会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 4. 发明授权
    • Method for securely creating, storing and using encryption keys in a computer system
    • 在计算机系统中安全地创建,存储和使用加密密钥的方法
    • US06581162B1
    • 2003-06-17
    • US08777615
    • 1996-12-31
    • Michael F. AngeloPeter J. Michels
    • Michael F. AngeloPeter J. Michels
    • H04K900
    • H04L63/04G06F21/602G06F21/606G06F21/83
    • A secure environment for entering and storing information necessary to conduct encryption processes. In a computer system according to the invention, session keys, passwords, and encryption algorithms are maintained in a secure memory space such as System Management Mode (SMM) memory. In one disclosed embodiment of the invention, a user password is entered via a secure keyboard channel. The password is maintained in a secure memory space that is not accessible during normal computer operation. In addition to the user password, optional node identification information is stored in secure memory. The node identification information is appended to the user password, and both are subsequently encrypted by an encryption algorithm and encryption keys that are also stored in secure memory. Following the encryption process, the encrypted password and node identification information are communicated directly from secure memory to network interface circuitry for communication over a network. In another disclosed embodiment of the invention, data entered in a secure manner is utilized as an encryption key (or to generate an encryption key) for securely encrypting packets of data prior to communicating the data over a computer network. The encryption key data entered by the user is securely stored for use in multiple encryption processes during a communication session, thereby alleviating the overhead of repeated key renegotiation that is typically required. In addition, an encryption key that is no longer needed can be safely destroyed in secure memory without the danger of unidentified copies of the key remaining in computer memory.
    • 用于输入和存储进行加密过程所必需的信息的安全环境。 在根据本发明的计算机系统中,会话密钥,密码和加密算法被保持在诸如系统管理模式(SMM)存储器之类的安全存储器空间中。 在本发明的一个公开实施例中,经由安全键盘通道输入用户密码。 密码保存在正常计算机操作期间无法访问的安全存储空间中。 除了用户密码之外,可选节点识别信息存储在安全存储器中。 节点识别信息附加到用户密码,并且随后都通过加密算法和也存储在安全存储器中的加密密钥对其进行加密。 在加密过程之后,将加密密码和节点识别信息直接从安全存储器传送到网络接口电路,以便通过网络进行通信。 在本发明的另一个公开的实施例中,以安全方式输入的数据被用作在通过计算机网络传送数据之前用于安全加密数据包的加密密钥(或生成加密密钥)。 在通信会话期间,由用户输入的加密密钥数据被安全地存储以用于多个加密过程,从而减轻了通常需要的重复密钥重新协商的开销。 此外,不再需要的加密密钥可以安全地在安全存储器中销毁,而不会存在计算机内存中剩余的密钥的不明副本的危险。
    • 6. 发明授权
    • Method and apparatus for correcting improper encryption and/or for reducing memory storage
    • 用于校正不正当加密和/或减少存储器存储的方法和装置
    • US06341164B1
    • 2002-01-22
    • US09120716
    • 1998-07-22
    • Lee DilkiePaul C. Van Oorschot
    • Lee DilkiePaul C. Van Oorschot
    • H04K900
    • H04L9/0825H04L9/0894H04L9/14
    • An apparatus and methods for facilitating an encryption process for use in systems employing cryptography based security, removes unnecessary data relating to encryption keys prior to storing the data after receipt of the encrypted information from a sender. Encrypted data, such as message data for multiple recipients, is analyzed to determine whether encryption related data for other recipients may be removed and/or whether a preferred encrypting process was used. In one embodiment, the apparatus and method also determines whether a non-preferred encryption process was used to encrypt encrypted data and re-encrypts the encrypted data with a different encryption process in response to detected non-preferred encryption key usage.
    • 一种用于促进在采用基于密码学的安全性的系统中使用的加密过程的装置和方法,在从发送者接收到加密的信息之后存储数据之前,去除与加密密钥有关的不必要的数据。 分析加密数据,例如多个收件人的消息数据,以确定是否可以删除其他收件人的加密相关数据和/或是否使用了优选的加密过程。 在一个实施例中,该装置和方法还确定是否使用非优选加密过程来加密加密数据,并且响应于检测到的非优选加密密钥使用,以不同的加密过程重新加密加密数据。