会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明授权
    • Securing passwords against dictionary attacks
    • 保护密码免受字典攻击
    • US09015489B2
    • 2015-04-21
    • US12755426
    • 2010-04-07
    • Mira BelenkiyTolga AcarHenry Nelson Jerez MoralesAlptekin Kupcu
    • Mira BelenkiyTolga AcarHenry Nelson Jerez MoralesAlptekin Kupcu
    • G06F21/00G06F7/04H04L29/06H04L9/08H04L9/32
    • H04L63/0428H04L9/0841H04L9/3226H04L9/3271H04L63/06H04L63/083H04L63/0853
    • Described herein are various technologies pertaining to constructions of a password-based authentication protocol that are configured to allow a user to register with and authenticate to an online service without the online service receiving a password or a deterministic function of the password of the user. When registering with an online service, a client computing device establishes a cryptographically strong random secret and stores an encryption of such secret with a data storage device. The storage device also never receives the password or a deterministic function of the password. When the user wishes to authenticate to the online service, the user employs her password to retrieve the encrypted secret from the storage device, decrypts such secret, and utilizes the decrypted secret to answer a cryptographically strong challenge provided to the user by the online service upon the online service receiving a username pertaining to such user.
    • 这里描述的是涉及基于密码的认证协议的构造的各种技术,其被配置为允许用户在没有在线服务接收密码或用户的密码的确定性功能的情况下向在线服务注册和认证。 当在线服务注册时,客户端计算设备建立密码强的随机秘密,并将这种秘密的加密存储在数据存储设备中。 存储设备也从不接收密码或密码的确定性功能。 当用户希望对在线服务进行身份验证时,用户使用她的密码从存储设备中取回加密的秘密,解密这样的秘密,并利用解密的秘密来回答由在线服务提供给用户的加密强大的挑战, 该在线服务接收与该用户有关的用户名。
    • 5. 发明授权
    • Managing group keys
    • 管理组密钥
    • US08325924B2
    • 2012-12-04
    • US12389217
    • 2009-02-19
    • Tolga AcarJosh BenalohNiels Thomas FergusonCarl M. EllisonMira BelenkiyDuy Lan Nguyen
    • Tolga AcarJosh BenalohNiels Thomas FergusonCarl M. EllisonMira BelenkiyDuy Lan Nguyen
    • H04L9/00
    • H04L9/0891H04L9/0833
    • In an example, one or more cryptographic keys may be associated with a group. Any member of the group may use the key to encrypt and decrypt information, thereby allowing members of the group to share encrypted information. Domain controllers (DCs) maintain copies of the group's keys. The DCs may synchronize with each other, so that each DC may have a copy of the group's keys. Keys may have expiration dates, and any client connected to a DC may generate a new key when a key is nearing expiration. The various clients may create new keys at differing amounts of time before expiration on various DCs. DCs that store keys early thus may have time to propagate the newly-created keys through synchronization before other DCs are requested to store keys created by other clients. In this way, the creation of an excessive number of new keys may be avoided.
    • 在一个示例中,一个或多个加密密钥可以与组相关联。 该组的任何成员可以使用密钥来加密和解密信息,从而允许该组的成员共享加密的信息。 域控制器(DC)维护组的密钥副本。 DC可以彼此同步,使得每个DC可以具有组的密钥的副本。 密钥可能有过期日期,连接到DC的任何客户端可能在密钥接近到期时生成新密钥。 各种客户端可以在不同的时间段之前以不同的时间量创建新的密钥。 因此,早期存储密钥的DC可能有时间通过​​同步传播新创建的密钥,而其他DC被请求存储由其他客户端创建的密钥。 以这种方式,可以避免创建过多的新密钥。
    • 6. 发明申请
    • SECURING PASSWORDS AGAINST DICTIONARY ATTACKS
    • 安全口令反对字典攻击
    • US20110252229A1
    • 2011-10-13
    • US12755426
    • 2010-04-07
    • Mira BelenkiyTolga AcarHenry Nelson Jerez MoralesAlptekin Kupcu
    • Mira BelenkiyTolga AcarHenry Nelson Jerez MoralesAlptekin Kupcu
    • H04L29/06H04L9/32
    • H04L63/0428H04L9/0841H04L9/3226H04L9/3271H04L63/06H04L63/083H04L63/0853
    • Described herein are various technologies pertaining to constructions of a password-based authentication protocol that are configured to allow a user to register with and authenticate to an online service without the online service receiving a password or a deterministic function of the password of the user. When registering with an online service, a client computing device establishes a cryptographically strong random secret and stores an encryption of such secret with a data storage device. The storage device also never receives the password or a deterministic function of the password. When the user wishes to authenticate to the online service, the user employs her password to retrieve the encrypted secret from the storage device, decrypts such secret, and utilizes the decrypted secret to answer a cryptographically strong challenge provided to the user by the online service upon the online service receiving a username pertaining to such user.
    • 这里描述的是涉及基于密码的认证协议的构造的各种技术,其被配置为允许用户在没有在线服务接收密码或用户的密码的确定性功能的情况下向在线服务注册和认证。 当在线服务注册时,客户端计算设备建立密码强的随机秘密,并将这种秘密的加密存储在数据存储设备中。 存储设备也从不接收密码或密码的确定性功能。 当用户希望对在线服务进行身份验证时,用户使用她的密码从存储设备中取回加密的秘密,解密这样的秘密,并利用解密的秘密来回答由在线服务提供给用户的加密强大的挑战, 该在线服务接收与该用户有关的用户名。
    • 7. 发明申请
    • Cryptographically strong key derivation using password, audio-visual and mental means
    • 使用密码,视听和心理手段的密码型强密码派生
    • US20080263361A1
    • 2008-10-23
    • US11788687
    • 2007-04-20
    • Tanmoy DuttaSunil KadamTolga Acar
    • Tanmoy DuttaSunil KadamTolga Acar
    • H04L9/00
    • H04L9/0863H04L9/0891H04L2209/60H04L2209/80
    • A security system that uses a cryptographic key derived from human interaction with media. The system employs a set of parameters that includes user responses to graphical media and/or audio data, among other parameters. The architecture adds a fourth dimension to the conventional authentication means in order to make at least an offline attack on the key much more difficult. In addition to a standard set of parameters such as password, salt (random bits inserted into the encryption process) and iteration count, the system further utilizes information in the form of “what the user does” by presenting and prompting the user to interact with media in some way. The media can include audio information, video information, and/or image information, for example.
    • 一种安全系统,它使用与媒体进行人工交互导出的加密密钥。 系统采用一组参数,其中包括用户对图形媒体和/或音频数据的响应以及其他参数。 该体系结构为常规认证手段增加了第四个维度,以便至少使密钥的脱机攻击更加困难。 除了密码,盐(插入加密过程中的随机位)和迭代计数等一系列参数之外,系统还通过呈现和提示用户进行交互来进一步利用“用户所做的”形式的信息 媒体在某种程度上 媒体可以包括例如音频信息,视频信息和/或图像信息。
    • 8. 发明申请
    • CRYPTOGRAPHIC KEY CONTAINERS ON A USB TOKEN
    • USB TOKEN上的CRYPTOGRAPHIC KEY CONTAINERS
    • US20080181412A1
    • 2008-07-31
    • US11627466
    • 2007-01-26
    • Tolga AcarCarl M. Ellison
    • Tolga AcarCarl M. Ellison
    • H04L9/08
    • G06F21/6209G06F21/79H04L9/0897
    • A Universal Serial Bus (USB) compatible storage device is utilized as a security token for storage of cryptographic keys. A cryptographic subsystem of a processor accesses cryptographic keys in containers on the USB compatible storage device. Accessing includes storing and/or retrieving. The processor does not include an infrastructure dedicated to the USB compatible storage device. Cryptographic key storage is redirected from an in-processor container to the USB compatible storage device. No password or PIN is required to access the cryptographic keys, yet enhanced security is provided. Utilizing a USB compatible storage device for a cryptographic key container provides a convenient, portable, mechanism for carrying the cryptographic key, and additional security is provided via physical possession of the device.
    • 通用串行总线(USB)兼容存储设备被用作存储加密密钥的安全令牌。 处理器的加密子系统访问USB兼容存储设备上的容器中的加密密钥。 访问包括存储和/或检索。 处理器不包括专用于USB兼容存储设备的基础设施。 加密密钥存储从处理器内容器重定向到USB兼容的存储设备。 不需要密码或密码来访问加密密钥,但提供了增强的安全性。 利用用于加密密钥容器的USB兼容存储设备提供用于携带加密密钥的便利的便携式机制,并且通过物理拥有该设备来提供额外的安全性。