. Multiplications of the elements of the finite field are implemented using lookup tables. A non-linear output can be obtained by using one or a combination of non-linear processes. The stream ciphers can be designed to support multi-tier keying to suit the requirements of the applications for which the stream ciphers are used.
    Type: Grant
    Filed: September 22, 1997
    Date of Patent: January 21, 2003
    Assignee: QUALCOMM, Incorporated
    Inventor: Gregory G. Rose
  • Publication number: 20020186840
    Abstract: A method and an apparatus for generating encryption stream ciphers are based on a recurrence relation designed to operate over finite fields larger than GF(2). A non-linear output can be obtained by using one or a combination of non-linear processes to form an output function. The recurrence relation and the output function can be selected to have distinct pair distances such that, as the shift register is shifted, no identical pair of elements of the shift register are used twice in either the recurrence relation or the output function. Under these conditions, the recurrence relation and the output function also can be chosen to optimize cryptographic security or computational efficiency.
    Type: Application
    Filed: May 13, 2002
    Publication date: December 12, 2002
    Inventor: Gregory G. Rose
  • Patent number: 6490357
    Abstract: A method and an apparatus for generating encryption stream ciphers are based on a recurrence relation designed to operate over finite fields larger than GF(2). A non-linear output can be obtained by using one or a combination of non-linear processes to form an output function. The recurrence relation and the output function can be selected to have distinct pair distances such that, as the shift register is shifted, no identical pair of elements of the shift register are used twice in either the recurrence relation or the output function. Under these conditions, the recurrence relation and the output function also can be chosen to optimize cryptographic security or computational efficiency.
    Type: Grant
    Filed: August 28, 1998
    Date of Patent: December 3, 2002
    Assignee: Qualcomm Incorporated
    Inventor: Gregory G. Rose