会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 25. 发明申请
    • TECHNOLOGIES FOR TRUSTED DEVICE ON-BOARDING
    • 用于托管设备的技术
    • US20160134419A1
    • 2016-05-12
    • US14670874
    • 2015-03-27
    • Ned M. SmithJesse WalkerMats AgerstamRavi S. SubramaniamEduardo Cabre
    • Ned M. SmithJesse WalkerMats AgerstamRavi S. SubramaniamEduardo Cabre
    • H04L9/08H04L9/30H04L9/14
    • H04L9/0841H04L9/0833H04L9/0844H04L9/0866H04L9/14H04L9/30H04L9/3013H04L2209/127H04W12/04
    • Technologies for trusted device on-boarding include a first computing device to generate a first public Diffie-Hellman key based on a private Diffie-Hellman key and a first unique identifier of the first computing device. The first unique identifier is retrieved from secure memory of the first computing device. The first computing device transmits the first public Diffie-Hellman key to a second computing device and receives, from the second computing device, a second public Diffie-Hellman key of the second computing device. The second public Diffie-Hellman key incorporates a second unique identifier of the second computing device. Further, the first computing device removes a contribution of the second unique identifier from the second public Diffie-Hellman key to generate a modified public Diffie-Hellman key and generates a shared Diffie-Hellman key based on the modified public Diffie-Hellman key and the private Diffie-Hellman key of the first computing device.
    • 用于可信设备登机的技术包括第一计算设备,用于基于私有Diffie-Hellman密钥和第一计算设备的第一唯一标识符生成第一公共Diffie-Hellman密钥。 从第一计算设备的安全存储器检索第一唯一标识符。 第一计算设备将第一公共Diffie-Hellman密钥发送到第二计算设备,并从第二计算设备接收第二计算设备的第二公共Diffie-Hellman密钥。 第二个公共Diffie-Hellman密钥包含第二计算设备的第二唯一标识符。 此外,第一计算设备从第二公共Diffie-Hellman密钥去除第二唯一标识符的贡献,以生成修改的公共Diffie-Hellman密钥,并且基于修改的公共Diffie-Hellman密钥生成共享Diffie-Hellman密钥,并且 第一个计算设备的私人Diffie-Hellman密钥。
    • 30. 发明申请
    • EFFICIENT KEY DERIVATION FOR END-TO-END NETWORK SECURITY WITH TRAFFIC VISIBILITY
    • 有效交付可视性的端到端网络安全的有效关键
    • US20140032905A1
    • 2014-01-30
    • US13916027
    • 2013-06-12
    • Men LongJesse WalkerKaranvir S. Grewal
    • Men LongJesse WalkerKaranvir S. Grewal
    • H04L29/06
    • H04L9/0866H04L9/0631H04L63/0428H04L63/06H04L2209/125
    • Both end-to-end security and traffic visibility may be achieved by a system using a controller that derives a cryptographic key that is different for each client based on a derivation key and a client identifier that is conveyed in each data packet. The controller distributes the derivation key to information technology monitoring devices and a server to provide traffic visibility. For large key sizes, the key may be derived using a derivation formula as follows: client_key_MSB=AES128(base_key_1,client_ID),  (1) client_key_LSB=AES128(base_key_2,client_ID+pad),and  (2) client_key=client_key_MSB∥client_key_LSB, where (1) and (2) are executed in parallel. The client key and a client identifier may be used so that end-to-end security may be achieved.
    • 端到端安全性和流量可见性可以由使用控制器的系统来实现,所述控制器基于在每个数据分组中传送的导出密钥和客户端标识符来导出每个客户端不同的密码密钥。 控制器将派生密钥分发到信息技术监控设备和服务器,以提供流量可视性。 对于较大的密钥大小,可以使用如下的推导公式来导出密钥:client_key_MSB = AES128(base_key_1,client_ID),(1)client_key_LSB = AES128(base_key_2,client_ID + pad)和(2)cli​​ent_key =client_key_MSB‖client_key_LSB, 其中(1)和(2)并行执行。 可以使用客户端密钥和客户端标识符,以便可以实现端到端的安全性。