会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明授权
    • Serial architecture for high assurance processing
    • 用于高保证处理的串行架构
    • US08499163B2
    • 2013-07-30
    • US12713409
    • 2010-02-26
    • Gerardo OrlandoDavid R. KingMark KrumpochEvan Custodio
    • Gerardo OrlandoDavid R. KingMark KrumpochEvan Custodio
    • H04L29/06
    • H04L9/3239H04L2209/38
    • A processing system (60) includes an input interface (62), a first processor (64), a second processor (66), and an output interface (68) arranged in a serial configuration. Each of the input interface (62), first processor (64), second processor (66), and output interface (68) computes a digest (92, 100, 110, and 114) using information, e.g., a unique parameter (94, 102, 112, 118), known only by that element (62, 64, 66, 68) and using information generated by that element (62, 64, 66, 68). The digests (92, 100, 110, and 114) are used to validate the integrity of payload data (86) processed by the system (60) to form processed data (104) and the system (60) only outputs the processed data (104) upon validation of data integrity. The serial configuration of system (60) may be implemented to provide high bit rate, redundant cryptographic services.
    • 处理系统(60)包括以串行配置布置的输入接口(62),第一处理器(64),第二处理器(66)和输出接口(68)。 输入接口(62),第一处理器(64),第二处理器(66)和输出接口(68)中的每一个使用诸如唯一参数(94)的信息来计算摘要(92,100,110和114) ,102,112,118),其仅由该元件(62,64,66,68)知道并使用由该元件(62,64,66,68)生成的信息。 摘要(92,100,110和114)用于验证由系统(60)处理的有效载荷数据(86)的完整性以形成处理的数据(104),并且系统(60)仅输出处理后的数据 104)验证数据完整性。 可以实现系统(60)的串行配置以提供高比特率冗余加密服务。
    • 4. 发明申请
    • SERIAL ARCHITECTURE FOR HIGH ASSURANCE PROCESSING
    • 用于高保证加工的串行结构
    • US20110213984A1
    • 2011-09-01
    • US12713409
    • 2010-02-26
    • Gerardo OrlandoDavid R. KingMark KrumpochEvan Custodio
    • Gerardo OrlandoDavid R. KingMark KrumpochEvan Custodio
    • H04L9/32
    • H04L9/3239H04L2209/38
    • A processing system (60) includes an input interface (62), a first processor (64), a second processor (66), and an output interface (68) arranged in a serial configuration. Each of the input interface (62), first processor (64), second processor (66), and output interface (68) computes a digest (92, 100, 110, and 114) using information, e.g., a unique parameter (94, 102, 112, 118), known only by that element (62, 64, 66, 68) and using information generated by that element (62, 64, 66, 68). The digests (92, 100, 110, and 114) are used to validate the integrity of payload data (86) processed by the system (60) to form processed data (104) and the system (60) only outputs the processed data (104) upon validation of data integrity. The serial configuration of system (60) may be implemented to provide high bit rate, redundant cryptographic services.
    • 处理系统(60)包括以串行配置布置的输入接口(62),第一处理器(64),第二处理器(66)和输出接口(68)。 输入接口(62),第一处理器(64),第二处理器(66)和输出接口(68)中的每一个使用诸如唯一参数(94)的信息来计算摘要(92,100,110和114) ,102,112,118),其仅由该元件(62,64,66,68)知道并使用由该元件(62,64,66,68)生成的信息。 摘要(92,100,110和114)用于验证由系统(60)处理的有效载荷数据(86)的完整性以形成处理的数据(104),并且系统(60)仅输出处理的数据( 104)验证数据完整性。 可以实现系统(60)的串行配置以提供高比特率冗余加密服务。
    • 6. 发明授权
    • Reliable elliptic curve cryptography computation
    • 可靠的椭圆曲线加密计算
    • US07742596B2
    • 2010-06-22
    • US11158635
    • 2005-06-21
    • Gerardo Orlando
    • Gerardo Orlando
    • H04L9/00
    • G06F7/725G06F2207/7228H04L9/3066
    • A method for reliable computation of point additions and point multiplications in an elliptic curve cryptography (ECC) system. Two asymmetric operations are performed: one of the operations is of slightly higher complexity than a conventional ECC operation, and the other operation is of much lower complexity than the first operation. The complexity of the second operation is a function of the desired degree of reliability, or the desired probability of failure detection. The method validates a computation involving one or more points on a specified elliptic curve by selecting a second elliptic curve, deriving a third elliptic curve from the specified and selected curves, projecting points onto the derived curve, performing a computation on the derived curve involving the projected points, validating the computation on the selected curve, extracting from the computation on the derived curve a predicted result of the computation on the selected curve, and comparing the predicted result to the computation on the selected curve. A predicted result of the computation to be validated may then be extracted from the computation on the derived curve. The predicted result is compared to an actual result of a computation on the selected curve, and if the results match, the predicted result of the computation performed on the selected curve is validated.
    • 一种用于在椭圆曲线密码(ECC)系统中可靠计算点加法和点乘法的方法。 执行两个不对称操作:其中一个操作比常规ECC操作复杂度稍高,而另一个操作比第一操作复杂度低得多。 第二操作的复杂性是期望的可靠度或故障检测概率的函数。 该方法通过选择第二椭圆曲线来确定涉及指定椭圆曲线上的一个或多个点的计算,从指定和选择的曲线导出第三椭圆曲线,将点投影到导出的曲线上,对导出的曲线进行计算 投影点,验证所选曲线上的计算,从导出曲线的计算中提取所选曲线上的计算结果,并将预测结果与所选曲线上的计算进行比较。 然后可以从导出曲线的计算中提取要验证的计算的预测结果。 将预测结果与所选曲线上的实际计算结果进行比较,如果结果相符,则对所选曲线执行的计算的预测结果进行验证。
    • 8. 发明授权
    • Reliable elliptic curve cryptography computation
    • 可靠的椭圆曲线加密计算
    • US08155307B2
    • 2012-04-10
    • US12774594
    • 2010-05-05
    • Gerardo Orlando
    • Gerardo Orlando
    • G06F21/00
    • G06F7/725G06F2207/7228H04L9/3066
    • A method for reliable computation of point additions and point multiplications in an elliptic curve cryptography (ECC) system. Two asymmetric operations are performed: one of the operations is of slightly higher complexity than a conventional ECC operation, and the other operation is of much lower complexity than the first operation. The complexity of the second operation is a function of the desired degree of reliability, or the desired probability of failure detection. The method validates a computation involving one or more points on a specified elliptic curve by selecting a second elliptic curve, deriving a third elliptic curve from the specified and selected curves, projecting points onto the derived curve, performing a computation on the derived curve involving the projected points, validating the computation on the selected curve, extracting from the computation on the derived curve a predicted result of the computation on the selected curve, and comparing the predicted result to the computation on the selected curve. A predicted result of the computation to be validated may then be extracted from the computation on the derived curve. The predicted result is compared to an actual result of a computation on the selected curve, and if the results match, the predicted result of the computation performed on the selected curve is validated.
    • 一种用于在椭圆曲线密码(ECC)系统中可靠计算点加法和点乘法的方法。 执行两个不对称操作:其中一个操作比常规ECC操作复杂度稍高,而另一个操作比第一操作复杂度低得多。 第二操作的复杂性是期望的可靠度或故障检测概率的函数。 该方法通过选择第二椭圆曲线来确定涉及指定椭圆曲线上的一个或多个点的计算,从指定和选择的曲线导出第三椭圆曲线,将点投影到导出的曲线上,对导出的曲线进行计算 投影点,验证所选曲线上的计算,从导出曲线的计算中提取所选曲线上的计算结果,并将预测结果与所选曲线上的计算进行比较。 然后可以从导出曲线的计算中提取要验证的计算的预测结果。 将预测结果与所选曲线上的实际计算结果进行比较,如果结果相符,则对所选曲线执行的计算的预测结果进行验证。
    • 9. 发明申请
    • Reliable elliptic curve cryptography computation
    • 可靠的椭圆曲线加密计算
    • US20060045262A1
    • 2006-03-02
    • US11158635
    • 2005-06-21
    • Gerardo Orlando
    • Gerardo Orlando
    • H04L9/28H04K1/00H04L9/00
    • G06F7/725G06F2207/7228H04L9/3066
    • A method for reliable computation of point additions and point multiplications in an elliptic curve cryptography (ECC) system. Two asymmetric operations are performed: one of the operations is of slightly higher complexity than a conventional ECC operation, and the other operation is of much lower complexity than the first operation. The complexity of the second operation is a function of the desired degree of reliability, or the desired probability of failure detection. The method validates a computation involving one or more points on a specified elliptic curve by selecting a second elliptic curve, deriving a third elliptic curve from the specified and selected curves, projecting points onto the derived curve, performing a computation on the derived curve involving the projected points, validating the computation on the selected curve, extracting from the computation on the derived curve a predicted result of the computation on the selected curve, and comparing the predicted result to the computation on the selected curve. A predicted result of the computation to be validated may then be extracted from the computation on the derived curve. The predicted result is compared to an actual result of a computation on the selected curve, and if the results match, the predicted result of the computation performed on the selected curve is validated.
    • 一种用于在椭圆曲线密码(ECC)系统中可靠计算点加法和点乘法的方法。 执行两个不对称操作:其中一个操作比常规ECC操作复杂度稍高,而另一个操作比第一操作复杂度低得多。 第二操作的复杂性是期望的可靠度或故障检测概率的函数。 该方法通过选择第二椭圆曲线来确定涉及指定椭圆曲线上的一个或多个点的计算,从指定和选择的曲线导出第三椭圆曲线,将点投影到导出的曲线上,对导出的曲线进行计算 投影点,验证所选曲线上的计算,从导出曲线的计算中提取所选曲线上的计算结果,并将预测结果与所选曲线上的计算进行比较。 然后可以从导出曲线的计算中提取要验证的计算的预测结果。 将预测结果与所选曲线上的实际计算结果进行比较,如果结果相符,则对所选曲线执行的计算的预测结果进行验证。