会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Routing methods and systems for increasing payment transaction volume and profitability
    • 增加支付交易量和盈利能力的路由方法和系统
    • US06999943B1
    • 2006-02-14
    • US09523405
    • 2000-03-10
    • Lance JohnsonBrian BuckleyPaul C. KocherPeter Meffert
    • Lance JohnsonBrian BuckleyPaul C. KocherPeter Meffert
    • G06F17/60
    • G06Q30/06G06Q20/10G06Q40/00G06Q40/025G06Q40/04
    • Customers often have access to multiple payment methods for any given transaction. In one embodiment of the invention, a merchant obtains information regarding multiple payment methods from a customer, and sends said information to a transaction evaluator. Via computer networks, the transaction evaluator sends information about the transaction to the issuers of one or more of the payment methods. The issuers perform a cost/benefit analysis of the transactions and respond with a description of the terms under which they are willing to process the transaction. Based on the issuer response, the transaction evaluator selects one of the payment methods. By enabling participating issuers to select favorable transactions and avoid unprofitable ones, the invention can thus improve issuer profitability by directing profitable transactions to participating issuers while directing unprofitable transactions away from participating issuers or to alternate transaction methods that are more profitable or less costly.
    • 客户通常可以访问任何给定交易的多种付款方式。 在本发明的一个实施例中,商家从客户获得关于多种支付方式的信息,并将所述信息发送给交易评估者。 通过计算机网络,交易评估者将关于交易的信息发送给一个或多个支付方法的发行者。 发行人对交易进行成本/效益分析,并对其愿意处理交易的条款作出回应。 根据发行人的回应,交易评估者选择一种支付方式。 通过使参与发行人能够选择有利的交易并避免无利可图的交易,因此本发明可以通过将有利可图的交易引向参与发行人,同时将无利可图的交易远离参与发行人或以更有利可图或成本更低的替代交易方式来提高发行人的盈利能力。
    • 2. 发明授权
    • Specialized circuitry for cryptographic authentication and other purposes
    • 用于加密认证和其他用途的专用电路
    • US09569628B2
    • 2017-02-14
    • US11387401
    • 2006-03-23
    • Paul C. KocherBenjamin C. JunJoshua M. Jaffe
    • Paul C. KocherBenjamin C. JunJoshua M. Jaffe
    • G06F11/30G06F21/60G06F21/10G06F21/72G06Q20/36H04L9/08
    • G06F21/602G06F21/10G06F21/72G06F2211/007G06F2221/0753G06F2221/2101G06Q20/367H04L9/0833H04L2209/127H04L2209/603
    • To prevent piracy, audiovisual content is encrypted prior to transmission to consumers. A low-cost, high-security cryptographic rights module (such as a smartcard) enables devices such as players/displays to decode such content. Security-critical functions may be performed by the cryptographic module in a manner that allows security compromises to be addressed by upgrading or replacing cryptographic modules, thereby avoiding the need to replace or modify other (typically much higher-cost) components. The security module contains cryptographic keys, which it uses to process rights enablement messages (REMs) and key derivation messages (KDMs). From a REM and KDM, the security module derives key data corresponding to content, uses public key and/or symmetric cryptography to re-encrypt the derived key data for another device, and provides the re-encrypted key data to the decoding device. The decoding device then uses cryptographic values derived from the re-encrypted key data to decrypt the content.
    • 为了防止盗版,视听内容在传输给消费者之前被加密。 低成本,高安全性的加密权限模块(如智能卡)可使诸如播放器/显示器等设备解码此类内容。 安全关键功能可以由加密模块以允许通过升级或替换加密模块来解决安全危害的方式来执行,从而避免需要替换或修改其他(通常成本更高的成本)组件。 安全模块包含加密密钥,用于处理权限启用消息(REM)和密钥导出消息(KDM)。 从REM和KDM,安全模块导出与内容对应的密钥数据,使用公开密钥和/或对称密码来对另一设备的导出密钥数据进行重新加密,并将重新加密的密钥数据提供给解码设备。 解码装置然后使用从重新加密的密钥数据导出的加密值来解密内容。
    • 5. 发明授权
    • Secure modular exponentiation with leak minimization for smartcards and other cryptosystems
    • 用智能卡和其他密码系统进行泄漏最小化的安全模幂运算
    • US06298442B1
    • 2001-10-02
    • US09325528
    • 1999-06-03
    • Paul C. KocherJoshua M. Jaffe
    • Paul C. KocherJoshua M. Jaffe
    • G06F1214
    • H04L9/3066G06F7/723G06F7/725G06F21/556G06F21/602G06F21/755G06F2207/7261H04L9/003H04L9/0841H04L2209/127H04L2209/56
    • Methods and apparatuses are disclosed for securing cryptosystems against external monitoring attacks by reducing the amount (and signal to noise ratio) of useful information leaked during processing. In general, this is accomplished by implementing critical operations using “branchless” or fixed execution path routines whereby the execution path does not vary in any manner that can reveal new information about the secret key during subsequent operations. More particularly, various embodiments of the invention include: implementing modular exponentiation without key-dependent conditional jumps; implementing modular exponentiation with fixed memory access patterns; implementing modular multiplication without using leak-prone multiplication-by-one operations; and implementing leak-minimizing multiplication (and other operations) for elliptic curve cryptosystems.
    • 公开了用于通过减少在处理期间泄露的有用信息的量(和信噪比)来保护密码系统免受外部监视攻击的方法和装置。 一般来说,这是通过使用“无分支”或固定执行路径例程实现关键操作来实现的,由此执行路径在随后的操作期间可以以任何可以揭示关于秘密密钥的新信息的方式变化。 更具体地,本发明的各种实施例包括:实现没有密钥依赖条件跳转的模幂运算; 实现具有固定存储器访问模式的模幂运算; 实现模数乘法而不使用易泄漏的乘法运算; 并为椭圆曲线密码系统实施泄漏最小化乘法(和其他操作)。
    • 6. 发明授权
    • Des and other cryptographic, processes with leak minimization for smartcards and other cryptosystems
    • Des和其他加密过程与漏洞最小化智能卡和其他密码系统
    • US06278783B1
    • 2001-08-21
    • US09324798
    • 1999-06-03
    • Paul C. KocherJoshua M. JaffeBenjamin C. Jun
    • Paul C. KocherJoshua M. JaffeBenjamin C. Jun
    • H04K102
    • H04L9/0625G06F21/556G06F21/602G06F21/755G06F2207/7219H04L9/003H04L2209/046H04L2209/08H04L2209/127
    • Methods and apparatuses are disclosed for improving DES and other cryptographic protocols against external monitoring attacks by reducing the amount (and signal-to-noise ratio) of useful information leaked during processing. An improved DES implementation of the invention instead uses two 56-bit keys (K1 and K2) and two 64-bit plaintext messages (M1 and M2), each associated with a permutation (i.e., K1P, K2P and M1P, M2P) such that K1P {K1} XOR K2P {K2} equals the “standard” DES key K, and M1P {M1} XOR M2P {M2} equals the “standard” message. During operation of the device, the tables are preferably periodically updated, by introducing fresh entropy into the tables faster than information leaks out, so that attackers will not be able to obtain the table contents by analysis of measurements. The technique is implementable in cryptographic smartcards, tamper resistant chips, and secure processing systems of all kinds.
    • 公开了用于通过减少在处理期间泄露的有用信息的量(和信噪比)来改善DES和其他加密协议以防外部监视攻击的方法和装置。 本发明的改进的DES实施方案改为使用两个56位密钥(K1和K2)和两个64位明文消息(M1和M2),每个与排列相关联(即,K1P,K2P和M1P,M2P),使得 K1P {K1} XOR K2P {K2}等于“标准”DES密钥K,M1P {M1} XOR M2P {M2}等于“标准”消息。 在设备的操作期间,优选地通过将新鲜的熵引入到表中比信息泄漏出来更周期地更新表,使得攻击者将不能通过分析测量获得表内容。 该技术可在加密智能卡,防篡改芯片和各种安全处理系统中实现。
    • 8. 发明授权
    • Payment smart cards with hierarchical session key derivation providing security against differential power analysis and other attacks
    • 支付智能卡,具有分级会话密钥导出,提供针对差分功率分析和其他攻击的安全性
    • US07941666B2
    • 2011-05-10
    • US10396975
    • 2003-03-24
    • Paul C. Kocher
    • Paul C. Kocher
    • H04L9/00
    • G07F7/1008G06F2207/7219G06Q20/341G06Q20/40975H04L9/003H04L9/0625H04L9/0891
    • Chip cards are used to secure credit and debit payment transactions. To prevent fraudulent transactions, the card must protect cryptographic keys used to authenticate transactions. In particular, cards should resist differential power analysis and/or other attacks. To address security risks posed by leakage of partial information about keys during cryptographic transactions, cards may be configured to perform periodic cryptographic key update operations. The key update transformation prevents adversaries from exploiting partial information that may have been leaked about the card's keys. Update operations based on a hierarchical structure can enable efficient transaction verification by allowing a verifying party (e.g., an issuer) to derive a card's current state from a transaction counter and its initial state by performing one operation per level in the hierarchy, instead of progressing through all update operations performed by the card.
    • 芯片卡用于确保信用卡和借记支付交易。 为防止欺诈性交易,该卡必须保护用于验证交易的加密密钥。 特别地,卡应该抵抗差分功率分析和/或其他攻击。 为了解决在加密事务期间泄漏关于密钥的部分信息所引起的安全隐患,卡可被配置为执行周期性加密密钥更新操作。 关键的更新转换防止对手利用可能已经泄露的卡的密钥的部分信息。 基于层次结构的更新操作可以通过允许验证方(例如,发行者)从事务计数器及其初始状态通过在层次结构中执行每个级别的一个操作来导出卡的当前状态来实现高效的事务验证,而不是进行 通过卡执行的所有更新操作。
    • 9. 发明授权
    • Prevention of side channel attacks against block cipher implementations and other cryptographic systems
    • 防止针对块密码实现和其他加密系统的侧信道攻击
    • US07787620B2
    • 2010-08-31
    • US11252898
    • 2005-10-18
    • Paul C. KocherJoshua M. JaffeBenjamin C. Jun
    • Paul C. KocherJoshua M. JaffeBenjamin C. Jun
    • H04L9/22
    • H04L9/0625G06F21/556G06F21/602G06F21/755G06F2207/7219H04L9/003H04L2209/046H04L2209/08H04L2209/127
    • Methods and apparatuses are disclosed for improving DES and other cryptographic protocols against external monitoring attacks by reducing the amount (and signal-to-noise ratio) of useful information leaked during processing. An improved DES implementation of the invention instead uses two 56-bit keys (K1 and K2) and two 64-bit plaintext messages (M1 and M2), each associated with a permutation (i.e., K1P, K2P and M1P, M2P) such that K1P{K1} XOR K2P{K2} equals the “standard” DES key K, and M1P{M1} XOR M2P{M2} equals the “standard” message. During operation of the device, the tables are preferably periodically updated, by introducing fresh entropy into the tables faster than information leaks out, so that attackers will not be able to obtain the table contents by analysis of measurements. The technique is implementable in cryptographic smartcards, tamper resistant chips, and secure processing systems of all kinds.
    • 公开了用于通过减少在处理期间泄露的有用信息的量(和信噪比)来改善DES和其他加密协议以防外部监视攻击的方法和装置。 本发明的改进的DES实施方案改为使用两个56位密钥(K1和K2)和两个64位明文消息(M1和M2),每个与排列相关联(即,K1P,K2P和M1P,M2P),使得 K1P {K1} XOR K2P {K2}等于“标准”DES密钥K,M1P {M1} XOR M2P {M2}等于“标准”消息。 在设备的操作期间,优选地通过将新鲜的熵引入到表中比信息泄漏出来更周期地更新表,使得攻击者将不能通过分析测量获得表内容。 该技术可在加密智能卡,防篡改芯片和各种安全处理系统中实现。
    • 10. 发明授权
    • Cryptographic computation using masking to prevent differential power analysis and other attacks
    • 使用掩码进行密码计算,以防止差分功率分析和其他攻击
    • US07668310B2
    • 2010-02-23
    • US09930836
    • 2001-08-15
    • Paul C. KocherJoshua M. JaffeBenjamin C. Jun
    • Paul C. KocherJoshua M. JaffeBenjamin C. Jun
    • H04L9/22
    • H04L9/0625G06F21/556G06F21/602G06F21/755G06F2207/7219H04L9/003H04L2209/046H04L2209/08H04L2209/127
    • Methods and apparatuses are disclosed for improving DES and other cryptographic protocols against external monitoring attacks by reducing the amount (and signal-to-noise ratio) of useful information leaked during processing. An improved DES implementation of the invention instead uses two 56-bit keys (K1 and K2) and two 64-bit plaintext messages (M1 and M2), each associated with a permutation (i.e., K1P, K2P and M1P, M2P) such that K1P{K1} XOR K2P {K2} equals the “standard” DES key K, and M1P{M1} XOR M2P{M2} equals the “standard” message. During operation of the device, the tables are preferably periodically updated, by introducing fresh entropy into the tables faster than information leaks out, so that attackers will not be able to obtain the table contents by analysis of measurements. The technique is implementable in cryptographic smartcards, tamper resistant chips, and secure processing systems of all kinds.
    • 公开了用于通过减少在处理期间泄露的有用信息的量(和信噪比)来改善DES和其他加密协议以防外部监视攻击的方法和装置。 本发明的改进的DES实施方案改为使用两个56位密钥(K1和K2)和两个64位明文消息(M1和M2),每个与排列相关联(即,K1P,K2P和M1P,M2P),使得 K1P {K1} XOR K2P {K2}等于“标准”DES密钥K,M1P {M1} XOR M2P {M2}等于“标准”消息。 在设备的操作期间,优选地通过将新鲜的熵引入到表中比信息泄漏出来更周期地更新表,使得攻击者将不能通过分析测量获得表内容。 该技术可在加密智能卡,防篡改芯片和各种安全处理系统中实现。