会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • System and method for synchronizing one time pad encryption keys for secure communication and access control
    • 用于同步一次性加密密钥以进行安全通信和访问控制的系统和方法
    • US06445794B1
    • 2002-09-03
    • US09104014
    • 1998-06-24
    • Adam Shefi
    • Adam Shefi
    • H04L922
    • H04L9/12G06Q20/3829H04L9/0662
    • A method for generating an identical electronic one-time pad at a first location and a second location, the method comprising the steps of: (a) providing a first electronic device at the first location and a second electronic device at the second location, each of the first and the second electronic devices having: (i) a non-volatile memory; (ii) a processor; (iii) at least one table of true random numbers being stored on the non-volatile memory, the table being identical for the first and the second electronic devices; and (iv) at least one software program for obtaining a true random number from the table, the software program being stored on the non-volatile memory and the at least one software program being operated by the processor; (b) providing a communication channel for communication between the first electronic device and the second electronic device; (c) selecting a selected true random number from the table at the first and the second electronic devices according to a selection procedure, the selection procedure being identical for the first and the second electronic devices, the selection procedure including exchanging at least a portion of a key between the first and the second electronic devices over the communication channel, such that the selected true random number is identical for the first and the second electronic devices; and (d) forming at least a portion of the identical electronic one-time pad at the first and the second locations with the selected true random number.
    • 一种用于在第一位置和第二位置处产生相同的电子一次性焊盘的方法,所述方法包括以下步骤:(a)在第一位置处提供第一电子设备,在第二位置提供第二电子设备, 所述第一和第二电子设备具有:(i)非易失性存储器; (ii)处理器; (iii)存储在非易失性存储器上的至少一个真实随机数表,该表对于第一和第二电子设备是相同的; 以及(iv)至少一个软件程序,用于从所述表中获取真实随机数,所述软件程序存储在所述非易失性存储器上,所述至少一个软件程序由所述处理器操作; (b)提供用于第一电子设备和第二电子设备之间的通信的通信信道; (c)根据选择程序从第一和第二电子设备的表格中选择所选择的真随机数,所述选择过程对于第一和第二电子设备是相同的,所述选择过程包括交换至少一部分 通过通信信道在第一和第二电子设备之间的键,使得所选择的真实随机数对于第一和第二电子设备是相同的; 以及(d)在所述第一和第二位置处形成具有所选真实随机数的相同电子一次性衬垫的至少一部分。
    • 3. 发明授权
    • Distributed state random number generator and method for utilizing same
    • 分布状态随机数发生器及其使用方法
    • US06628786B1
    • 2003-09-30
    • US08941677
    • 1997-09-30
    • Bryn Dole
    • Bryn Dole
    • H04L922
    • G06F7/588H04L9/0662H04L9/0841H04L9/0891
    • A system and method for generating random numbers utilizing a shared or distributed source of entropy is disclosed. In one embodiment, the invention allows networked computers to generate and share entropy in proportion to the need for random numbers utilized to initialize the internal state of random number generators residing on the computers. A shared session key generated during communications between a first and second computer is appended to the current internal state of the random number generators residing on the computers to create a bit string. The bit string is then mixed or hashed using a one-way “hash” function such as message digest function to produce a mixed bit string. At least a portion of the mixed bit string is then used to reinitialize the internal state of the random number generators residing on the computers. Since the initial state of the random number generators residing on the computers will be different, the values used to reinitialize the internal state of the generators will be different. In the case of a computer network, the internal state of each host computer's random number will thus ultimately be dependent upon on the internal state of every other computer that the host has communicated with and the order in which the communications took place.
    • 公开了一种利用共享或分布的熵源产生随机数的系统和方法。 在一个实施例中,本发明允许网络计算机与用于初始化驻留在计算机上的随机数发生器的内部状态的随机数的比例成比例地生成和共享熵。 在第一和第二计算机之间的通信期间生成的共享会话密钥被附加到驻留在计算机上的随机数生成器的当前内部状态以创建位串。 然后使用诸如消息摘要功能的单向“散列”功能将位串混合或散列以产生混合位串。 混合位串的至少一部分然后用于重新初始化驻留在计算机上的随机数发生器的内部状态。 由于驻留在计算机上的随机数生成器的初始状态将不同,因此用于重新初始化发生器内部状态的值将不同。 在计算机网络的情况下,每个主计算机的随机数的内部状态将最终取决于主机通信的每个其他计算机的内部状态以及通信发生的顺序。
    • 4. 发明授权
    • Limiting delays associated with the generation of encryption stream ciphers
    • 限制与生成加密流密码相关的延迟
    • US06560338B1
    • 2003-05-06
    • US09246366
    • 1999-02-08
    • Gregory G. RoseRoy Franklin Quick, Jr.
    • Gregory G. RoseRoy Franklin Quick, Jr.
    • H04L922
    • H04L9/0668H04L2209/12H04L2209/20
    • A method and an apparatus for generating encryption stream ciphers are based on a recurrence relation designed to operate over finite fields larger than GF(2). A non-linear output can be obtained by using one or a combination of non-linear processes to form an output function. The recurrence relation and the output function can be selected to have distinct pair distances such that, as the shift register is shifted, no identical pair of elements of the shift register are used twice in either the recurrence relation or the output function. Under these conditions, the recurrence relation and the output function also can be chosen to optimize cryptographic security or computational efficiency. Moreover, it is another object of the present invention to provide a method of assuring that the delay that results for the encryption process does not exceed predetermined bounds. To this end the ciphering delay is measured and if the estimated delay exceeds a predetermined threshold a second ciphering method is employed to limit the accumulated delay of the ciphering operation.
    • 用于产生加密流密码的方法和装置基于设计成在大于GF(2)的有限域上操作的递归关系。 可以通过使用非线性处理中的一个或组合来形成非线性输出来形成输出函数。 递归关系和输出函数可以被选择为具有不同的对距离,使得当移位寄存器被移位时,移位寄存器的相同元素对在递归关系或输出函数中不被使用两次。 在这些条件下,可以选择递归关系和输出函数来优化加密安全性或计算效率。 此外,本发明的另一个目的是提供一种确保加密过程导致的延迟不超过预定范围的方法。 为此,测量加密延迟,并且如果估计延迟超过预定阈值,则采用第二加密方法来限制加密操作的累积延迟。
    • 6. 发明授权
    • Cryptographic key split combiner
    • US06606386B2
    • 2003-08-12
    • US09917807
    • 2001-07-31
    • Edward M. ScheidtC. Jay Wack
    • Edward M. ScheidtC. Jay Wack
    • H04L922
    • H04L9/0866H04L9/0869H04L9/0877
    • A cryptographic key split combiner, which includes a number of key split generators for generating cryptographic key splits and a key split randomizer for randomizing the cryptographic key splits to produce a cryptographic key, and a process for forming cryptographic keys. Each of the key split generators generates key splits from seed data. The key split generators may include a random split generator for generating a random key split based on reference data. Other key split generators may include a token split generator for generating a token key split based on label data, a console split generator for generating a console key split based on maintenance data, and a biometric split generator for generating a biometric key split based on biometric data. All splits may further be based on static data, which may be updated, for example by modifying a prime number divisor of the static data. The label data may be read from a storage medium, and may include user authorization data. The resulting cryptographic key may be, for example, a stream of symbols, at least one symbol block, or a key matrix.
    • 7. 发明授权
    • Method and apparatus for generating encryption stream ciphers
    • 用于产生加密流密码的方法和装置
    • US06510228B2
    • 2003-01-21
    • US08934582
    • 1997-09-22
    • Gregory G. Rose
    • Gregory G. Rose
    • H04L922
    • H04L9/0668G09C1/00H04L2209/12H04L2209/20
    • A method and apparatus for generating encryption stream ciphers. The recurrence relation is designed to operate over finite fields larger than GF(2). The linear feedback shift register used to implement the recurrence relation can be implemented using a circular buffer or sliding a window. Multiplications of the elements of the finite field are implemented using lookup tables. A non-linear output can be obtained by using one or a combination of non-linear processes. The stream ciphers can be designed to support multi-tier keying to suit the requirements of the applications for which the stream ciphers are used.
    • 一种用于产生加密流密码的方法和装置。 复发关系被设计为在大于GF(2)的有限域上运行。 用于实现递归关系的线性反馈移位寄存器可以使用循环缓冲器或滑动窗口来实现。 有限域的元素的乘法使用查找表来实现。 可以通过使用一个或非线性处理的组合来获得非线性输出。 流密码可以被设计为支持多层密钥以适应使用流密码的应用的要求。
    • 8. 发明授权
    • Cryptographic key split combiner
    • US06608901B2
    • 2003-08-19
    • US09917794
    • 2001-07-31
    • Edward M. ScheidtC. Jay Wack
    • Edward M. ScheidtC. Jay Wack
    • H04L922
    • H04L9/0866H04L9/0869H04L9/0877
    • A cryptographic key split combiner, which includes a number of key split generators for generating cryptographic key splits and a key split randomizer for randomizing the cryptographic key splits to produce a cryptographic key, and a process for forming cryptographic keys. Each of the key split generators generates key splits from seed data. The key split generators may include a random split generator for generating a random key split based on reference data. Other key split generators may include a token split generator for generating a token key split based on label data, a console split generator for generating a console key split based on maintenance data, and a biometric split generator for generating a biometric key split based on biometric data. All splits may further be based on static data, which may be updated, for example by modifying a prime number divisor of the static data. The label data may be read from a storage medium, and may include user authorization data. The resulting cryptographic key may be, for example, a stream of symbols, at least one symbol block, or a key matrix.
    • 9. 发明授权
    • Cryptographic key split combiner
    • US06549623B1
    • 2003-04-15
    • US09917802
    • 2002-02-04
    • Edward M. ScheidtC. Jay Wack
    • Edward M. ScheidtC. Jay Wack
    • H04L922
    • H04L9/0866H04L9/0869H04L9/0877
    • A cryptographic key split combiner, which includes a number of key split generators for generating cryptographic key splits and a key split randomizer for randomizing the cryptographic key splits to produce a cryptographic key, and a process for forming cryptographic keys. Each of the key split generators generates key splits from seed data. The key split generators may include a random split generator for generating a random key split based on reference data. Other key split generators may include a token split generator for generating a token key split based on label data, a console split generator for generating a console key split based on maintenance data, and a biometric split generator for generating a biometric key split based on biometric data. All splits may further be based on static data, which may be updated, for example by modifying a prime number divisor of the static data. The label data may be read from a storage medium, and may include user authorization data. The resulting cryptographic key may be, for example, a stream of symbols, at least one symbol block, or a key matrix.
    • 10. 发明授权
    • Method and apparatus for generating encryption stream ciphers
    • 用于产生加密流密码的方法和装置
    • US06490357B1
    • 2002-12-03
    • US09143441
    • 1998-08-28
    • Gregory G. Rose
    • Gregory G. Rose
    • H04L922
    • H04L9/0668H04L2209/12H04L2209/20
    • A method and an apparatus for generating encryption stream ciphers are based on a recurrence relation designed to operate over finite fields larger than GF(2). A non-linear output can be obtained by using one or a combination of non-linear processes to form an output function. The recurrence relation and the output function can be selected to have distinct pair distances such that, as the shift register is shifted, no identical pair of elements of the shift register are used twice in either the recurrence relation or the output function. Under these conditions, the recurrence relation and the output function also can be chosen to optimize cryptographic security or computational efficiency.
    • 用于产生加密流密码的方法和装置基于设计成在大于GF(2)的有限域上操作的递归关系。 可以通过使用非线性处理中的一个或组合来形成非线性输出来形成输出函数。 递归关系和输出函数可以被选择为具有不同的对距离,使得当移位寄存器被移位时,移位寄存器的相同元素对在递归关系或输出函数中不被使用两次。 在这些条件下,可以选择递归关系和输出函数来优化加密安全性或计算效率。