会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 6. 发明授权
    • Multiple hashing in a cryptographic scheme
    • 密码方案中的多个哈希算法
    • US08995656B2
    • 2015-03-31
    • US13458320
    • 2012-04-27
    • Gregory Marc ZaveruchaDavid William Kravitz
    • Gregory Marc ZaveruchaDavid William Kravitz
    • H04L9/00H04L9/32
    • H04L9/3236
    • Methods, systems, and computer programs for producing hash values are disclosed. A first hash value is obtained by applying a first hash function to a first input. The first input can be based on an implicit certificate, a message to be signed, a message to be verified, or other suitable information. A second hash value is obtained by applying a second hash function to a second input. The second input is based on the first hash value. The second hash value is used in a cryptographic scheme. In some instances, a public key or a private key is generated based on the second hash value. In some instances, a digital signature is generated based on the second hash value, or a digital signature is verified based on the second hash value, as appropriate.
    • 公开了用于产生散列值的方法,系统和计算机程序。 通过将第一散列函数应用于第一输入来获得第一哈希值。 第一个输入可以基于隐式证书,要签名的消息,要验证的消息或其他合适的信息。 通过将第二散列函数应用于第二输入来获得第二哈希值。 第二个输入是基于第一个哈希值。 第二个哈希值用于加密方案。 在一些情况下,基于第二散列值生成公钥或私钥。 在一些情况下,根据第二散列值生成数字签名,或者根据第二散列值,适当地验证数字签名。
    • 8. 发明申请
    • MULTIPLE HASHING IN A CRYPTOGRAPHIC SCHEME
    • 多重打击在一个CRYPTOGRAPHIC计划
    • US20130287207A1
    • 2013-10-31
    • US13458320
    • 2012-04-27
    • Gregory Marc ZaveruchaDavid William Kravitz
    • Gregory Marc ZaveruchaDavid William Kravitz
    • H04L9/30
    • H04L9/3236
    • Methods, systems, and computer programs for producing hash values are disclosed. A first hash value is obtained by applying a first hash function to a first input. The first input can be based on an implicit certificate, a message to be signed, a message to be verified, or other suitable information. A second hash value is obtained by applying a second hash function to a second input. The second input is based on the first hash value. The second hash value is used in a cryptographic scheme. In some instances, a public key or a private key is generated based on the second hash value. In some instances, a digital signature is generated based on the second hash value, or a digital signature is verified based on the second hash value, as appropriate.
    • 公开了用于产生散列值的方法,系统和计算机程序。 通过将第一散列函数应用于第一输入来获得第一哈希值。 第一个输入可以基于隐式证书,要签名的消息,要验证的消息或其他合适的信息。 通过将第二散列函数应用于第二输入来获得第二哈希值。 第二个输入是基于第一个哈希值。 第二个哈希值用于加密方案。 在一些情况下,基于第二散列值生成公钥或私钥。 在一些情况下,根据第二散列值生成数字签名,或者根据第二散列值,适当地验证数字签名。