Patents by Inventor James Semple

James Semple has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20060205388
    Abstract: A mutual authentication method is provided for securely agreeing application-security keys with mobile terminals supporting legacy Subscriber Identity Modules (e.g., GSM SIM and CDMA2000 R-UIM, which do not support 3G AKA mechanisms). A challenge-response key exchange is implemented between a bootstrapping server function (BSF) and mobile terminal (MT). The BSF generates an authentication challenge and sends it to the MT under a server-authenticated public key mechanism. The MT receives the challenge and determines whether it originates from the BSF based on a bootstrapping server certificate. The MT formulates a response to the authentication challenge based on keys derived from the authentication challenge and a pre-shared secret key. The BSF receives the authentication response and verifies whether it originates from the MT.
    Type: Application
    Filed: February 3, 2006
    Publication date: September 14, 2006
    Inventors: James Semple, Gregory Rose, John Nasielski
  • Patent number: 7093196
    Abstract: A method and apparatus allowing items to be relatively positioned within an electronic document is disclosed. By positioning the items relative to each other, as opposed to absolutely with respect to the page, this allows for a greater versatility in the page layout. Utilization of this method and apparatus means that items can be automatically aligned on a page. Furthermore if additional items are inserted, the position of the original items can be automatically adjusted to ensure that correct alignment is maintained.
    Type: Grant
    Filed: June 10, 2000
    Date of Patent: August 15, 2006
    Assignee: Oracle International Corporation
    Inventors: David T. Griffiths, Michael L. Gardner, James Semple
  • Publication number: 20060120531
    Abstract: A communications system and method of bootstrapping mobile station authentication and establishing a secure encryption key are disclosed. In one embodiment of the communications network, a distinguished random challenge is reserved for generation of a secure encryption key, wherein the distinguished random challenge is not used for authentication of a mobile station. The distinguished random challenge is stored at a mobile station's mobile equipment and used to generate a secure encryption key, and a bootstrapping function in the network uses a normal random challenge to authenticate the mobile station and the distinguished random challenge to generate the secure encryption key.
    Type: Application
    Filed: September 2, 2005
    Publication date: June 8, 2006
    Inventors: James Semple, Gregory Rose, Michael Paddon, Philip Hawkes
  • Publication number: 20060079205
    Abstract: Methods and devices for instructing a subscriber identity module in a cellular communications network to process non-standard authentication information in a standard manner are disclosed. One embodiment of a method comprises receiving a first message authentication code (MAC) and an authentication management field (AMF) at a subscriber identity module as part of an authentication protocol, calculating a second MAC and determining whether the second MAC is equivalent to the first MAC. If the first and second MAC are not equivalent, the SIM calculates a third MAC and determines whether the first MAC is equivalent to the third MAC, and if so, the subscriber identity module processes the AMF in a predefined or standard manner.
    Type: Application
    Filed: September 2, 2005
    Publication date: April 13, 2006
    Inventors: James Semple, Gregory Rose, Michael Paddon, Philip Hawkes
  • Publication number: 20060048235
    Abstract: An authentication system is disclosed. The authentication system includes a content provider configured to distribute encrypted content, wherein the encrypted content is generated using a content key, and a client having a symmetric key and configured to store the encrypted content received from the content provider and issue a request to the content provider, wherein the request includes a cryptographic function configured to have the symmetric key and the encrypted content as input, wherein the content provider is further configured to verify the client via the request to ensure that the client has received the encrypted content.
    Type: Application
    Filed: January 6, 2005
    Publication date: March 2, 2006
    Inventors: Gregory Rose, James Semple, Roy Quick, Philip Hawkes
  • Publication number: 20060046690
    Abstract: Pseudo-secret key generation in a communications system. A subscriber station may be configured with a processing system having first and second security protocols. The processing system uses the first security protocol to generate a pseudo-secret key from a challenge received from a service provider, and uses the second security protocol to generate a response to the challenge from the pseudo-secret key.
    Type: Application
    Filed: January 6, 2005
    Publication date: March 2, 2006
    Inventors: Gregory Rose, Roy Quick, John Nasielski, James Semple
  • Publication number: 20050138379
    Abstract: A method and apparatus for secure generation of a short-term key SK for viewing information content in a Multicast-broadcast-multimedia system are described. A short-term key is generated by a memory module residing in user equipment (UE) only when the source of the information used to generate the short-term key can be validated. A short-term key can be generated by a Broadcast Access Key (BAK) or a derivative of BAK and a changing value with a Message Authentication Code (MAC) appended to the changing value. A short-term key (SK) can also be generated by using a private key and a short-term key (SK) manager with a corresponding public key distributed to the memory module residing in the user equipment (UE), using a digital signature.
    Type: Application
    Filed: September 1, 2004
    Publication date: June 23, 2005
    Inventors: James Semple, Gregory Rose
  • Publication number: 20050102517
    Abstract: Systems and methods of securing wireless communications between a network and a subscriber station are disclosed. One embodiment creates authentication triplets due to expire after a certain amount of time such that they may not be used indefinitely by an attacker who intercepts them.
    Type: Application
    Filed: September 16, 2004
    Publication date: May 12, 2005
    Inventors: Michael Paddon, Gregory Rose, Philip Hawkes, James Semple
  • Publication number: 20050100165
    Abstract: Systems and methods of securing wireless communications between a network and a subscriber station include inserting a marker denoting an encryption type within a random value used for authentication, calculating a first session key and a first response value as a function of the random value, then calculating a second session key and a second response value as a function of the random value, first session key and first response value. The two levels of session keys and response values may be used by upgraded subscriber stations and network access points to prevent attackers from intercepting authentication triplets.
    Type: Application
    Filed: September 16, 2004
    Publication date: May 12, 2005
    Inventors: Gregory Rose, Michael Paddon, Philip Hawkes, James Semple
  • Publication number: 20050008159
    Abstract: A method and an apparatus for secure registration for a multicast-broadcast-multimedia system (MBMS) are disclosed. A random number is generated by a broadcast-multicast-service center (BM-SC) and broadcast to user equipment in the coverage area of a radio access network (RAN). A memory module or smart card (UICC) in the user equipment generates a radio access network key (RAK) which is a function of the random number and a key selected from the group consisting of a public land mobile network key (PK) and a broadcast access key (BAK), and then generates a temporary registration key (RGK) as a function of the RAK, a service identification number and a user identification number, for example, P-TMSI, which may be extracted by the RAN to authenticate the registration as legitimate.
    Type: Application
    Filed: July 7, 2003
    Publication date: January 13, 2005
    Inventors: Francesco Grilli, Lorenzo Casaccia, James Semple, Parag Agashe
  • Publication number: 20050010774
    Abstract: Apparatus and method for provisioning an access key used for a controlled access broadcast service is disclosed. In one aspect, a method for secure processing in a device that securely stores a secret key comprises receiving a plurality of challenges from a network, generating a plurality of ciphering keys based on the secret key and the plurality of challenges, and generating an access key based on the plurality of ciphering keys.
    Type: Application
    Filed: June 16, 2004
    Publication date: January 13, 2005
    Inventors: Gregory Rose, James Semple, Roy Quick
  • Publication number: 20040120527
    Abstract: Method and apparatus for secure transmissions. Each user is provided a registration key. A long-time updated broadcast key is encrypted using the registration key and provided periodically to a user. A short-time updated key is encrypted using the broadcast key and provided periodically to a user. Broadcasts are then encrypted using the short-time key, wherein the user decrypts the broadcast message using the short-time key. One embodiment provides link layer content encryption. Another embodiment provides end-to-end encryption.
    Type: Application
    Filed: February 2, 2004
    Publication date: June 24, 2004
    Inventors: Philip Michael Hawkes, James Semple, Gregory Gordon Rose
  • Publication number: 20030074555
    Abstract: A method of requesting and issuing a certificate from certification authority for use by an initiating correspondent with a registration authority is provided. The initiating correspondent makes a request for a certificate to the registration authority, and the registration authority sends the request to a certificate authority, which issues the certificate to the registration authority. The certificate is stored at a location in a directory and this location is associated with a pointer such as uniform resource locator (URN) that is derived from information contained in the certificate request. The initiating correspondent computes the location using the same information and forwards it to other corespondents. The other correspondents can then locate the certificate to authenticate the public key of the initiating correspondent.
    Type: Application
    Filed: October 17, 2001
    Publication date: April 17, 2003
    Inventors: Paul Neil Fahn, James Semple