会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Personal identification number security enhancement
    • 个人识别号码安全增强
    • US08639938B2
    • 2014-01-28
    • US13099509
    • 2011-05-03
    • Todd W. ArnoldElizabeth A. DamesCarsten D. FrehrClifford L. HansenShelia M. Sittinger
    • Todd W. ArnoldElizabeth A. DamesCarsten D. FrehrClifford L. HansenShelia M. Sittinger
    • H04L29/06
    • G06F21/46G06F21/31G06Q20/382G06Q20/4012G07F7/1016G07F7/1075G07F7/1091G07F19/211
    • A system for enhancing security of a personal identification number is configned for performing a method that includes receiving, from a first entity having an input permission, a first data structure into a HSM, wherein the first data structure maps a first many-to-one mapping between a first and a second PIN numeral system. The method also includes determining whether the content of the first data structure is valid, storing the first data structure in the HSM if the first data structure is valid and marking the stored first data structure as inactive. The method further includes activating the first data structure if a second data structure is input into the HSM by a second entity having an activation permission, wherein the first entity is different from the second entity, the first data structure is identical to the second data structure. The method additionally includes converting from the first to the second PIN numeral system responsive to the activated first data structure.
    • 用于增强个人识别号码的安全性的系统用于执行包括从具有输入许可的第一实体接收第一数据结构到HSM的方法,其中所述第一数据结构映射第一多对一 第一和第二PIN数字系统之间的映射。 该方法还包括确定第一数据结构的内容是否有效,如果第一数据结构有效并将所存储的第一数据结构标记为不活动,则将第一数据结构存储在HSM中。 该方法还包括:如果第二数据结构由具有激活许可的第二实体输入到HSM中,则激活第一数据结构,其中第一实体与第二实体不同,第一数据结构与第二数据结构相同 。 该方法还包括响应于激活的第一数据结构从第一PIN数字系统转换为第二PIN数字系统。
    • 5. 发明申请
    • SECURE KEY CREATION
    • 安全关键创建
    • US20120308001A1
    • 2012-12-06
    • US13150592
    • 2011-06-01
    • Todd W. ArnoldElizabeth A. DamesRichard V. KisleyMichael J. MieleJames W. Sweeny
    • Todd W. ArnoldElizabeth A. DamesRichard V. KisleyMichael J. MieleJames W. Sweeny
    • H04L9/06
    • H04L9/0841H04L9/0877H04L9/088H04L2209/20
    • Key creation includes sending a first public key part from a first system to a second system, receiving a second public key part sent by the second system to the first system and establishing a first secret material in the first system using the first and second public key parts, wherein the first secret material is identical to a second secret material established on the second system using the first and second key parts. Key creation also includes binding key control information to the first secret material in the first system, wherein the key control information includes information relating to key type and key management and deriving a first key material from the combination of the key control information and the first secret material, wherein the first key material is identical to a second key material derived by the second system.
    • 密钥创建包括将第一公钥部分从第一系统发送到第二系统,接收由第二系统发送给第一系统的第二公共密钥部分,并使用第一和第二公钥在第一系统中建立第一秘密资料 其中所述第一秘密材料与使用所述第一和第二关键部分在所述第二系统上建立的第二秘密材料相同。 密钥创建还包括将密钥控制信息绑定到第一系统中的第一秘密资料,其中密钥控制信息包括与密钥类型和密钥管理有关的信息,并从密钥控制信息和第一密钥的组合中导出第一密钥资料 材料,其中所述第一密钥材料与由所述第二系统导出的第二密钥材料相同。