Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and apparatus for security in a data processing system

A safe and secure processing technology, applied in the direction of security devices, data processing applications, secure communication devices, etc.

Active Publication Date: 2010-06-16
QUALCOMM INC
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In symmetric cryptosystems, there is a problem with securely delivering keys from the sender to the receiver

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for security in a data processing system
  • Method and apparatus for security in a data processing system
  • Method and apparatus for security in a data processing system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Specific details are given in the following description to provide a thorough understanding of the embodiments. However, it will be understood by those of ordinary skill in the art that these embodiments may be practiced without these specific details. For example, circuits may be shown in block diagrams in order not to obscure the embodiments in unnecessary detail. In other instances, well-known circuits, structures and techniques have been shown in detail in order not to obscure the embodiments.

[0028] It should also be noted that the embodiments may be described as processes represented by flowcharts, block diagrams or block diagrams. Although a flowchart may describe operations as a sequential process, many of the operations may be performed in parallel or simultaneously. Additionally, the order of operations can be rearranged. When the operation is complete, the process ends. A procedure may correspond to a method, function, procedure, subroutine, subroutine,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Method and apparatus for secure transmissions. Each user is provided a registration key. A long-time updated broadcast key is encrypted using the registration key and provided periodically to a user.A short-time updated key is encrypted using the broadcast key and provided periodically to a user. Broadcasts are then encrypted using the short-time key, wherein the user decrypts the broadcast message using the short-time key. One embodiment provides link layer content encryption. Another embodiment provides end-to-end encryption.

Description

technical field [0001] The present invention generally relates to a data processing system, and in particular to a security method and device in the data processing system. Background technique [0002] The security of data processing and information systems, including communication systems, leads to accountability, impartiality, accuracy, confidentiality, operability, and many other expected standards. Encryption, or the field of cryptography in general, is used in electronic commerce, wireless communications, broadcasting, and has an infinite range of applications. In electronic commerce, encryption is used to prevent fraud and to authenticate financial transactions. In data processing systems, encryption is used to verify the identity of participants. Encryption is also used to prevent hacking attacks, secure web pages, and prevent access to confidential documents. [0003] Symmetric encryption systems, often called cryptosystems, use the same key to encrypt and decryp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00G06F11/30G06F12/14G06F9/32H04M15/00H04N7/167H04K1/04H04K1/06H04L9/08H04L9/30H04W4/24H04W12/03H04W12/0433
CPCH04M15/51H04W4/24H04M2215/7072H04M2215/54H04M2215/2026H04M2215/32H04L9/30H04L9/08H04M15/73H04L2209/601H04M15/48H04M2215/0156H04L9/0825G06Q20/3829H04W12/04
Inventor 菲利普·米凯尔·霍克斯詹姆斯·森普尔格雷戈里·G·罗斯
Owner QUALCOMM INC