会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Method for sharing the authorization to use specific resources
    • 共享授权使用特定资源的方法
    • US07343014B2
    • 2008-03-11
    • US10621258
    • 2003-07-15
    • Sampo SovioNadarajah AsokanKaisa NybergValtteri Niemi
    • Sampo SovioNadarajah AsokanKaisa NybergValtteri Niemi
    • H04K9/00H04L9/00
    • H04L9/0827H04L9/0863H04L9/3226H04L9/3247H04L2209/76
    • The invention relates to a method for sharing the authorization to use specific resources among multiple devices, which resources are accessible via messages on which a secret key operation was applied with a predetermined secret master key d available at a master device 11. In order to provide an optimized sharing of authorization, it is proposed that the master device 11 splits the secret master key d into two parts d1, d2. A piece of information relating to the first part d1 of the secret master key d is forwarded to the slave device 13 for enabling this slave device to perform a partial secret key operation on a message m. The second part d2 of the secret master key d is forwarded to a server 12 for enabling the server 12 to perform partial secret key operations on a message m received from the slave device 13.
    • 本发明涉及一种用于共享在多个设备之间使用特定资源的授权的方法,所述资源可以通过使用在主设备11上可用的预定秘密主密钥d应用秘密密钥操作的消息来访问。 为了提供优化的授权共享,建议主设备11将秘密主密钥d分割成两部分d 2,d 2 2。 与秘密主密钥d的第一部分d 1相关的信息被转发到从设备13,以使该从设备能够对消息m执行部分秘密密钥操作。 秘密主密钥d的第二部分d 2 2被转发到服务器12,以使得服务器12能够对从设备13接收到的消息m执行部分秘密密钥操作。
    • 2. 发明授权
    • Linked authentication protocols
    • 链接的认证协议
    • US07707412B2
    • 2010-04-27
    • US10528161
    • 2002-11-25
    • Kaisa NybergValtteri NiemiNadarajah Asokan
    • Kaisa NybergValtteri NiemiNadarajah Asokan
    • H04L9/32
    • H04L63/0869H04L63/162H04W12/06
    • A system and method for authenticating a terminal in a communication system is described. The method includes executing a terminal authentication protocol, whereby the executing the terminal authentication protocol includes authenticating an identity of a network entity by a terminal in a communication system. The method further includes executing a challenge authentication protocol, wherein the executing the challenge authentication protocol includes sharing challenge data between the terminal and the network entity, and forming at the terminal, test data by at least applying one authentication function to the challenge data using the identifier. The executing the challenge authentication protocol further includes transmitting a message including terminal authentication data from the terminal to the network entity, and determining, based on the terminal authentication data, whether to provide the terminal with access to a service.
    • 描述用于认证通信系统中的终端的系统和方法。 该方法包括执行终端认证协议,由此执行终端认证协议包括通信系统中的终端认证网络实体的身份。 该方法还包括执行挑战认证协议,其中执行挑战认证协议包括在终端和网络实体之间共享挑战数据,以及在终端上形成测试数据,至少使用一个认证功能将其应用于质询数据 标识符 执行挑战认证协议还包括从终端向网络实体发送包括终端认证数据的消息,并且基于终端认证数据确定是否向终端提供对服务的访问。
    • 3. 发明申请
    • Linked authentication protocols
    • 链接的认证协议
    • US20050210251A1
    • 2005-09-22
    • US10528161
    • 2002-11-25
    • Kaisa NybergValtteri NiemiNadarajah Asokan
    • Kaisa NybergValtteri NiemiNadarajah Asokan
    • H04L12/56H04L29/06H04W12/06H04L9/00
    • H04L63/0869H04L63/162H04W12/06
    • A method for authenticating a terminal in a communication system, the terminal comprising identification means for applying authentication functions to input data to form response data, and the communication system being arranged to utilise a first authentication protocol for authentication of the terminal, wherein an authentication functionality and the terminal share challenge data, the terminal forms response data and a first key by applying the authentication functions to the challenge data by means of the identification means, and returns the response data to the authentication functionality, and the authentication functionality authenticates the terminal by means of the response data and can apply an authentication function to the challenge data to duplicate the first key; the method comprising; executing a second authentication protocol wherein the terminal authenticates the identity of a network entity and the terminal and the network entity share a second key for use in securing subsequent communications between the terminal and the network entity; and subsequently executing a third authentication protocol by the steps of: sharing challenge data between the network entity and the terminal; forming at the terminal test data by at least applying one of the authentication functions to the challenge data by means of the identification means; transmitting a message comprising authentication data, from the terminal to the network entity; and determining based on the authentication data whether to provide the terminal with access to a service; wherein in the determining step the terminal is provided with access to the service only if the authentication data equals a predetermined function of at least the test data and the second key.
    • 一种用于在通信系统中认证终端的方法,所述终端包括识别装置,用于将认证功能应用于输入数据以形成响应数据,并且所述通信系统被布置为利用第一认证协议进行认证,其中认证功能 终端共享挑战数据,终端通过识别装置将认证功能应用于质询数据,形成响应数据和第一密钥,并将响应数据返回给认证功能,并且认证功能通过 响应数据的装置,并且可以将认证功能应用于质询数据以复制第一密钥; 该方法包括: 执行第二认证协议,其中终端认证网络实体的身份,并且终端和网络实体共享用于保护终端和网络实体之间的后续通信的第二密钥; 并且随后通过以下步骤执行第三认证协议:在所述网络实体和所述终端之间共享挑战数据; 通过所述识别装置至少将所述认证功能中的一个应用于所述质询数据,在终端测试数据形成; 从终端向网络实体发送包括认证数据的消息; 以及基于所述认证数据确定是否向所述终端提供对服务的访问; 其中在所述确定步骤中,仅当所述认证数据等于至少所述测试数据和所述第二密钥的预定功能时,才向所述终端提供对所述服务的访问。
    • 9. 发明授权
    • System, method and computer program product for authenticating a data agreement between network entities
    • 系统,方法和计算机程序产品,用于认证网络实体之间的数据协议
    • US07783041B2
    • 2010-08-24
    • US11242374
    • 2005-10-03
    • Nadarajah AsokanKaisa Nyberg
    • Nadarajah AsokanKaisa Nyberg
    • H04K1/00
    • H04L9/0844H04L63/0428H04L63/08H04L63/18H04L2209/80
    • A method for authenticating a data agreement between first and second network entities can include the first network entity committing to the agreed data value, and transmitting the committed data value and a first random value to the second network entity. The first network entity can receive a second random value, and can then open the committed data value such that the second network entity can check the committed data value. If successful, the second network entity can calculate a third check string, and the first network entity can similarly calculate a fourth check string, based upon the data value and the first and second random values. The first network entity can calculate the fourth check string without the second network entity committing to the data value. The method can then include comparing the check strings such that the agreed data can be considered authenticated based upon the comparison.
    • 用于认证第一和第二网络实体之间的数据协议的方法可以包括提交到约定的数据值的第一网络实体,以及向第二网络实体发送所提交的数据值和第一随机值。 第一网络实体可以接收第二随机值,然后可以打开提交的数据值,使得第二网络实体可以检查提交的数据值。 如果成功,则第二网络实体可以计算第三检查字符串,并且第一网络实体可以基于数据值和第一和第二随机值类似地计算第四检查字符串。 第一个网络实体可以计算第四个检查字符串,而第二个网络实体不提交数据值。 该方法然后可以包括比较检查字符串,使得可以基于比较认可约定的数据。
    • 10. 发明授权
    • Method for protecting electronic device, and electronic device
    • 电子设备保护方法及电子设备
    • US07630495B2
    • 2009-12-08
    • US10186222
    • 2002-06-28
    • Antti KiiveriNadarajah AsokanValtteri Niemi
    • Antti KiiveriNadarajah AsokanValtteri Niemi
    • H04K1/00
    • H04W88/02H04W12/08
    • Identity data of an operational unit and a verification key of the cryptographic method employed by the service provider are protected with a key of the cryptographic method employed by the manufacturer of the operational unit. The verification key of the cryptographic method employed by the manufacturer of the operational unit is stored in the operational unit of the electronic device. The identity data of the operational unit and the identity data of the service provider are protected with a key of the cryptographic method employed by the service provider. The identity data of the operational unit and the verification key of the service provider are verified with the verification key of the manufacturer of the operational unit. The identity data of the operational unit and the identity data of the service provider are verified with the verified verification key of the service provider. The identity data stored in the user-specific module are compared with the verified identity data. The device starts if the identity data verified by the cryptographic method correspond with the identity data stored in the user-specific module.
    • 操作单元的身份数据和由服务提供商使用的密码方法的验证密钥由操作单元的制造商采用的密码方法的密钥进行保护。 操作单元的制造商使用的密码方法的验证密钥存储在电子设备的操作单元中。 操作单元的身份数据和服务提供商的身份数据由服务提供商使用的密码方法的密钥保护。 操作单元的身份数据和服务提供商的验证密钥由操作单元的制造商的验证密钥进行验证。 操作单元的身份数据和服务提供商的身份数据用服务提供商的已验证验证密钥进行验证。 将存储在用户特定模块中的身份数据与验证的身份数据进行比较。 如果通过加密方法验证的身份数据与存储在用户特定模块中的身份数据相对应,则设备启动。