会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 33. 发明授权
    • Method and apparatus for data authentication in a data communication
environment
    • 数据通信环境中数据认证的方法和装置
    • US5673318A
    • 1997-09-30
    • US647503
    • 1996-05-14
    • Mihir BellareRoch Andre GuerinPhillip Walder Rogaway
    • Mihir BellareRoch Andre GuerinPhillip Walder Rogaway
    • G09C1/00H04L9/06H04L9/14H04L9/32H04L9/00
    • H04L9/3242H04L9/0625H04L9/0643H04L9/3297H04L2209/125H04L2209/20
    • A method and system for providing data authentication, within a data communication environment, in a manner which is simple, fast, and provably secure. A data message to be sent is partitioned into data blocks. Each data block is combined with a block index to create a word. A pseudo-random function is applied to each word to create a plurality of enciphered data strings. An identifying header, comprising the identity of the sender and a counter value, is also enciphered using a pseudo-random function. These enciphered data strings and header are logically combined to create a tag. As the enciphering of a particular word occurs independent of the other words, each block can be enciphered independently of the others. The method and system can thus be performed and structured in either a parallel or pipelined fashion. A receiving component or system generates a second tag which can then be compared with the transmitted tag to determine message authentication.
    • 一种在数据通信环境中以简单,快速且可证明的方式提供数据认证的方法和系统。 要发送的数据消息被分割成数据块。 每个数据块与块索引组合以创建一个单词。 伪随机函数被应用于每个单词以创建多个加密的数据串。 包括发送者的身份和计数器值的标识头也使用伪随机函数进行加密。 这些加密的数据串和标头在逻辑上组合起来创建一个标签。 由于特定字的加密独立于其他单词,所以每个块可以独立于其他单元进行加密。 因此,该方法和系统可以以并行或流水线方式执行和构造。 接收组件或系统产生第二标签,然后可将其与传输的标签进行比较以确定消息认证。
    • 38. 发明授权
    • Asymmetric key pair having a kiosk mode
    • 具有报亭模式的非对称密钥对
    • US07599493B2
    • 2009-10-06
    • US11056114
    • 2005-02-14
    • Ravinderpal Singh SandhuBrett Jason SchoppertRavi GanesanMihir BellareColin Joseph deSa
    • Ravinderpal Singh SandhuBrett Jason SchoppertRavi GanesanMihir BellareColin Joseph deSa
    • H04L9/00
    • H04L63/08H04L9/085H04L9/3271
    • Techniques for providing different levels of access based upon a same authentication factor are provided. A first message is received that is transformed with a first portion of a split private key, the first portion based upon a user password and another factor, and the split private key associated with an asymmetric key pair having a public key and the split private key. The user is authenticated for a first level of network access based upon the received first message being transformed with the first portion. A second message is received that is transformed with a second portion of the split private key, the second portion based upon the password only and not combinable with the first portion to complete the split private key. The user is authenticated for a second level of network access different that the first level based upon the received second message being transformed with the second portion.
    • 提供了基于相同认证因素提供不同级别的访问的技术。 接收到第一消息被转换为分割私钥的第一部分,第一部分基于用户密码和另一因素,以及与具有公共密钥和分离私钥的非对称密钥对相关联的分离专用密钥 。 基于所接收的第一消息被第一部分变换,用户被认证用于第一级网络访问。 接收到第二消息,该第二消息用分割专用密钥的第二部分进行变换,第二部分仅基于密码而不与第一部分组合以完成分割的私钥。 用户被认证为第二级别的网络访问,其不同于基于所接收的第二消息的第一级被第二部分变换。