会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 6. 发明授权
    • Method and apparatus for providing interoperability between key recovery and non-key recovery systems
    • US06535607B1
    • 2003-03-18
    • US09184002
    • 1998-11-02
    • Coimbatore S. ChandersekaranRosario GennaroSarbari GuptaStephen M. Matyas, Jr.David R. SaffordNevenko Zunic
    • Coimbatore S. ChandersekaranRosario GennaroSarbari GuptaStephen M. Matyas, Jr.David R. SaffordNevenko Zunic
    • H04L900
    • H04L9/0841H04L9/0894
    • A method and apparatus for ensuring that a key recovery-enabled (KR-enabled) system communicating with a non-KR-enabled system in a cryptographic communication system transmits the information necessary to permit key recovery by a key recovery entity. In a first embodiment, data is encrypted under a second key K that is generated as a one-way function of a first key K′ and a key recovery block KRB generated on the first key K′. The key recovery block KRB and the encrypted data e(K, data) are transmitted to the receiver, who cannot decrypt the data without regenerating the second key K from the first key K′ and the key recovery block KRB. In a second embodiment, data is encrypted under a second key K that is generated independently of the first key K′. A third key X, generated as a one-way function of the first key K′ and a key recovery block KRB generated on the second key K, is used to encrypt the XOR product Y of the first and second keys K′, K. The key recovery block KRB, the encrypted XOR product e(X, Y) and the encrypted data e(K, data) are transmitted to the receiver, who cannot decrypt the data without regenerating the third key X from the first key K′ and the key recovery block KRB, decrypting the XOR product Y using the regenerated third key X, and recombining the XOR product Y with the first key K″ to regenerate the second key K. In a third embodiment, an integrity value is computed on a key K and its key recovery block KRB. The integrity value and the key K are encrypted to form an encrypted portion of a key exchange block KEB, while the key recovery block KRB is put in an unencrypted portion of the key exchange block KEB, which is sent along with the encrypted data e(K, data) to the receiver. The receiver decrypts the encrypted portion, recomputes the integrity value and compares it with the received integrity value. Only if the two integrity values compare is the key K extracted and used to decrypt the data.
    • 7. 发明授权
    • Method and apparatus for interoperable validation of key recovery
information in a cryptographic system
    • 用于密码系统中关键恢复信息的可互操作验证的方法和装置
    • US6058188A
    • 2000-05-02
    • US899855
    • 1997-07-24
    • Coimbatore S. ChandersekaranRosario GennaroSarbari GuptaStephen M. Matyas, Jr.David R. SaffordNevenko Zunic
    • Coimbatore S. ChandersekaranRosario GennaroSarbari GuptaStephen M. Matyas, Jr.David R. SaffordNevenko Zunic
    • H04L9/08H04L9/32
    • H04L9/3247H04L9/0894H04L9/3268
    • In a cryptographic communications system, a method and apparatus for allowing a sender of encrypted data to demonstrate to a receiver its ability to correctly generate key recovery information that is transmitted along with the encrypted data and from which law enforcement agents or others may recover the original encryption key. Initially, the sender generates a key pair comprising a private signature key and a corresponding public verification key and sends the latter to a key recovery validation service (KRVS). Upon a satisfactory demonstration by the sender of its ability to correctly generate key recovery information, the KRVS generates a certificate certifying the public verification key and the ability of the sender to correctly generate key recovery information. The sender uses its private signature key to generate a digital signature on the key recovery information, which is sent along with the key recovery information and encrypted data to the receiver. The receiver verifies the signature on the key recovery information using the certified public verification key and decrypts the encrypted data only if the signature is verified as being a valid signature.
    • 在加密通信系统中,允许加密数据的发送方向接收机证明正确地生成与加密数据一起发送的密钥恢复信息的能力的方法和装置,并且执法人员或其他人可以从其恢复原始 加密密钥 最初,发送者生成包括私有签名密钥和对应的公共验证密钥的密钥对,并将其发送到密钥恢复验证服务(KRVS)。 在发送方能够正确生成密钥恢复信息的令人满意的演示之后,KRVS生成证明公共验证密钥的证书以及发送方正确生成密钥恢复信息的能力。 发送方使用其私有签名密钥在密钥恢复信息上生成数字签名,密钥恢复信息与密钥恢复信息和加密数据一起发送给接收者。 接收者使用经认证的公开验证密钥来验证密钥恢复信息上的签名,并且只有当签名被验证为有效签名时才对加密数据进行解密。
    • 8. 发明授权
    • Time stamping method employing a separate ticket and stub
    • 时间戳方法采用单独的机票和存根
    • US07487359B2
    • 2009-02-03
    • US11846562
    • 2007-08-29
    • Mohammad PeyravianAllen RoginskyNevenko ZunicStephen M. Matyas, Jr.
    • Mohammad PeyravianAllen RoginskyNevenko ZunicStephen M. Matyas, Jr.
    • H04L9/00G06F7/04H04K1/00
    • H04L9/3297H04L9/3242
    • A time stamping protocol has two stages referred to as the ticketing stage and the certification stage. During the ticketing stage, the document or other identifying data is sent to the TSA. The TSA generates a “ticket” based on the document or other identifying data and a time indication derived from a trusted clock. The ticket, which serves as an unsigned time stamp receipt, is transmitted back to the document originator. During the certification stage, the holder of the ticket requests a certified time stamp receipt by presenting the ticket to the TSA. The TSA verifies the ticket and generates a signed time stamp receipt, called the ticket stub, which is then transmitted back to the document originator. The ticket stub serves as a “universal time-stamp” that the holder of the ticket stub can use to prove the date of the document.
    • 时间戳协议有两个阶段,称为票务阶段和认证阶段。 在票务阶段,文件或其他识别数据被发送到TSA。 TSA根据文档或其他标识数据和从可信时钟导出的时间指示生成“票证”。 作为未签名的时间戳收据的票据被传回给文件发起者。 在认证阶段,机票持有人通过向TSA提供机票来申请经过认证的时间戳收据。 TSA验证票据并生成一个称为票据存根的签名时间戳收据,然后将其传回给文档发起者。 票据桩作为票据存根的持有者可以用来证明文件的日期的“通用时间戳”。
    • 9. 发明授权
    • Time stamping method employing a separate ticket and stub
    • 时间戳方法采用单独的机票和存根
    • US07315948B1
    • 2008-01-01
    • US09458921
    • 1999-12-10
    • Mohammad PeyravianAllen RoginskyNevenko ZunicStephen M. Matyas, Jr.
    • Mohammad PeyravianAllen RoginskyNevenko ZunicStephen M. Matyas, Jr.
    • H04L9/00G06F7/04H04K1/00
    • H04L9/3297H04L9/3242
    • A time stamping protocol has two stages referred to as the ticketing stage and the certification stage. During the ticketing stage, the document or other identifying data is sent to the TSA. The TSA generates a “ticket” based on the document or other identifying data and a time indication derived from a trusted clock. The ticket, which serves as an unsigned time stamp receipt, is transmitted back to the document originator. During the certification stage, the holder of the ticket requests a certified time stamp receipt by presenting the ticket to the TSA. The TSA verifies the ticket and generates a signed time stamp receipt, called the ticket stub, which is then transmitted back to the document originator. The ticket stub serves as a “universal time-stamp” that the holder of the ticket stub can use to prove the date of the document.
    • 时间戳协议有两个阶段,称为票务阶段和认证阶段。 在票务阶段,文件或其他识别数据被发送到TSA。 TSA根据文档或其他标识数据和从可信时钟导出的时间指示生成“票证”。 作为未签名的时间戳收据的票据被传回给文件发起者。 在认证阶段,机票持有人通过向TSA提交机票来申请经过认证的时间戳收据。 TSA验证票据并生成一个称为票据存根的签名时间戳收据,然后将其传回给文档发起者。 票据桩作为票据存根的持有者可以用来证明文件的日期的“通用时间戳”。