会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明授权
    • Enhancing the security of public key cryptosystem implementations
    • 增强公钥密码系统实现的安全性
    • US07903814B2
    • 2011-03-08
    • US11828849
    • 2007-07-26
    • Onur AciicmezJean-Pierre SeifertQingwei MaXinwen Zhang
    • Onur AciicmezJean-Pierre SeifertQingwei MaXinwen Zhang
    • H04L9/00G06F11/30
    • H04L9/302
    • In one embodiment, cryptographic transformation of a message is performed by first performing a table initiation phase to populate a data structure. Then, a first random number multiplied by a public key is added to each value in the data structure, in modulo of a second random number multiplied by the public key. Then an exponentiation phase is performed, wherein each modular multiplication and square operation in the exponentiation phase is performed in modulo of the second random number multiplied by the public key, producing a result. Then the result of the exponentiation phase is reduced in modulo of the public key. The introduction of the random numbers aids in the prevention of potential security breaches from the deduction of operands in the table initiation phase by malicious individuals.
    • 在一个实施例中,通过首先执行表起始阶段来填充数据结构来执行消息的密码学变换。 然后,乘以公开密钥的第一随机数被加到数据结构中的每个值上,以第二随机数乘以公钥的模数。 然后执行取幂阶段,其中乘幂相位中的每个模乘和平方运算以第二随机数乘以公钥进行模拟,产生结果。 然后,乘法相位的结果以公钥的模数减少。 随机数的引入有助于防止潜在的安全漏洞在恶意个人的桌面启动阶段扣除操作数。
    • 6. 发明申请
    • SECURING STORED CONTENT FOR TRUSTED HOSTS AND SAFE COMPUTING ENVIRONMENTS
    • 保护有关主机和安全计算环境的存储内容
    • US20090049510A1
    • 2009-02-19
    • US11839439
    • 2007-08-15
    • Xinwen ZhangOnur AciicmezJean-Pierre SeifertQingwei Ma
    • Xinwen ZhangOnur AciicmezJean-Pierre SeifertQingwei Ma
    • G06F21/00G06F15/16G06F9/455H04L9/32H04L9/30G06F17/00
    • G06F21/53G06F21/57G06F21/79
    • Techniques for protecting content to ensure its use in a trusted environment are disclosed. The stored content is protected against harmful and/or defective host (or hosted) environments. A trusted security component provided for a device can verify the internal integrity of the stored content and the host before it allows the content to come in contact with the host. As a counter part, a trusted security component provided for the host can verify and attest to the integrity of the host and/or specific host computing environment that can be provided for the content stored in the device. The trusted security component provided for a device effectively verify the host integrity based on the information attested to by the trusted security component provided for the host. If the trusted security component trusts the host, it allows the trusted host to provide a trusted host computing environment trusted to be safe for the content stored in the device. A trusted host can effectively provide a safe virtual environment that allows a content representing a copy (or image) of an original computing environment to operate on the host computing system to give a similar appearance as the original computing environment.
    • 公开了用于保护内容以确保其在可信环境中使用的技术。 存储的内容受到保护,防止有害和/或缺陷的主机(或托管)环境。 为设备提供的受信任的安全组件可以在允许内容与主机联系之前验证存储的内容和主机的内部完整性。 作为计数器部件,为主机提供的可信安全组件可以验证和证实可以为存储在设备中的内容提供的主机和/或特定主机计算环境的完整性。 为设备提供的受信任的安全性组件基于为主机提供的可信安全组件所证明的信息有效地验证主机完整性。 如果信任的安全组件信任主机,则允许可信主机提供受信任的主机计算环境,以便对存储在设备中的内容安全。 可信主机可以有效地提供安全的虚拟环境,其允许表示原始计算环境的副本(或图像)的内容在主机计算系统上操作以给出与原始计算环境相似的外观。
    • 7. 发明授权
    • Securing stored content for trusted hosts and safe computing environments
    • 保护可信主机和安全计算环境的存储内容
    • US08782801B2
    • 2014-07-15
    • US11839439
    • 2007-08-15
    • Xinwen ZhangOnur AciicmezJean-Pierre SeifertQingwei Ma
    • Xinwen ZhangOnur AciicmezJean-Pierre SeifertQingwei Ma
    • G06F17/30
    • G06F21/53G06F21/57G06F21/79
    • Techniques for protecting content to ensure its use in a trusted environment are disclosed. A trusted security component provided for a device can verify the internal integrity of the stored content and the host before it allows the content to come in contact with the host. As a counter part, a trusted security component provided for the host can verify and attest to the integrity of the host and/or specific host computing environment that can be provided for the content stored in the device. The trusted security component provided for a device effectively verify the host integrity based on the information attested to by the trusted security component provided for the host. If the trusted security component trusts the host, it allows the trusted host to provide a trusted host computing environment trusted to be safe for the content stored in the device.
    • 公开了用于保护内容以确保其在可信环境中使用的技术。 为设备提供的受信任的安全组件可以在允许内容与主机联系之前验证存储的内容和主机的内部完整性。 作为计数器部件,为主机提供的可信安全组件可以验证和证实可以为存储在设备中的内容提供的主机和/或特定主机计算环境的完整性。 为设备提供的受信任的安全性组件基于为主机提供的可信安全组件所证明的信息有效地验证主机完整性。 如果信任的安全组件信任主机,则允许可信主机提供受信任的主机计算环境,以便对存储在设备中的内容安全。