会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 31. 发明申请
    • SECURE NETWORK SWITCHING INFRASTRUCTURE
    • 安全网络交换基础设施
    • US20080189769A1
    • 2008-08-07
    • US11970976
    • 2008-01-08
    • Martin CasadoNick MckeownDan BonehMichael J. FreedmanScott Shenker
    • Martin CasadoNick MckeownDan BonehMichael J. FreedmanScott Shenker
    • G06F21/22H04L9/32
    • H04L63/102G06F21/6281G06F21/85G06F2221/2129G06F2221/2141
    • Use of a centralized control architecture in a network. Policy declaration, routing computation, and permission checks are managed by a logically centralized controller. By default, hosts on the network can only route to the network controller. Hosts and users must first authenticate themselves with the controller before they can request access to the network resources. The controller uses the first packet of each flow for connection setup. When a packet arrives at the controller, the controller decides whether the flow represented by that packet should be allowed. The switches use a simple flow table to forward packets under the direction of the controller. When a packet arrives that is not in the flow table, it is forwarded to the controller, along with information about which port the packet arrived on. When a packet arrives that is in the flow table, it is forwarded according to the controller's directive.
    • 在网络中使用集中控制架构。 策略声明,路由计算和权限检查由逻辑集中控制器管理。 默认情况下,网络中的主机只能路由到网络控制器。 主机和用户必须首先通过控制器对其进行身份验证,然后才能请求访问网络资源。 控制器使用每个流的第一个数据包进行连接建立。 当数据包到达控制器时,控制器决定是否允许由该数据包表示的流。 交换机使用简单的流表在控制器的方向转发数据包。 当数据包到达不在流表中时,它将转发到控制器,以及数据包到达哪个端口的信息。 当流表中的数据包到达时,它将根据控制器的指令进行转发。
    • 32. 发明授权
    • Method of using transient faults to verify the security of a cryptosystem
    • 使用瞬态故障验证密码系统的安全性的方法
    • US06965673B1
    • 2005-11-15
    • US09516910
    • 2000-03-01
    • Dan BonehRichard LiptonRichard A. DeMillo
    • Dan BonehRichard LiptonRichard A. DeMillo
    • G06F7/72H04K1/00H04L9/30H04L9/32
    • H04L9/3218G06F7/723G06F2207/7219H04L9/004H04L9/302H04L9/3249
    • A useful method of verifying the integrity of a cryptosystem involves using erroneous outputs to obtain secret information. In certain signature schemes which use the Chinese Remainder Theorem, a correct signature of a message and an erroneous signature of the same message permit the modulus to be easily obtained. If the content of the message is known, such cryptosystems may be cracked with only an erroneous signature of the message. Certain other authorization schemes may be cracked by analyzing a number of erroneous outputs caused by a particular type of error called a “register fault.” A security expert or cryptosystem designer may intentionally induce a tamper proof device generate a faulty computation by subjecting the device, such as a smart card, to physical stress, such as certain types of radiation, atypical voltage levels, or a higher clock rate than the device was designed to accommodate. Cryptosystems should be impervious to the attacks described herein. If not, the system should be modified or discarded.
    • 验证密码系统的完整性的有用方法涉及使用错误的输出来获取秘密信息。 在使用中国剩余定理的某些签名方案中,消息的正确签名和相同消息的错误签名允许容易地获得模数。 如果消息的内容是已知的,则这样的密码系统可能仅以消息的错误签名被破解。 通过分析由称为“寄存器故障”的特定类型的错误导致的许多错误输出,某些其他授权方案可能会被破解。 安全专家或密码系统设计者可以有意地诱导防篡改设备通过使设备(例如智能卡)经受物理应力(例如某些类型的辐射,非典型电压电平或更高的时钟速率)来产生故障计算 设备被设计为容纳。 密码系统应该不受本文描述的攻击。 如果没有,系统应该被修改或者丢弃。
    • 33. 发明授权
    • Lightweight word-oriented technique for generating a pseudo-random sequence for use in a keystream of a stream cipher
    • 用于生成在流密码的密钥流中使用的伪随机序列的轻量级的面向字的​​技术
    • US06490354B2
    • 2002-12-03
    • US09102945
    • 1998-06-23
    • Ramarathnam R. VenkatesanDan Boneh
    • Ramarathnam R. VenkatesanDan Boneh
    • H04L900
    • H04L9/0662
    • A word-oriented technique for generating a pseudo-random sequence, e.g., a keystream (17) for use in a stream cipher. Specifically, the technique utilizes two different arrays (653, 657) with each array having illustratively 256 32-bit elements. One array (653) contains a 256 element 32-bit S-box. An output stream generated by the S-box, i.e., St, is applied as one input to a first hash function. This hash function, in response to input St multiplied by a variable, C, provides the output keystream. S-box element St is then updated through a second hash function having, as its input, the current value of St multiplied by the variable C. The variable, C, initially a random variable, is itself updated, for use during a next iteration, through an additive combination, of its current value and a corresponding element in the second array (G), i.e., Gt. Both the S-box and G array can be initialized by, e.g., entirely filling each of these arrays with random 32-bit values. This technique, when used to generate a keystream for a stream cipher, appears to be just as secure as a conventional RC4 cipher and, by operating on a word- rather than a byte-level, is considerably faster than an RC4 keystream generator. Hence, this technique, when used in cryptographic applications, is particularly well suited for use in devices that have limited computational resources and would not be amenable to use of the RC4 stream cipher.
    • 一种面向字的技术,用于产生伪随机序列,例如用于流密码的密钥流(17)。 具体地,该技术利用两个不同的阵列(653,657),每个阵列具有示例性的256个32位元素。 一个阵列(653)包含256个元素的32位S盒。 由S盒(即St)产生的输出流作为一个输入被应用于第一散列函数。 这个哈希函数响应于输入St乘以变量C,提供了输出密钥流。 S盒元素St然后通过第二散列函数进行更新,该第二哈希函数具有作为其输入的St的当前值乘以变量C.变量C最初是随机变量本身被更新以供下次迭代使用 ,通过加法组合,其当前值和第二阵列(G)中的相应元素,即Gt。 S盒和G阵列都可以通过例如使用随机32位值完全填充这些阵列中的每一个来初始化。 当用于生成流密码的密钥流时,该技术似乎与传统的RC4密码一样安全,并且通过对字而不是字节级的操作比RC4密钥流生成器快得多。 因此,当在密码应用中使用时,该技术特别适用于具有有限计算资源并且不适合使用RC4流密码的设备。