会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • ONE TIME PASSWORD KEY RING FOR MOBILE COMPUTING DEVICE
    • 用于移动计算设备的一次密码钥匙环
    • US20100262834A1
    • 2010-10-14
    • US12423163
    • 2009-04-14
    • Trevor William FreemanJosh BenalohK John BiccumAtul Kumar Shah
    • Trevor William FreemanJosh BenalohK John BiccumAtul Kumar Shah
    • H04L9/32G06F21/00
    • H04L9/0891G06F21/31G06F21/33H04L9/3228H04L9/3247H04L9/3271H04L63/0838H04L2209/80
    • Single-use character combinations are a secure mechanism for user authentication. Such “one-time passwords” (OTPs) can be generated by a mobile device to which the user otherwise maintains easy access. A key exchange, such as in accordance with the Diffie-Hellman algorithm, can provide both the mobile device and a server with a shared secret from which the OTPs can be generated. The shared secret can be derived from parameters posted on the server and updated periodically, and the mobile device can obtain such parameters from the server before generating an OTP. Such parameters can also specify the type of OTP mechanism to be utilized. A second site can, independently, establish an OTP mechanism with the mobile device. For efficiency, the first server can provide an identity token which provides the mobile device's public key in a trusted manner, enabling more efficient generation of the shared secret with the second server.
    • 一次性字符组合是用户认证的安全机制。 这种“一次性密码”(OTP)可以由用户另外保持容易访问的移动设备生成。 密钥交换,例如根据Diffie-Hellman算法,可以向移动设备和服务器提供可以从其生成OTP的共享秘密。 共享密钥可以从服务器上发布的参数导出,并定期更新,移动设备可以在生成OTP之前从服务器获取这些参数。 这样的参数也可以指定要使用的OTP机制的类型。 第二个站点可以独立地使用移动设备建立OTP机制。 为了提高效率,第一台服务器可以提供一种以令人信服的方式提供移动设备公钥的身份令牌,从而能够更有效地生成第二台服务器的共享密钥。
    • 2. 发明授权
    • One time password key ring for mobile computing device
    • 用于移动计算设备的一次密码密钥环
    • US08230231B2
    • 2012-07-24
    • US12423163
    • 2009-04-14
    • Trevor William FreemanJosh BenalohK John BiccumAtul Kumar Shah
    • Trevor William FreemanJosh BenalohK John BiccumAtul Kumar Shah
    • H04L29/06
    • H04L9/0891G06F21/31G06F21/33H04L9/3228H04L9/3247H04L9/3271H04L63/0838H04L2209/80
    • Single-use character combinations are a secure mechanism for user authentication. Such “one-time passwords” (OTPs) can be generated by a mobile device to which the user otherwise maintains easy access. A key exchange, such as in accordance with the Diffie-Hellman algorithm, can provide both the mobile device and a server with a shared secret from which the OTPs can be generated. The shared secret can be derived from parameters posted on the server and updated periodically, and the mobile device can obtain such parameters from the server before generating an OTP. Such parameters can also specify the type of OTP mechanism to be utilized. A second site can, independently, establish an OTP mechanism with the mobile device. For efficiency, the first server can provide an identity token which provides the mobile device's public key in a trusted manner, enabling more efficient generation of the shared secret with the second server.
    • 一次性字符组合是用户认证的安全机制。 这种“一次性密码”(OTP)可以由用户另外保持容易访问的移动设备生成。 密钥交换,例如根据Diffie-Hellman算法,可以向移动设备和服务器提供可以从其生成OTP的共享秘密。 共享密钥可以从服务器上发布的参数导出,并定期更新,移动设备可以在生成OTP之前从服务器获取这些参数。 这样的参数也可以指定要使用的OTP机制的类型。 第二个站点可以独立地使用移动设备建立OTP机制。 为了提高效率,第一台服务器可以提供一种以令人信服的方式提供移动设备公钥的身份令牌,从而能够更有效地生成第二台服务器的共享密钥。
    • 4. 发明授权
    • System and method for non-interactive human answerable challenges
    • 非交互式人为责任挑战的系统和方法
    • US07337324B2
    • 2008-02-26
    • US10725243
    • 2003-12-01
    • Josh BenalohIsmail Cem Paya
    • Josh BenalohIsmail Cem Paya
    • H04L9/32
    • H04L63/12G06F21/31H04L63/0435H04L63/0442
    • A system and method for automatically determining if a computer user is a human or an automated script. Human interactive proofs (HIPs) are currently used to deter automated registration for web services by automated computer scripts. Unfortunately, HIPs entail multiple steps (request service, receive challenge, respond to challenge) that can be burdensome. The system and method of the invention in one embodiment provides a “black-box” to potential users consisting of a challenge generator and a secret key. The challenge is generated for the user and the response can be provided as part of the service request, eliminating the need for a separate challenge from a service provider and response to the challenge.
    • 用于自动确定计算机用户是人或自动脚本的系统和方法。 人类交互式证明(HIP)目前用于通过自动计算机脚本来阻止Web服务的自动注册。 不幸的是,HIP需要多重步骤(请求服务,接收挑战,应对挑战),这可能是繁重的。 在一个实施例中,本发明的系统和方法为由挑战发生器和秘密密钥组成的潜在用户提供“黑箱”。 为用户生成挑战,并且响应可以作为服务请求的一部分提供,消除了对来自服务提供商的单独挑战的需求以及对挑战的响应。
    • 5. 发明申请
    • Using hierarchical identity based cryptography for authenticating outbound mail
    • 使用基于层次标识的加密技术来验证出站邮件
    • US20070124578A1
    • 2007-05-31
    • US11291946
    • 2005-11-30
    • Cem PayaJosh Benaloh
    • Cem PayaJosh Benaloh
    • H04L9/00
    • H04L63/06H04L9/3073H04L9/3247H04L9/3271H04L51/00H04L63/12
    • A hierarchical identity based cryptographic system (“HIBC”) is integrated with the domain name system (“DNS”). A private key is assigned to each of the top level domain name authorities responsible for assigning the top level domain names (e.g., net, .com, etc.). The private key is generated according to an HIBC system, wherein the corresponding public key is based on the identity of the particular domain authority. When user requests a domain name from one of the top level domain name authorities, the user is issued a private key that is generated by the top level domain authority using its private key and the identity of the user according to the particular HIBC system implemented. The user's corresponding public key can be derived from the identity of the user and the public key of the top level domain name authority. Similarly, when the user adds servers and accounts to the users domain, the user can generate private keys for the servers and accounts using the users private key according to the particular HIBC system. Later, emails originating from the users domain can be authenticated by recipients using the public key associated with the top level domain name authority.
    • 基于层次标识的加密系统(“HIBC”)与域名系统(“DNS”)集成。 私钥分配给负责分配顶级域名(例如,net,.com等)的顶级域名权限。 私钥根据HIBC系统生成,其中相应的公钥基于特定域权限的身份。 当用户从顶级域名权限之一请求域名时,将使用其私有密钥和根据实施的特定HIBC系统的用户身份由顶级域机构生成的私钥。 用户的相应公钥可以从用户的身份和顶级域名权限的公钥中导出。 类似地,当用户将服务器和帐户添加到用户域时,用户可以使用根据特定HIBC系统的用户私钥为服务器和帐户生成私钥。 之后,来自用户域的电子邮件可以由收件人使用与顶级域名权限关联的公钥进行身份验证。