会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 22. 发明授权
    • Method and apparatus for cryptographically transforming an input block into an output block
    • 用于将输入块加密地变换成输出块的方法和装置
    • US06301362B1
    • 2001-10-09
    • US09096615
    • 1998-06-12
    • Stephen M. Matyas, Jr.Don CoppersmithDonald B. Johnson
    • Stephen M. Matyas, Jr.Don CoppersmithDonald B. Johnson
    • H04L906
    • H04L9/002H04L9/0625H04L2209/24
    • A method and apparatus for cryptographically transforming an input block into an output block. The input block has a first block size and is partitionable into a plurality of input subblocks having a second block size that is a submultiple of the first block size. To encrypt or decrypt, the input subblocks are passed through respective first substitution functions controlled by one or more keys to generate a first plurality of modified subblocks. The first plurality of modified subblocks are then passed through a mixing function to generate a second plurality of modified subblocks, each of which depends on each of the first plurality of modified subblocks. Finally, the second plurality of modified subblocks are passed through respective second substitution functions controlled by one or more keys to generate a plurality of output subblocks that are combinable into an output block.
    • 一种用于将输入块密码变换为输出块的方法和装置。 输入块具有第一块大小并且可分割成具有第二块大小的多个输入子块,该第二块大小是第一块大小的次数。 为了加密或解密,输入子块通过由一个或多个键控制的相应的第一替换函数,以产生第一多个修改的子块。 第一多个经修改的子块然后被传递通过混合功能以产生第二多个修改的子块,每个子块依赖于第一多个修改子块中的每一个。 最后,第二多个经修改的子块通过由一个或多个密钥控制的相应的第二替换函数,以产生可组合成输出块的多个输出子块。
    • 24. 发明申请
    • MASKED DIGITAL SIGNATURES
    • 屏蔽数字签名
    • US20110258455A1
    • 2011-10-20
    • US13172138
    • 2011-06-29
    • Donald B. JohnsonScott A. VanstoneMinghua Qu
    • Donald B. JohnsonScott A. VanstoneMinghua Qu
    • H04L9/32
    • H04L9/3247G06Q20/341G06Q20/40975G07F7/1008H04L9/3066H04L9/3252H04L2209/04
    • The present invention relates to digital signature operations using public key schemes in a secure communications system and in particular for use with processors having limited computing power such as ‘smart cards’. This invention describes a method for creating and authenticating a digital signature comprising the steps of selecting a first session parameter k and generating a first short term public key derived from the session parameter k, computing a first signature component r derived from a first mathematical function using the short term public key, selecting a second session parameter t and computing a second signature component s derived from a second mathematical function using the second session parameter t and without using an inverse operation, computing a third signature component using the first and second session parameters and sending the signature components (s, r, c) as a masked digital signature to a receiver computer system. In the receiver computer system computing a recovered second signature component s′ by combining a third signature component with the second signature component to derive signature components (s′, r) as an unmasked digital signature. Verifying these signature components as in a usual EIGamal or ECDSA type signature verification.
    • 本发明涉及在安全通信系统中使用公共密钥方案的数字签名操作,特别是与具有计算能力有限的处理器(例如“智能卡”)一起使用。 本发明描述了一种用于创建和认证数字签名的方法,包括以下步骤:选择第一会话参数k并生成从会话参数k导出的第一短期公钥,使用从第一数学函数导出的第一签名组件 短期公钥,选择第二会话参数t并且使用第二会话参数t计算从第二数学函数导出的第二签名组件,并且不使用反向操作,使用第一和第二会话参数来计算第三签名组件 并将签名组件(s,r,c)作为掩蔽的数字签名发送到接收机计算机系统。 在接收机计算机系统中,通过将第三签名组件与第二签名组件组合来计算恢复的第二签名组件s',以将签名组件(s',r)导出为未屏蔽的数字签名。 验证这些签名组件,如通常的EIGAMAL或ECDSA类型的签名验证。
    • 25. 发明申请
    • RESILIENT CRYPTOGRAPHIC SCHEME
    • 灵活的CRYPTOGRAPHIC计划
    • US20100284540A1
    • 2010-11-11
    • US12840008
    • 2010-07-20
    • Donald B. JohnsonScott Alexander Vanstone
    • Donald B. JohnsonScott Alexander Vanstone
    • H04L9/08
    • H04L9/3242H04L9/3249
    • A system and method are provided for enabling a symmetric key to be derived, the method comprising: obtaining a plurality of key parts, wherein the plurality of key parts when combined equal the symmetric key; encrypting a first of the key parts using a first cryptographic algorithm to generate a first encrypted value; encrypting one or more remaining key parts of the plurality of key parts using respective cryptographic algorithms to generate one or more additional encrypted values, wherein each key part encrypted is encrypted using a different cryptographic algorithm; and providing the first encrypted value and the one or more additional encrypted values to an other entity to enable the other entity to derive the symmetric key.
    • 提供了一种用于使得能够导出对称密钥的系统和方法,所述方法包括:获得多个密钥部分,其中所述多个密钥部分在组合时等于所述对称密钥; 使用第一密码算法加密第一密钥部分以生成第一加密值; 使用相应的密码算法加密所述多个密钥部分中的一个或多个剩余的关键部分以生成一个或多个附加的加密值,其中使用不同的加密算法加密加密的每个密钥部分; 以及将第一加密值和所述一个或多个附加加密值提供给另一实体以使所述另一实体能够导出所述对称密钥。
    • 28. 发明申请
    • MASKED DIGITAL SIGNATURES
    • 屏蔽数字签名
    • US20090319790A1
    • 2009-12-24
    • US12488652
    • 2009-06-22
    • Donald B. JohnsonScott A. VanstoneMinghua Qu
    • Donald B. JohnsonScott A. VanstoneMinghua Qu
    • H04L9/00
    • H04L9/3247G06Q20/341G06Q20/40975G07F7/1008H04L9/3066H04L9/3252H04L2209/04
    • The present invention relates to digital signature operations using public key schemes in a secure communications system and in particular for use with processors having limited computing power such as ‘smart cards’. This invention describes a method for creating and authenticating a digital signature comprising the steps of selecting a first session parameter k and generating a first short term public key derived from the session parameter k, computing a first signature component r derived from a first mathematical function using the short term public key, selecting a second session parameter t and computing a second signature component s derived from a second mathematical function using the second session parameter t and without using an inverse operation, computing a third signature component using the first and second session parameters and sending the signature components (s, r, c) as a masked digital signature to a receiver computer system. In the receiver computer system computing a recovered second signature component s′ by combining a third signature component with the second signature component to derive signature components (s′, r) as an unmasked digital signature. Verifying these signature components as in a usual ElGamal or ECDSA type signature verification.
    • 本发明涉及在安全通信系统中使用公共密钥方案的数字签名操作,特别是与具有计算能力有限的处理器(例如“智能卡”)一起使用。 本发明描述了一种用于创建和认证数字签名的方法,包括以下步骤:选择第一会话参数k并生成从会话参数k导出的第一短期公钥,使用从第一数学函数导出的第一签名组件 短期公钥,选择第二会话参数t并且使用第二会话参数t计算从第二数学函数导出的第二签名组件,并且不使用反向操作,使用第一和第二会话参数来计算第三签名组件 并将签名组件(s,r,c)作为掩蔽的数字签名发送到接收机计算机系统。 在接收机计算机系统中,通过将第三签名组件与第二签名组件组合来计算恢复的第二签名组件s',以将签名组件(s',r)导出为未屏蔽的数字签名。 验证这些签名组件,如通常的ElGamal或ECDSA类型签名验证。
    • 29. 发明授权
    • Masked digital signatures
    • 蒙面的数字签名
    • US07260723B2
    • 2007-08-21
    • US09773665
    • 2001-02-02
    • Donald B. JohnsonScott A. VanstoneMinghua Ou
    • Donald B. JohnsonScott A. VanstoneMinghua Ou
    • H04L9/00
    • H04L9/3247G06Q20/341G06Q20/40975G07F7/1008H04L9/3066H04L9/3252H04L2209/04
    • The present invention relates to digital signature operations using public key schemes in a secure communications system and in particular for use with processors having limited computing power such as ‘smart cards’. This invention describes a method for creating and authenticating a digital signature comprising the steps of selecting a first session parameter k and generating a first short term public key derived from the session parameter k, computing a first signature component r derived from a first mathematical function using the short term public key, selecting a second session parameter t and computing a second signature component s derived from a second mathematical function using the second session parameter t and without using an inverse operation, computing a third signature component using the first and second session parameters and sending the signature components (s, r, c) as a masked digital signature to a receiver computer system. In the receiver computer system computing a recovered second signature component s′ by combining a third signature component with the second signature component to derive signature components (s′, r) as an unmasked digital signature. Verifying these signature components as in a usual ElGamal or ECDSA type signature verification.
    • 本发明涉及在安全通信系统中使用公共密钥方案的数字签名操作,特别是与具有计算能力有限的处理器(例如“智能卡”)一起使用。 本发明描述了一种用于创建和认证数字签名的方法,包括以下步骤:选择第一会话参数k并生成从会话参数k导出的第一短期公钥,使用从第一数学函数导出的第一签名组件 短期公钥,选择第二会话参数t并且使用第二会话参数t计算从第二数学函数导出的第二签名组件,并且不使用反向操作,使用第一和第二会话参数来计算第三签名组件 并将签名组件(s,r,c)作为掩蔽的数字签名发送到接收机计算机系统。 在接收机计算机系统中,通过将第三签名组件与第二签名组件组合来计算恢复的第二签名组件s',以将签名组件(s',r)导出为未屏蔽的数字签名。 验证这些签名组件,如通常的ElGamal或ECDSA类型签名验证。
    • 30. 发明授权
    • Key validation scheme
    • 关键验证方案
    • US07215773B1
    • 2007-05-08
    • US10181356
    • 1998-10-14
    • Donald B. Johnson
    • Donald B. Johnson
    • H04L9/00
    • H04L9/30H04L9/0816H04L9/3066H04L9/3252H04L9/3263H04L2209/24
    • A method of providing improved security in a communication system used to transfer information between at least a pair of correspondents. The communication between the correspondents generally comprises steps of generating key pairs in accordance with the arithmetic properties of a chosen algorithm, communicating one of the keys, being a public key, to the other party by way of a certificate, generation and transmission of a signature using a private key of the key pairs by one of the correspondents and transmitting the signature to the other correspondent and verification of the signature by the recipient. The invention provides for the additional step of verifying the public key conform to the arithmetic properties dictated by the requirements of the selected algorithm.
    • 一种在用于在至少一对记者之间传送信息的通信系统中提供改进的安全性的方法。 记者之间的通信通常包括根据所选择的算法的算术特性生成密钥对的步骤,通过证书将密钥中的一个作为公钥传送给对方,生成和发送签名 使用一个记者的密钥对的私钥,并将签名发送给另一个记者,并由接收者对签名的验证。 本发明提供了验证符合由所选算法的要求所规定的算术特性的公共密钥的附加步骤。