Patents by Inventor Michael A. Hawkes

Michael A. Hawkes has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8793497
    Abstract: A puzzle-based protocol is provided that allows a token and verifier to agree on a secure symmetric key for authentication between the token and verifier. A token stores a secret key and one or more puzzle-generating algorithms. The verifier independently obtains a plurality of puzzles associated with the token, pseudorandomly selects at least one of the puzzles, and solves it to obtain a puzzle secret and a puzzle identifier. The verifier generates a verifier key based on the puzzle secret. The verifier sends the puzzle identifier and an encoded version of the verifier key to the token. The token regenerates the puzzle secret using its puzzle-generating algorithms and the puzzle identifier. The token sends an encoded response to the verifier indicating that it knows the verifier key. The token and verifier may use the verifier key as a symmetric key for subsequent authentications.
    Type: Grant
    Filed: May 9, 2008
    Date of Patent: July 29, 2014
    Assignee: QUALCOMM Incorporated
    Inventors: Gregory Gordon Rose, Alexander Gantman, Miriam Wiggers De Vries, Michael Paddon, Philip Michael Hawkes
  • Patent number: 8776739
    Abstract: A cam can rotate on a camshaft of an internal combustion engine. A rocker arm that actuates a valve of the internal combustion engine can include a rocker pivot connection point located on a distal side of a valve component from a proximate end of the rocker arm that is deflected by action of the cam. The rocker arm can include a contact point located between the rocker pivot point and the proximate end. The contact point can act on the valve component to actuate the valve. The rocker pivot connection point can be translated such that it is closer to or further from the cam. This translation can be used to vary valve lift and/or valve timing. The cam can have a three-dimensional profile to provide different actuation distance of the rocker arm. Systems, methods, and articles of manufacture consistent with one or more of these features are described.
    Type: Grant
    Filed: October 10, 2011
    Date of Patent: July 15, 2014
    Assignee: Pinnacle Engines, Inc.
    Inventors: James M. Cleeves, Michael Hawkes
  • Publication number: 20140162606
    Abstract: Systems and methods of performing link setup and authentication are disclosed. A method includes, at an access point, receiving an unprotected authentication request from a mobile device. The method also includes extracting an initiate message from the unprotected authentication request and sending the initiate message to an authentication server. The method further includes receiving an answer message from the authentication server, where the answer message includes a re-authentication master session key (rMSK). The method includes generating an access point nonce (ANonce) and sending an authentication response to the mobile device, where the authentication response includes the ANonce.
    Type: Application
    Filed: February 14, 2014
    Publication date: June 12, 2014
    Applicant: Qualcomm Incprporated
    Inventors: George Cherian, Philip Michael Hawkes, Santosh Paul Abraham, Hemanth Sampath
  • Publication number: 20140164763
    Abstract: Systems and methods of performing link setup and authentication are disclosed. A method includes receiving, at a mobile device, a first access point nonce (ANonce) from an access point and generating a first pairwise transient key (PTK) using the first ANonce. The mobile device sends an authentication request including a station nonce (SNonce) to the access point, where the authentication request is protected using the first PTK. The mobile device receives an authentication response including a second ANonce from the access point, where the authentication response is protected using a second PTK. The mobile device generates the second PTK using the second ANonce and the SNonce and uses the second PTK to protect at least one subsequent message to be sent from the mobile device to the access point.
    Type: Application
    Filed: February 14, 2014
    Publication date: June 12, 2014
    Applicant: Qualcomm Incprporated
    Inventors: George Cherian, Philip Michael Hawkes, Santosh Paul Abraham, Hemanth Sampath
  • Publication number: 20140158093
    Abstract: Fuel efficiency of small carbureted engines can be improved through the use of a fuel shut off valve that ceases fuel flow in the carburetor upon determination that the engine throttle has been closed and the engine is not at or near an idle condition.
    Type: Application
    Filed: July 9, 2013
    Publication date: June 12, 2014
    Inventors: James M. Cleeves, Michael Hawkes
  • Patent number: 8750285
    Abstract: Embodiments describe a system and/or method for efficient classification of network packets. According to an aspect a method includes describing a packet as a feature vector and mapping the feature vector to a feature space. The method can further include defining a feature prism, classifying the packet relative to the feature prism, and determining if the feature vector matches the feature prism. If the feature vector matches the feature prism the packet is passed to a data recipient, if not, the packet is blocked. Another embodiment is an apparatus that includes an identification component that defines at least one feature of a packet and a classification component that classifies the packet based at least in part upon the at least one defined feature.
    Type: Grant
    Filed: September 26, 2011
    Date of Patent: June 10, 2014
    Assignee: QUALCOMM Incorporated
    Inventors: Michael Paddon, Gregory Gordon Rose, Philip Michael Hawkes
  • Patent number: 8738027
    Abstract: Techniques are provided which may be implemented in various methods, apparatus, and/or articles of manufacture to allow a mobile device to obtain certain location service(s) and/or the like from one or more computing devices that have been authorized for use. For example, in certain implementations, an authorizing location server may obtain a first message from a mobile device indicating a first set of location servers, determine a second set of location servers based, at least in part, on the first set of location servers, and transmit a second message to the mobile device indicating that the second set of location servers are authorized for location service related access by the mobile device.
    Type: Grant
    Filed: February 4, 2012
    Date of Patent: May 27, 2014
    Assignee: QUALCOMM Incorporated
    Inventors: Stephen William Edge, Andreas Klaus Wachter, Philip Michael Hawkes
  • Patent number: 8726019
    Abstract: In a communication system in which two communication entities seek to have a private or confidential communication session, a trust relationship needs first be established. The trust relationship is based on the determination of a shared secret which in turn is generated from contextual information. The contextual information can be derived from the circumstances surrounding the communication session. For example, the contextual information can include topological information, time-based information, and transactional information. The shared secret may be self-generated or received from a third party. In either event, the shared secret may be used as key material for any cryptographic protocol used between the communication entities.
    Type: Grant
    Filed: February 10, 2006
    Date of Patent: May 13, 2014
    Assignee: QUALCOMM Incorporated
    Inventors: Michael Paddon, Gregory Gordon Rose, James Semple, Philip Michael Hawkes
  • Publication number: 20140094147
    Abstract: A particular method includes generating, at a secure user plane location (SUPL) server, a message to be sent to a mobile device, the message including: a server certificate including an identifier of the SUPL server and a public key of the SUPL server; and a request for a device certificate of the mobile device. The method also includes receiving a reply from the mobile device that includes a device certificate of the mobile device; and authenticating the mobile device as associated with a SUPL user based on the device certificate.
    Type: Application
    Filed: December 4, 2013
    Publication date: April 3, 2014
    Applicant: QUALCOMM Incorporated
    Inventors: Philip Michael Hawkes, Andreas Klaus Wachter, Adrian Edward Escott, Stephen William Edge
  • Publication number: 20140093081
    Abstract: A particular method includes receiving, at a secure user plane location (SUPL) server, an indication from a mobile device of one or more transport layer security (TLS) cipher suites supported by the mobile device; determining whether the one or more TLS cipher suites include a TLS pre-shared key (TLS-PSK) cipher suite that is supported by the SUPL server; in response to determining whether the one or more TLS cipher suites include the TLS-PSK cipher suite that is supported by the SUPL server, performing a generic bootstrapping architecture (GBA)-based authentication process to authenticate the mobile device, or determining whether the SUPL server supports a certificate-based authentication method; and in response to determining that the SUPL server supports the certificate-based authentication method, performing the certificate-based authentication method that includes sending a server certificate to the mobile device and receiving a device certificate from the mobile device.
    Type: Application
    Filed: December 4, 2013
    Publication date: April 3, 2014
    Applicant: QUALCOMM INCORPORATED
    Inventors: Philip Michael Hawkes, Andreas Klaus Wachter, Adrian Edward Escott, Stephen William Edge
  • Patent number: 8675017
    Abstract: A virtual environment and real world environment are combined into a framework that facilitates large-scale social interaction in multi-player fantasy games played in both the real world and/or a virtual world. Such combination of real and virtual world features may blend geo-caching, orienteering, and other virtual gaming features to enable players to interact across the real and virtual environments. A real world player is also mapped into the virtual environment, thereby inserting the player's movements and actions into the virtual environment. Additionally, this feature enables interaction between players located in a real environment with characters found in a virtual environment. A player may use a mobile device that is configured to recognize the geo-location and orientation of the player and display a corresponding view of the virtual environment gaming landscape for the player.
    Type: Grant
    Filed: June 26, 2007
    Date of Patent: March 18, 2014
    Assignee: QUALCOMM Incorporated
    Inventors: Gregory Gordon Rose, Miriam Wiggers De Vries, Michael Paddon, Philip Michael Hawkes
  • Publication number: 20140032424
    Abstract: Systems and methods for protecting digital assets associated with a computing device are described herein. An example of a method according to the disclosure includes assigning at least one asset worth value to respective digital assets associated with a device, computing at least one device worth value using the at least one asset worth value assigned to the digital assets associated with the device, identifying at least one device worth value threshold, performing a comparison of the at least one device worth value to the at least one worth value threshold, and initiating at least one action with respect to the digital assets associated with the device based on the comparison.
    Type: Application
    Filed: September 27, 2013
    Publication date: January 30, 2014
    Applicant: QUALCOMM Incorporated
    Inventors: Philip Michael HAWKES, Alexander GANTMAN, Cameron A. MC Donald, Miriam M. WIGGERS DE VRIES, Craig W. NORTHWAY, Craig M. BROWN
  • Patent number: 8625793
    Abstract: A method for a server to initiate resynchronization with an access terminal, when synchronization has been lost, that cannot be exploited by attackers is provided. The server may provide the access terminal with a secret key that is only known to the access terminal and the server. The access terminal may store the secret key in a secure storage device to prevent the secret key from being hacked. If the server determines that synchronization has been lost, the server may send a resynchronization message to the access terminal with the secret key attached. The access terminal retrieves the stored secret key from the secure memory device and compares it to the secret key attached to the resynchronization message. If there is a match, the access terminal may initiate a secure communication link with the server to reestablish synchronization.
    Type: Grant
    Filed: June 9, 2008
    Date of Patent: January 7, 2014
    Assignee: QUALCOMM Incorporated
    Inventors: Philip Michael Hawkes, Andreas K. Wachter, Michael Paddon
  • Patent number: 8627422
    Abstract: A particular method includes storing, at a mobile device, at least one security credential that is specific to the mobile device. The method also includes transmitting the at least one security credential to a secure user plane location (SUPL) location platform (SLP) to authenticate the mobile device as associated with a SUPL user based on a comparison of the device identifier to a stored device identifier.
    Type: Grant
    Filed: November 3, 2011
    Date of Patent: January 7, 2014
    Assignee: Qualcomm Incorporated
    Inventors: Philip Michael Hawkes, Andreas Wachter, Adrian Edward Escott, Stephen William Edge
  • Patent number: 8611536
    Abstract: A communications system and method of bootstrapping mobile station authentication and establishing a secure encryption key are disclosed. In one embodiment of the communications network, a distinguished random challenge is reserved for generation of a secure encryption key, wherein the distinguished random challenge is not used for authentication of a mobile station. The distinguished random challenge is stored at a mobile station's mobile equipment and used to generate a secure encryption key, and a bootstrapping function in the network uses a normal random challenge to authenticate the mobile station and the distinguished random challenge to generate the secure encryption key.
    Type: Grant
    Filed: September 2, 2005
    Date of Patent: December 17, 2013
    Assignee: QUALCOMM Incorporated
    Inventors: James Semple, Gregory G. Rose, Michael Paddon, Philip Michael Hawkes
  • Patent number: 8595501
    Abstract: A network helper is provided that assists verifiers in executing a puzzle-based protocol for authentication of a token. A token stores a secret key and one or more puzzle-generating algorithms. The helper stores a plurality of puzzles associated with a particular token. When requested to do so by a verifier, the helper provides a plurality of pseudorandomly selected puzzles for the token to a verifier. The puzzles are encoded with information that is used between the verifier and token to establish a secured symmetric key. The verifier selects one or a few of the encoded puzzles and breaks them by a brute force attack. Because the helper does not know which puzzles have been selected, it has to break all puzzles to attempt to figure out the symmetric key. However, if a large number of puzzles are utilized, say millions, then breaking all of them becomes a computationally prohibitive task.
    Type: Grant
    Filed: May 9, 2008
    Date of Patent: November 26, 2013
    Assignee: QUALCOMM Incorporated
    Inventors: Gregory Gordon Rose, Alexander Gantman, Miriam Wiggers De Vries, Michael Paddon, Philip Michael Hawkes
  • Publication number: 20130283352
    Abstract: Techniques are provided which may be implemented in various methods, apparatus, and/or articles of manufacture to allow a mobile device to obtain certain location service(s) and/or the like from one or more computing devices that have been authorized for use. For example, in certain implementations, a location server may comprise a proxy location server for an authorizing location server and may indicate one or more other location servers as being authorized for location service related access by a mobile device.
    Type: Application
    Filed: February 6, 2012
    Publication date: October 24, 2013
    Applicant: QUALCOMM INCORPORATED
    Inventors: Stephen William Edge, Andreas Klaus Wachter, Philip Michael Hawkes
  • Publication number: 20130263223
    Abstract: Systems and methods of performing link setup and authentication are disclosed. A first method utilizes an unprotected association request and an association response that includes an access point nonce (ANonce). A second method includes receiving, during a first link setup using a first ANonce, a second ANonce for use in a second link setup. A third method utilizes a temporary key to protect an association request. A fourth method includes generating an ANonce at a mobile device based on an ANonce-seed received from an access point.
    Type: Application
    Filed: September 11, 2012
    Publication date: October 3, 2013
    Applicant: QUALCOMM Incorporated
    Inventors: George Cherian, Philip Michael Hawkes, Santosh Paul Abraham, Hemanth Sampath
  • Publication number: 20130243194
    Abstract: A method includes generating a shared master secret. The method also includes generating a set of shared ephemeral key data. The set of shared ephemeral key data is generated independent of the shared master secret. A validity duration of the set of shared ephemeral key data is less than a validity duration of the shared master secret. The method further includes encrypting at least one message that is to be transmitted to at least one station based on at least the shared master secret and the set of shared ephemeral key data.
    Type: Application
    Filed: September 11, 2012
    Publication date: September 19, 2013
    Applicant: QUALCOMM Incorporated
    Inventors: Philip Michael Hawkes, George Cherian
  • Publication number: 20130247150
    Abstract: A method includes generating at least one of a re-authorization request or a re-authentication with an extensible authentication protocol. The method also includes generating an upper layer message. The method further includes bundling the upper layer message and the least one of the re-authorization request or the re-authentication request as an association request. The method further includes transmitting the association request to an access point.
    Type: Application
    Filed: September 11, 2012
    Publication date: September 19, 2013
    Applicant: QUALCOMM Incorporated
    Inventors: George Cherian, Philip Michael Hawkes, Jouni Malinen, Santosh Paul Abraham, Anand Palanigounder, Maarten Menzo Wentink