Deleting Confidential Information Used to Secure a Communication Link
    4.
    发明申请
    Deleting Confidential Information Used to Secure a Communication Link 有权
    删除用于保护通信链路的机密信息

    公开(公告)号:US20110321171A1

    公开(公告)日:2011-12-29

    申请号:US13229682

    申请日:2011-09-10

    IPC分类号: G06F21/00

    CPC分类号: G06F21/60 H04W12/02 H04W88/02

    摘要: A system includes a first wireless-enabled device that transparently stores confidential information and a second wireless-enabled device that stores the same confidential information. The confidential information is to be used to secure a wireless communication link between the first device and the second device. One or both of the first device and the second device is to delete the confidential information upon fulfillment of one or more conditions related to the communication link.

    摘要翻译: 系统包括透明地存储机密信息的第一无线功能设备和存储相同机密信息的第二无线功能设备。 机密信息将用于保护第一设备和第二设备之间的无线通信链路。 第一装置和第二装置中的一个或两个是在履行与通信链路相关的一个或多个条件时删除机密信息。

    Plural wirelessly connected devices with user alarm if wireless connection is lost or endangered
    5.
    发明申请
    Plural wirelessly connected devices with user alarm if wireless connection is lost or endangered 审中-公开
    无线连接丢失或濒危的多个无线连接设备,带有用户报警

    公开(公告)号:US20070167194A1

    公开(公告)日:2007-07-19

    申请号:US11331338

    申请日:2006-01-13

    IPC分类号: H04B1/38

    摘要: A portable wireless user communication device is wirelessly coupled to a second device over a monitored link. If the link is lost or endangered, then a user alarm is activated at the portable wireless user device and/or at the second device to which it is linked (which may also be a portable electronic device). The type of monitoring and/or the type of alarming may be user selectable.

    摘要翻译: 便携式无线用户通信设备通过被监视的链路无线耦合到第二设备。 如果链路丢失或濒危,则在便携式无线用户设备和/或与其链接的第二设备(其也可以是便携式电子设备)上激活用户警报。 监视类型和/或报警类型可以是用户可选择的。

    INCORPORATING DATA INTO AN ECDSA SIGNATURE COMPONENT
    7.
    发明申请
    INCORPORATING DATA INTO AN ECDSA SIGNATURE COMPONENT 有权
    将数据合并到ECDSA签名组件中

    公开(公告)号:US20130064363A2

    公开(公告)日:2013-03-14

    申请号:US13070226

    申请日:2011-03-23

    IPC分类号: H04L9/28 H04L9/30

    摘要: During generation of a signature on a message to create a signed message, a signer determines one of the signature components such that particular information can be extracted from the signature component. The particular information may be related to one or more of the signer and the message to be signed. After receiving a signed message purported to be signed by the signer, a verifier can extract the particular information from the signature component.

    摘要翻译: 在生成消息的签名以产生签名消息时,签名者确定签名组件中的一个,从而可以从签名组件提取特定信息。 特定信息可以与签名者和要签名的消息中的一个或多个有关。 在收到签名者签名的签名信息后,验证者可以从签名组件中提取特定信息。

    Answer To Reset (ATR) Pushing
    8.
    发明申请
    Answer To Reset (ATR) Pushing 有权
    应答复位(ATR)推

    公开(公告)号:US20120160909A1

    公开(公告)日:2012-06-28

    申请号:US13409053

    申请日:2012-02-29

    IPC分类号: G06F17/00

    摘要: A smart card reader receives an Answer to Reset (ATR) from a smart card and transmits the ATR over a communication link to a computing device without waiting for an ATR request from the computing device. The computing device may cache the ATR and use it for subsequent communication sessions with the smart card.

    摘要翻译: 智能卡读卡器从智能卡接收应答复位(ATR),并通过通信链路将ATR发送到计算设备,而不必等待来自计算设备的ATR请求。 计算设备可以缓存ATR并将其用于与智能卡的后续通信会话。

    SPECIFYING A SET OF FORBIDDEN PASSWORDS
    9.
    发明申请
    SPECIFYING A SET OF FORBIDDEN PASSWORDS 有权
    指定一组禁止密码

    公开(公告)号:US20110126262A1

    公开(公告)日:2011-05-26

    申请号:US13017314

    申请日:2011-01-31

    IPC分类号: G06F21/00

    CPC分类号: G06F21/46

    摘要: Various embodiments are described for providing password approval on a device. The password approval includes getting the user password, generating at least one symbolically equivalent password and then comparing the at least one symbolically equivalent password with at least one specified forbidden password. The user password is disapproved if one of the symbolically equivalent passwords corresponds to the at least one forbidden password.

    摘要翻译: 描述了用于在设备上提供密码批准的各种实施例。 密码批准包括获得用户密码,生成至少一个符号等效的密码,然后将至少一个符号等效的密码与至少一个指定的禁止密码进行比较。 如果符号相当的密码之一对应于至少一个禁止的密码,则用户密码被拒绝。