会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 81. 发明申请
    • SYSTEM AND METHOD FOR AUTHENTICATION USING A SHARED TABLE AND SORTING EXPONENTIATION
    • 使用共享表和分配引用进行认证的系统和方法
    • US20100153450A1
    • 2010-06-17
    • US12334732
    • 2008-12-15
    • Pierre BetouinMathieu CietAugustin J. Farrugia
    • Pierre BetouinMathieu CietAugustin J. Farrugia
    • G06F17/30
    • G06F21/31
    • Disclosed herein are systems, computer-implemented methods, and computer-readable media for authentication using a shared table. The method receives an authentication challenge from a first entity including an accumulator with an initial value, lists of elements in a shared table, and a list of sorting algorithms, each sorting algorithm is associated with one of the lists of elements and modified to include embedded instructions operating on the accumulator. The method then generates a temporary table for each list of elements in the shared table by copying elements from the shared table as indicated in each respective list of elements, each temporary table being associated with one sorting algorithm in the list of sorting algorithms. The method sorts each generated temporary table with the associated sorting algorithm, thereby updating the accumulator with the embedded instructions. Finally, the method transmits the updated accumulator to the first entity for verification.
    • 本文公开了系统,计算机实现的方法和用于使用共享表进行认证的计算机可读介质。 该方法从包括具有初始值的累加器,共享表中的元素列表和排序算法列表的第一实体接收认证挑战,每个排序算法与元素列表中的一个相关联并被修改为包括嵌入 在累加器上操作的指令。 然后,该方法通过从每个相应的元素列表中指示的从共享表中复制元素来生成共享表中的每个元素列表的临时表,每个临时表与排序算法列表中的一个排序算法相关联。 该方法使用相关联的排序算法对每个生成的临时表进行排序,从而用嵌入式指令更新累加器。 最后,该方法将更新的累加器发送到第一实体进行验证。
    • 87. 发明申请
    • SYSTEM AND METHOD FOR A COLLATZ BASED HASH FUNCTION
    • 基于COLLATZ的哈希函数的系统和方法
    • US20130108038A1
    • 2013-05-02
    • US13308452
    • 2011-11-30
    • Mathieu CietAugustin J. FarrugiaThomas Icart
    • Mathieu CietAugustin J. FarrugiaThomas Icart
    • H04L9/28
    • H04L9/0643
    • Disclosed herein are systems, methods, and non-transitory computer-readable storage media for generating a hash based on the Collatz conjecture. The Collatz conjecture is based on a set of operations for a given number n that are performed iteratively on n, with one operation performed if n is even, and another operation performed if n is odd. Operating on an input value according to the Collatz conjecture for a specified number of iterations produces an output value that can then be used as a hash in a cryptographic function. The hash function performs steps according to the Collatz conjecture, or a modification thereof, on the value n for r iterations, and outputs a resulting hash value. The hash function can apply more complex variations, such as adding multiplication, addition, modulo or other operation(s) in the even and/or odd operations. The hash value can be used to pad blocks of a message.
    • 本文公开了用于基于Collat​​z推测来生成散列的系统,方法和非暂时的计算机可读存储介质。 Collat​​z猜想基于对n进行迭代执行的给定数量n的一组操作,如果n是偶数,则执行一个操作,并且如果n是奇数则执行另一个操作。 对于指定数量的迭代,根据Collat​​z推测对输入值进行操作会产生一个输出值,然后可以将其用作加密函数中的散列。 散列函数根据Collat​​z推测或其修改对r值的n值执行步骤,并输出所得到的散列值。 散列函数可以应用更复杂的变化,例如在偶数和/或奇数运算中添加乘法,加法,模或其他操作。 哈希值可以用于填充消息块。
    • 90. 发明申请
    • SYSTEM AND METHOD FOR MODULUS OBFUSCATION
    • 用于模块化的系统和方法
    • US20100054459A1
    • 2010-03-04
    • US12203101
    • 2008-09-02
    • Mathieu CietAugustin J. FarrugiaNicholas T. Sullivan
    • Mathieu CietAugustin J. FarrugiaNicholas T. Sullivan
    • H04L9/28
    • H04L9/00H04L2209/16
    • Disclosed herein are methods for obfuscating data on a client, on a server, and on a client and a server. The method on a client device includes receiving input data, storing an operation value in a secure location, performing a modulus obfuscation on the operation value, performing a modulus operation on the operation value and the input data, performing a modulus transformation on the operation value and the input data to obtain client output data, and checking if the client output data matches corresponding server output data. The method on a server device includes receiving input data, performing a modulus transformation on the input data to obtain a result, performing a plain operation on the result and an operation value to obtain server output data, and checking if the server output data matches corresponding client output data from a client device that (1) receives input data, (2) stores an operation value in a secure location, (3) performs a modulus obfuscation on the operation value, (4) performs a modulus operation on the operation value and the input data, and (5) performs a modulus transformation on the operation value and the input data to obtain client output data. In an optional step applicable to both clients and servers, the method further includes authenticating the client input data and the server input data if the server output data matches the client output data. In one aspect, server input data and client input data pertain to a cryptographic key.
    • 这里公开了用于在客户端,服务器上以及在客户端和服务器上模糊数据的方法。 客户端装置的方法包括接收输入数据,将操作值存储在安全位置,对运算值进行模糊混淆,对运算值和输入数据进行模运算,对运算值进行模变换 和输入数据,以获取客户端输出数据,并检查客户端输出数据是否匹配相应的服务器输出数据。 服务器装置上的方法包括:接收输入数据,对输入数据进行模数变换,得到结果,对结果执行简单操作,得到操作值,得到服务器输出数据,并检查服务器输出数据是否匹配对应 (1)接收输入数据的客户端输出数据,(2)将操作值存储在安全位置,(3)对运算值进行模糊混淆,(4)对运算值进行模运算 和输入数据,(5)对运算值和输入数据进行模变换,得到客户输出数据。 在适用于客户端和服务器的可选步骤中,如果服务器输出数据与客户端输出数据匹配,则该方法还包括验证客户端输入数据和服务器输入数据。 在一个方面,服务器输入数据和客户端输入数据属于加密密钥。