会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 11. 发明申请
    • Method for securely creating an endorsement certificate in an insecure environment
    • 在不安全的环境中安全地创建背书证书的方法
    • US20050144440A1
    • 2005-06-30
    • US10750594
    • 2003-12-31
    • Ryan CathermanDavid ChallenerJames Hoff
    • Ryan CathermanDavid ChallenerJames Hoff
    • G06F21/00H04L9/00
    • G06F21/602G06F21/57G06F2221/2117H04L9/0877H04L9/3236H04L9/3263
    • A method and system for ensuring security-compliant creation and signing of endorsement keys of manufactured TPMs. The endorsement keys are generated for the TPM. The TPM vendor selects an N-byte secret and stores the N-byte secret in the TPM along with the endorsement keys. The secret number cannot be read outside of the TPM. The secret number is also provided to the OEM's credential server. During the endorsement key (EK) credential process, the TPM generates an endorsement key, which comprises both the public key and a hash of the secret and the public key. The credential server matches the hash within the endorsement key with a second hash of the received public key (from the endorsement key) and the vendor provided secret. The EK certificate is generated and inserted into the TPM only when a match is confirmed.
    • 一种用于确保制造TPM的签注密钥的安全兼容创建和签名的方法和系统。 为TPM生成认可密钥。 TPM供应商选择一个N字节的秘密,并将N字节的秘密与支持密钥一起存储在TPM中。 无法在TPM之外读取密码。 秘密编号也提供给OEM的凭据服务器。 在认可密钥(EK)凭证处理过程中,TPM产生一个签名密钥,其包括公开密钥和密钥的散列以及公开密钥。 凭证服务器将签名密钥内的散列与接收到的公钥(来自认可密钥)和供应商提供的秘密的第二散列进行匹配。 仅当匹配确认时,EK证书才会生成并插入到TPM中。
    • 14. 发明申请
    • Method for securely creating an endorsement certificate utilizing signing key pairs
    • 使用签名密钥对安全地创建签注证书的方法
    • US20050149733A1
    • 2005-07-07
    • US10749261
    • 2003-12-31
    • Ryan CathermanDavid ChallenerJames Hoff
    • Ryan CathermanDavid ChallenerJames Hoff
    • G06F21/00H04L9/00
    • G06F21/602G06F21/57
    • A method and system for ensuring security-compliant creation and certificate generation for endorsement keys of manufactured TPMs. The endorsement keys are generated by the TPM manufacturer and stored within the TPM. The TPM manufacturer also creates a signing key pair and associated signing key certificate. The signing key pair is also stored within the TPM, while the certificate is provided to the OEM's credential server. During the endorsement key (EK) credential process, the TPM generates a signed endorsement key, which comprises the public endorsement key signed with the public signing key. The credential server matches the public signing key of the endorsement key with a public signing key within the received certificate. The EK certificate is generated and inserted into the TPM only when a match is confirmed.
    • 一种用于确保制造TPM的认可密钥的安全兼容创建和证书生成的方法和系统。 认可密钥由TPM制造商生成并存储在TPM内。 TPM制造商还创建了一个签名密钥对和相关的签名密钥证书。 签名密钥对也存储在TPM中,同时将证书提供给OEM的凭据服务器。 在认可密钥(EK)凭证过程中,TPM生成签名的背书密钥,其包括用公共签名密钥签名的公开签名密钥。 凭证服务器将签名密钥的公共签名密钥与接收到的证书中的公共签名密钥相匹配。 仅当匹配确认时,EK证书才会生成并插入到TPM中。
    • 19. 发明申请
    • System and method for multiple users to securely access encrypted data on computer system
    • 多用户安全访问计算机系统上加密数据的系统和方法
    • US20050114686A1
    • 2005-05-26
    • US10718786
    • 2003-11-21
    • Charles BallRyan CathermanPhilip ChildsJames HoffAndy Trotter
    • Charles BallRyan CathermanPhilip ChildsJames HoffAndy Trotter
    • G06F21/00H04L9/08H04L9/32
    • G06F21/78G06F2221/2107H04L9/083H04L9/0894H04L9/14H04L9/3213
    • A method and system for encrypting non-volatile storage regions, such as volumes, accessible by multiple users. A plurality of non-volatile storage regions is encrypted each with a different encryption key. A subset of the encryption keys is made available to each user thereby granting the user access to a corresponding subset of non-volatile storage regions. To protect a user's encryption keys, a private-public encryption key pair is generated, the private key being made available only to that user. The subset of the user's encryption keys is encrypted using the user's public encryption key. The users' private keys can be stored in a secure encryption module and can be protected with a password. Upon authenticating a user, the corresponding encryption keys may be provided to the user after decrypting the encryption keys using the user's private key. The contents of the non-volatile storage regions are then decrypted using the encryption keys.
    • 用于加密多个用户可访问的非易失性存储区域(例如卷)的方法和系统。 多个非易失性存储区域用不同的加密密钥加密。 加密密钥的子集可用于每个用户,从而授予用户对非易失性存储区域的对应子集的访问。 为了保护用户的加密密钥,生成私有 - 公共加密密钥对,私钥仅对该用户可用。 用户的加密密钥的子集是使用用户的公开加密密钥加密的。 用户的私钥可以存储在安全的加密模块中,并且可以用密码进行保护。 在对用户进行认证之后,可以在使用用户的私钥解密加密密钥之后,向用户提供对应的加密密钥。 然后使用加密密钥解密非易失性存储区域的内容。