Patents by Inventor Gregory Gordon Rose

Gregory Gordon Rose has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7756269
    Abstract: The REX cryptosystem presented herein is a variant of the NTRU cryptosystem. In the REX cryptosystem, a primary ring RXOR and two secondary rings RXOR,q and RXOR,p are used to reduce the number of operations required to compute the keys, to perform the encryption process, and to perform the decryption process. The REX cryptosystem may also be implemented using Walsh-Hadamard transformations to significantly increase speed.
    Type: Grant
    Filed: March 14, 2003
    Date of Patent: July 13, 2010
    Assignee: QUALCOMM Incorporated
    Inventors: Philip Michael Hawkes, Roy Franklin Quick, Gregory Gordon Rose
  • Publication number: 20100174907
    Abstract: A mutual authentication method is provided for securely agreeing application-security keys with mobile terminals supporting legacy Subscriber Identity Modules (e.g., GSM SIM and CDMA2000 R-UIM, which do not support 3G AKA mechanisms). A challenge-response key exchange is implemented between a bootstrapping server function (BSF) and mobile terminal (MT). The BSF generates an authentication challenge and sends it to the MT under a server-authenticated public key mechanism. The MT receives the challenge and determines whether it originates from the BSF based on a bootstrapping server certificate. The MT formulates a response to the authentication challenge based on keys derived from the authentication challenge and a pre-shared secret key. The BSF receives the authentication response and verifies whether it originates from the MT.
    Type: Application
    Filed: March 22, 2010
    Publication date: July 8, 2010
    Applicant: QUALCOMM Incorporated
    Inventors: James F. Semple, Gregory Gordon Rose, John W. Nasielski
  • Patent number: 7715822
    Abstract: A mutual authentication method is provided for securely agreeing application-security keys with mobile terminals supporting legacy Subscriber Identity Modules (e.g., GSM SIM and CDMA2000 R-UIM, which do not support 3G AKA mechanisms). A challenge-response key exchange is implemented between a bootstrapping server function (BSF) and mobile terminal (MT). The BSF generates an authentication challenge and sends it to the MT under a server-authenticated public key mechanism. The MT receives the challenge and determines whether it originates from the BSF based on a bootstrapping server certificate. The MT formulates a response to the authentication challenge based on keys derived from the authentication challenge and a pre-shared secret key. The BSF receives the authentication response and verifies whether it originates from the MT.
    Type: Grant
    Filed: February 3, 2006
    Date of Patent: May 11, 2010
    Assignee: QUALCOMM Incorporated
    Inventors: James Semple, Gregory Gordon Rose, John Wallace Nasielski
  • Publication number: 20100115286
    Abstract: A block cipher is provided that secures data by encrypting it based on the memory address where it is to be stored. When encrypting data for storage in the memory address, the memory address is encrypted in a first plurality of block cipher rounds. Data round keys are generated using information from the first plurality of block cipher rounds. Data to be stored is combined with the encrypted memory address and encrypted in a second plurality of block cipher rounds using the data round keys. The encrypted data is then stored in the memory location. When decrypting data, the memory address is again encrypted as before while the encrypted stored data is decrypted in a second plurality of the block cipher rounds using the data round keys to obtain a partially decrypted data. The partially decrypted data is combined with the encrypted memory address to obtain fully decrypted data.
    Type: Application
    Filed: October 30, 2008
    Publication date: May 6, 2010
    Applicant: QUALCOMM Incorporated
    Inventors: Philip Michael Hawkes, LU Xiao, Gregory gordon Rose, Steve Millendorf
  • Publication number: 20100098242
    Abstract: Disclosed is a method for evaluating resistance to cryptanalysis of a cipher structure having a diffusion element including a linear transformation placed between differently-sized confusion elements at an input and an output of the diffusion element. A generalized minimum number of non-zero symbols at the diffusion element's input and output is determined. The diffusion element's input is divided into subset inputs, each having a size corresponding to the size of each confusion element at the diffusion element input. For each subset input, a subset number of non-zero symbols at the subset input and the diffusion element output is determined. Each subset number is summed to generate a summed subset number. The summed subset number is subtracted from the generalized minimum number to generate a worst-case number. An upper bound of a maximum differential characteristic probability is calculated and used to evaluate the cipher structure.
    Type: Application
    Filed: October 17, 2008
    Publication date: April 22, 2010
    Applicant: QUALCOMM Incorporated
    Inventors: Lu Xiao, Philip Michael Hawkes, Gregory Gordon Rose
  • Publication number: 20100100933
    Abstract: Disclosed is a method for transitioning access rights, in a remote station with role-based access control, for an unknown role having access rights defined by a central access control management module. In the method, a role capability table is maintained in the remote station specifying centrally-defined access rights of roles that are interpretable in the remote station. An access request associated with an unknown role that is not interpretable in the remote station is received. The access request includes a role transition list that relates the unknown role to other centrally-defined roles. At least one of the other centrally-defined roles is interpretable in the remote station. A role is selected, from the role transition list, that is interpretable in the remote station for interpreting the unknown role of the access request. Access is granted based on the access request associated with the unknown role using the access rights of the interpretable role selected from the role transition table.
    Type: Application
    Filed: October 17, 2008
    Publication date: April 22, 2010
    Applicant: QUALCOMM Incorporated
    Inventors: Gregory Gordon Rose, Alexander Gantman, Lu Xiao
  • Publication number: 20100049615
    Abstract: The mobile commerce authentication and authorization system disclosed, illustrated, and claimed allows a user of a currently existing mobile wireless communications instrument to conduct financial transactions, including purchases, across a wireless communications system using location data to authorize and authenticate the user and the transaction. The location of the mobile wireless communications instrument and the location of a vendor point-of-sale device are matched with a payment sum. Authentication of the user of the mobile wireless communications instrument is achieved at least by application of the position and/or location determinable features of the mobile wireless communications instrument, the position and/or location of a point-of-sale device of a vendor or merchant where the instrument user seeks to purchase goods or services, and the payment sum entered on the point-of-sale device.
    Type: Application
    Filed: August 20, 2008
    Publication date: February 25, 2010
    Applicant: QUALCOMM Incorporated
    Inventors: Gregory Gordon Rose, Craig Lauer, Alexander Gantman, Joan T. Waltman
  • Publication number: 20090307766
    Abstract: Disclosed is a method for verifying data packet integrity in a streaming-data channel. In the method, data packets are received from the streaming-data channel. Each data packet includes a data payload and a corresponding message integrity code. The received data packets are processed in a first processing mode, wherein the received data packets are forwarded to an application module before checking the integrity of the data packets using the respective message integrity codes. An integrity-check-failure measurement is generated for monitoring an integrity-check-failure rate in the first processing mode. If the integrity-check-failure measurement exceeds an integrity-check threshold, then the method transitions to a second processing mode. A received data packet is forwarded to the application module in the second processing mode only after passing the integrity check.
    Type: Application
    Filed: June 9, 2008
    Publication date: December 10, 2009
    Applicant: QUALCOMM INCORPORATED
    Inventors: Gregory Gordon Rose, David Jonathan Julian, Lu Xiao
  • Patent number: 7623656
    Abstract: Stream cipher encryption and message authentication. Stream cipher encryption is performed by generating a keystream at the transmitting end from a state value, applying the keystream to plaintext to generate an encrypted message block having at least a portion of the plaintext converted to ciphertext, and updating the state value as a function of said at least a portion of the plaintext. Stream cipher decryption is performed by generating a keystream at the receiving end from the same state value, applying the keystream to the encrypted message block to convert the ciphertext to plaintext, and updating the state value as a function of the plaintext. Message authentication techniques are also described.
    Type: Grant
    Filed: February 17, 2005
    Date of Patent: November 24, 2009
    Assignee: QUALCOMM Incorporated
    Inventors: Phillip Hawkes, Michael Paddon, Gregory Gordon Rose
  • Publication number: 20090282243
    Abstract: A puzzle-based protocol is provided that allows a token and verifier to agree on a secure symmetric key for authentication between the token and verifier. A token stores a secret key and one or more puzzle-generating algorithms. The verifier independently obtains a plurality of puzzles associated with the token, pseudorandomly selects at least one of the puzzles, and solves it to obtain a puzzle secret and a puzzle identifier. The verifier generates a verifier key based on the puzzle secret. The verifier sends the puzzle identifier and an encoded version of the verifier key to the token. The token regenerates the puzzle secret using its puzzle-generating algorithms and the puzzle identifier. The token sends an encoded response to the verifier indicating that it knows the verifier key. The token and verifier may use the verifier key as a symmetric key for subsequent authentications.
    Type: Application
    Filed: May 9, 2008
    Publication date: November 12, 2009
    Applicant: QUALCOMM Incorporated
    Inventors: Gregory Gordon Rose, Alexander Gantman, Miriam Wiggers De Vries, Michael Paddon, Philip Michael Hawkes
  • Publication number: 20090282253
    Abstract: A network helper is provided that assists verifiers in executing a puzzle-based protocol for authentication of a token. A token stores a secret key and one or more puzzle-generating algorithms. The helper stores a plurality of puzzles associated with a particular token. When requested to do so by a verifier, the helper provides a plurality of pseudorandomly selected puzzles for the token to a verifier. The puzzles are encoded with information that is used between the verifier and token to establish a secured symmetric key. The verifier selects one or a few of the encoded puzzles and breaks them by a brute force attack. Because the helper does not know which puzzles have been selected, it has to break all puzzles to attempt to figure out the symmetric key. However, if a large number of puzzles are utilized, say millions, then breaking all of them becomes a computationally prohibitive task.
    Type: Application
    Filed: May 9, 2008
    Publication date: November 12, 2009
    Applicant: QUALCOMM Incorporated
    Inventors: Gregory Gordon Rose, Alexander Gantman, Miriam Wiggers De Vries, Michael Paddon, Philip Michael Hawkes
  • Patent number: 7533735
    Abstract: Method and apparatus for controlling access to a secure network, system or application is disclosed. In one embodiment, an apparatus for requesting authentication includes a storage medium that stores a cryptographic key, a processor that generates an access code using the cryptographic key, a converter that converts the access code into sound waves, and an audio output unit that outputs the sound waves encoded with the access code for authentication. An apparatus for granting authentication includes a storage medium that stores a cryptographic key, an audio input unit that receives sound waves encoded with a access code, a converter that recovers the access code from the sound waves, and a processor that generates a second access code using the cryptographic key and grants authentication if the access code corresponds to the second access code.
    Type: Grant
    Filed: July 22, 2003
    Date of Patent: May 19, 2009
    Assignee: Qualcomm Corporation
    Inventors: Alexander Gantman, Gregory Gordon Rose
  • Publication number: 20090005140
    Abstract: A virtual environment and real world environment are combined into a framework that facilitates large-scale social interaction in multi-player fantasy games played in both the real world and/or a virtual world. Such combination of real and virtual world features may blend geo-caching, orienteering, and other virtual gaming features to enable players to interact across the real and virtual environments. A real world player is also mapped into the virtual environment, thereby inserting the player's movements and actions into the virtual environment. Additionally, this feature enables interaction between players located in a real environment with characters found in a virtual environment. A player may use a mobile device that is configured to recognize the geo-location and orientation of the player and display a corresponding view of the virtual environment gaming landscape for the player.
    Type: Application
    Filed: June 26, 2007
    Publication date: January 1, 2009
    Applicant: QUALCOMM Incorporated
    Inventors: Gregory Gordon Rose, Miriam Wiggers De Vries, Michael Paddon, Philip Michael Hawkes
  • Publication number: 20090003597
    Abstract: Embodiments disclosed allow authentication between two entities having agreed on the use of a common modulus N. The authentication includes generating a pseudorandom string value; generating a public key value based on the modulus N and the pseudorandom string value; generating a private key value corresponding to the public key value; receiving a verifier's public key value; generating a shared secret value based on the modulus N, the private key value and the verifier's public key value; calculating an authentication signature value using the shared secret value; and transmitting the authentication signature value for authentication. When the authentication signature is received, the public key value and the shared value are generated to calculate an authentication signature value. Thereafter, the authentication signature values are compared and authenticated.
    Type: Application
    Filed: February 24, 2006
    Publication date: January 1, 2009
    Applicant: QUALCOMM INCORPORATED
    Inventors: Alexander Gantman, Gregory Gordon Rose, John W. Noerenberg, II, Philip Michael Hawkes
  • Publication number: 20080263117
    Abstract: A secure seeding and reseeding scheme is provided for pseudorandom number generators by using a pre-stored initialization seed. This scheme initializes a pseudorandom number generator into an unknown state even when entropy collection is unavailable. A primary seed file and a shadow seed file are maintained with initialization seed information in a secure file system. If the primary seed file is corrupted, the pseudorandom number generator is seeded with the content of the shadow seed file. Additionally, a trusted timer or clock may be mixed with the pre-stored initialization seed to add entropy even when the pre-stored seed information has been compromised.
    Type: Application
    Filed: April 23, 2007
    Publication date: October 23, 2008
    Inventors: Gregory Gordon Rose, Alexander Gantman, Lu Xiao, David Figueroa
  • Publication number: 20080240440
    Abstract: Device authentication is based on the ability of a human to synchronize the movements of his or her fingers. A pairing procedure for two wireless devices may thus involve a synchronization test that is based on the relative timing of actuations of input devices on each of the wireless devices. In some aspects a synchronization test involves determining whether actuations of user input devices on two different wireless devices occurred within a defined time interval. In some aspects a synchronization test involves comparing time intervals defined by multiple actuations of user input devices on two wireless devices.
    Type: Application
    Filed: August 24, 2007
    Publication date: October 2, 2008
    Inventors: Gregory Gordon Rose, Lu Xiao, David Jonathan JULIAN
  • Publication number: 20080037785
    Abstract: A constrained proxy key is used to secure communications between two devices via an intermediary device. A first proxy key is generated at a host device (key generator device) based on a shared secret key, one or more constraints on the first proxy key, and a key derivation function. At least the shared secret key and key derivation function are known to the host device an a client device (authentication device). The first proxy key is sent to a proxy device to use in authenticating communications with the client device. An authenticated message is generated by the proxy device using the first proxy key and sent to the client device. The client device locally generates a second proxy key using the key derivation function, one or more constraints, and the shared secret key for authenticating the proxy device. The proxy device is authenticated if the client device successfully accesses the authenticated message from the proxy device using the second proxy key.
    Type: Application
    Filed: September 27, 2006
    Publication date: February 14, 2008
    Inventors: Alexander Gantman, Tolga Yalcinkaya, Gregory Gordon Rose, Lu Xiao
  • Publication number: 20040227624
    Abstract: An apparatus and method for viewing information from a mobile station in a vehicle is disclosed. Generally, a display module is configured to be installed in a vehicle and to link with the mobile station to display information from the mobile station. A control module is coupled to the display module and configured to enable the display of the information from the mobile station.
    Type: Application
    Filed: November 20, 2003
    Publication date: November 18, 2004
    Inventors: Philip Michael Hawkes, Gregory Gordon Rose
  • Publication number: 20040218763
    Abstract: Embodiments describe a method and/or system whereby a secret key in a cryptographic system may be replaced without revealing the secret key. One embodiment comprises creating a first private key and corresponding first public key. A second private key associated with the first private key and a second public key corresponding to the second private key are also created. The second private key is output once such that it can be re-created and the second public key is output when outputting the first public key. The first private key is used for authentication. The method further comprises re-creating the second private key; and using the second private key for authentication. Another embodiment comprises creating a private key and corresponding public key with associated system parameter; outputting the system parameter when outputting the public key; and using the private key for authentication. The method may further comprise creating a new private key using the previous key and the system parameter.
    Type: Application
    Filed: January 5, 2004
    Publication date: November 4, 2004
    Inventors: Gregory Gordon Rose, Alexander Gantman, John W. Noerenberg
  • Publication number: 20040179679
    Abstract: The REX cryptosystem presented herein is a variant of the NTRU cryptosystem. In the REX cryptosystem, a primary ring RXOR and two secondary rings RXOR,q and RXOR,p are used to reduce the number of operations required to compute the keys, to perform the encryption process, and to perform the decryption process. The REX cryptosystem may also be implemented using Walsh-Hadamard transformations to significantly increase speed.
    Type: Application
    Filed: March 14, 2003
    Publication date: September 16, 2004
    Inventors: Philip Michael Hawkes, Roy Franklin Quick, Gregory Gordon Rose