会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • SYSTEM AND METHOD FOR CRYPTOGRAPHIC KEY EXCHANGE USING MATRICES
    • 使用矩阵进行拼接键交换的系统和方法
    • US20120166809A1
    • 2012-06-28
    • US12980218
    • 2010-12-28
    • Edward M. BartonLen L. Mizrah
    • Edward M. BartonLen L. Mizrah
    • H04L9/32
    • H04L9/0844
    • Two parties can establish a cryptographic key using a matrix based key exchange protocol, for secure communications without any prior distribution of secret keys or other secret data, and without revealing said key to any third party who may have access to all of the transmissions between them. A common matrix M, shared in advance, is multiplied by a random matrix K on the sending side, and a different random matrix N on the receiving side. The matrix product KM is sent from the sending side to the receiving side, and the matrix product MN is sent from the receiving side to the sending side. Both sides produce the common matrix product KMN, and use it for producing a symmetric key for encrypted communications.
    • 双方可以使用基于矩阵的密钥交换协议来建立加密密钥,用于安全通信,而无需事先分发秘密密钥或其他秘密数据,并且不向可能访问其间的所有传输的任何第三方泄露所述密钥 。 预先共享的公共矩阵M乘以发送侧的随机矩阵K,并且在接收侧乘以不同的随机矩阵N. 矩阵产品KM从发送侧发送到接收侧,矩阵产品MN从接收侧发送到发送侧。 双方产生公共矩阵产品KMN,并用于生成用于加密通信的对称密钥。
    • 3. 发明授权
    • Method of one time authentication response to a session-specific challenge indicating a random subset of password or PIN character positions
    • 一种针对特定于会话的挑战的一次认证响应的方法,指示密码或PIN字符位置的随机子集
    • US07681228B2
    • 2010-03-16
    • US11353560
    • 2006-02-14
    • Len L. Mizrah
    • Len L. Mizrah
    • G06F7/04G06F17/30H04L9/32H04K1/00G06K5/00H04L29/06G06Q40/00
    • G06Q40/02G06Q20/04G06Q20/10G06Q20/108G06Q20/3823G06Q20/40G06Q20/425G06Q40/00G06Q40/025
    • Financial institution back office computerized transaction-processing system with embedded privacy and security layer (EPSL) enables strong transaction authentication prior to a merchant or vendor contact, based on a user account number, transaction conditions like anticipated transaction time and money, user two-factor authentication with a static transaction PIN and a transaction session-specific random partial password or PIN recognition algorithm. User enters the user name and then, challenged by server with a random session-specific subset of a password or PIN character's consecutive position numbers, enters based on cognitive association a one time authentication response. The authentication session is interactive, transaction session-specific, and followed by either a transaction denial or an alphanumeric transaction signature generated by EPSL for this specific transaction. Then, the user submits her request to a transaction counterpart along with the transaction signature. The merchant or vendor requests an authorization session with EPSL.
    • 具有嵌入式隐私和安全层(EPSL)的金融机构后台计算机化交易处理系统可以在商家或供应商联系之前,根据用户帐号,诸如预期交易时间和金额之类的交易条件,用户双因素 使用静态事务PIN和事务会话特定的随机部分密码或PIN识别算法进行认证。 用户输入用户名,然后由具有密码或PIN字符的连续位置号码的随机会话特定子集的服务器挑战,基于认知关联进行一次认证响应。 认证会话是交互式的,事务会话特定的,后面是EPSL为此特定事务生成的事务拒绝或字母数字事务签名。 然后,用户将其请求与交易签名一起提交给交易对方。 商家或供应商请求与EPSL的授权会话。
    • 4. 发明授权
    • System and method for user authentication interface
    • 用户认证接口的系统和方法
    • US07188314B2
    • 2007-03-06
    • US10353500
    • 2003-01-29
    • Len L. Mizrah
    • Len L. Mizrah
    • H04L9/32G06F7/04
    • H04L63/08G06F21/31G06F21/36
    • A graphical user interface supports an interactive client-server authentication based on Random Partial Pattern Recognition algorithm (RPPR). In RPPR, an ordered set of data fields is stored for a client to be authenticated in secure memory on the server side. A graphical user interface presents a clue generated at the server to the client, such positions in the ordered set of a random subset of data fields from the ordered set. The client enters input data in multiple fields of the interface according to the clue, and the server accepts the input data from the client. The input data includes storage units representing alpha-numeric characters, images and colors corresponding to the field contents for the data fields. The interface includes indicators for elapsed time and status of the authentication session.
    • 图形用户界面支持基于随机部分模式识别算法(RPPR)的交互式客户端 - 服务器认证。 在RPPR中,存储一组有序数据字段以供客户端在服务器端的安全内存中进行身份验证。 图形用户界面向客户端呈现在服务器处产生的线索,来自有序集合的数据字段的随机子集的有序集合中的位置。 客户根据线索在接口的多个字段中输入输入数据,服务器接受来自客户端的输入数据。 输入数据包括表示与数据字段的字段内容相对应的字母数字字符,图像和颜色的存储单元。 该接口包括经过时间和认证会话状态的指示符。
    • 6. 发明申请
    • MULTI-TIER TRANSACTION PROCESSING METHOD AND PAYMENT SYSTEM IN M- AND E- COMMERCE
    • 多层交易处理方法和付款系统在M-和E-商业
    • US20110035294A1
    • 2011-02-10
    • US12535546
    • 2009-08-04
    • LEN L. MIZRAH
    • LEN L. MIZRAH
    • G06Q30/00G06Q10/00G06F21/00
    • G06Q20/405G06F21/33G06F21/645G06Q20/322G06Q20/385G06Q20/389G06Q30/06G06Q30/0615G06Q40/12G06Q50/188
    • A server executes a protocol that automates transactions involving a customer and a merchant agreeing to trade money in the customer's account for goods or services available from the merchant. The protocol protects personal identifying information of the customer from disclosure to the merchant, and protects all parties from repudiation of the specific transaction. The protocol defines a pre-authenticated form of the specific transaction; obtains authorization from the customer and the merchant to commit on their behalf to the pre-authenticated transaction; and obtains authorization from the bank to commit resources for settlement with the merchant. After obtaining authorizations, a transaction clearance code is generated completing a record of the pre-authenticated transaction for non-repudiation, for proof of a right to receive settlement from the third party and for proof of a right to receive the goods or services from the merchant.
    • 服务器执行一个协议,自动化涉及客户和商家的交易,同意在客户的帐户中交易货物或服务,从商家可用。 该协议保护客户的个人识别信息免于向商家披露,并且保护所有各方免于具体交易的抵赖。 该协议定义了特定事务的预认证形式; 获得客户和商户授权代表他们进行预认证的交易; 并获得银行授权,提供与商户结算的资源。 在获得授权之后,产生交易清关代码,完成预认证交易的记录以进行不可抵赖,以证明有权从第三方接收结算,以及证明从第三方收到货物或服务的权利 商人。
    • 7. 发明授权
    • Authentication method of random partial digitized path recognition with a challenge built into the path
    • 随机部分数字化路径识别的验证方法,具有内置于路径中的挑战
    • US07849321B2
    • 2010-12-07
    • US11466697
    • 2006-08-23
    • Len L. Mizrah
    • Len L. Mizrah
    • G06F21/00
    • G06F21/83G06F21/36
    • An interactive method for authentication is based on two shared secrets, including a first shared secret in the form of an ordered path on the frame of reference, and a second shared secret in the form of locations on the frame of reference at which characters identifying a subset of the ordered path are to be displayed. An instance of the frame of reference comprises a set of characters which is arranged in a random or other irregular pattern. Authentication requires that a user enter the characters in the displayed instance of the frame of reference found in the locations in the random subset of the ordered path by indicating characters either in these locations, or any other locations having the same characters. Thus, a secret challenge identifying the random partial subset is embedded within the displayed instance of the graphical representation of the frame of reference.
    • 用于认证的交互方法基于两个共享秘密,包括在参考帧上以有序路径的形式的第一共享秘密,以及在参考帧上的位置形式的第二共享秘密,其中字符识别 要显示有序路径的子集。 参考框架的实例包括以随机或其他不规则图案排列的一组字符。 认证要求用户通过在这些位置或具有相同字符的任何其他位置指示字符来输入在有序路径的随机子集中的位置中找到的参考帧的显示实例中的字符。 因此,识别随机部分子集的秘密挑战被嵌入在参考帧的图形表示的所显示的实例内。
    • 8. 发明授权
    • Communication session encryption and authentication system
    • 通信会话加密和认证系统
    • US07506161B2
    • 2009-03-17
    • US10653506
    • 2003-09-02
    • Len L. Mizrah
    • Len L. Mizrah
    • H04L9/00
    • H04L9/0844H04L9/3273
    • An interactive mutual authentication protocol, which does not allow shared secrets to pass through untrusted communication media, integrates an encryption key management system into the authentication protocol, so that key management becomes an essential part of the authentication protocol itself. The system provides a secure distribution of a secret session random key used in symmetric cryptography. Successful exchange of this encryption key allows for secure transit of the protocol data over communication lines in encrypted form, permitting explicit mutual authentication of the connected parties. The post-authentication stage of the communication session can use secure encryption for the data exchange, since each party has already obtained the secret session random key.
    • 不允许共享秘密通过不信任通信介质的交互式互认认证协议将加密密钥管理系统集成到认证协议中,使得密钥管理成为认证协议本身的重要部分。 该系统提供在对称密码学中使用的秘密会话随机密钥的安全分发。 该加密密钥的成功交换允许协议数据通过通信线路以加密的形式进行安全传输,允许连接方的显式相互认证。 通信会话的后验证阶段可以使用安全加密来进行数据交换,因为每一方已经获得了秘密会话随机密钥。
    • 9. 发明授权
    • System and method for private secure financial transactions
    • 私人和安全金融交易的系统和方法
    • US07379916B1
    • 2008-05-27
    • US09706370
    • 2000-11-03
    • Len L. Mizrah
    • Len L. Mizrah
    • G06Q40/00G07F19/00G06F5/00
    • G06Q40/02G06Q20/04G06Q20/10G06Q20/108G06Q20/3823G06Q20/40G06Q20/425G06Q40/00G06Q40/025
    • A clocked authentication, authorization and accounting (CAAA) system and method offers private and secure credit/debit card online and offline financial transactions (FT) including an embedded privacy and security layer (EPSL) architecture. EPSL includes an authentication stage prior to the authorization stage that is automated and enabled through a back office, and enhanced by associating the authentication stage with projected timing, security and accounting parameters. It enables legal financial account holders to perform buy/sell or withdraw/deposit transactions without disclosing private personal information to the transaction counterparts, while preserving highly elevated and enhanced security and fraud protection as compared with conventional methods. The CAAA method enables efficient mass user EPSL implementation at back offices utilizing high frequency synchronized global clocking of EPSL logic blocks.
    • 计时认证,授权和会计(CAAA)系统和方法提供私人和安全的信用卡/借记卡在线和离线金融交易(FT),包括嵌入式隐私和安全层(EPSL)架构。 EPSL包括在授权阶段之前的认证阶段,其通过后台自动化和启用,并且通过将认证阶段与预计的时间安排和安全性和会计参数相关联来增强。 它使得法定财务账户持有人可以在不向交易对手披露私人个人信息的情况下执行买/卖或提取/存款交易,同时保持与传统方法相比高度提升和增强的安全性和欺诈保护。 CAAA方法可以利用EPSL逻辑块的高频同步全局时钟在后台实现高效的大量用户EPSL。
    • 10. 发明授权
    • Key conversion method for communication session encryption and authentication system
    • 通信会话加密和认证系统的密钥转换方法
    • US07299356B2
    • 2007-11-20
    • US10653500
    • 2003-09-02
    • Len L. Mizrah
    • Len L. Mizrah
    • H04L9/00
    • H04L63/061H04L9/0822H04L9/0844H04L63/08H04L63/0869
    • An interactive mutual authentication protocol, which does not allow shared secrets to pass through untrusted communication media, integrates an encryption key management system into the authentication protocol. The server encrypts a particular data random key by first veiling the particular data random key using a first conversion array seeded by a shared secret, and then encrypting the veiled particular data random key. The client decrypts and unveils the particular data random key using the shared secret, and returns a similarly veiled version of the particular data random key using a second conversion array seeded by a shared secret. Access to the shared secret indicates authenticity of the stations. The procedure may be repeated for a second shared secret for strong authentication, without allowing shared secrets to pass via untrusted media.
    • 不允许共享秘密通过不信任通信介质的交互式互认认证协议将加密密钥管理系统集成到认证协议中。 服务器通过首先使用由共享密钥接收的第一转换阵列来掩蔽特定数据随机密钥来加密特定数据随机密钥,然后加密掩蔽的特定数据随机密钥。 客户端使用共享秘密解密并发布特定数据随机密钥,并使用由共享密钥种子的第二转换阵列返回特定数据随机密钥的类似遮蔽版本。 访问共享密钥表示站点的真实性。 可以针对第二共享秘密重复该过程以进行强认证,而不允许共享秘密通过不受信任的媒体。