会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Two-phase cryptographic key recovery system
    • 两相加密密钥恢复系统
    • US5937066A
    • 1999-08-10
    • US725102
    • 1996-10-02
    • Rosario GennaroDonald Byron JohnsonPaul Ashley KargerStephen Michael Matyas, Jr.Mohammad PeyravianDavid Robert SaffordMarcel Mordechay YungNevenko Zunic
    • Rosario GennaroDonald Byron JohnsonPaul Ashley KargerStephen Michael Matyas, Jr.Mohammad PeyravianDavid Robert SaffordMarcel Mordechay YungNevenko Zunic
    • G09C1/00H04L9/08H04L9/00
    • H04L9/0841H04L9/085H04L9/0897
    • A cryptographic key recovery system that operates in two phases. In the first phase, the sender establishes a secret value with the receiver. For each key recovery agent, the sender generates a key-generating value as a one-way function of the secret value and encrypts the key-generating value with a public key of the key recovery agent. In the second phase, performed for a particular cryptographic session, the sender generates for each key recovery agent a key-encrypting key as a one-way function of the corresponding key-generating value and multiply encrypts the session key with the key-encrypting keys of the key recovery agents. The encrypted key-generating values and the multiply encrypted session key are transmitted together with other recovery information in a manner permitting their interception by a party seeking to recover the secret value. To recover the secret value, the party seeking recovery presents the encrypted key-generating values and public recovery information to the key recovery agents, who decrypt the key-generating values, regenerate the key-encrypting keys from the corresponding key-generating values, and provide the regenerated key-encrypting keys to the recovering party. The recovering party uses the key-encrypting keys to recover the secret value. Since the key-generating values cannot be derived from the key-encrypting keys, they may be used over a period spanning multiple cryptographic sessions without requiring new values or new public key encryptions.
    • 一个加密密钥恢复系统,分两个阶段运行。 在第一阶段,发送者与接收者建立秘密值。 对于每个密钥恢复代理,发送者生成密钥生成值作为秘密值的单向函数,并用密钥恢复代理的公钥加密密钥生成值。 在针对特定加密会话执行的第二阶段中,发送者针对每个密钥恢复代理生成密钥加密密钥作为对应的密钥生成值的单向函数,并且将密钥加密密钥乘以加密密钥 的关键回收剂。 加密的密钥生成值和乘法加密的会话密钥与其他恢复信息一起被发送,以允许由寻求恢复秘密值的一方拦截的方式。 为了恢复秘密值,寻求恢复方向密钥恢复代理提供加密的密钥生成值和公共恢复信息,密钥恢复代理解密密钥生成值,从相应的密钥生成值重新生成密钥加密密钥, 向恢复方提供重新生成的密钥加密密钥。 恢复方使用密钥加密密钥来恢复秘密值。 由于密钥生成值不能从密钥加密密钥导出,所以它们可以在跨越多个加密会话的时间段内使用,而不需要新的值或新的公钥加密。
    • 2. 发明授权
    • Interoperable cryptographic key recovery system
    • 互操作密码恢复系统
    • US5796830A
    • 1998-08-18
    • US681679
    • 1996-07-29
    • Donald Byron JohnsonPaul Ashley KargerCharles William Kaufman, Jr.Stephen Michael Matyas, Jr.David Robert SaffordMarcel Mordechay YungNevenko Zunic
    • Donald Byron JohnsonPaul Ashley KargerCharles William Kaufman, Jr.Stephen Michael Matyas, Jr.David Robert SaffordMarcel Mordechay YungNevenko Zunic
    • G09C1/00H04K1/00H04L9/08H04L9/14H04L9/28H04L9/32
    • H04L9/0894
    • A cryptographic key recovery system that is interoperable with existing systems for establishing keys between communicating parties. The sender uses a reversible key inversion function to generate key recovery values P, Q and (optionally) R as a function of a session key and public information, so that the session key may be regenerated from the key recovery values P, Q and (if generated) R. Key recovery values P and Q are encrypted using the respective public recovery keys of a pair of key recovery agents. The encrypted P and Q values are included along with other recovery information in a session header accompanying an encrypted message sent from the sender to the receiver. The key recovery agents may recover the P and Q values for a law enforcement agent by decrypting the encrypted P and Q values in the session header, using their respective private recovery keys corresponding to the public keys. The R value, if generated, is not made available to the key recovery agents, but is ascertained using standard cryptanalytic techniques in order to provide a nontrivial work factor for law enforcement agents. The receiver checks the session header of a received message to ensure that the sender has included valid recovery information. Only when the receiver has verified that the sender has included valid recovery information does the receiver decrypt the received message.
    • 可与现有系统互通的加密密钥恢复系统,用于在通信方之间建立密钥。 发送方使用可逆密钥反转功能来产生密钥恢复值P,Q和(可选地)R作为会话密钥和公共信息的函数,使得会话密钥可以从密钥恢复值P,Q和( 如果生成)R.密钥恢复值P和Q使用一对密钥恢复代理的相应的公共恢复密钥进行加密。 加密的P和Q值与伴随从发送方发送到接收方的加密消息的会话报头中的其他恢复信息一起被包括。 密钥恢复代理可以通过使用它们对应于公钥的各自的私有恢复密钥来解密会话报头中的加密的P和Q值来恢复执法代理的P和Q值。 R值(如果生成的话)不提供给密钥恢复代理,而是使用标准密码分析技术来确定,以便为执法人员提供一个非常重要的工作因素。 接收机检查接收到的消息的会话报头,以确保发送方已经包括有效的恢复信息。 只有当接收方已经验证发送方已经包括有效的恢复信息时,接收方才能解密接收的消息。
    • 3. 发明授权
    • Interoperable cryptographic key recovery system with verification by
comparison
    • 可互操作的加密密钥恢复系统,通过比较验证
    • US6052469A
    • 2000-04-18
    • US133877
    • 1998-08-14
    • Donald Byron JohnsonPaul Ashley KargerCharles William Kaufman, Jr.Stephen Michael Matyas, Jr.David Robert SaffordMarcel Mordechay YungNevenko Zunic
    • Donald Byron JohnsonPaul Ashley KargerCharles William Kaufman, Jr.Stephen Michael Matyas, Jr.David Robert SaffordMarcel Mordechay YungNevenko Zunic
    • G09C1/00H04K1/00H04L9/08H04L9/14H04L9/28H04L9/32
    • H04L9/0894
    • A cryptographic key recovery system that is interoperable with existing systems for establishing keys between communicating parties. The sender uses a reversible key inversion function to generate key recovery values P, Q and (optionally) R as a function of a session key and public information, so that the session key may be regenerated from the key recovery values P, Q and (if generated) R. Key recovery values P and Q are encrypted using the respective public recovery keys of a pair of key recovery agents. The encrypted P and Q values are included along with other recovery information in a session header accompanying an encrypted message sent from the sender to the receiver. The key recovery agents may recover the P and Q values for a law enforcement agent by decrypting the encrypted P and Q values in the session header, using their respective private recovery keys corresponding to the public keys. The R value, if generated, is not made available to the key recovery agents, but is ascertained using standard cryptanalytic techniques in order to provide a nontrivial work factor for law enforcement agents. The receiver checks the session header of a received message to ensure that the sender has included valid recovery information. Only when the receiver has verified that the sender has included valid recovery information does the receiver decrypt the received message.
    • 可与现有系统互通的加密密钥恢复系统,用于在通信方之间建立密钥。 发送方使用可逆密钥反转功能来产生密钥恢复值P,Q和(可选地)R作为会话密钥和公共信息的函数,使得会话密钥可以从密钥恢复值P,Q和( 如果生成)R.密钥恢复值P和Q使用一对密钥恢复代理的相应的公共恢复密钥进行加密。 加密的P和Q值与伴随从发送方发送到接收方的加密消息的会话报头中的其他恢复信息一起被包括。 密钥恢复代理可以通过使用它们对应于公钥的各自的私有恢复密钥来解密会话报头中的加密的P和Q值来恢复执法代理的P和Q值。 R值(如果生成的话)不提供给密钥恢复代理,而是使用标准密码分析技术来确定,以便为执法人员提供一个非常重要的工作因素。 接收机检查接收到的消息的会话报头,以确保发送方已经包括有效的恢复信息。 只有当接收方已经验证发送方已经包括有效的恢复信息时,接收方才能解密接收的消息。
    • 4. 发明授权
    • Cryptographic key recovery system
    • 加密密钥恢复系统
    • US5815573A
    • 1998-09-29
    • US629815
    • 1996-04-10
    • Donald Byron JohnsonPaul Ashley KargerCharles William Kaufman, Jr.Stephen Michael Matyas, Jr.Marcel Mordechay YungNevenko Zunic
    • Donald Byron JohnsonPaul Ashley KargerCharles William Kaufman, Jr.Stephen Michael Matyas, Jr.Marcel Mordechay YungNevenko Zunic
    • H04L9/08H04L9/10H04K1/00
    • H04L9/0894
    • A cryptographic key recovery system for generating a cryptographic key for use by a pair of communicating parties while simultaneously providing for its recovery using one or more key recover agents. A plurality of m-bit shared key parts (P, Q) are generated which are shared with respective key recovery agents, while an n-bit nonshared key part (R) is generated that is not shared with any key recovery agent. The shared key parts (P, Q) are combined to generate an m-bit value which is concatenated with the nonshared key part (R) to generate an (m+n)-bit value from which an encryption key is generated. The cryptographic system has the effective work factor of an n-bit key to all of the key recovery agents acting in concert, but has the effective work factor of an (m+n)-bit to any other combination of third parties. The quantity n is selected to make authorized key recovery feasible, but not so trivial as to permit routine decryption of intercepted communications, while the quantity m is selected to make decryption by unauthorized third parties infeasible. Means are provided for verifying that the shared key parts have been shared with the key recovery agents before permitting encrypted communications using the thus generated key.
    • 一种加密密钥恢复系统,用于生成密钥,供一对通信方使用,同时使用一个或多个密钥恢复代理提供其恢复。 生成与各个密钥恢复代理共享的多个m位共享密钥部分(P,Q),而生成不与任何密钥恢复代理共享的n位非共享密钥部分(R)。 共享密钥部分(P,Q)被组合以产生与非共享密钥部分(R)连接的m比特值,以生成从其生成加密密钥的(m + n)比特值。 加密系统对所有主要恢复代理人具有一致的n位密钥的有效工作因子,但具有(m + n)位到任何其他第三方组合的有效工作因子。 选择数量n使授权密钥恢复成为可行,但不允许允许例行解密截取的通信,同时选择数量m以使得未经授权的第三方解密不可行。 提供了用于在使用由此产生的密钥进行加密通信之前验证共享密钥部分已经与密钥恢复代理共享的手段。
    • 5. 发明授权
    • Method and apparatus for establishing an authenticated shared secret
value between a pair of users
    • 用于在一对用户之间建立经认证的共享秘密值的方法和装置
    • US5953420A
    • 1999-09-14
    • US736774
    • 1996-10-25
    • Stephen Michael Matyas, Jr.Donald Byron Johnson
    • Stephen Michael Matyas, Jr.Donald Byron Johnson
    • H04L9/08H04L9/30
    • H04L9/0844
    • A method and apparatus for generating authenticated Diffie-Hellman keys. Each user first generates an authenticated first shared secret value from a first nonshared persistent secret value generated by that user and an authenticated first transformed value received from the other user over a trusted communications channel. Each user then dynamically generates a second shared secret value from a second nonshared secret value dynamically generated by that user and a dynamically generated second transformed value received from the other user. Each user thereafter generates one or more keys by concatenating the first and second shared secret values together with a count to form a concatenated value and passing the concatenated value through a one-way hash function to generate a hash value from which the keys are extracted. Since only the legitimate users possess the information necessary to construct the first shared secret value, a spoofer interacting with a user to generate a second shared secret value cannot generate the same key. Incrementing the count for successive hashes allows a multiplicity of keys to be generated from a given pair of shared secret values.
    • 一种用于生成经认证的Diffie-Hellman密钥的方法和装置。 每个用户首​​先从由该用户生成的第一非共享持久秘密值生成经认证的第一共享秘密值,以及通过可信通信信道从另一用户接收到的经认证的第一变换值。 然后,每个用户从由该用户动态生成的第二非共享密钥动态地生成第二共享秘密值,以及从另一个用户接收到的动态生成的第二变换值。 每个用户此后通过将第一和第二共享秘密值连同计数结合起来生成一个或多个密钥,以形成级联值,并通过单向散列函数传递级联值,以生成提取密钥的哈希值。 由于只有合法用户拥有构建第一个共享秘密值所需的信息,所以与用户交互以产生第二共享秘密值的垃圾邮件无法生成相同的密钥。 递增连续哈希值的计数允许从给定的一对共享密钥值生成多个密钥。
    • 6. 发明授权
    • Authentication system using one-time passwords
    • 验证系统使用一次性密码
    • US5661807A
    • 1997-08-26
    • US516889
    • 1995-08-18
    • Richard Henry GuskiRaymond Craig LarsonStephen Michael Matyas, Jr.Donald Byron JohnsonDon Coppersmith
    • Richard Henry GuskiRaymond Craig LarsonStephen Michael Matyas, Jr.Donald Byron JohnsonDon Coppersmith
    • G09C1/00G06F1/00G06F21/00H04L9/32H04L12/22H04L29/06H04L9/00
    • H04L63/0838G06F21/31H04L12/22H04L63/0846H04L9/0822H04L9/088H04L9/0894H04L9/3228H04L2209/20
    • A system for authenticating a user located at a requesting node to a resource such as a host application located at an authenticating node using one-time passwords that change pseudorandomly with each request for authentication. At the requesting node a non-time-dependent value is generated from nonsecret information identifying the user and the host application, using a secret encryption key shared with the authenticating node. The non-time-dependent value is combined with a time-dependent value to generate a composite value that is encrypted to produce an authentication parameter. The authentication parameter is reversibly transformed into an alphanumeric character string that is transmitted as a one-time password to the authenticating node. At the authenticating node the received password is transformed back into the corresponding authentication parameter, which is decrypted to regenerate the composite value. The non-time-dependent value is replicated at the authenticating node using the same nonsecret information and encryption key shared with the requesting node. The locally generated non-time-dependent value is combined with the regenerated composite value to regenerate the time-dependent value. The user is authenticated if the regenerated time-dependent value is within a predetermined range of a time-dependent value that is locally generated at the authenticating node.
    • 一种用于将位于请求节点处的用户的身份认证给诸如位于认证节点的主机应用的资源的系统,该系统使用与每个认证请求伪随机地改变的一次性密码。 在请求节点,使用与认证节点共享的秘密加密密钥,从识别用户和主机应用的非秘密信息生成非时间依赖值。 将非时间依赖值与时间相关的值组合以生成被加密以产生认证参数的复合值。 验证参数可逆地转换成以一次性密码的形式发送给认证节点的字母数字字符串。 在认证节点,将接收到的密码转换回相应的认证参数,对其进行解密,以重新生成复合值。 使用与请求节点共享的相同的非秘密信息和加密密钥在认证节点上复制非时间依赖值。 将本地生成的非时间依赖值与再生的复合值组合以再生时间依赖值。 如果再生的时间依赖值在认证节点处本地生成的与时间有关的值的预定范围内,则认证用户。
    • 7. 发明授权
    • Method and apparatus for encrypting long blocks using a short-block
encryption procedure
    • 使用短块加密程序加密长块的方法和装置
    • US5987124A
    • 1999-11-16
    • US847902
    • 1997-04-28
    • Stephen Michael Matyas, Jr.Donald Byron Johnson
    • Stephen Michael Matyas, Jr.Donald Byron Johnson
    • G06F7/72G09C1/00H04L9/06H04L9/30H04L9/00H04K1/00
    • H04L9/0618G06F7/725H04L2209/046
    • A system for encrypting a plaintext block using a block encryption algorithm having a block size smaller than that of the plaintext block. The plaintext block is transformed into a masked plaintext block using an invertible transformation optionally dependent on additional data and defined such that each bit of the masked plaintext block depends on every bit of the original plaintext block. A subportion of the masked plaintext block is encrypted using the encryption algorithm to generate an encrypted portion of the masked plaintext block. A ciphertext block is generated from the thus encrypted portion of the masked plaintext block and the remaining portion of the masked plaintext block. The ciphertext block is transmitted to a data recipient, who reverses the procedure to recover the original plaintext block. Since the entire masked plaintext block is necessary to reconstruct the original plaintext block and since the encrypted portion cannot be derived from the remaining portion, the remaining portion of the masked plaintext block may be transmitted to the recipient in unencrypted form. Two, three or four masking rounds are performed, depending on the location of secret data that is infeasible to exhaust and the location of the portion of the masked block that is encrypted.
    • 一种使用块大小小于明文块的块大小的块加密算法来加密明文块的系统。 使用可选地依赖于附加数据的可逆变换将明文块变换成掩蔽的明文块,并且被定义为使得掩蔽的明文块的每个比特依赖于原始明文块的每一比特。 使用加密算法对掩蔽的明文块的子部分进行加密,以生成被掩蔽的明文块的加密部分。 从掩蔽的明文块的这样加密的部分和掩蔽的明文块的剩余部分生成密文块。 密文块被发送到数据接收者,数据接收者反转了恢复原始明文块的过程。 由于整个屏蔽的明文块对于重构原始明文块是必要的,并且由于加密部分不能从剩余部分导出,所以掩蔽的明文块的剩余部分可以以未加密的形式发送给接收者。 根据不可靠排气的秘密数据的位置和被加密的被屏蔽块的部分的位置,执行两个,三个或四个屏蔽轮。
    • 8. 发明授权
    • Method and apparatus for encrypting long blocks using a short-block
encryption procedure
    • 使用短块加密程序加密长块的方法和装置
    • US5870470A
    • 1999-02-09
    • US603771
    • 1996-02-20
    • Donald Byron JohnsonStephen Michael Matyas, Jr.
    • Donald Byron JohnsonStephen Michael Matyas, Jr.
    • G06F7/72G09C1/00H04L9/06H04L9/30H04K1/02
    • H04L9/0618G06F7/725H04L2209/046
    • A system for encrypting a plaintext block using a block encryption algorithm having a block size smaller than that of the plaintext block. The plaintext block is transformed into a masked plaintext block using an invertible transformation optionally dependent on additional data and defined such that each bit of the masked plaintext block depends on every bit of the original plaintext block. A subportion of the masked plaintext block is encrypted using the encryption algorithm to generate an encrypted portion of the masked plaintext block. A ciphertext block is generated from the thus encrypted portion of the masked plaintext block and the remaining portion of the masked plaintext block. The ciphertext block is transmitted to a data recipient, who reverses the procedure to recover the original plaintext block. Since the entire masked plaintext block is necessary to reconstruct the original plaintext block and since the encrypted portion cannot be derived from the remaining portion, the remaining portion of the masked plaintext block may be transmitted to the recipient in unencrypted form. To thwart certain cryptanalytic attacks, either the plaintext block or the optional additional data is uniquely modified for each encryption of a plaintext block, using an incrementing counter, time stamp, random number or other mechanism. In an exemplary embodiment, an elliptic curve algorithm having a block size on the order of 160 bits is used to encrypt a 512-bit block containing a symmetric encryption key.
    • 一种使用块大小小于明文块的块大小的块加密算法来加密明文块的系统。 使用可选地依赖于附加数据的可逆变换将明文块变换成掩蔽的明文块,并且被定义为使得掩蔽的明文块的每个比特依赖于原始明文块的每一比特。 使用加密算法对掩蔽的明文块的子部分进行加密,以生成被掩蔽的明文块的加密部分。 从掩蔽的明文块的这样加密的部分和掩蔽的明文块的剩余部分生成密文块。 密文块被发送到数据接收者,数据接收者反转了恢复原始明文块的过程。 由于整个屏蔽的明文块对于重构原始明文块是必要的,并且由于加密部分不能从剩余部分导出,所以掩蔽的明文块的剩余部分可以以未加密的形式发送给接收者。 为了阻止某些密码分析攻击,使用递增计数器,时间戳,随机数或其他机制,对明文块的每次加密,明文块或可选附加数据进行唯一修改。 在示例性实施例中,使用具有大约160位的块大小的椭圆曲线算法来加密包含对称加密密钥的512位块。
    • 9. 发明授权
    • Cryptographic system with masking
    • 带掩蔽的加密系统
    • US5768390A
    • 1998-06-16
    • US895713
    • 1997-07-17
    • Don CoppersmithDonald Byron JohnsonStephen Michael Matyas, Jr.
    • Don CoppersmithDonald Byron JohnsonStephen Michael Matyas, Jr.
    • H04L9/06H04K1/02H04K1/00H04K1/04H04K1/06H04L9/00
    • H04L9/0637H04L2209/046H04L2209/125
    • A system for cryptographically transforming a sequence of input blocks of plaintext or ciphertext data into corresponding sequence of output blocks of data while providing enhanced protection against cryptographic attacks. Each input block is enciphered using a first key to generate a first encryption product, which is combined with a first secret masking value generated independently of the input blocks to generate a masked first encryption product. Each masked first encryption product is then enciphered using a second key to generate a second encryption product, which is combined with a second secret masking value generated independently of the input blocks to generate a masked second encryption product. Finally, each masked second encryption result is enciphered using a third key to generate an output block corresponding to the input block.
    • 一种用于将明文或密文数据的输入块的序列密码变换成输出数据块的相应序列的系统,同时提供增强的针对加密攻击的保护。 使用第一密钥对每个输入块进行加密以产生第一加密产物,其与独立于输入块生成的第一秘密掩蔽值组合以生成被掩蔽的第一加密产物。 然后,使用第二密钥对每个被掩蔽的第一加密产品进行加密,以产生第二加密产品,该第二加密产品与独立于输入块生成的第二秘密掩蔽值组合以生成被掩蔽的第二加密产物。 最后,使用第三密钥对每个被掩蔽的第二加密结果进行加密,以产生与输入块相对应的输出块。