会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 95. 发明授权
    • Method for signing and verifying data using multiple hash algorithms and digests in PKCS
    • 使用PKCS中的多个散列算法和摘要对数据进行签名和验证的方法
    • US08914641B2
    • 2014-12-16
    • US13712401
    • 2012-12-12
    • Vinodh GopalSean M. GulleyJames D. GuilfordWajdi K. Feghali
    • Vinodh GopalSean M. GulleyJames D. GuilfordWajdi K. Feghali
    • H04L9/32
    • H04L9/3247
    • Methods, systems, and apparatuses are disclosed for signing and verifying data using multiple hash algorithms and digests in PKCS including, for example, retrieving, at the originating computing device, a message for signing at the originating computing device to yield a signature for the message; identifying multiple hashing algorithms to be supported by the signature; for each of the multiple hashing algorithms identified to be supported by the signature, hashing the message to yield multiple hashes of the message corresponding to the multiple hashing algorithms identified; constructing a single digest having therein each of the multiple hashes of the messages corresponding to the multiple hashing algorithms identified and further specifying the multiple hashing algorithms to be supported by the signature; applying a signing algorithm to the single digest using a private key of the originating computing device to yield the signature for the message; and distributing the message and the signature to receiving computing devices. Other related embodiments are disclosed.
    • 公开了用于使用PKCS中的多个散列算法和摘要来签名和验证数据的方法,系统和装置,包括例如在起始计算设备处检索用于在始发计算设备处签名的消息以产生该消息的签名 ; 识别签名支持的多个散列算法; 对于被标识为被签名支持的多个散列算法中的每一个,散列消息以产生与识别的多个散列算法相对应的消息的多个哈希; 构建其中具有与识别的多个散列算法相对应的消息的多个散列中的每一个的单个摘要,并进一步指定要由签名支持的多个散列算法; 使用始发计算设备的私钥将签名算法应用于单个摘要以产生该消息的签名; 并将消息和签名分发给接收计算设备。 公开了其他相关实施例。
    • 100. 发明申请
    • INSTRUCTION AND LOGIC TO PROVIDE A SECURE CIPHER HASH ROUND FUNCTIONALITY
    • 指导和逻辑提供安全的水龙头功能
    • US20150043729A1
    • 2015-02-12
    • US13962933
    • 2013-08-08
    • Vinodh GopalWajdi K. Feghali
    • Vinodh GopalWajdi K. Feghali
    • H04L9/06
    • H04L9/0643G06F9/30007G06F9/30036H04L9/0625
    • Instructions and logic provide secure cipher hashing algorithm round functionality. Some embodiments include a processor comprising: a decode stage to decode an instruction for a secure cipher hashing algorithm, the first instruction specifying a source data, and one or more key operands. Processor execution units, are responsive to the decoded instruction, to perform one or more secure cipher hashing algorithm round iterations upon the source data, using the one or more key operands, and store a result of the instruction in a destination register. One embodiment of the instruction specifies a secure cipher hashing algorithm round iteration using a Feistel cipher algorithm such as DES or TDES. In one embodiment a result of the instruction may be used in generating a resource assignment from a request for load balancing requests across the set of processing resources.
    • 指令和逻辑提供安全密码散列算法的圆功能。 一些实施例包括处理器,包括:解码级,用于解码用于安全密码散列算法的指令,指定源数据的第一指令以及一个或多个键操作数。 处理器执行单元响应于解码的指令,使用一个或多个键操作数对源数据执行一次或多次安全密码散列算法循环迭代,并将该指令的结果存储在目的地寄存器中。 该指令的一个实施例使用诸如DES或TDES之类的Feistel密码算法来指定安全密码散列算法的圆迭代。 在一个实施例中,指令的结果可以用于从整个处理资源集合的负载平衡请求请求生成资源分配。