Traceable method and system for encrypting and/or decrypting data, and recording media for implementing the method
    1.
    发明授权
    Traceable method and system for encrypting and/or decrypting data, and recording media for implementing the method 有权
    用于加密和/或解密数据的可跟踪方法和系统,以及用于实现该方法的记录介质

    公开(公告)号:US07697680B2

    公开(公告)日:2010-04-13

    申请号:US10560429

    申请日:2004-06-02

    IPC分类号: H04L9/28

    摘要: A traceable method for encrypting and/or decrypting data broadcast by at least one transmitter towards several decoders includes the steps: during encryption of broadcast data, the transmitter implements (in 86) at least one first secret function to transform an unencrypted message into an encrypted message; and during decryption of the broadcast data, all the decoders implement (in 92) at least one common second secret function, each decoder using therefor a mathematical description of the second function stored in a memory (21), the mathematical description of the second function being different from one decoder to another or from one group of decoders to another such that the mathematical description used identifies exclusively the particular decoder or group of decoders.

    摘要翻译: 用于加密和/或解密由至少一个发射机向多个解码器广播的数据的可跟踪方法包括以下步骤:在广播数据的加密期间,发射机实现(86)至少一个第一秘密功能,以将未加密的消息转换成加密的 信息; 并且在解密广播数据期间,所有解码器(在92中)实现至少一个共同的第二秘密功能,每个解码器使用存储器(21)中存储的第二功能的数学描述,第二功能的数学描述 不同于一个解码器到另一个解码器或从一组解码器到另一个解码器,使得所使用的数学描述专门识别特定解码器或解码器组。

    Method for Controlling Secure Transactions Using a Single Multiple Dual-Key Device, Corresponding Physical Deivce, System and Computer Program
    2.
    发明申请
    Method for Controlling Secure Transactions Using a Single Multiple Dual-Key Device, Corresponding Physical Deivce, System and Computer Program 审中-公开
    使用单个多重双键设备控制安全事务的方法,相应的物理设备,系统和计算机程序

    公开(公告)号:US20080250246A1

    公开(公告)日:2008-10-09

    申请号:US11996179

    申请日:2006-07-18

    IPC分类号: H04L9/06

    CPC分类号: H04L9/3263 H04L2209/56

    摘要: A device is provided for controlling secure transactions using a physical device held by a user and bearing at least one first pair of asymmetric keys, including a first device public key and a first corresponding device private key. The control includes, prior to implementing the device, certifying a first device public key and characteristics data of the physical device by signing with a first certification key, delivering a factory certificate, after verifying that the device private key is housed in a tamper-proof zone of the physical device. At least one second pair of asymmetric keys is generated, including a second device public key and a second device private key housed in a tamper-proof zone of the device. A second device public key is certified by signing with at least the first device private key, delivering a provisional certificate. The factory and provisional certificate are verified using, respectively, a second certification key corresponding to the first certification key, and the first device public key. In case of positive verification, the method includes delivering by a trusted third party a device certificate corresponding to the signature by the provider at least the second device public key and an identifier of the user and the characteristic data of the device.

    摘要翻译: 提供了一种用于使用由用户持有的物理设备来控制安全事务并且承载至少一个第一对非对称密钥(包括第一设备公钥和第一对应设备私钥)的设备。 该控制包括在实施该设备之前,在验证设备私钥被容纳在防篡改中之后,通过使用第一认证密钥进行签名来验证物理设备的第一设备公钥和特征数据,以交付工厂证书 物理设备的区域。 产生至少一个第二对非对称密钥,包括第二设备公钥和容纳在设备的防篡改区域中的第二设备私钥。 第二个设备公钥通过至少使用第一个设备私钥进行签名,提供临时证书。 分别使用与第一认证密钥对应的第二认证密钥和第一设备公钥来验证工厂和临时证书。 在正确验证的情况下,该方法包括至少由第二设备公钥和用户的标识符以及设备的特征数据来由可信任的第三方递送与提供者的签名相对应的设备证书。

    Method for Assigning an Authentication Certificate and Infrastructure for Assigning Said Certificate
    4.
    发明申请
    Method for Assigning an Authentication Certificate and Infrastructure for Assigning Said Certificate 审中-公开
    分配认证证书和基础设施以分配所述证书的方法

    公开(公告)号:US20070283426A1

    公开(公告)日:2007-12-06

    申请号:US11660543

    申请日:2005-08-05

    IPC分类号: H04L9/32

    摘要: This method provides for electronic certificate assignment in a certificate assignment infrastructure distributed in a network. The infrastructure includes at least one certificate server, an identity server and a registration server linked to the network. Prior to a certificate application request, information relating to the identity of a certificate applicant is stored in the identity server, the identity information being accessible by way of an identifier. In this method, an applicant requests a certificate from the registration server; the identifier is dispatched to the identity server; after verification of the identifier, the identity server dispatches the previously registered identity of the applicant, said identity being provided to the registration server; after receipt of the identity, the registration server dispatches a certificate request including the identity of the applicant to the certificate server, and the certificate server dispatches the certificate destined for the applicant.

    摘要翻译: 该方法提供分布在网络中的证书分配基础中的电子证书分配。 基础设施包括至少一个证书服务器,身份服务器和链接到网络的注册服务器。 在证书申请请求之前,与证书申请人的身份有关的信息存储在身份服务器中,身份信息可通过标识符来访问。 在该方法中,申请人从注册服务器请求证书; 标识符被分派到身份服务器; 身份服务器在验证了该标识符之后,发送申请人先前注册的身份,所述身份被提供给注册服务器; 在收到身份后,注册服务器将包含申请人身份的证书请求发送到证书服务器,证书服务器发送发往申请人的证书。

    Traceable method and system for encrypting and/or decrypting data, and recording media therefor
    5.
    发明申请
    Traceable method and system for encrypting and/or decrypting data, and recording media therefor 有权
    用于加密和/或解密数据的可跟踪方法和系统,以及记录媒体

    公开(公告)号:US20060153377A1

    公开(公告)日:2006-07-13

    申请号:US10560429

    申请日:2004-06-02

    IPC分类号: H04N7/167

    摘要: A traceable method for encrypting and/or decrypting data broadcast by at least one transmitter towards several decoders includes the steps: during encryption of broadcast data, the transmitter implements (in 86) at least one first secret function to transform an unencrypted message into an encrypted message; and during decryption of the broadcast data, all the decoders implement (in 92) at least one common second secret function, each decoder using therefor a mathematical description of the second function stored in a memory (21), the mathematical description of the second function being different from one decoder to another or from one group of decoders to another such that the mathematical description used identifies exclusively the particular decoder or group of decoders.

    摘要翻译: 用于加密和/或解密由至少一个发射机向多个解码器广播的数据的可跟踪方法包括以下步骤:在广播数据的加密期间,发射机实现(86)至少一个第一秘密功能,以将未加密的消息转换成加密的 信息; 并且在解密广播数据期间,所有解码器(在92中)实现至少一个共同的第二秘密功能,每个解码器使用存储器(21)中存储的第二功能的数学描述,第二功能的数学描述 不同于一个解码器到另一个解码器或从一组解码器到另一个解码器,使得所使用的数学描述专门识别特定解码器或解码器组。

    Public key identification process using two hash functions
    6.
    发明授权
    Public key identification process using two hash functions 失效
    公钥识别过程使用两个哈希函数

    公开(公告)号:US6125445A

    公开(公告)日:2000-09-26

    申请号:US76818

    申请日:1998-05-13

    IPC分类号: H04L9/32 H04L9/00

    CPC分类号: H04L9/3236 H04L9/3218

    摘要: A process for the identification of a claimant by a verifier. The process is of the public key type, where the public exponent is equal to 3. The claimant draws at random a first exponent .alpha., calculates r=g.sup..alpha. mod n and transmits R=r.sup.3. The verifier draws at random a second exponent .beta., calculates t=g.sup..beta. mod n, calculates T=t.sup.3 mod n and h=H.sub.1 (Z), where H.sub.1 is a hash function, and calculates Z=R.sup.3 mod n. The verifier transmits to the claimant the numbers T and h. The claimant calculates Y=T.sup..alpha. mod n, verifies the result H.sub.1 (Y), calculates H=H.sub.2 (Y), where H.sub.2 is another hash function, calculates z=rS mod n, and transmits z and H. The claimant also has a secret number S equal to the modulo n cubic root of a number I deduced from its identity so that the number S verifies S.sup.3 =I mod n. The verifier verifies that H received is equal to H.sub.2 (Z) and that z.sup.3 is equal to RI mod n.

    摘要翻译: 验证者识别索赔人的过程。 该过程是公钥类型,其中公共指数等于3.索赔人随机抽取第一指数α,计算r = g alpha mod n并发送R = r3。 验证者随机抽取第二指数β,计算t = g beta mod n,计算T = t3 mod n和h = H1(Z),其中H1是散列函数,并计算Z = R3 mod n。 验证者向索赔人传送号码T和h。 索赔人计算Y = Tαmod n,验证结果H1(Y),计算H = H2(Y),其中H2是另一个哈希函数,计算z = rS mod n,并发送z和H.索赔人也有 秘密数S等于从其身份推断的数字的模n立方根,使得数S验证S3 = I mod n。 验证者验证H接收等于H2(Z),并且z3等于RI mod n。

    Process for the dissimulaton of a secret code in a data authentication
device
    7.
    发明授权
    Process for the dissimulaton of a secret code in a data authentication device 失效
    用于在数据认证设备中解密密码的过程

    公开(公告)号:US5894519A

    公开(公告)日:1999-04-13

    申请号:US838646

    申请日:1997-04-09

    摘要: A process for the dissimulation of concealment of a secret code in a data authentication device by encrypting the secret code by an encrypting function for forming an image of the secret code and storing the secret code image in the authentication device. Beforehand, an encrypting function is chosen such that with each stored secret code image corresponds a plurality of antecedent codes all differing from the secret code, but which, once encrypted by the encrypting function have an image identical to that of the secret code. The secret code of a user has an authentication device in which is stored the secret code image.

    摘要翻译: 一种用于通过用于形成秘密码的图像的加密功能加密秘密码并将该秘密码图像存储在认证装置中来隐藏数据认证装置中的秘密码的隐藏的过程。 之前,选择加密功能,使得每个存储的密码图像对应于与密码不同的多个先行代码,但是一旦由加密函数加密,其具有与密码相同的图像。 用户的秘密码具有存储秘密码图像的认证装置。

    Cryptographic process for protection against fraud
    8.
    发明授权
    Cryptographic process for protection against fraud 失效
    用于防范欺诈的加密过程

    公开(公告)号:US5862224A

    公开(公告)日:1999-01-19

    申请号:US731488

    申请日:1996-10-16

    IPC分类号: G07F7/10 H04L9/00

    摘要: A cryptographic process is for protection against fraud. An allocation of a secret key K is made to a card and to an application and an input value R is defined. The card and application calculate the modulo 2 scalar product of binary vectors constituted by words of R and words of K. The application checks whether the result obtained by the card is in agreement with its own result. An exemplary application is low cost cards.

    摘要翻译: 加密过程是防止欺诈。 对卡和应用进行秘密密钥K的分配,并且定义输入值R. 卡和应用程序计算由R的单词和K组成的二进制向量的模2标量乘积。应用程序检查卡获得的结果是否与其自身的结果一致。 示例性应用是低成本卡。

    Electronic group signature method with revocable anonymity, equipment and programs for implementing the method
    10.
    发明授权
    Electronic group signature method with revocable anonymity, equipment and programs for implementing the method 失效
    具有可撤销匿名性的电子组签名方法,用于实施该方法的设备和程序

    公开(公告)号:US07526651B2

    公开(公告)日:2009-04-28

    申请号:US10848943

    申请日:2004-05-19

    IPC分类号: H04L9/00

    CPC分类号: H04L9/3255 H04L2209/42

    摘要: A ring-signature scheme is adapted so that at least one of the variability parameter values used is an identity trace of the anonymous signatory, determined as a function of anonymity withdrawal data stored and held secret by an anonymity withdrawal entity in connection with an identification of the anonymous signatory. This provides a subsequent controlled capacity of withdrawing the anonymity of the signatory, either by an authority, or by the signatory himself.

    摘要翻译: 环形签名方案被改编成使得所使用的可变性参数值中的至少一个是匿名签名者的身份痕迹,该身份痕迹被确定为由匿名提款实体存储和保密的匿名提取数据的函数, 匿名签字人 这提供了随后由管理机构或签字人本人撤回签字人匿名的受控能力。