会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Method and apparatus for hiding a private key
    • 用于隐藏私钥的方法和装置
    • US07853018B2
    • 2010-12-14
    • US11558765
    • 2006-11-10
    • Mikhail J. AtallahEric D. Bryant
    • Mikhail J. AtallahEric D. Bryant
    • H04L9/08
    • H04L9/088H04L9/0891H04L2209/16
    • A method and system for hiding an encryption key. The method including creating a directed graph having a plurality of vertices and edges, including a source and a sink vertex. Each vertex has a vertex value. The source vertices have a common source value, and the sink vertices have a common sink value, the sink value being a function of the source value and the encryption key. Each edge has an edge value that is a function of r(in)−1 and r(out) where r(in)−1 is the functional inverse of the vertex value of the predecessor vertex and r(out) is the vertex value of the successor vertex. A message enters a source vertex; flows along a path from the source vertex to a sink vertex; and leaves the sink vertex, where the output message is an encrypted or decrypted version of the input message using the private encryption key.
    • 一种用于隐藏加密密钥的方法和系统。 该方法包括创建具有多个顶点和边缘的有向图,包括源和汇点顶点。 每个顶点都有一个顶点值。 源顶点具有公共源值,并且接收器顶点具有公共接收器值,接收器值是源值和加密密钥的函数。 每个边具有一个边缘值,它是r(in)-1和r(out)的函数,其中r(in)-1是前导顶点的顶点值的函数倒数,r(out)是顶点值 的后继顶点。 消息进入源顶点; 沿着从源顶点到宿顶点的路径流动; 并离开宿顶点,其中输出消息是使用专用加密密钥的输入消息的加密或解密版本。
    • 2. 发明授权
    • Software trusted platform module and application security wrapper
    • 软件可信平台模块和应用安全包装
    • US07870399B2
    • 2011-01-11
    • US11672054
    • 2007-02-07
    • Eric D. BryantAvni Harilal RambhiaMikhael J. AtallahJohn R. Rice
    • Eric D. BryantAvni Harilal RambhiaMikhael J. AtallahJohn R. Rice
    • G06F11/30H04L29/06G06F7/04
    • G06F21/552G06F21/54G06F21/57
    • A software system that transforms an original application into an STPM enabled application and runs the enabled application. At protect time, an anti-tamper tool accepts the original application, uses anti-tamper techniques to create a guarded application, creates a security wrapper according to a policy file, and wraps the guarded application to create the STPM enabled application. A trusted service provider is inserted at the entry point of the enabled application. A set of core services is made accessible to the enabled application through the trusted service provider. At runtime the trusted service provider creates a TSP thread and passes a security file to an STPM device driver implementing TPM functionality and protected by anti-tamper techniques. The TSP thread actively monitors the enabled application and interacts with the STPM device driver through the set of core services.
    • 将原始应用程序转换为支持STPM的应用程序并运行启用的应用程序的软件系统。 在保护时间,防篡改工具可接受原始应用程序,使用防篡改技术创建受保护的应用程序,根据策略文件创建安全包装器,并将防护应用程序包装以创建启用STPM的应用程序。 在启用的应用程序的入口点插入可信服务提供商。 启用的应用程序通过可信服务提供商访问一组核心服务。 在运行时,可信服务提供商创建一个TSP线程,并将一个安全文件传递给实现TPM功能并受防篡改技术保护的STPM设备驱动程序。 TSP线程主动监视启用的应用程序,并通过一组核心服务与STPM设备驱动程序交互。