会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Method and system for establishing a cryptographic key agreement using
linear protocols
    • 使用线性协议建立加密密钥协议的方法和系统
    • US5966444A
    • 1999-10-12
    • US761455
    • 1996-12-06
    • Chuan K. YuanFeng Q. Hao
    • Chuan K. YuanFeng Q. Hao
    • H04L9/08H04K1/00
    • H04L9/0838
    • A method for establishing key agreement between two communicating parties using a general linear protocol in finite and infinite dimensional spaces. Two topological linear spaces, in particular Euclidean spaces, and a non-trivial degenerate linear operator are selected. Each party respectively selects a secret element, and exchanges with the other party an image under the transformation of a matrix. Key agreement is therefore mutually established between the two communicating parties having the same cryptographic key. Various illustrative embodiments of the general linear operator are disclosed, including a rectangular matrix, a square matrix, a symmetric matrix, a skew symmetric matrix, an upper triangular square matrix, a lower triangular square matrix, a special type of skew symmetric matrix to generate a modified cross product protocol, a series of matrices to generate a sequential key protocol, and a combination of circulant matrices.
    • 一种在有限和无限维空间中使用一般线性协议在两个通信方之间建立密钥协商的方法。 选择两个拓扑线性空间,特别是欧几里德空间,和非平凡退化线性算子。 每一方分别选择一个秘密元素,并且与另一方交换矩阵变换下的图像。 因此,具有相同加密密钥的两个通信方之间的密钥协商是相互建立的。 公开了通用线性算子的各种说明性实施例,包括矩形矩阵,方矩阵,对称矩阵,偏斜对称矩阵,上三角形方阵,下三角方阵,特殊类型的偏斜对称矩阵,以产生 修改的交叉产品协议,用于生成顺序密钥协议的一系列矩阵,以及循环矩阵的组合。
    • 2. 发明授权
    • Secure, swift cryptographic key exchange
    • 安全,快速的加密密钥交换
    • US5583939A
    • 1996-12-10
    • US460675
    • 1995-06-01
    • Chung N. ChangChuan K. YuanFeng Q. Hao
    • Chung N. ChangChuan K. YuanFeng Q. Hao
    • H04L9/08H04L9/00
    • H04L9/0841
    • Using the present cryptographic key exchange protocol, a first of two cryptographic units selects quantities "A" and "B." That same unit then applies a mathematical function ".PHI..sub.1 " to A and B to compute a third quantity "C.". A and B and the function .PHI..sub.1 posses the property that knowing A or B, and C, and the function .PHI..sub.1, it is mathematically impossible to compute the unknown quantity B or A. The first unit then transmits A together C to the second unit while retaining B. The second unit selects a fourth quantity "D" and then applies a second mathematical function .PHI..sub.2 to A and D to compute a quantity "E" which the second unit transmits to the first unit while retaining D. The quantities A and D and the function .PHI..sub.2 must posses the property that knowing D and E, and the function .PHI..sub.2, it is mathematically impossible to compute the unknown quantity D. Then the second unit applies a third mathematical function ".PSI..sub.2 " to D and C to compute the secure key "K." The first unit upon receiving the quantity E then applies a fourth mathematical function .PSI..sub.1 to B and E to also compute the secure key K.
    • 使用本密码密钥交换协议,两个加密单元中的第一个选择数量“A”和“B.” 那个同一单元然后将数学函数“PHI 1”应用于A和B来计算第三数量“C.”。 A和B和函数PHI 1具有知道A或B和C的属性,以及函数PHI 1,在数学上不可能计算未知数量B或A.第一单元然后将A一起发送到第二个 同时保持B.第二单元选择第四数量“D”,然后将第二数学函数PHI 2应用于A和D以计算第二单元在保留D的同时向第一单元发送的数量“E”。数量 A和D和函数PHI 2必须具有知道D和E的属性,以及函数PHI 2,在数学上不可能计算未知数量D.然后第二单元将第三数学函数“PSI 2”应用于D 和C来计算安全密钥“K.” 接收数量E的第一单元然后将第四数学函数PSI 1应用于B和E,以计算安全密钥K.