Techniques for negotiation of security policies in wireless mesh networks
    3.
    发明授权
    Techniques for negotiation of security policies in wireless mesh networks 失效
    无线网状网络中安全策略协商的技术

    公开(公告)号:US08037510B2

    公开(公告)日:2011-10-11

    申请号:US11857349

    申请日:2007-09-18

    IPC分类号: G06F7/04 G06F17/30

    摘要: Techniques to overlay ciphersuite negotiation on top of the mesh link establishment protocol without sacrificing security. Two cryptographic primitives may be utilized: (1) a message integrity code, which is denoted as mK, where K is an authentication key (mK may be utilized to detect forged messages); and (2) a cryptographic random number generator, which will be denoted as rng. The techniques may use rng to produce values that cannot be predicted by any polynomial time algorithm.

    摘要翻译: 在网络链路建立协议之上覆盖密码协商的技术,而不牺牲安全性。 可以使用两个加密原语:(1)消息完整性代码,其被表示为mK,其中K是认证密钥(mK可用于检测伪造的消息); 和(2)密码随机数生成器,其将被表示为rng。 这些技术可以使用rng来产生不能被任何多项式时间算法预测的值。

    Techniques for key derivation for secure communication in wireless mesh networks
    4.
    发明授权
    Techniques for key derivation for secure communication in wireless mesh networks 有权
    用于无线网状网络中安全通信的密钥导出技术

    公开(公告)号:US09049592B2

    公开(公告)日:2015-06-02

    申请号:US11857345

    申请日:2007-09-18

    IPC分类号: H04L9/08 H04W12/04 H04W84/18

    摘要: Key derivation procedures and key hierarchies compatible with the mesh link establishment protocol for use in a mesh network. A single cryptographic primitive may be utilized, which is a key derivation function, denoted as kdfK, where K is a cached pairwise master key. The result of the function kdfK may be used to derive the keys used to secure both link establishment and the data subsequently exchanged over the link.

    摘要翻译: 密钥导出过程和与网状网络建立协议兼容的密钥层次结构,用于网状网络。 可以使用单个加密原语,其是密钥导出函数,表示为kdfK,其中K是缓存的成对主密钥。 函数kdfK的结果可以用于导出用于确保链路建立和随后通过链路交换的数据的密钥。

    TECHNIQUES FOR NEGOTIATION OF SECURITY POLICIES IN WIRELESS MESH NETWORKS
    5.
    发明申请
    TECHNIQUES FOR NEGOTIATION OF SECURITY POLICIES IN WIRELESS MESH NETWORKS 失效
    无线网络安全政策谈判技术

    公开(公告)号:US20080069351A1

    公开(公告)日:2008-03-20

    申请号:US11857349

    申请日:2007-09-18

    摘要: Techniques to overlay ciphersuite negotiation on top of the mesh link establishment protocol without sacrificing security. Two cryptographic primitives may be utilized: (1) a message integrity code, which is denoted as mK, where K is an authentication key (mK may be utilized to detect forged messages); and (2) a cryptographic random number generator, which will be denoted as rng. The techniques may use rng to produce values that cannot be predicted by any polynomial time algorithm.

    摘要翻译: 在网络链路建立协议之上覆盖密码协商的技术,而不牺牲安全性。 可以使用两个加密原语:(1)消息完整性代码,其被表示为m K,其中K是认证密钥(m≠K)可用于检测 伪造消息); 和(2)密码随机数生成器,其将被表示为rng。 这些技术可以使用rng来产生不能被任何多项式时间算法预测的值。

    System and method for correct execution of software based on baseline and real time information
    6.
    发明授权
    System and method for correct execution of software based on baseline and real time information 有权
    基于基线和实时信息正确执行软件的系统和方法

    公开(公告)号:US09003236B2

    公开(公告)日:2015-04-07

    申请号:US13631317

    申请日:2012-09-28

    IPC分类号: G06F11/00 G06F11/34

    摘要: In an embodiment of the invention an application provider may include “tracing elements” in a target software application. While working with the application the trace elements are detected and provide a “baseline trace” indicating proper application execution. The provider then supplies the application, which still includes the trace elements, and the baseline trace to a user. The user operates the application to produce a “real-time trace” based on the application still having trace elements that produce trace events. A comparator then compares the baseline and real-time traces. If the traces are within a pre-determined range of each other the user has a level of assurance the software is operating correctly. If the level of assurance is low, an embodiment may trigger a hardware interrupt or similar event to prevent further execution of software. Other embodiments are described herein.

    摘要翻译: 在本发明的实施例中,应用提供者可以在目标软件应用中包括“跟踪元素”。 在处理应用程序时,将检测到跟踪元素,并提供一个“基线跟踪”,指示正确的应用程序执行。 然后,提供商将仍然包含跟踪元素的应用程序和基准跟踪提供给用户。 用户根据仍然具有产生跟踪事件的微量元素的应用来操作应用以产生“实时跟踪”。 比较器然后比较基线和实时迹线。 如果迹线在彼此的预定范围内,则用户具有软件正确操作的保证级别。 如果保证级别低,则实施例可以触发硬件中断或类似事件以防止进一步执行软件。 本文描述了其它实施例。

    BARCODE AUTHENTICATION FOR RESOURCE REQUESTS
    8.
    发明申请
    BARCODE AUTHENTICATION FOR RESOURCE REQUESTS 有权
    BARCODE认证资源要求

    公开(公告)号:US20140230039A1

    公开(公告)日:2014-08-14

    申请号:US13763116

    申请日:2013-02-08

    IPC分类号: G06F21/35

    摘要: Mobile device, client device and server associated with client-server authentication are described. In embodiments, the mobile device may comprise a camera and a token extractor. The token extractor may be coupled to the camera and configured to analyze an image, captured by the camera. The captured image may contain a barcode and may be displayed on a client device in response to a request of a server for access to a resource. The barcode may contain a token, which may be extracted by the token extractor to be used to gain access to a resource requested from a server. Other embodiments may be described and/or claimed.

    摘要翻译: 描述了与客户机 - 服务器认证相关联的移动设备,客户端设备和服务器。 在实施例中,移动设备可以包括相机和令牌提取器。 令牌提取器可以耦合到相机并且被配置为分析由相机捕获的图像。 捕获的图像可以包含条形码,并且可以响应于服务器访问资源的请求而在客户端设备上显示。 条形码可以包含令牌,其可以由令牌提取器提取以被用于获得对从服务器请求的资源的访问。 可以描述和/或要求保护其他实施例。

    APPARATUS AND METHOD FOR SKEIN HASHING
    9.
    发明申请
    APPARATUS AND METHOD FOR SKEIN HASHING 有权
    装置和方法进行滑雪

    公开(公告)号:US20120328097A1

    公开(公告)日:2012-12-27

    申请号:US13165269

    申请日:2011-06-21

    IPC分类号: H04L9/28

    摘要: Described herein are an apparatus and method for Skein hashing. The apparatus comprises a block cipher operable to receive an input data and to generate a hashed output data by applying Unique Block Iteration (UBI) modes, the block cipher comprising at least two mix and permute logic units which are pipelined by registers; and a counter, coupled to the block cipher, to determine a sequence of the UBI modes and to cause the block cipher to process at least two input data simultaneously for generating the hashed output data.

    摘要翻译: 这里描述了用于Skein散列的装置和方法。 该装置包括可以用于接收输入数据并通过应用唯一块迭代(UBI)模式来产生散列输出数据的块密码,所述块密码包括由寄存器流水线化的至少两个混合和置换逻辑单元; 以及耦合到所述块密码的计数器,以确定所述UBI模式的序列,并且使所述块密码同时处理至少两个输入数据以产生所述散列输出数据。

    END-TO-END NETWORK SECURITY WITH TRAFFIC VISIBILITY
    10.
    发明申请
    END-TO-END NETWORK SECURITY WITH TRAFFIC VISIBILITY 审中-公开
    具有交通可见性的端到端网络安全

    公开(公告)号:US20120096270A1

    公开(公告)日:2012-04-19

    申请号:US13337919

    申请日:2011-12-27

    IPC分类号: H04L9/32

    摘要: End-to-end security between clients and a server, and traffic visibility to intermediate network devices, achieved through combined mode, single pass encryption and authentication using two keys is disclosed. In various embodiments, a combined encryption-authentication unit includes a cipher unit and an authentication unit coupled in parallel to the cipher unit, and generates an authentication tag using an authentication key in parallel with the generation of the cipher text using an encryption key, where the authentication and encryption key have different key values. In various embodiments, the cipher unit operates in AES counter mode, and the authentication unit operates in parallel, in AES-GMAC mode Using a two key, single pass combined mode algorithm preserves network performance using a limited number of HW gates, while allowing an intermediate device access to the encryption key for deciphering the data, without providing that device the ability to compromise data integrity, which is preserved between the end to end devices.

    摘要翻译: 公开了客户机与服务器之间的端到端安全性,以及通过组合模式,单程加密和使用两个密钥的认证实现的对中间网络设备的流量可见性。 在各种实施例中,组合加密认证单元包括与密码单元并行耦合的密码单元和认证单元,并且使用加密密钥与密文生成并行地使用认证密钥生成认证标签,其中 认证和加密密钥具有不同的密钥值。 在各种实施例中,密码单元以AES计数器模式运行,并且认证单元以AES-GMAC模式并行操作。使用双键单通组合模式算法使用有限数量的HW门保留网络性能,同时允许 中间设备访问用于解密数据的加密密钥,而不提供该设备损害数据完整性的能力,这在端到端设备之间保留。