Patents by Inventor Philip Michael Hawkes

Philip Michael Hawkes has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7185362
    Abstract: Method and apparatus for secure transmissions. Each user is provided a registration key. A long-time updated broadcast key is encrypted using the registration key and provided periodically to a user. A short-time updated key is encrypted using the broadcast key and provided periodically to a user. Broadcasts are then encrypted using the short-time key, wherein the user decrypts the broadcast message using the short-time key. One embodiment provides link layer content encryption. Another embodiment provides end-to-end encryption.
    Type: Grant
    Filed: August 28, 2002
    Date of Patent: February 27, 2007
    Assignee: Qualcomm, Incorporated
    Inventors: Philip Michael Hawkes, Raymond T. Hsu, Ramin Rezaiifar, Gregory G. Rose, Paul E. Bender, Jun Wang, Roy Franklin Quick, Jr., Arungundram C. Mahendran, Parag A. Agashe
  • Patent number: 6950517
    Abstract: Methods and apparatus are presented herein for encrypting and authentication data, such that some of data can be transmitted in the clear but still be authenticated by the sender. A set of cleartext positions and/or a set of ciphertext positions are used to specify which data blocks will be used to generate an input checksum value and an output checksum value. These checksums are then used to generate an authentication tag.
    Type: Grant
    Filed: July 24, 2002
    Date of Patent: September 27, 2005
    Assignee: Qualcomm, Inc.
    Inventors: Philip Michael Hawkes, Gregory G. Rose
  • Patent number: 6948067
    Abstract: Methods and apparatus are presented for encrypting and authenticating data, wherein some data is encrypted and some data is not encrypted, but all of the data is authenticated. Different formulations for authentication blocks are used according to whether a block of data occupies a cleartext position or ciphertext position. The authentication blocks are then combined to form a checksum, which is encrypted to form an authentication tag.
    Type: Grant
    Filed: July 24, 2002
    Date of Patent: September 20, 2005
    Assignee: Qualcomm, Inc.
    Inventors: Philip Michael Hawkes, Gregory G. Rose
  • Publication number: 20040227624
    Abstract: An apparatus and method for viewing information from a mobile station in a vehicle is disclosed. Generally, a display module is configured to be installed in a vehicle and to link with the mobile station to display information from the mobile station. A control module is coupled to the display module and configured to enable the display of the information from the mobile station.
    Type: Application
    Filed: November 20, 2003
    Publication date: November 18, 2004
    Inventors: Philip Michael Hawkes, Gregory Gordon Rose
  • Publication number: 20040179679
    Abstract: The REX cryptosystem presented herein is a variant of the NTRU cryptosystem. In the REX cryptosystem, a primary ring RXOR and two secondary rings RXOR,q and RXOR,p are used to reduce the number of operations required to compute the keys, to perform the encryption process, and to perform the decryption process. The REX cryptosystem may also be implemented using Walsh-Hadamard transformations to significantly increase speed.
    Type: Application
    Filed: March 14, 2003
    Publication date: September 16, 2004
    Inventors: Philip Michael Hawkes, Roy Franklin Quick, Gregory Gordon Rose
  • Publication number: 20040120527
    Abstract: Method and apparatus for secure transmissions. Each user is provided a registration key. A long-time updated broadcast key is encrypted using the registration key and provided periodically to a user. A short-time updated key is encrypted using the broadcast key and provided periodically to a user. Broadcasts are then encrypted using the short-time key, wherein the user decrypts the broadcast message using the short-time key. One embodiment provides link layer content encryption. Another embodiment provides end-to-end encryption.
    Type: Application
    Filed: February 2, 2004
    Publication date: June 24, 2004
    Inventors: Philip Michael Hawkes, James Semple, Gregory Gordon Rose
  • Publication number: 20040071289
    Abstract: Apparatus and method for generating a key stream is disclosed. In one embodiment, a cryptographic function is applied on input values selected from a first array of values to generate output values. Mask values are then selected from a second array of values and combined with the output values to generate a key stream block for the key stream. The first and second arrays are finite and may be implemented by a linear feedback shift register.
    Type: Application
    Filed: August 19, 2003
    Publication date: April 15, 2004
    Inventors: Gregory Gordon Rose, Philip Michael Hawkes
  • Publication number: 20040039908
    Abstract: Methods and apparatus are presented for encrypting and authenticating data, wherein some data is encrypted and some data is not encrypted, but all of the data is authenticated. Masking modules (410) are used in a partial-block encryption mode to indicate which bits of a data block are to be encrypted.
    Type: Application
    Filed: August 23, 2002
    Publication date: February 26, 2004
    Inventors: Gregory G. Rose, Philip Michael Hawkes
  • Publication number: 20040019785
    Abstract: Methods and apparatus are presented for encrypting and authenticating data, wherein some data is encrypted and some data is not encrypted, but all of the data is authenticated. Different formulations for authentication blocks are used according to whether a block of data occupies a cleartext position or ciphertext position. The authentication blocks are then combined to form a checksum, which is encrypted to form an authentication tag.
    Type: Application
    Filed: July 24, 2002
    Publication date: January 29, 2004
    Inventors: Philip Michael Hawkes, Gregory G. Rose
  • Publication number: 20040017913
    Abstract: Methods and apparatus are presented herein for encrypting and authentication data, such that some of data can be transmitted in the clear but still be authenticated by the sender. A set of cleartext positions and/or a set of ciphertext positions are used to specify which data blocks will be used to generate an input checksum value and an output checksum value. These checksums are then used to generate an authentication tag.
    Type: Application
    Filed: July 24, 2002
    Publication date: January 29, 2004
    Inventors: Philip Michael Hawkes, Gregory G. Rose
  • Publication number: 20040019783
    Abstract: Methods and apparatus are presented for secure, authenticated communication and data storage. The methods can be based on other methods such as IAPM, in which the encryption and authentication keys are of the same strength. In the HR-IAPM mode, a sender encrypts the data as in the IAPM mode using two encryption keys K0 and K1. The sender then XORs the plaintexts with corresponding ciphertexts, and combines the results to form a checksum This checksum is encrypted under the authentication key K2, this value is appended to the encrypted message as a message authentication code (MAC). The receiver decrypts as with IAPM, XORs the plaintexts with the corresponding ciphertexts and combines these values to form a checksum. The receiver then encrypts the checksum under the authentication key K2 and verifies that the resulting value agrees with the MAC. The HR mode allows blocks to be sent un-encrypted if desired.
    Type: Application
    Filed: July 24, 2002
    Publication date: January 29, 2004
    Inventors: Philip Michael Hawkes, Gregory G. Rose
  • Publication number: 20040019782
    Abstract: Methods and apparatus are presented for partially encrypting a data transmission, yet providing authentication for all of the data transmission. Plaintext blocks are combined with noise blocks and then either encrypted or decrypted to form ciphertext blocks and authentication blocks.
    Type: Application
    Filed: July 24, 2002
    Publication date: January 29, 2004
    Inventors: Philip Michael Hawkes, Gregory G. Rose
  • Publication number: 20030059040
    Abstract: A method and apparatus for decrypting stream ciphers. An SSC2-type stream cipher is decrypted by utilizing the period of LFG output and the correlation of the LSBs of LSFR output. A dynamic probability of error for each bit of a data stream is calculated to determine whether a particular bit should be inverted.
    Type: Application
    Filed: August 22, 2002
    Publication date: March 27, 2003
    Inventors: Gregory G. Rose, Philip Michael Hawkes
  • Publication number: 20030039361
    Abstract: Method and apparatus for secure transmissions. Each user is provided a registration key. A long-time updated broadcast key is encrypted using the registration key and provided periodically to a user. A short-time updated key is encrypted using the broadcast key and provided periodically to a user. Broadcasts are then encrypted using the short-time key, wherein the user decrypts the broadcast message using the short-time key. One embodiment provides link layer content encryption. Another embodiment provides end-to-end encryption.
    Type: Application
    Filed: August 28, 2002
    Publication date: February 27, 2003
    Inventors: Philip Michael Hawkes, Raymond T. Hsu, Ramin Rezaiifar, Gregory G. Rose, Paul E. Bender, Jun Wang, Roy Franklin Quick, Arungundram C. Mahendran, Parag A. Agashe