会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 92. 发明申请
    • COMBINATION WHITE BOX/BLACK BOX CRYPTOGRAPHIC PROCESSES AND APPARATUS
    • 组合白盒/黑盒CRYPTOGRAPHIC PROCESSES AND APPARATUS
    • US20090252327A1
    • 2009-10-08
    • US12061363
    • 2008-04-02
    • Mathieu CietAugustin J. FarrugiaJean-Francois Riendeau
    • Mathieu CietAugustin J. FarrugiaJean-Francois Riendeau
    • H04L9/06
    • H04L9/002H04L9/3066H04L2209/16H04L2209/603
    • Method and apparatus for increasing security of a cryptographic algorithm such as deciphering, enciphering, or a digital signature. A cryptographic algorithm and a key are provided such that a deciphering process, for instance, is partitioned between two portions. The portion of the cryptographic algorithm carried out in the first portion is implemented in a “white box” model such that it is highly secure even against an attack by the user who has full access to internal operations, code execution and memory of the user device, such as a hacker or attacker. The remaining portion of the algorithm is carried out in the second portion. Since this second portion has relaxed security constraints, its code may be implemented using a “black box” approach where its code execution may be more efficient and faster, not requiring the code obfuscation of the white box implementation in the user device. This partitioning may be achieved using a delegation protocol. The chief advantage is that even given a limited code size for the cryptographic process, the security of the system is improved by carrying out the more computationally intensive functions more efficiently in the black box portion and executing the less computationally intensive function in the white box portion.
    • 用于提高加密算法的安全性的方法和装置,例如解密,加密或数字签名。 提供了一种加密算法和密钥,使得例如在两部分之间进行解密处理。 在第一部分中执行的加密算法的部分被实现在“白盒”模型中,使得即使对于完全访问内部操作,代码执行和用户设备的存储器的用户的攻击也是非常安全的 ,如黑客或攻击者。 算法的剩余部分在第二部分中进行。 由于该第二部分具有放松的安全约束,因此其代码可以使用“黑箱”方法来实现,其中其代码执行可能更有效和更快,而不需要用户设备中的白盒实现的代码混淆。 可以使用委托协议来实现该分区。 主要的优点是,即使给出密码过程的有限的代码大小,通过在黑盒部分中更有效地执行更多的计算密集型函数,并且在白盒部分中执行较少的计算密集型函数来提高系统的安全性 。
    • 93. 发明授权
    • Methods and apparatus for data hashing based on non-linear operations
    • 基于非线性运算的数据散列方法和装置
    • US08832450B2
    • 2014-09-09
    • US13485454
    • 2012-05-31
    • Mathieu CietThomas IcartAugustin J. Farrugia
    • Mathieu CietThomas IcartAugustin J. Farrugia
    • H04L9/32
    • H04L9/0643
    • A method and an apparatus that provides a hard problem based hashing mechanism to improve security of hash functions are described. The hashing mechanism can include a custom padding and/or a post processing to a hashed value strengthened via operations specifying a hard problem. In one embodiment, a new hash function may be provided or defined directly without introducing or relying on existing hash functions to embed security features based on this hard problem. The new hash functions can be used in usual constructions implying hash functions. For example, the standard HMAC construction could be applied on these hash functions, standard signature algorithms or authentication protocol, etc.
    • 描述了提供基于硬问题的散列机制以提高散列函数的安全性的方法和装置。 散列机制可以包括通过指定硬问题的操作来加强散列值的定制填充和/或后处理。 在一个实施例中,可以直接提供或定义新的散列函数,而不引入或依赖现有的散列函数来基于这个难题来嵌入安全特征。 新的哈希函数可以在通常的结构中使用,这意味着散列函数。 例如,标准HMAC结构可以应用于这些散列函数,标准签名算法或认证协议等。
    • 99. 发明授权
    • Hash function using a heap modeling process
    • 哈希函数使用堆建模过程
    • US08386787B2
    • 2013-02-26
    • US12551267
    • 2009-08-31
    • Augustin J. FarrugiaBenoit Chevallier-MamesMathieu Ciet
    • Augustin J. FarrugiaBenoit Chevallier-MamesMathieu Ciet
    • H04L9/32
    • H04L9/3236
    • This discloses, in the computer data security field, a cryptographic hash function process embodied in a computer system and which may be keyless, but is highly secure. The process is based on the type of randomness exhibited by a heap or stack of physical objects such as a heap of pieces of fruit and involves modeling the behavior of such a heap when pieces are removed from the heap. Computation of the hash value (digest) is thereby the result of executing a heap model algorithm using the message as an input to initialize the heap, then executing the heap model algorithm which logically models the process of serially removing objects (pieces of fruit) from the heap at various locations in the modeled heap.
    • 这在计算机数据安全领域中公开了一种体现在计算机系统中的加密哈希函数过程,其可以是无钥匙的,但是是高度安全的。 该过程基于堆或堆栈的物理对象(例如一堆水果)所呈现的随机性的类型,并且涉及当从堆中移除碎片时对该堆的行为进行建模。 因此,哈希值(摘要)的计算是使用消息作为输入来初始化堆的执行堆模型算法的结果,然后执行堆模型算法,其对从串行移除对象(水果)的过程进行逻辑建模 堆在建模堆中的各个位置。