会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Hybrid signature scheme
    • 混合签名方案
    • US07249259B1
    • 2007-07-24
    • US09390362
    • 1999-09-07
    • Scott Alexander VanstoneRobert GallantRobert J. LambertLeon A. PintsovFrederick W. Ryan, Jr.Ari Singer
    • Scott Alexander VanstoneRobert GallantRobert J. LambertLeon A. PintsovFrederick W. Ryan, Jr.Ari Singer
    • H04L9/00H04K1/00
    • H04L9/3247H04L9/3252
    • A signature scheme is provided in which a message is divided in to a first portion which is hidden and is recovered during verification, and a second portion which is visible and is required as input to the verification algorithm. A first signature component is generated by encrypting the first portion alone. An intermediate component is formed by combining the first component and the visible portion and cryptographically hashing them. A second signature component is then formed using the intermediate component and the signature comprises the first and second components with the visible portion. A verification of the signature combines a first component derived only from the hidden portion of the message with the visible portion and produces a hash of the combination. The computed hash is used together with publicly available information to generate a bit string corresponding to the hidden portion. If the required redundancy is present the signature is accepted and the message reconstructed from the recovered bit string and the visible portion.
    • 提供一种签名方案,其中消息被分成隐藏的第一部分,并且在验证期间被恢复,并且第二部分是可见的并且被要求作为验证算法的输入。 通过单独加密第一部分来产生第一签名组件。 通过组合第一组件和可见部分并对其进行密码散列来形成中间组件。 然后使用中间部件形成第二签名部件,并且签名包括具有可见部分的第一和第二部件。 签名的验证将仅从消息的隐藏部分导出的第一组件与可见部分组合,并产生组合的散列。 所计算的散列与公开可用的信息一起使用以产生对应于隐藏部分的位串。 如果存在所需的冗余,则签名被接受,并且从恢复的位串和可见部分重建消息。
    • 3. 发明授权
    • Hybrid signature scheme
    • 混合签名方案
    • US07877610B2
    • 2011-01-25
    • US11812811
    • 2007-06-21
    • Scott Alexander VanstoneRobert GallantRobert J. LambertLeon A. PintsovFrederick W. Ryan, Jr.Ari Singer
    • Scott Alexander VanstoneRobert GallantRobert J. LambertLeon A. PintsovFrederick W. Ryan, Jr.Ari Singer
    • H04L9/00
    • H04L9/3247H04L9/3252
    • A signature scheme is provided in which a message is divided into a first portion which is hidden and is recovered during verification, and a second portion which is visible and is required as input to the verification algorithm. A first signature component is generated by encrypting the first portion alone. An intermediate component is formed by combining the first component and the visible portion and cryptographically hashing them. A second signature component is then formed using the intermediate component and the signature comprises the first and second components with the visible portion. A verification of the signature combines a first component derived only from the hidden portion of the message with the visible portion and produces a hash of the combination. The computed hash is used together with publicly available information to generate a bit string corresponding to the hidden portion. If the required redundancy is present the signature is accepted and the message reconstructed from the recovered bit string and the visible portion.
    • 提供了一种签名方案,其中消息被分成在验证期间被隐藏并被恢复的第一部分,以及作为验证算法的输入可见并被要求的第二部分。 通过单独加密第一部分来产生第一签名组件。 通过组合第一组件和可见部分并对其进行加密散列来形成中间组件。 然后使用中间部件形成第二签名部件,并且签名包括具有可见部分的第一和第二部件。 签名的验证将仅从消息的隐藏部分导出的第一组件与可见部分组合,并产生组合的散列。 所计算的散列与公开可用的信息一起使用以产生对应于隐藏部分的位串。 如果存在所需的冗余,则签名被接受,并且从恢复的位串和可见部分重建消息。
    • 4. 发明申请
    • Hybrid signature scheme
    • 混合签名方案
    • US20080141036A1
    • 2008-06-12
    • US11812811
    • 2007-06-21
    • Scott Alexander VanstoneRobert GallantRobert J. LambertLeon A. PinstovFrederick W. RyanAri Singer
    • Scott Alexander VanstoneRobert GallantRobert J. LambertLeon A. PinstovFrederick W. RyanAri Singer
    • H04L9/00H04K1/00
    • H04L9/3247H04L9/3252
    • A signature scheme is provided in which a message is divided into a first portion which is hidden and is recovered during verification, and a second portion which is visible and is required as input to the verification algorithm. A first signature component is generated by encrypting the first portion alone. An intermediate component is formed by combining the first component and the visible portion and cryptographically hashing them. A second signature component is then formed using the intermediate component and the signature comprises the first and second components with the visible portion. A verification of the signature combines a first component derived only from the hidden portion of the message with the visible portion and produces a hash of the combination. The computed hash is used together with publicly available information to generate a bit string corresponding to the hidden portion. If the required redundancy is present the signature is accepted and the message reconstructed from the recovered bit string and the visible portion.
    • 提供了一种签名方案,其中消息被分成在验证期间被隐藏并被恢复的第一部分,以及作为验证算法的输入可见并被要求的第二部分。 通过单独加密第一部分来产生第一签名组件。 通过组合第一组件和可见部分并对其进行密码散列来形成中间组件。 然后使用中间部件形成第二签名部件,并且签名包括具有可见部分的第一和第二部件。 签名的验证将仅从消息的隐藏部分导出的第一组件与可见部分组合,并产生组合的散列。 所计算的散列与公开可用的信息一起使用以产生对应于隐藏部分的位串。 如果存在所需的冗余,则签名被接受,并且从恢复的位串和可见部分重建消息。
    • 5. 发明授权
    • Two way authentication protocol
    • 双向认证协议
    • US06487660B1
    • 2002-11-26
    • US09432166
    • 1999-11-02
    • Scott Alexander VanstoneDonald B. JohnsonRobert J. LambertAshok Vadekar
    • Scott Alexander VanstoneDonald B. JohnsonRobert J. LambertAshok Vadekar
    • G06F124
    • G07F7/1008G06Q20/341G06Q20/40975H04L9/0841H04L9/3066H04L9/3273
    • A method of authenticating a pair of correspondents C,S to permit the exchange of information therebetween, each of the correspondents having a respective private key, e, d and a public key, Qu, and Qs derived from a generator element of a group and a respective ones of the private keys e,d, the method comprising the steps of: a first of the correspondents C generating a session value x; the first correspondent generating a private value t, a public value derived from the private value t and the generator and a shared secret value derived from the private value t and the public key Qs of the second correspondent; the second correspondent generating a challenge value y and transmitting the challenge value y to the first correspondent; the first correspondent in response thereto computing a value h by applying a function H to the challenge value y, the session value x, the public value an of the first correspondent; the first correspondent signing the value h utilizing the private key e; the first correspondent transmitting to the second correspondent the signature including the session value x, and the private value t; and the second correspondent verifying the signature utilizing the public key Qu of the first correspondent and whereby verification of the signature authenticates the first correspondent to the second correspondent.
    • 一种认证一对记者C,S以允许它们之间的信息交换的方法,每个通信对象具有从组的发生器元素导出的相应私钥,e,d和公钥Qu和Q,以及 相应的私钥e,d,该方法包括以下步骤:生成会话值x的通信对象C中的第一个; 生成私有值t的第一通信对象,从私有值t和生成器导出的公有值和从私有值t和第二通信对方的公钥Qs导出的共享秘密值; 第二记者产生质询值y并将询问值y发送给第一通讯员; 响应于第一记者通过将函数H应用于质询值y,会话值x,第一记者的公开值a来计算值h; 第一个记者利用私钥e签名值h; 第一记者向第二记者发送包括会话值x和私有值t的签名; 以及第二记者利用第一记者的公钥Qu验证签名,由此签名的验证对第二通信对象的第一对应者进行认证。
    • 7. 发明授权
    • Signed montgomery arithmetic
    • 签名montgomery算术
    • US08781112B2
    • 2014-07-15
    • US12260865
    • 2008-10-29
    • Robert J. Lambert
    • Robert J. Lambert
    • G06F21/00G06F21/79G06F21/86
    • G06F21/79G06F7/728G06F21/86
    • A system and method configured for applying Montgomery style reduction directly to negative quantities as well as positive values, producing the new form which does not require conditional operations to move values into the positive range. The low-order components of the resulting product, or partially completed product, can be reduced either by the addition of multiples of the modulus, as is usual in the standard Montgomery multiplication which accepts positive values, or by subtracting multiples of the modulus, which of course depends on the actual computation. Signed versions of the Montgomery values in a Montgomery computation are used to avoid the conditional addition and subtraction that can leak information, for example, using a two's complement representation.
    • 一种配置用于将蒙哥马利风格减少直接应用于负数量和正值的系统和方法,产生不需要条件操作将值移动到正范围的新形式。 所得到的产品或部分完成的产品的低阶分量可以通过加入模数的倍数来减少,如接受正值的标准蒙哥马利乘法中常用的,或通过减去模数的倍数,其中 当然取决于实际的计算。 蒙哥马利计算中蒙哥马利价值的签名版本用于避免可能泄露信息的条件加法和减法,例如使用二进制补码表示法。
    • 9. 发明授权
    • Method for strengthening the implementation of ECDSA against power analysis
    • 加强ECDSA实施功率分析的方法
    • US07599491B2
    • 2009-10-06
    • US10119803
    • 2002-04-11
    • Robert J. Lambert
    • Robert J. Lambert
    • H04K1/00H04L9/00G06F1/26G08B29/00
    • G06F7/725G06F7/723G06F2207/7233H04L9/003H04L9/0891H04L9/3066H04L9/3252
    • A method of inhibiting the disclosure of confidential information through power analysis attacks on processors in cryptographic systems. The method masks a cryptographic operation using a generator G. A secret value, which may be combined with the generator G to form a secret generator is generated. The secret value is divided into a plurality of parts. A random value is generated for association with the plurality of parts. Each of the plurality of parts is combined with the random value to derive a plurality of new values such that the new values when combined are equivalent to the secret value. Each of the new values is used in the cryptographic operation, thereby using the secret generator in place of the generator G in the cryptographic operation. The introduction of randomness facilitates the introduction of noise into algorithms used by cryptographic systems so as to mask the secret value and provide protection against power analysis attacks.
    • 通过对加密系统中的处理器进行功率分析攻击来抑制对机密信息的公开的方法。 该方法使用生成器G来掩蔽加密操作。产生可以与生成器G组合以形成秘密生成器的秘密值。 秘密值分为多个部分。 产生与多个部分相关联的随机值。 将多个部分中的每一个与随机值组合以导出多个新值,使得当组合时的新值等于秘密值。 在加密操作中使用每个新值,从而在密码操作中使用秘密发生器来代替生成器G. 引入随机性有助于将噪声引入到加密系统使用的算法中,以掩盖秘密值并提供防止功率分析攻击的保护。
    • 10. 发明申请
    • Nozzle assembly incorporating a molded flow through brush application and a reusable break-off cap, a container having a nozzle assembly and packaging therefor
    • 喷嘴组件包括通过刷子施加的模制流程和可重复使用的分离盖,具有喷嘴组件和其包装的容器
    • US20090050649A1
    • 2009-02-26
    • US12246888
    • 2008-10-07
    • Peter C. RusheGary J. LeonardRobert J. Lambert
    • Peter C. RusheGary J. LeonardRobert J. Lambert
    • B65D35/36B65D35/44B65D47/10
    • B65D1/0238B65D1/095Y02W30/807
    • A nozzle assembly (3, 20) with a re-useable break off cap (20) for dispensing a product from a container (1). On a dispensing end (5) of the nozzle (3) a break-off cap (20) is integrally formed thereon and closes off the dispensing end (5) of the nozzle (3). The break-off cap (20) is removable by breaking a frangible connection (22) between the nozzle (3) and the break-off cap (20). Removing the break-off cap opens the dispensing end (5) of the nozzle (3) thereby allowing product to be dispensed through the nozzle (3). The break-off cap (20) removed from the nozzle (3) can then be re-engaged with the nozzle (3) to close off the dispensing end (5) thereby preventing further product from being dispensed. The cap can be attached to or removed from the nozzle (3) as often as a user requires. Packaging which includes a tray (111) or pouch into which the nozzle assembly (3, 20) and container (1) can be inserted. A flexible resealable peel-off cover (110) is provided on each tray (111) to allow a user to resealably open and close the tray (111). The resealable tray (111) can be provided either singly or as a series of trays. The nozzle assembly may also incorporate an applicator for application of the dispensed product.
    • 一种具有用于从容器(1)分配产品的可重复使用的分离盖(20)的喷嘴组件(3,20)。 在喷嘴(3)的分配端(5)上,一个整体地形成有一个断开盖(20)并封闭喷嘴(3)的分配端(5)。 通过断开喷嘴(3)和断开盖(20)之间的易碎连接(22),分离盖(20)可移除。 拆卸断开盖打开喷嘴(3)的分配端(5),从而允许通过喷嘴(3)分配产品。 然后可以从喷嘴(3)移除的分离盖(20)与喷嘴(3)重新接合,以便关闭分配端(5),从而防止进一步的产品被分配。 盖可以按照使用者的要求经常连接到喷嘴(3)上或从喷嘴(3)移除。 包括其中可以插入喷嘴组件(3,20)和容器(1)的托盘(111)或小袋。 在每个托盘(111)上设置柔性的可重新密封的剥离盖(110),以允许使用者可再密封地打开和关闭托盘(111)。 可重新密封的托盘(111)可以单独提供或作为一系列托盘提供。 喷嘴组件还可以包括用于施加分配产品的施加器。