会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 6. 发明授权
    • Method and apparatus for providing interoperability between key recovery and non-key recovery systems
    • US06535607B1
    • 2003-03-18
    • US09184002
    • 1998-11-02
    • Coimbatore S. ChandersekaranRosario GennaroSarbari GuptaStephen M. Matyas, Jr.David R. SaffordNevenko Zunic
    • Coimbatore S. ChandersekaranRosario GennaroSarbari GuptaStephen M. Matyas, Jr.David R. SaffordNevenko Zunic
    • H04L900
    • H04L9/0841H04L9/0894
    • A method and apparatus for ensuring that a key recovery-enabled (KR-enabled) system communicating with a non-KR-enabled system in a cryptographic communication system transmits the information necessary to permit key recovery by a key recovery entity. In a first embodiment, data is encrypted under a second key K that is generated as a one-way function of a first key K′ and a key recovery block KRB generated on the first key K′. The key recovery block KRB and the encrypted data e(K, data) are transmitted to the receiver, who cannot decrypt the data without regenerating the second key K from the first key K′ and the key recovery block KRB. In a second embodiment, data is encrypted under a second key K that is generated independently of the first key K′. A third key X, generated as a one-way function of the first key K′ and a key recovery block KRB generated on the second key K, is used to encrypt the XOR product Y of the first and second keys K′, K. The key recovery block KRB, the encrypted XOR product e(X, Y) and the encrypted data e(K, data) are transmitted to the receiver, who cannot decrypt the data without regenerating the third key X from the first key K′ and the key recovery block KRB, decrypting the XOR product Y using the regenerated third key X, and recombining the XOR product Y with the first key K″ to regenerate the second key K. In a third embodiment, an integrity value is computed on a key K and its key recovery block KRB. The integrity value and the key K are encrypted to form an encrypted portion of a key exchange block KEB, while the key recovery block KRB is put in an unencrypted portion of the key exchange block KEB, which is sent along with the encrypted data e(K, data) to the receiver. The receiver decrypts the encrypted portion, recomputes the integrity value and compares it with the received integrity value. Only if the two integrity values compare is the key K extracted and used to decrypt the data.
    • 7. 发明授权
    • Method and apparatus for interoperable validation of key recovery
information in a cryptographic system
    • 用于密码系统中关键恢复信息的可互操作验证的方法和装置
    • US6058188A
    • 2000-05-02
    • US899855
    • 1997-07-24
    • Coimbatore S. ChandersekaranRosario GennaroSarbari GuptaStephen M. Matyas, Jr.David R. SaffordNevenko Zunic
    • Coimbatore S. ChandersekaranRosario GennaroSarbari GuptaStephen M. Matyas, Jr.David R. SaffordNevenko Zunic
    • H04L9/08H04L9/32
    • H04L9/3247H04L9/0894H04L9/3268
    • In a cryptographic communications system, a method and apparatus for allowing a sender of encrypted data to demonstrate to a receiver its ability to correctly generate key recovery information that is transmitted along with the encrypted data and from which law enforcement agents or others may recover the original encryption key. Initially, the sender generates a key pair comprising a private signature key and a corresponding public verification key and sends the latter to a key recovery validation service (KRVS). Upon a satisfactory demonstration by the sender of its ability to correctly generate key recovery information, the KRVS generates a certificate certifying the public verification key and the ability of the sender to correctly generate key recovery information. The sender uses its private signature key to generate a digital signature on the key recovery information, which is sent along with the key recovery information and encrypted data to the receiver. The receiver verifies the signature on the key recovery information using the certified public verification key and decrypts the encrypted data only if the signature is verified as being a valid signature.
    • 在加密通信系统中,允许加密数据的发送方向接收机证明正确地生成与加密数据一起发送的密钥恢复信息的能力的方法和装置,并且执法人员或其他人可以从其恢复原始 加密密钥 最初,发送者生成包括私有签名密钥和对应的公共验证密钥的密钥对,并将其发送到密钥恢复验证服务(KRVS)。 在发送方能够正确生成密钥恢复信息的令人满意的演示之后,KRVS生成证明公共验证密钥的证书以及发送方正确生成密钥恢复信息的能力。 发送方使用其私有签名密钥在密钥恢复信息上生成数字签名,密钥恢复信息与密钥恢复信息和加密数据一起发送给接收者。 接收者使用经认证的公开验证密钥来验证密钥恢复信息上的签名,并且只有当签名被验证为有效签名时才对加密数据进行解密。
    • 8. 发明授权
    • Two-phase cryptographic key recovery system
    • 两相加密密钥恢复系统
    • US5937066A
    • 1999-08-10
    • US725102
    • 1996-10-02
    • Rosario GennaroDonald Byron JohnsonPaul Ashley KargerStephen Michael Matyas, Jr.Mohammad PeyravianDavid Robert SaffordMarcel Mordechay YungNevenko Zunic
    • Rosario GennaroDonald Byron JohnsonPaul Ashley KargerStephen Michael Matyas, Jr.Mohammad PeyravianDavid Robert SaffordMarcel Mordechay YungNevenko Zunic
    • G09C1/00H04L9/08H04L9/00
    • H04L9/0841H04L9/085H04L9/0897
    • A cryptographic key recovery system that operates in two phases. In the first phase, the sender establishes a secret value with the receiver. For each key recovery agent, the sender generates a key-generating value as a one-way function of the secret value and encrypts the key-generating value with a public key of the key recovery agent. In the second phase, performed for a particular cryptographic session, the sender generates for each key recovery agent a key-encrypting key as a one-way function of the corresponding key-generating value and multiply encrypts the session key with the key-encrypting keys of the key recovery agents. The encrypted key-generating values and the multiply encrypted session key are transmitted together with other recovery information in a manner permitting their interception by a party seeking to recover the secret value. To recover the secret value, the party seeking recovery presents the encrypted key-generating values and public recovery information to the key recovery agents, who decrypt the key-generating values, regenerate the key-encrypting keys from the corresponding key-generating values, and provide the regenerated key-encrypting keys to the recovering party. The recovering party uses the key-encrypting keys to recover the secret value. Since the key-generating values cannot be derived from the key-encrypting keys, they may be used over a period spanning multiple cryptographic sessions without requiring new values or new public key encryptions.
    • 一个加密密钥恢复系统,分两个阶段运行。 在第一阶段,发送者与接收者建立秘密值。 对于每个密钥恢复代理,发送者生成密钥生成值作为秘密值的单向函数,并用密钥恢复代理的公钥加密密钥生成值。 在针对特定加密会话执行的第二阶段中,发送者针对每个密钥恢复代理生成密钥加密密钥作为对应的密钥生成值的单向函数,并且将密钥加密密钥乘以加密密钥 的关键回收剂。 加密的密钥生成值和乘法加密的会话密钥与其他恢复信息一起被发送,以允许由寻求恢复秘密值的一方拦截的方式。 为了恢复秘密值,寻求恢复方向密钥恢复代理提供加密的密钥生成值和公共恢复信息,密钥恢复代理解密密钥生成值,从相应的密钥生成值重新生成密钥加密密钥, 向恢复方提供重新生成的密钥加密密钥。 恢复方使用密钥加密密钥来恢复秘密值。 由于密钥生成值不能从密钥加密密钥导出,所以它们可以在跨越多个加密会话的时间段内使用,而不需要新的值或新的公钥加密。
    • 9. 发明授权
    • Method and apparatus for verifiably providing key recovery information
in a cryptographic system
    • 用于在加密系统中可验证地提供密钥恢复信息的方法和装置
    • US5907618A
    • 1999-05-25
    • US775348
    • 1997-01-03
    • Rosario GennaroPaul Ashley KargerStephen Michael Matyas, Jr.Mohammad PeyravianDavid Robert SaffordNevenko Zunic
    • Rosario GennaroPaul Ashley KargerStephen Michael Matyas, Jr.Mohammad PeyravianDavid Robert SaffordNevenko Zunic
    • H04L9/08H04L9/00
    • H04L9/0841H04L9/0894
    • A method and apparatus for verifiably providing key recovery information to one or more trustees in a cryptographic communication system having a sender and a receiver Each communicating party has its own Diffie-Hellman key pair comprising a secret value and corresponding public value, as does each trustee The sender non-interactively generates from its own secret value and the public value held by the receiver a first shared Diffie-Hellman key pair comprising a first shared secret value, shared with the receiver but not with any trustee, and a corresponding public value. For each trustee, the sender then non-interactively generates an additional shared secret value, shared with the receiver and the trustee, from the first shared secret value and the public value corresponding to the secret value held by the trustee. The sender uses the additional shared secret value to encrypt recovery information for each trustee, which is transmitted to the receiver along with the encrypted message. Each trustee can decrypt its recovery information by regenerating its additional shared secret value from its own secret value and the public value of the first shared Diffie-Hellman key pair. The receiver can verify the correctness of the recovery information for each trustee by decrypting the information using the additional shared secret value for that trustee, without having to recreate the recovery information or perform computationally expensive public key operations.
    • 一种用于在具有发送者和接收者的密码通信系统中可验证地向一个或多个受托人提供密钥恢复信息的方法和装置。每个通信方都有自己的Diffie-Hellman密钥对,包括秘密值和对应的公共价值,每个受托人 发送方从其自己的秘密值和由接收者持有的公开值不交互地生成包括与接收者共享但不与任何受托人共享的第一共享秘密值的第一共享Diffie-Hellman密钥对以及相应的公共值。 对于每个受托人,发件人然后从第一共享秘密值和与受托人​​所持有的秘密值相对应的公共价值非交互地生成与接收方和受托人共享的附加共享秘密值。 发送方使用额外的共享秘密值来加密每个受信任者的恢复信息,这些信息与加密消息一起发送到接收者。 每个受托人可以通过从其自己的秘密值和第一个共享的Diffie-Hellman密钥对的公共值重新生成其附加的共享秘密值来解密其恢复信息。 接收方可以通过使用该受托人的附加共享秘密值解密信息来验证每个受托人的恢复信息的正确性,而无需重新创建恢复信息或执行计算上昂贵的公钥操作。
    • 10. 发明授权
    • Time stamping method employing a separate ticket and stub
    • 时间戳方法采用单独的机票和存根
    • US07487359B2
    • 2009-02-03
    • US11846562
    • 2007-08-29
    • Mohammad PeyravianAllen RoginskyNevenko ZunicStephen M. Matyas, Jr.
    • Mohammad PeyravianAllen RoginskyNevenko ZunicStephen M. Matyas, Jr.
    • H04L9/00G06F7/04H04K1/00
    • H04L9/3297H04L9/3242
    • A time stamping protocol has two stages referred to as the ticketing stage and the certification stage. During the ticketing stage, the document or other identifying data is sent to the TSA. The TSA generates a “ticket” based on the document or other identifying data and a time indication derived from a trusted clock. The ticket, which serves as an unsigned time stamp receipt, is transmitted back to the document originator. During the certification stage, the holder of the ticket requests a certified time stamp receipt by presenting the ticket to the TSA. The TSA verifies the ticket and generates a signed time stamp receipt, called the ticket stub, which is then transmitted back to the document originator. The ticket stub serves as a “universal time-stamp” that the holder of the ticket stub can use to prove the date of the document.
    • 时间戳协议有两个阶段,称为票务阶段和认证阶段。 在票务阶段,文件或其他识别数据被发送到TSA。 TSA根据文档或其他标识数据和从可信时钟导出的时间指示生成“票证”。 作为未签名的时间戳收据的票据被传回给文件发起者。 在认证阶段,机票持有人通过向TSA提供机票来申请经过认证的时间戳收据。 TSA验证票据并生成一个称为票据存根的签名时间戳收据,然后将其传回给文档发起者。 票据桩作为票据存根的持有者可以用来证明文件的日期的“通用时间戳”。