会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • DEVICE AUTHENTICATION
    • 设备认证
    • US20100106970A1
    • 2010-04-29
    • US12685475
    • 2010-01-11
    • Michael K. BROWNHerbert A. LITTLEDinah L. M. DAVIS
    • Michael K. BROWNHerbert A. LITTLEDinah L. M. DAVIS
    • H04L9/00H04L9/30H04K1/00
    • G11C7/24
    • Authentication of two devices in communication with a third device is achieved where the first and second devices each possess a shared secret value. The authentication includes communication of authentication values from the first device to the second device using the third device. Similarly, there is communication of values from the second device to the first device using the third device. The third device retains the communicated values. The values are calculated to permit the third device to authenticate the first and second devices without the third device receiving the shared secret value. The authentication may be used to establish a communications channel between the first and the second devices.
    • 实现与第三设备通信的两个设备的认证,其中第一和第二设备各自具有共享秘密值。 认证包括使用第三设备从第一设备到第二设备的认证值的通信。 类似地,存在使用第三设备从第二设备到第一设备的值的通信。 第三个设备保留所传达的值。 计算这些值以允许第三设备认证第一和第二设备,而第三设备不接收共享秘密值。 认证可以用于在第一和第二设备之间建立通信信道。
    • 3. 发明申请
    • SYSTEM AND METHOD FOR ENCRYPTED SMART CARD PIN ENTRY
    • 加密智能卡引脚的系统和方法
    • US20100241867A1
    • 2010-09-23
    • US12795383
    • 2010-06-07
    • Michael K. BROWNNeil P. AdamsHerbert A. Little
    • Michael K. BROWNNeil P. AdamsHerbert A. Little
    • H04L9/32
    • G07F7/1008G06Q20/341G06Q20/4012G06Q20/40975G07F7/1025
    • A smart card, system, and method for securely authorizing a user or user device using the smart card is provided. The smart card is configured to provide, upon initialization or a request for authentication, a public key to the user input device such that the PIN or password entered by the user is encrypted before transmission to the smart card via a smart card reader. The smart card then decrypts the PIN or password to authorize the user. Preferably, the smart card is configured to provide both a public key and a nonce to the user input device, which then encrypts a concatenation or other combination of the nonce and the user-input PIN or password before transmission to the smart card. The smart card reader thus never receives a copy of the PIN or password in the clear, allowing the smart card to be used with untrusted smart card readers.
    • 提供了使用智能卡安全授权用户或用户设备的智能卡,系统和方法。 智能卡被配置为在初始化或请求验证时向用户输入设备提供公钥,使得在经由智能卡读卡器传输到智能卡之前,由用户输入的PIN或密码被加密。 智能卡然后解密PIN或密码以授权用户。 优选地,智能卡被配置为向用户输入设备提供公开密钥和随机数,该用户输入设备然后在发送到智能卡之前加密随机数和用户输入的PIN或密码的级联或其他组合。 因此,智能卡读卡器从未收到PIN或密码的副本,允许智能卡与不可信的智能卡读卡器一起使用。
    • 6. 发明申请
    • CHALLENGE RESPONSE-BASED DEVICE AUTHENTICATION SYSTEM AND METHOD
    • 基于挑战响应的设备认证系统和方法
    • US20120045057A1
    • 2012-02-23
    • US13281789
    • 2011-10-26
    • Michael K. BROWNMichael S. BROWNMichael G. KIRKUPHerbert A. LITTLE
    • Michael K. BROWNMichael S. BROWNMichael G. KIRKUPHerbert A. LITTLE
    • H04L9/00
    • H04L9/3271H04L9/3226H04L9/3236H04L63/083H04L2209/80
    • A challenge response scheme authenticates a requesting device by an authenticating device. The authenticating device generates and issues a challenge to the requesting device. The requesting device combines the challenge with a hash of a password provided by a user, and the combination is further hashed in order to generate a requesting encryption key used to encrypt the user supplied password. The encrypted user supplied password is sent to the authenticating device as a response to the issued challenge. The authenticating device generates an authenticating encryption key by generating the hash of a combination of the challenge and a stored hash of an authenticating device password. The authenticating encryption key is used to decrypt the response in order to retrieve the user-supplied password. If the user-supplied password hash matches the stored authenticating device password hash, the requesting device is authenticated and the authenticating device is in possession of the password.
    • 挑战响应方案通过认证设备认证请求设备。 认证设备生成并向请求设备发出质询。 请求设备将挑战与由用户提供的密码的散列相结合,并且组合进一步进行散列,以便生成用于加密用户提供的密码的请求加密密钥。 加密的用户提供的密码作为对发布的挑战的响应被发送到认证设备。 认证设备通过生成质询的组合和存储的认证设备密码的哈希的散列来生成认证加密密钥。 认证加密密钥用于解密响应,以便检索用户提供的密码。 如果用户提供的密码哈希与存储的认证设备密码散列匹配,则请求设备被认证,认证设备拥有密码。
    • 10. 发明申请
    • CHALLENGE RESPONSE-BASED DEVICE AUTHENTICATION SYSTEM AND METHOD
    • 基于挑战响应的设备认证系统和方法
    • US20090240943A1
    • 2009-09-24
    • US12428170
    • 2009-04-22
    • Michael K. BROWNMichael S. BROWNMichael G. KIRKUPHerbert A. LITTLE
    • Michael K. BROWNMichael S. BROWNMichael G. KIRKUPHerbert A. LITTLE
    • H04L9/32H04L9/00
    • H04L9/3271H04L9/3226H04L9/3236H04L63/083H04L2209/80
    • A challenge response scheme authenticates a requesting device by an authenticating device. The authenticating device generates and issues a challenge to the requesting device. The requesting device combines the challenge with a hash of a password provided by a user, and the combination is further hashed in order to generate a requesting encryption key used to encrypt the user supplied password. The encrypted user supplied password is sent to the authenticating device as a response to the issued challenge. The authenticating device generates an authenticating encryption key by generating the hash of a combination of the challenge and a stored hash of an authenticating device password. The authenticating encryption key is used to decrypt the response in order to retrieve the user-supplied password. If the user-supplied password hash matches the stored authenticating device password hash, the requesting device is authenticated and the authenticating device is in possession of the password.
    • 挑战响应方案通过认证设备认证请求设备。 认证设备生成并向请求设备发出质询。 请求设备将挑战与由用户提供的密码的散列相结合,并且组合进一步进行散列,以便生成用于加密用户提供的密码的请求加密密钥。 加密的用户提供的密码作为对发布的挑战的响应被发送到认证设备。 认证设备通过生成质询的组合和存储的认证设备密码的哈希的散列来生成认证加密密钥。 认证加密密钥用于解密响应,以便检索用户提供的密码。 如果用户提供的密码哈希与存储的认证设备密码散列匹配,则请求设备被认证,认证设备拥有密码。