会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明授权
    • Finite field inverse circuit
    • 有限域反向电路
    • US6009450A
    • 1999-12-28
    • US997943
    • 1997-12-24
    • James Douglas DworkinP. Michael GlaserMichael John TorlaAshok VadekarRobert John LambertScott Alexander Vanstone
    • James Douglas DworkinP. Michael GlaserMichael John TorlaAshok VadekarRobert John LambertScott Alexander Vanstone
    • G06F7/72G06F7/00
    • G06F7/726
    • A finite field inverse circuit has a finite field data unit (1112) and an inverse control unit (1110). The inverse control unit includes (1110) a k.sub.l and k.sub.u decrementer pair (1108, 1122), a k.sub.l -k.sub.u difference unit (1106), an inverse control finite state machine (1102), and a one-bit memory (1104) coupled to the inverse control finite state machine (1102). The finite field data unit (1112) includes four m bit wide registers that are shift registers designated as B (1120), A (1118), M (1114), and C (1116), where B- is a first register, A- is a second register, M- is a irreducible polynomial register, and C- is a field element register. An the irreducible polynomial is loaded left justified in the M-register, a field element to be inverted is loaded left justified in the C-register, and a single "1" is loaded in an LSB bit of the B-register. The field element is then inverted in 2n+2 system clock cycles where n is a field size associated with the field element.
    • 有限域逆电路具有有限场数据单元(1112)和逆控制单元(1110)。 逆控制单元包括(1110)kl和ku减量器对(1108,1122),kl-ku差分单元(1106),逆控制有限状态机(1102)和耦合到一个比特存储器(1104)的一位存储器 到反向有限状态机(1102)。 有限域数据单元(1112)包括四个m位宽的寄存器,它们是指定为B(1120),A(1118),M(1114)和C(1116)的移位寄存器,其中B-是第一寄存器,A - 是第二寄存器,M-是不可约多项式寄存器,C是场元素寄存器。 在M寄存器中左对齐加载不可约多项式,在C寄存器中左对齐加载要反相的场元素,并在B寄存器的LSB位中加载单个“1”。 然后,在2n + 2个系统时钟周期中,场元素被反转,其中n是与场元素相关联的场大小。
    • 4. 发明授权
    • System for controlling data exchange between a host device and a processor
    • 用于控制主机设备和处理器之间的数据交换的系统
    • US06266717B1
    • 2001-07-24
    • US08997964
    • 1997-12-24
    • James Douglas DworkinMichael John TorlaAshok Vadekar
    • James Douglas DworkinMichael John TorlaAshok Vadekar
    • G06F1314
    • G06F9/30014G06F7/72G06F7/722G06F7/724G06F7/725G06F9/30036G06F2207/382
    • A system for efficiently controlling the exchange of data between a host bus (190) and an input/output (I/O) register (125) of an elliptic curve (EC) processor (120) having a much wider datapath than that of the host device (100) . A spreading/despreading pattern is determined which spans multiple bit positions of the input/output register (125). In one embodiment, a full combinational circuit (300) is provided to connect a bit position of the host bus (190) to a bit position of the input/output register (125). In another embodiment, a combinational circuit (300) and an intermediate register (410) are provided. In still another embodiment, a spreading-by shifting system (500) is provided which comprises a plurality of subfield modules (520) into which data from the host bus (190) is shifted. The spreading/despreading pattern is achieved through multiplexers (540) connected between the subfield modules (520). In yet another embodiment, a cross bar switch (600) is provided to connect any bit position of the host bus (190) to any bit position of the I/O register 125. In each embodiment, an EC control unit (123) is provided which stores information for the spreading/despreading pattern.
    • 一种用于有效控制主机总线(190)与椭圆曲线(EC)处理器(120)的输入/输出(I / O)寄存器(125)之间的数据交换的系统,其具有比 主机设备(100)。 确定跨越输入/输出寄存器(125)的多个位位置的扩展/解扩展模式。 在一个实施例中,提供全组合电路(300)以将主机总线(190)的位位置连接到输入/输出寄存器(125)的位位置。 在另一个实施例中,提供组合电路(300)和中间寄存器(410)。 在另一个实施例中,提供了扩展移位系统(500),其包括多个子场模块(520),来自主机总线(190)的数据被移动到该子场模块中。 扩展/解扩模式通过连接在子场模块(520)之间的多路复用器(540)来实现。 在另一个实施例中,提供了一种横杆开关(600),用于将主机总线(190)的任何位位置连接到I / O寄存器125的任何位位置。在每个实施例中,EC控制单元(123) 提供哪个存储用于扩展/解扩图案的信息。
    • 7. 发明授权
    • Two way authentication protocol
    • 双向认证协议
    • US06487660B1
    • 2002-11-26
    • US09432166
    • 1999-11-02
    • Scott Alexander VanstoneDonald B. JohnsonRobert J. LambertAshok Vadekar
    • Scott Alexander VanstoneDonald B. JohnsonRobert J. LambertAshok Vadekar
    • G06F124
    • G07F7/1008G06Q20/341G06Q20/40975H04L9/0841H04L9/3066H04L9/3273
    • A method of authenticating a pair of correspondents C,S to permit the exchange of information therebetween, each of the correspondents having a respective private key, e, d and a public key, Qu, and Qs derived from a generator element of a group and a respective ones of the private keys e,d, the method comprising the steps of: a first of the correspondents C generating a session value x; the first correspondent generating a private value t, a public value derived from the private value t and the generator and a shared secret value derived from the private value t and the public key Qs of the second correspondent; the second correspondent generating a challenge value y and transmitting the challenge value y to the first correspondent; the first correspondent in response thereto computing a value h by applying a function H to the challenge value y, the session value x, the public value an of the first correspondent; the first correspondent signing the value h utilizing the private key e; the first correspondent transmitting to the second correspondent the signature including the session value x, and the private value t; and the second correspondent verifying the signature utilizing the public key Qu of the first correspondent and whereby verification of the signature authenticates the first correspondent to the second correspondent.
    • 一种认证一对记者C,S以允许它们之间的信息交换的方法,每个通信对象具有从组的发生器元素导出的相应私钥,e,d和公钥Qu和Q,以及 相应的私钥e,d,该方法包括以下步骤:生成会话值x的通信对象C中的第一个; 生成私有值t的第一通信对象,从私有值t和生成器导出的公有值和从私有值t和第二通信对方的公钥Qs导出的共享秘密值; 第二记者产生质询值y并将询问值y发送给第一通讯员; 响应于第一记者通过将函数H应用于质询值y,会话值x,第一记者的公开值a来计算值h; 第一个记者利用私钥e签名值h; 第一记者向第二记者发送包括会话值x和私有值t的签名; 以及第二记者利用第一记者的公钥Qu验证签名,由此签名的验证对第二通信对象的第一对应者进行认证。
    • 9. 发明授权
    • Retrofitting authentication onto firmware
    • 将验证改装到固件上
    • US08566791B2
    • 2013-10-22
    • US11418462
    • 2006-05-05
    • Ashok VadekarBrian Neill
    • Ashok VadekarBrian Neill
    • G06F9/44
    • G06F21/57G06F21/572G06F21/79G06F2221/2129
    • The present invention provides an inexpensive, software-based security-retrofit solution to verify the integrity of program code in embedded systems, or accessories, without resorting to expensive hardware changes. All unused memory on an accessory that could be used to store a program code image is filled with random data. A host system also locally stores a copy of the accessory's program image containing the random data. The host system sends the accessory a list of memory addresses or memory ranges on the accessory, which is always different and random in nature. The accessory will then produce a digest using values stored in the memory addresses as inputs to a secure hash function. The host system verifies the integrity of the embedded program code by verifying the resulting digest produced by and returned from the accessory.
    • 本发明提供了一种廉价的基于软件的安全改进解决方案,用于在不诉诸昂贵的硬件改变的情况下验证嵌入式系统或附件中的程序代码的完整性。 可用于存储程序代码图像的附件上的所有未使用的内存都填充有随机数据。 主机系统还在本地存储包含随机数据的附件的节目图像的副本。 主机系统向附件发送附件上的存储器地址或存储器范围列表,该列表本质上是随机的。 然后,附件将使用存储在存储器地址中的值作为安全散列函数的输入来生成摘要。 主机系统通过验证由附件生成和返回的结果摘要来验证嵌入式程序代码的完整性。
    • 10. 再颁专利
    • Method and apparatus for computing a shared secret key
    • 用于计算共享密钥的方法和装置
    • USRE43792E1
    • 2012-11-06
    • US13075988
    • 2011-03-30
    • Robert LambertAshok Vadekar
    • Robert LambertAshok Vadekar
    • H04L9/00H04L9/28H04L9/30
    • H04L9/0844
    • A method of generating a key by a first correspondent. The key is computable by a second correspondent. The method comprises the steps of: a) making available to the second correspondent a first short term public key; b) obtaining a second short term public key from the second correspondent; c) computing a first exponent derived from the first short term private key, the first short term public key, and the first long term private key; d) computing a second exponent derived from the first short term private key, the first long short term public key, the second short term public key and the first long term private key; e) computing a simultaneous exponentiation of the first exponent with the second short term public key and the second exponent with the second long term public key.
    • 一种由第一通讯员产生密钥的方法。 密钥可由第二个记者计算。 该方法包括以下步骤:a)向第二记者提供第一短期公钥; b)从第二个记者处获得第二个短期公钥; c)计算从第一短期私钥,第一短期公钥和第一长期私钥导出的第一指数; d)计算从第一短期私钥,第一长短期公钥,第二短期公钥和第一长期私钥导出的第二指数; e)使用所述第二短期公钥和所述第二指数与所述第二长期公共密钥计算所述第一指数的同时取幂。