会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 11. 发明授权
    • Securing passwords against dictionary attacks
    • 保护密码免受字典攻击
    • US09015489B2
    • 2015-04-21
    • US12755426
    • 2010-04-07
    • Mira BelenkiyTolga AcarHenry Nelson Jerez MoralesAlptekin Kupcu
    • Mira BelenkiyTolga AcarHenry Nelson Jerez MoralesAlptekin Kupcu
    • G06F21/00G06F7/04H04L29/06H04L9/08H04L9/32
    • H04L63/0428H04L9/0841H04L9/3226H04L9/3271H04L63/06H04L63/083H04L63/0853
    • Described herein are various technologies pertaining to constructions of a password-based authentication protocol that are configured to allow a user to register with and authenticate to an online service without the online service receiving a password or a deterministic function of the password of the user. When registering with an online service, a client computing device establishes a cryptographically strong random secret and stores an encryption of such secret with a data storage device. The storage device also never receives the password or a deterministic function of the password. When the user wishes to authenticate to the online service, the user employs her password to retrieve the encrypted secret from the storage device, decrypts such secret, and utilizes the decrypted secret to answer a cryptographically strong challenge provided to the user by the online service upon the online service receiving a username pertaining to such user.
    • 这里描述的是涉及基于密码的认证协议的构造的各种技术,其被配置为允许用户在没有在线服务接收密码或用户的密码的确定性功能的情况下向在线服务注册和认证。 当在线服务注册时,客户端计算设备建立密码强的随机秘密,并将这种秘密的加密存储在数据存储设备中。 存储设备也从不接收密码或密码的确定性功能。 当用户希望对在线服务进行身份验证时,用户使用她的密码从存储设备中取回加密的秘密,解密这样的秘密,并利用解密的秘密来回答由在线服务提供给用户的加密强大的挑战, 该在线服务接收与该用户有关的用户名。
    • 12. 发明申请
    • SECURING PASSWORDS AGAINST DICTIONARY ATTACKS
    • 安全口令反对字典攻击
    • US20110252229A1
    • 2011-10-13
    • US12755426
    • 2010-04-07
    • Mira BelenkiyTolga AcarHenry Nelson Jerez MoralesAlptekin Kupcu
    • Mira BelenkiyTolga AcarHenry Nelson Jerez MoralesAlptekin Kupcu
    • H04L29/06H04L9/32
    • H04L63/0428H04L9/0841H04L9/3226H04L9/3271H04L63/06H04L63/083H04L63/0853
    • Described herein are various technologies pertaining to constructions of a password-based authentication protocol that are configured to allow a user to register with and authenticate to an online service without the online service receiving a password or a deterministic function of the password of the user. When registering with an online service, a client computing device establishes a cryptographically strong random secret and stores an encryption of such secret with a data storage device. The storage device also never receives the password or a deterministic function of the password. When the user wishes to authenticate to the online service, the user employs her password to retrieve the encrypted secret from the storage device, decrypts such secret, and utilizes the decrypted secret to answer a cryptographically strong challenge provided to the user by the online service upon the online service receiving a username pertaining to such user.
    • 这里描述的是涉及基于密码的认证协议的构造的各种技术,其被配置为允许用户在没有在线服务接收密码或用户的密码的确定性功能的情况下向在线服务注册和认证。 当在线服务注册时,客户端计算设备建立密码强的随机秘密,并将这种秘密的加密存储在数据存储设备中。 存储设备也从不接收密码或密码的确定性功能。 当用户希望对在线服务进行身份验证时,用户使用她的密码从存储设备中取回加密的秘密,解密这样的秘密,并利用解密的秘密来回答由在线服务提供给用户的加密强大的挑战, 该在线服务接收与该用户有关的用户名。
    • 13. 发明申请
    • Cryptographically strong key derivation using password, audio-visual and mental means
    • 使用密码,视听和心理手段的密码型强密码派生
    • US20080263361A1
    • 2008-10-23
    • US11788687
    • 2007-04-20
    • Tanmoy DuttaSunil KadamTolga Acar
    • Tanmoy DuttaSunil KadamTolga Acar
    • H04L9/00
    • H04L9/0863H04L9/0891H04L2209/60H04L2209/80
    • A security system that uses a cryptographic key derived from human interaction with media. The system employs a set of parameters that includes user responses to graphical media and/or audio data, among other parameters. The architecture adds a fourth dimension to the conventional authentication means in order to make at least an offline attack on the key much more difficult. In addition to a standard set of parameters such as password, salt (random bits inserted into the encryption process) and iteration count, the system further utilizes information in the form of “what the user does” by presenting and prompting the user to interact with media in some way. The media can include audio information, video information, and/or image information, for example.
    • 一种安全系统,它使用与媒体进行人工交互导出的加密密钥。 系统采用一组参数,其中包括用户对图形媒体和/或音频数据的响应以及其他参数。 该体系结构为常规认证手段增加了第四个维度,以便至少使密钥的脱机攻击更加困难。 除了密码,盐(插入加密过程中的随机位)和迭代计数等一系列参数之外,系统还通过呈现和提示用户进行交互来进一步利用“用户所做的”形式的信息 媒体在某种程度上 媒体可以包括例如音频信息,视频信息和/或图像信息。
    • 14. 发明申请
    • CRYPTOGRAPHIC KEY CONTAINERS ON A USB TOKEN
    • USB TOKEN上的CRYPTOGRAPHIC KEY CONTAINERS
    • US20080181412A1
    • 2008-07-31
    • US11627466
    • 2007-01-26
    • Tolga AcarCarl M. Ellison
    • Tolga AcarCarl M. Ellison
    • H04L9/08
    • G06F21/6209G06F21/79H04L9/0897
    • A Universal Serial Bus (USB) compatible storage device is utilized as a security token for storage of cryptographic keys. A cryptographic subsystem of a processor accesses cryptographic keys in containers on the USB compatible storage device. Accessing includes storing and/or retrieving. The processor does not include an infrastructure dedicated to the USB compatible storage device. Cryptographic key storage is redirected from an in-processor container to the USB compatible storage device. No password or PIN is required to access the cryptographic keys, yet enhanced security is provided. Utilizing a USB compatible storage device for a cryptographic key container provides a convenient, portable, mechanism for carrying the cryptographic key, and additional security is provided via physical possession of the device.
    • 通用串行总线(USB)兼容存储设备被用作存储加密密钥的安全令牌。 处理器的加密子系统访问USB兼容存储设备上的容器中的加密密钥。 访问包括存储和/或检索。 处理器不包括专用于USB兼容存储设备的基础设施。 加密密钥存储从处理器内容器重定向到USB兼容的存储设备。 不需要密码或密码来访问加密密钥,但提供了增强的安全性。 利用用于加密密钥容器的USB兼容存储设备提供用于携带加密密钥的便利的便携式机制,并且通过物理拥有该设备来提供额外的安全性。
    • 15. 发明授权
    • Cryptographic key containers on a USB token
    • USB令牌上的加密密钥容器
    • US08588421B2
    • 2013-11-19
    • US11627466
    • 2007-01-26
    • Tolga AcarCarl M. Ellison
    • Tolga AcarCarl M. Ellison
    • G06F21/00
    • G06F21/6209G06F21/79H04L9/0897
    • A Universal Serial Bus (USB) compatible storage device is utilized as a security token for storage of cryptographic keys. A cryptographic subsystem of a processor accesses cryptographic keys in containers on the USB compatible storage device. Accessing includes storing and/or retrieving. The processor does not include an infrastructure dedicated to the USB compatible storage device. Cryptographic key storage is redirected from an in-processor container to the USB compatible storage device. No password or PIN is required to access the cryptographic keys, yet enhanced security is provided. Utilizing a USB compatible storage device for a cryptographic key container provides a convenient, portable, mechanism for carrying the cryptographic key, and additional security is provided via physical possession of the device.
    • 通用串行总线(USB)兼容存储设备被用作存储加密密钥的安全令牌。 处理器的加密子系统访问USB兼容存储设备上的容器中的加密密钥。 访问包括存储和/或检索。 处理器不包括专用于USB兼容存储设备的基础设施。 加密密钥存储从处理器内容器重定向到USB兼容的存储设备。 不需要密码或密码来访问加密密钥,但提供了增强的安全性。 利用用于加密密钥容器的USB兼容存储设备提供用于携带加密密钥的便利的便携式机制,并且通过物理拥有该设备来提供额外的安全性。
    • 17. 发明申请
    • REVOKING DELEGATABLE ANONYMOUS CREDENTIALS
    • 取消可取代的匿名证书
    • US20120144459A1
    • 2012-06-07
    • US12961505
    • 2010-12-07
    • Lan NguyenTolga Acar
    • Lan NguyenTolga Acar
    • H04L9/32
    • H04L9/0891H04L9/3218H04L2209/38H04L2209/42
    • The claimed subject matter provides a method for revoking delegatable anonymous credentials. The method includes receiving a request to revoke an anonymous credential. The anonymous credential may be representative of an ability to prove non-membership in an accumulator for a first entity. The method also includes revoking the anonymous credential from the first entity in response to the request to revoke the anonymous credential. Additionally, the method includes revoking the anonymous credential from a second entity in response to the request to revoke the anonymous credential. The first entity delegates the anonymous credential to the second entity.
    • 所要求保护的主题提供了撤销可委托匿名凭证的方法。 该方法包括接收撤销匿名凭证的请求。 匿名凭证可以代表证明第一实体的累加器的不隶属的能力。 该方法还包括响应于撤销匿名凭证的请求,从第一实体撤销匿名凭证。 此外,该方法包括响应于撤销匿名凭证的请求,从第二实体撤销匿名凭证。 第一个实体将匿名凭证委托给第二个实体。