会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 12. 发明授权
    • System and method for remote device registration
    • 用于远程设备注册的系统和方法
    • US07734915B2
    • 2010-06-08
    • US11450418
    • 2006-06-12
    • Brian NeillAshok VadekarPatrick Xu
    • Brian NeillAshok VadekarPatrick Xu
    • H04L29/06
    • G06F21/72H04L9/0897H04L63/062H04L2209/04H04L2209/60H04L2463/062
    • A system and method for remote device registration, to monitor and meter the injection of keying or other confidential information onto a device, is provided. A producer who utilizes one or more separate manufacturers, operates a remote module that communicates over forward and backward channels with a local module at the manufacturer. Encrypted data transmissions are sent by producer to the manufacturer and are decrypted to obtain sensitive data used in the devices. As data transmissions are decrypted, credits from a credit pool are depleted and can be replenished by the producer through credit instructions. As distribution images are decrypted, usage records are created and eventually concatenated, and sent as usage reports back to the producer, to enable the producer to monitor and meter production at the manufacturer.
    • 提供了用于远程设备注册的系统和方法,用于监视和计量密钥或其他机密信息到设备上的注入。 使用一个或多个单独的制造商的生产商操作远程模块,其通过前向和后向通道与制造商的本地模块进行通信。 加密的数据传输由制造商发送给制造商,并被解密以获得在设备中使用的敏感数据。 当数据传输被解密时,来自信用卡的信用被用尽,并且可以通过信用指示由生产者补充。 随着分发图像被解密,创建使用记录并最终并入,并将其作为使用报告发送回制造商,以使制造商能够监视制造商的生产计量。
    • 15. 发明授权
    • Method and apparatus for computing a shared secret key
    • 用于计算共享密钥的方法和装置
    • US08693684B2
    • 2014-04-08
    • US13618305
    • 2012-09-14
    • Robert LambertAshok Vadekar
    • Robert LambertAshok Vadekar
    • H04L9/00H04L9/30H04L9/28
    • H04L9/0844
    • A method of generating a key by a first correspondent. The key is computable by a second correspondent. The method comprises the steps of: a) making available to the second correspondent a first short term public key; b) obtaining a second short term public key from the second correspondent; c) computing a first exponent derived from the first short term private key, the first short term public key, and the first long term private key; d) computing a second exponent derived from the first short term private key, the first short term public key, the second short term public key and the first long term private key; e) computing a simultaneous exponentiation of the first exponent with the second short term public key and the second exponent with the second long term public key.
    • 一种由第一通讯员产生密钥的方法。 密钥可由第二个记者计算。 该方法包括以下步骤:a)向第二记者提供第一短期公钥; b)从第二个记者处获得第二个短期公钥; c)计算从第一短期私钥,第一短期公钥和第一长期私钥导出的第一指数; d)计算从第一短期私钥,第一短期公钥,第二短期公钥和第一长期私钥得到的第二指数; e)使用所述第二短期公钥和所述第二指数与所述第二长期公共密钥计算所述第一指数的同时取幂。
    • 16. 发明申请
    • PARTIAL REVOCATION LIST
    • 部分撤销清单
    • US20100312791A1
    • 2010-12-09
    • US12859032
    • 2010-08-18
    • Brian NeillAshok Vadekar
    • Brian NeillAshok Vadekar
    • G06F17/30
    • D04H13/003G06F21/6209G06F21/64G06F21/70G06F21/84G06F2221/2101G06F2221/2129G11B20/0021
    • A partial revocation list and a system and method for using the partial revocation list for tracking the authenticity of replacement cartridges in a manufactured device to inhibit cloning of the cartridges is provided. A revocation pool is maintained by a manufacturer who chooses a partial revocation list from the revocation pool to store in the memory of the cartridge. The device stores its own revocation list, informs the manufacturer of cartridges which have been used and checks when a new device is installed to ensure a cloned replacement is not being used. The partial revocation list distributes enough revocation information to devices to statistically impair the cartridge yield of a cloning operation.
    • 提供了部分撤销列表以及用于使用部分撤销列表跟踪制造的装置中替换盒的真实性以禁止克隆盒的系统和方法。 撤销池由制造商维护,该制造商从撤销池中选择部分撤销列表以存储在存储器的存储器中。 设备存储其自己的撤销列表,通知制造商已经使用的盒式磁带,并在安装新设备时检查,以确保克隆的更换不被使用。 部分撤销列表向设备分配足够的撤销信息以统计地损害克隆操作的盒产量。
    • 17. 发明申请
    • METHOD AND APPARATUS FOR GENERATING A KEY STREAM
    • 用于产生关键流域的方法和装置
    • US20100260335A1
    • 2010-10-14
    • US12821882
    • 2010-06-23
    • Ashok Vadekar
    • Ashok Vadekar
    • H04L9/00
    • H04L9/0662
    • A method of generating a key stream for a precomputed state information table. The method comprises initialising a counter and an accumulator with non-zero values; combining state information identified by the counter with the accumulator; swapping state information identified by the counter with state information identified by the accumulator; combining the two pieces of state information; outputting the state information identified by the combination as a byte of the key stream; adding a predetermined number odd number to the counter; and repeating the above steps to produce each byte of the key stream.
    • 一种为预先计算的状态信息表生成密钥流的方法。 该方法包括初始化具有非零值的计数器和累加器; 将由计数器识别的状态信息与累加器组合; 通过由累加器识别的状态信息交换由计数器识别的状态信息; 组合两条国家信息; 将由组合识别的状态信息作为密钥流的字节输出; 向计数器添加预定数量的奇数; 并重复上述步骤以产生密钥流的每个字节。
    • 19. 发明申请
    • Retrofitting authentication onto firmware
    • 将验证改装到固件上
    • US20070156638A1
    • 2007-07-05
    • US11418462
    • 2006-05-05
    • Ashok VadekarBrian Neill
    • Ashok VadekarBrian Neill
    • G06F7/00
    • G06F21/57G06F21/572G06F21/79G06F2221/2129
    • The present invention provides an inexpensive, software-based security-retrofit solution to verify the integrity of program code in embedded systems, or accessories, without resorting to expensive hardware changes. All unused memory on an accessory that could be used to store a program code image is filled with random data. A host system also locally stores a copy of the accessory's program image containing the random data. The host system sends the accessory a list of memory addresses or memory ranges on the accessory, which is always different and random in nature. The accessory will then produce a digest using values stored in the memory addresses as inputs to a secure hash function. The host system verifies the integrity of the embedded program code by verifying the resulting digest produced by and returned from the accessory.
    • 本发明提供了一种廉价的基于软件的安全改进解决方案,用于在不诉诸昂贵的硬件改变的情况下验证嵌入式系统或附件中的程序代码的完整性。 可用于存储程序代码图像的附件上的所有未使用的内存都填充有随机数据。 主机系统还在本地存储包含随机数据的附件的节目图像的副本。 主机系统向附件发送附件上的存储器地址或存储器范围列表,该列表本质上是随机的。 然后,附件将使用存储在存储器地址中的值作为安全散列函数的输入来生成摘要。 主机系统通过验证由附件生成和返回的结果摘要来验证嵌入式程序代码的完整性。
    • 20. 发明申请
    • Method and apparatus for computing a shared secret key
    • 用于计算共享密钥的方法和装置
    • US20070110234A1
    • 2007-05-17
    • US11519207
    • 2006-09-12
    • Robert LambertAshok Vadekar
    • Robert LambertAshok Vadekar
    • H04L9/00
    • H04L9/0844
    • A method of generating a key by a first correspondent. The key is computable by a second correspondent. The method comprises the steps of: a) making available to the second correspondent a first short term public key, b) obtaining a second short term public key from the second correspondent; c) computing a first exponent derived from the first short term private key, the first short term public key, and the first long term private key; d) computing a second exponent derived from the first short term private key, the first long term public key, the second short term public key and the first long term private key; computing a simultaneous exponentiation of the first exponent with the second short term public key and the second exponent with the second long term public key.
    • 一种由第一通讯员产生密钥的方法。 密钥可由第二个记者计算。 该方法包括以下步骤:a)向第二记者提供第一短期公共密钥,b)从第二个记者获取第二个短期公钥; c)计算从第一短期私钥,第一短期公钥和第一长期私钥导出的第一指数; d)计算从第一短期私钥,第一长期公钥,第二短期公钥和第一长期私钥导出的第二指数; 使用第二短期公钥和第二指数与第二长期公钥计算第一指数的同时求幂。