会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 46. 发明授权
    • Saving and retrieving data based on public key encryption
    • 基于公钥加密保存和检索数据
    • US07890771B2
    • 2011-02-15
    • US10407117
    • 2003-04-04
    • Paul EnglandMarcus Peinado
    • Paul EnglandMarcus Peinado
    • G06F11/30
    • G06F21/6218
    • In accordance with certain aspects, data is received from a calling program. Ciphertext that includes the data is generated, using public key encryption, in a manner that allows only one or more target programs to be able to obtain the data from the ciphertext. In accordance with another aspect, a bit string is received from a calling program. An identifier of the calling program is checked to determine whether the calling program is allowed to access data encrypted in ciphertext of the bit string. The data is decrypted using public key decryption and returned to the calling program only if the calling program is allowed to access the data.
    • 根据某些方面,从呼叫程序接收数据。 使用公钥加密来生成包含数据的密文,只允许一个或多个目标程序能够从密文获得数据。 根据另一方面,从调用程序接收位串。 检查调用程序的标识符以确定是否允许调用程序访问以位串的密文加密的数据。 数据使用公开密钥解密解密,只有在允许调用程序访问数据的情况下才能返回到调用程序。
    • 47. 发明授权
    • Virtualization of software configuration registers of the TPM cryptographic processor
    • 虚拟化TPM加密处理器的软件配置寄存器
    • US07836299B2
    • 2010-11-16
    • US11080906
    • 2005-03-15
    • Paul EnglandMatthew C. Setzer
    • Paul EnglandMatthew C. Setzer
    • H04L29/06G06F11/30
    • G06F21/57
    • A virtual PCR (VPCR) construct is provided that can be cryptographically tagged as optionally resettable or as enduring for the life of a client (process, virtual machine, and the like) and that can be loaded into a resettable hardware PCR to make use of the functionality of a Trusted Platform Module (TPM). The VPCRs may cryptographically reflect their characteristics (resettable or not) in their stored values. Also, since the PCRs are virtualized, they are (effectively) unlimited in number and may be given general names (UUIDs) that are less likely to collide. The VPCRs can be loaded into a physical PCR as needed, but in a way that stops one piece of software from impersonating another piece of software. The VPCRs thus enable all software using the TPM to be given access to TPM functionality (sealing, quoting, etc.) without security concerns.
    • 提供虚拟PCR(VPCR)构造,其可以被加密地标记为可选择地重置或在客户端(过程,虚拟机等)的寿命中持久,并且可以将其加载到可重置的硬件PCR中以利用 可信平台模块(TPM)的功能。 VPCR可以加密地反映其存储值的特性(可重置或不可复位)。 此外,由于PCR被虚拟化,它们(有效地)数量无限制,并且可以被给予不太可能发生冲突的通用名称(UUID)。 VPCR可以根据需要加载到物理PCR中,但可以阻止一块软件冒充另一块软件。 因此,VPCR可以使所有使用TPM的软件都能够获得TPM功能(密封,引用等),而无需安全考虑。
    • 48. 发明授权
    • Attesting to establish trust between computer entities
    • 证明在计算机实体之间建立信任
    • US07797544B2
    • 2010-09-14
    • US10734028
    • 2003-12-11
    • Blair B. DillawayPaul EnglandMarcus Peinado
    • Blair B. DillawayPaul EnglandMarcus Peinado
    • H04L9/32
    • H04L9/0825H04L9/3226H04L9/3247H04L9/3265H04L2209/56
    • To establish trust between first and second entities, the first entity sends an attestation message to the second entity, including a code ID, relevant data, a digital signature based on the code ID and data, and a certificate chain. The second entity verifies the signature and decides whether to in fact enter into a trust-based relationship with the first entity based on the code ID and the data in the attestation message. Upon so deciding, the second entity sends a trust message to the first entity, including a secret to be shared between the first and second entities. The first entity obtains the shared secret in the trust message and employs the shared secret to exchange information with the second entity.
    • 为了在第一和第二实体之间建立信任,第一实体向第二实体发送认证消息,包括代码ID,相关数据,基于代码ID和数据的数字签名以及证书链。 第二实体验证签名,并且基于代码ID和认证消息中的数据来确定是否实际上与第一实体进行基于信任的关系。 在这样确定的情况下,第二实体向第一实体发送信任消息,包括要在第一和第二实体之间共享的秘密。 第一实体获取信任消息中的共享密钥,并使用共享密钥与第二实体交换信息。
    • 49. 发明授权
    • Generating, migrating or exporting bound keys
    • 生成,迁移或导出绑定键
    • US07765397B2
    • 2010-07-27
    • US11557581
    • 2006-11-08
    • Paul EnglandMarcus Peinado
    • Paul EnglandMarcus Peinado
    • H04L29/06
    • G06F21/6218
    • In accordance with certain aspects, data is received from a calling program. Ciphertext that includes the data is generated, using public key encryption, in a manner that allows only one or more target programs to be able to obtain the data from the ciphertext. In accordance with another aspect, a bit string is received from a calling program. An identifier of the calling program is checked to determine whether the calling program is allowed to access data encrypted in ciphertext of the bit string. The data is decrypted using public key decryption and returned to the calling program only if the calling program is allowed to access the data.
    • 根据某些方面,从呼叫程序接收数据。 使用公钥加密来生成包含数据的密文,只允许一个或多个目标程序能够从密文获得数据。 根据另一方面,从调用程序接收位串。 检查调用程序的标识符以确定是否允许调用程序访问以位串的密文加密的数据。 数据使用公开密钥解密解密,只有在允许调用程序访问数据的情况下才能返回到调用程序。