Challenge-Response Authentication Using a Masked Response Value
    3.
    发明申请
    Challenge-Response Authentication Using a Masked Response Value 有权
    使用掩蔽响应值进行挑战响应验证

    公开(公告)号:US20140153714A1

    公开(公告)日:2014-06-05

    申请号:US13691101

    申请日:2012-11-30

    Applicant: CERTICOM CORP.

    CPC classification number: H04L9/3271 H04L9/28 H04L9/3236 H04L2209/04 H04W12/06

    Abstract: Challenge-response authentication protocols are disclosed herein, including systems and methods for a first device to authenticate a second device. In one embodiment, the following operations are performed by the first device: (a) sending to the second device: (i) a challenge value corresponding to an expected response value known by the first device, and (ii) a hiding value; (b) receiving from the second device a masked response value; (c) obtaining an expected masked response value from the expected response value and the hiding value; and (d) determining whether the expected masked response value matches the masked response value received from the second device. The operations from the perspective of the second device are also disclosed, which in some embodiments include computing the masked response value using the challenge value, the hiding value, and secret information known to the second device.

    Abstract translation: 本文公开了挑战响应认证协议,包括用于第一设备认证第二设备的系统和方法。 在一个实施例中,以下操作由第一设备执行:(a)向第二设备发送:(i)对应于由第一设备已知的预期响应值的挑战值,以及(ii)隐藏值; (b)从第二设备接收被屏蔽的响应值; (c)从预期响应值和隐藏值获得预期屏蔽响应值; 以及(d)确定预期的屏蔽响应值是否与从第二设备接收到的屏蔽的响应值相匹配。 还公开了从第二设备的角度的操作,在一些实施例中,这些操作包括使用挑战值,隐藏值和第二设备已知的秘密信息来计算被屏蔽的响应值。

    System and method for operating pseudorandom generators

    公开(公告)号:US11310033B2

    公开(公告)日:2022-04-19

    申请号:US16431845

    申请日:2019-06-05

    Applicant: Certicom Corp.

    Abstract: A method for operating a pseudorandom generator is disclosed. The method may be implemented by a processor of a mobile computing device. The method includes: collecting raw sensor data from at least one sensor associated with the mobile computing device; selecting a subset of the raw sensor data; retrieving first representation representing accumulated entropy associated with one or more previously acquired raw sensor data sets for the at least one sensor; and generating a seed for a pseudorandom generator based on combining the first representation and the selected subset of raw sensor data.

    Challenge-response authentication using a masked response value

    公开(公告)号:US09727720B2

    公开(公告)日:2017-08-08

    申请号:US13690996

    申请日:2012-11-30

    Applicant: Certicom Corp.

    Abstract: Challenge-response authentication protocols are disclosed herein, including systems and methods for a first device to authenticate a second device. In one embodiment, the following operations are performed by the first device: (a) sending to the second device: (i) a challenge value corresponding to an expected response value known by the first device, and (ii) a hiding value; (b) receiving from the second device a masked response value; (c) obtaining an expected masked response value from the expected response value and the hiding value; and (d) determining whether the expected masked response value matches the masked response value received from the second device. The operations from the perspective of the second device are also disclosed, which in some embodiments include computing the masked response value using the challenge value, the hiding value, and secret information known to the second device.

    Challenge-response authentication using a masked response value
    8.
    发明授权
    Challenge-response authentication using a masked response value 有权
    使用屏蔽响应值进行挑战响应认证

    公开(公告)号:US09369290B2

    公开(公告)日:2016-06-14

    申请号:US13691101

    申请日:2012-11-30

    Applicant: Certicom Corp.

    CPC classification number: H04L9/3271 H04L9/28 H04L9/3236 H04L2209/04 H04W12/06

    Abstract: Challenge-response authentication protocols are disclosed herein, including systems and methods for a first device to authenticate a second device. In one embodiment, the following operations are performed by the first device: (a) sending to the second device: (i) a challenge value corresponding to an expected response value known by the first device, and (ii) a hiding value; (b) receiving from the second device a masked response value; (c) obtaining an expected masked response value from the expected response value and the hiding value; and (d) determining whether the expected masked response value matches the masked response value received from the second device. The operations from the perspective of the second device are also disclosed, which in some embodiments include computing the masked response value using the challenge value, the hiding value, and secret information known to the second device.

    Abstract translation: 本文公开了挑战响应认证协议,包括用于第一设备认证第二设备的系统和方法。 在一个实施例中,以下操作由第一设备执行:(a)向第二设备发送:(i)对应于由第一设备已知的预期响应值的挑战值,以及(ii)隐藏值; (b)从第二设备接收被屏蔽的响应值; (c)从预期响应值和隐藏值获得预期屏蔽响应值; 以及(d)确定预期的屏蔽响应值是否与从第二设备接收到的屏蔽的响应值相匹配。 还公开了从第二设备的角度的操作,在一些实施例中,这些操作包括使用挑战值,隐藏值和第二设备已知的秘密信息来计算被屏蔽的响应值。

    Verifying a Wireless Device
    9.
    发明申请
    Verifying a Wireless Device 有权
    验证无线设备

    公开(公告)号:US20140154975A1

    公开(公告)日:2014-06-05

    申请号:US13690001

    申请日:2012-11-30

    CPC classification number: H04W4/008 H04L63/0492 H04L63/126 H04W4/80 H04W12/10

    Abstract: In some aspects of what is described here, a first wireless device detects proximity of a second wireless device (e.g., by a Near Field Communication (NFC) interface or another type of interface). Based on detecting proximity of the second wireless device, the first wireless device generates a recommendation request from information received from the second wireless device. The first wireless device sends the recommendation request to a trusted authority and receives a response. The response includes the trusted authority's recommendation whether to trust the second wireless device. The first wireless device can determine whether to trust the second wireless device based on the recommendation.

    Abstract translation: 在这里描述的一些方面,第一无线设备检测第二无线设备的接近(例如,通过近场通信(NFC)接口或另一类型的接口)。 基于检测到第二无线设备的接近度,第一无线设备从从第二无线设备接收的信息生成推荐请求。 第一无线设备将推荐请求发送到可信管理机构并接收响应。 响应包括可信管理机构的建议是否信任第二个无线设备。 第一无线设备可以基于推荐来确定是否信任第二无线设备。

Patent Agency Ranking