会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • SYSTEMS AND METHODS FOR DISTRIBUTING AND SECURING DATA
    • 用于分发和安全数据的系统和方法
    • US20120163592A1
    • 2012-06-28
    • US13412111
    • 2012-03-05
    • Mihir BellarePhillip Rogaway
    • Mihir BellarePhillip Rogaway
    • H04L9/28H04L9/00
    • H04L9/0894G06F21/64H04L9/0816H04L9/085H04L9/14H04L9/321H04L9/3218H04L9/3231H04L2209/24H04L2209/56H04L2209/805
    • A robust computational secret sharing scheme that provides for the efficient distribution and subsequent recovery of a private data is disclosed. A cryptographic key may be randomly generated and then shared using a secret sharing algorithm to generate a collection of key shares. The private data may be encrypted using the key, resulting in a ciphertext. The ciphertext may then be broken into ciphertext fragments using an Information Dispersal Algorithm. Each key share and a corresponding ciphertext fragment are provided as input to a committal method of a probabilistic commitment scheme, resulting in a committal value and a decommittal value. The share for the robust computational secret sharing scheme may be obtained by combining the key share, the ciphertext fragment, the decommittal value, and the vector of committal values.
    • 公开了一种强大的计算秘密共享方案,其提供了私有数据的有效分配和随后的恢复。 可以随机生成加密密钥,然后使用秘密共享算法来共享密钥,以生成密钥共享的集合。 可以使用密钥对私有数据进行加密,得到密文。 然后可以使用信息分散算法将密文分解成密文片段。 将每个密钥份额和相应的密文片段作为输入提供给概率承诺方案的提交方法,从而产生一个提交值和一个分解值。 可以通过组合密钥份额,密文片段,分解值和提交值的向量来获得鲁棒计算秘密共享方案的份额。
    • 2. 发明授权
    • Asymmetric crypto-graphy with rolling key security
    • 具有滚动密钥安全性的不对称密码
    • US08099607B2
    • 2012-01-17
    • US11332204
    • 2006-01-17
    • Ravinderpal Singh SandhuBrett Jason SchoppertRavi GanesanMihir BellareColin Joseph deSa
    • Ravinderpal Singh SandhuBrett Jason SchoppertRavi GanesanMihir BellareColin Joseph deSa
    • G06F21/00H04L9/08
    • H04L9/085H04L9/302H04L9/3218H04L2209/80
    • A system for securing information, includes a processor and storage device. The storage device stores information encrypted with one of a first private rolling key and a first public rolling key of an a first asymmetric rolling crypto-key, along with the one first rolling key. The processor has the logic to direct transmission, via a network, of proof of knowledge of the stored one first rolling key to authenticate a user, and of a request for the other of the first private rolling key and the first public rolling key. The processor receives the other first rolling key via the network, responsive to the directed transmission. The processor then decrypts the stored encrypted information with the received other first rolling key, and generates a second asymmetric rolling crypto-key having a second private rolling key and a second public rolling key. The processor encrypts the information with one of the second private rolling key and the second public rolling key. The processor also directs transmission of the other of the second private rolling key and the second public rolling key via the network. The storage device stores the information encrypted with the one second rolling key and the one second rolling key itself.
    • 一种用于保护信息的系统,包括处理器和存储设备。 存储装置与第一滚动键一起存储用第一非对称滚动加密密钥的第一专用滚动键和第一公开滚动键加密的信息。 处理器具有通过网络直接传送所存储的一个第一滚动密钥的认证证明以验证用户的逻辑,以及对第一私人滚动密钥和第一公共滚动密钥中的另一个的请求的逻辑。 响应于定向传输,处理器经由网络接收另一第一滚动键。 然后处理器用接收到的其他第一滚动密钥对存储的加密信息进行解密,并且生成具有第二专用滚动键和第二公共滚动键的第二非对称滚动加密密钥。 处理器使用第二专用滚动键和第二公共滚动键之一来加密信息。 处理器还通过网络指导第二私人滚动键和第二公共滚动键中的另一个的传输。 存储装置存储利用一个第二滚动键和一个第二滚动键本身加密的信息。
    • 4. 发明授权
    • Secure login using a multifactor split asymmetric crypto-key with persistent key security
    • 使用具有持久密钥安全性的多因素拆分非对称密钥进行安全登录
    • US07571471B2
    • 2009-08-04
    • US11381878
    • 2006-05-05
    • Ravinderpal Singh SandhuBrett Jason SchoppertRavi GanesanMihir BellareColin Joseph Desa
    • Ravinderpal Singh SandhuBrett Jason SchoppertRavi GanesanMihir BellareColin Joseph Desa
    • H04L9/32
    • H04L9/3218H04L9/0825H04L9/0863
    • A first network station encrypts a first message with a first key portion from a first split of a private or public key of a user's asymmetric crypto-key and transmits it during a network session. The second network station decrypts the transmitted encrypted first message with a second key portion from the first split of the one key of the asymmetric crypto-key to initially authenticate the user for access, during the session, to store information. The first network station also encrypts a second message with another first key portion from a second split of that one key, and subsequently transmits it during the same network session. The second network station decrypts the subsequently transmitted encrypted second message with another second key portion from the second split of that same one key to subsequently authenticate the user for access, during the same session, to other stored_information.
    • 第一网络站利用来自用户非对称密钥的私钥或公钥的第一次拆分的第一密钥部分加密第一消息,并在网络会话期间发送它。 第二网络站利用来自非对称密钥的一个密钥的第一次拆分的第二密钥部分解密发送的加密第一消息,以在会话期间初始认证用户访问以存储信息。 第一网络台还用来自该一个密钥的第二分组的另一个第一密钥部分来加密第二个消息,并且随后在相同的网络会话期间发送它。 第二网络站利用来自相同一个密钥的第二次拆分的另一个第二密钥部分来解密随后发送的加密第二消息,随后在同一会话期间认证用户访问其他存储信息。
    • 5. 发明申请
    • MULTIFACTOR SPLIT ASYMMETRIC CRYPTO-KEY WITH PERSISTENT KEY SECURITY
    • 多重密钥安全的多重分离不对称密钥
    • US20070258585A1
    • 2007-11-08
    • US11381829
    • 2006-05-05
    • Ravinderpal SANDHUBrett SchoppertRavi GanesanMihir BellareColin DeSa
    • Ravinderpal SANDHUBrett SchoppertRavi GanesanMihir BellareColin DeSa
    • H04L9/00
    • H04L9/302
    • A processor generates an asymmetric crypto-key, such as an RSA crypto-key, which is associated with the user and includes a private key and a public key. It computes a first key portion based on a stored random number generation function, which has one or more constants such as a salt and/or iteration count, and a first value of a constant, and a second key portion based on the computed first key portion and one of the private key and the public key. It additionally computes another first key portion based on the stored random number generation function and a second value of that constant, and another second key portion based on the computed other first key portion and the one key. The computed first and second key portions and the computed other first and second key portions form first and second splits of the one key of the asymmetric crypto-key.
    • 处理器生成与用户相关联并包括私钥和公共密钥的非对称加密密钥,例如RSA密钥。 它基于存储的随机数生成函数来计算第一密钥部分,该函数具有一个或多个常数,例如盐和/或迭代计数,以及常数的第一值,以及基于计算出的第一密钥的第二密钥部分 部分和私钥和公钥之一。 另外基于所存储的随机数生成函数和该常数的第二值,另外基于计算的其他第一密钥部分和一个密钥另外计算第二密钥部分。 所计算的第一和第二密钥部分和计算的其他第一和第二密钥部分形成非对称密钥的一个密钥的第一和第二拆分。
    • 7. 发明授权
    • Variable-length cipher system and method
    • 可变长度密码系统和方法
    • US09361617B2
    • 2016-06-07
    • US12481504
    • 2009-06-09
    • Clay von MuellerMihir Bellare
    • Clay von MuellerMihir Bellare
    • H04L9/28G06Q20/38G07F7/10H04L9/06H04L9/00
    • G06Q20/3823G07F7/1008G07F7/1016H04L9/0625H04L2209/12H04L2209/56
    • Systems and methods for enciphering data are provided. In one embodiment, information is enciphered using a variable block length cipher that returns the encrypted symbol set in the same format as the plaintext symbol set. The cipher can be based on DES, AES or other block ciphers. In one example implementation a method for enciphering token information the invention provides for enciphering token information by constructing a tweak of a defined length using token information; converting the tweak to a bit string of a defined size to form a first parameter; converting a number of digits of plaintext to a byte string of a defined size to form a second parameter, wherein the number of digits converted varies; defining a data encryption standard key; applying the data encryption standard key to the first and second parameters; computing a specified number of encryption rounds; and receiving enciphered token information.
    • 提供了加密数据的系统和方法。 在一个实施例中,使用可变块长度密码来加密信息,所述可变块长度密码返回与明文符号集合相同格式的加密符号集合。 密码可以基于DES,AES或其他块密码。 在一个示例实现中,本发明提供了用于加密令牌信息的方法,其通过使用令牌信息构造具有定义长度的调整来加密令牌信息; 将调整转换为定义大小的位串以形成第一参数; 将明文的数位数转换为规定大小的字节串以形成第二参数,其中转换的位数变化; 定义数据加密标准密钥; 将数据加密标准密钥应用于第一和第二参数; 计算指定数量的加密回合; 并接收加密令牌信息。
    • 10. 发明授权
    • Multifactor split asymmetric crypto-key with persistent key security
    • 具有持久密钥安全性的多因素拆分非对称密钥
    • US07734045B2
    • 2010-06-08
    • US11381829
    • 2006-05-05
    • Ravinderpal Singh SandhuBrett Jason SchoppertRavi GanesanMihir BellareColin Joseph Desa
    • Ravinderpal Singh SandhuBrett Jason SchoppertRavi GanesanMihir BellareColin Joseph Desa
    • H04L9/00H04L29/06
    • H04L9/302
    • A processor generates an asymmetric crypto-key, such as an RSA crypto-key, which is associated with the user and includes a private key and a public key. It computes a first key portion based on a stored random number generation function, which has one or more constants such as a salt and/or iteration count, and a first value of a constant, and a second key portion based on the computed first key portion and one of the private key and the public key. It additionally computes another first key portion based on the stored random number generation function and a second value of that constant, and another second key portion based on the computed other first key portion and the one key. The computed first and second key portions and the computed other first and second key portions form first and second splits of the one key of the asymmetric crypto-key.
    • 处理器生成与用户相关联并包括私钥和公共密钥的非对称加密密钥,例如RSA密钥。 它基于存储的随机数生成函数来计算第一密钥部分,该函数具有一个或多个常数,例如盐和/或迭代计数,以及常数的第一值,以及基于计算出的第一密钥的第二密钥部分 部分和私钥和公钥之一。 另外基于所存储的随机数生成函数和该常数的第二值,另外基于计算的其他第一密钥部分和一个密钥另外计算第二密钥部分。 所计算的第一和第二密钥部分和计算的其他第一和第二密钥部分形成非对称密钥的一个密钥的第一和第二拆分。