Hash functions using recurrency and arithmetic
    1.
    发明授权
    Hash functions using recurrency and arithmetic 失效
    散列函数使用循环和算术

    公开(公告)号:US08225100B2

    公开(公告)日:2012-07-17

    申请号:US12263293

    申请日:2008-10-31

    IPC分类号: H04L29/06

    摘要: Aspects relate to systems and methods for implementing a hash function using a stochastic and recurrent process, and performing arithmetic operations during the recurrence on portions of a message being hashed. In an example method, the stochastic process is a Galton-Watson process, the message is decomposed into blocks, and the method involves looping for a number of blocks in the message. In each loop, a current hash value is determined based on arithmetic performed on a previous hash value and some aspect of a current block. The arithmetic performed can involve modular arithmetic, such as modular addition and exponentiation. The algorithm can be adjusted to achieve qualities including a variable length output, or to perform fewer or more computations for a given hash. Also, randomizing elements can be introduced into the arithmetic, avoiding a modular reduction until final hash output production.

    摘要翻译: 方面涉及用于使用随机和复现过程来实现散列函数的系统和方法,以及在散列的消息的部分上的重复期间执行算术运算。 在一个示例方法中,随机过程是Galton-Watson过程,消息被分解成块,并且该方法涉及在消息中循环多个块。 在每个循环中,基于对先前哈希值和当前块的某个方面执行的算术来确定当前哈希值。 执行的算术可以涉及模数运算,例如模块加法和乘法运算。 可以调整算法以实现包括可变长度输出的质量,或者为给定散列执行更少或更多的计算。 此外,可以将随机化元素引入算术,避免模块化减少直到最终哈希输出生成。

    HASH FUNCTIONS USING RECURRENCY AND ARITHMETIC
    2.
    发明申请
    HASH FUNCTIONS USING RECURRENCY AND ARITHMETIC 失效
    使用回归和算术的HASH函数

    公开(公告)号:US20100115230A1

    公开(公告)日:2010-05-06

    申请号:US12263293

    申请日:2008-10-31

    IPC分类号: G06F12/08

    摘要: Aspects relate to systems and methods for implementing a hash function using a stochastic and recurrent process, and performing arithmetic operations during the recurrence on portions of a message being hashed. In an example method, the stochastic process is a Galton-Watson process, the message is decomposed into blocks, and the method involves looping for a number of blocks in the message. In each loop, a current hash value is determined based on arithmetic performed on a previous hash value and some aspect of a current block. The arithmetic performed can involve modular arithmetic, such as modular addition and exponentiation. The algorithm can be adjusted to achieve qualities including a variable length output, or to perform fewer or more computations for a given hash. Also, randomizing elements can be introduced into the arithmetic, avoiding a modular reduction until final hash output production.

    摘要翻译: 方面涉及用于使用随机和复现过程来实现散列函数的系统和方法,以及在散列的消息的部分上的重复期间执行算术运算。 在一个示例方法中,随机过程是Galton-Watson过程,消息被分解成块,并且该方法涉及在消息中循环多个块。 在每个循环中,基于对先前哈希值和当前块的某个方面执行的算术来确定当前哈希值。 执行的算术可以涉及模数运算,例如模块加法和乘法运算。 可以调整算法以实现包括可变长度输出的质量,或者为给定散列执行更少或更多的计算。 此外,可以将随机化元素引入算术,避免模块化减少直到最终哈希输出生成。

    SCHEME FOR AUTHENTICATING WITHOUT PASSWORD EXCHANGE
    3.
    发明申请
    SCHEME FOR AUTHENTICATING WITHOUT PASSWORD EXCHANGE 审中-公开
    没有密码交换的认证方案

    公开(公告)号:US20100100947A1

    公开(公告)日:2010-04-22

    申请号:US12255315

    申请日:2008-10-21

    IPC分类号: H04L9/32 G06F7/38

    CPC分类号: H04L9/3271 H04L2209/80

    摘要: Aspects relate to systems and methods implementing a scheme allowing a Verifier (V) to authenticate a Prover (P). The scheme comprises pre-sharing between V and P a graph of nodes. Each node is associated with a polynomial. V sends P data comprising data for selecting a polynomial of the graph, such as traversal data for proceeding from a known node to another node, a time interval, and a number k. P uses the time interval in an evaluation of the polynomial. P then uses the evaluation as a λ in a Poisson distribution, and determines a value related to a probability that a number of occurrences of an event equals k. P sends the determined value to V. V performs a similar determination to arrive at a comparison value. P authenticates V if the separately determined values match, or otherwise meet expectations. The process can be repeated to increase confidence in authentication.

    摘要翻译: 方面涉及实现允许Verifier(V)验证Prover(P)的方案的系统和方法。 该方案包括在V和P之间预先共享节点图。 每个节点与多项式相关联。 V发送包括用于选择图形的多项式的数据的P数据,例如用于从已知节点进行到另一个节点的遍历数据,时间间隔和数量k。 P在多项式的评估中使用时间间隔。 P然后将评估用作泊松分布中的λ,并且确定与事件的发生次数等于k的概率相关的值。 P将确定的值发送到V.V执行类似的确定以得到比较值。 如果单独确定的值匹配,则P验证V,否则满足期望。 可以重复该过程以增加认证的置信度。

    System and method for modulus obfuscation
    4.
    发明授权
    System and method for modulus obfuscation 有权
    模糊模糊系统和方法

    公开(公告)号:US08094813B2

    公开(公告)日:2012-01-10

    申请号:US12203101

    申请日:2008-09-02

    IPC分类号: H04L9/00

    CPC分类号: H04L9/00 H04L2209/16

    摘要: Disclosed herein are methods for obfuscating data on a client, on a server, and on a client and a server. The method on a client device includes receiving input data, storing an operation value in a secure location, performing a modulus obfuscation on the operation value, performing a modulus operation on the operation value and the input data, performing a modulus transformation on the operation value and the input data to obtain client output data, and checking if the client output data matches corresponding server output data. The method on a server device includes receiving input data, performing a modulus transformation on the input data to obtain a result, performing a plain operation on the result and an operation value to obtain server output data, and checking if the server output data matches corresponding client output data from a client device that (1) receives input data, (2) stores an operation value in a secure location, (3) performs a modulus obfuscation on the operation value, (4) performs a modulus operation on the operation value and the input data, and (5) performs a modulus transformation on the operation value and the input data to obtain client output data. In an optional step applicable to both clients and servers, the method further includes authenticating the client input data and the server input data if the server output data matches the client output data. In one aspect, server input data and client input data pertain to a cryptographic key.

    摘要翻译: 这里公开了用于在客户端,服务器上以及在客户端和服务器上模糊数据的方法。 客户端装置的方法包括接收输入数据,将操作值存储在安全位置,对运算值进行模糊混淆,对运算值和输入数据进行模运算,对运算值进行模变换 和输入数据,以获取客户端输出数据,并检查客户端输出数据是否匹配相应的服务器输出数据。 服务器装置上的方法包括:接收输入数据,对输入数据进行模数变换,得到结果,对结果执行简单操作,得到操作值,得到服务器输出数据,并检查服务器输出数据是否匹配对应 (1)接收输入数据的客户端输出数据,(2)将操作值存储在安全位置,(3)对运算值进行模糊混淆,(4)对运算值进行模运算 和输入数据,(5)对运算值和输入数据进行模变换,得到客户输出数据。 在适用于客户端和服务器的可选步骤中,如果服务器输出数据与客户端输出数据匹配,则该方法还包括验证客户端输入数据和服务器输入数据。 在一个方面,服务器输入数据和客户端输入数据属于加密密钥。

    SYSTEM AND METHOD FOR MODULUS OBFUSCATION
    5.
    发明申请
    SYSTEM AND METHOD FOR MODULUS OBFUSCATION 有权
    用于模块化的系统和方法

    公开(公告)号:US20100054459A1

    公开(公告)日:2010-03-04

    申请号:US12203101

    申请日:2008-09-02

    IPC分类号: H04L9/28

    CPC分类号: H04L9/00 H04L2209/16

    摘要: Disclosed herein are methods for obfuscating data on a client, on a server, and on a client and a server. The method on a client device includes receiving input data, storing an operation value in a secure location, performing a modulus obfuscation on the operation value, performing a modulus operation on the operation value and the input data, performing a modulus transformation on the operation value and the input data to obtain client output data, and checking if the client output data matches corresponding server output data. The method on a server device includes receiving input data, performing a modulus transformation on the input data to obtain a result, performing a plain operation on the result and an operation value to obtain server output data, and checking if the server output data matches corresponding client output data from a client device that (1) receives input data, (2) stores an operation value in a secure location, (3) performs a modulus obfuscation on the operation value, (4) performs a modulus operation on the operation value and the input data, and (5) performs a modulus transformation on the operation value and the input data to obtain client output data. In an optional step applicable to both clients and servers, the method further includes authenticating the client input data and the server input data if the server output data matches the client output data. In one aspect, server input data and client input data pertain to a cryptographic key.

    摘要翻译: 这里公开了用于在客户端,服务器上以及在客户端和服务器上模糊数据的方法。 客户端装置的方法包括接收输入数据,将操作值存储在安全位置,对运算值进行模糊混淆,对运算值和输入数据进行模运算,对运算值进行模变换 和输入数据,以获取客户端输出数据,并检查客户端输出数据是否匹配相应的服务器输出数据。 服务器装置上的方法包括:接收输入数据,对输入数据进行模数变换,得到结果,对结果执行简单操作,得到操作值,得到服务器输出数据,并检查服务器输出数据是否匹配对应 (1)接收输入数据的客户端输出数据,(2)将操作值存储在安全位置,(3)对运算值进行模糊混淆,(4)对运算值进行模运算 和输入数据,(5)对运算值和输入数据进行模变换,得到客户输出数据。 在适用于客户端和服务器的可选步骤中,如果服务器输出数据与客户端输出数据匹配,则该方法还包括验证客户端输入数据和服务器输入数据。 在一个方面,服务器输入数据和客户端输入数据属于加密密钥。

    System and method for modulus obfuscation
    6.
    发明授权
    System and method for modulus obfuscation 有权
    模糊模糊系统和方法

    公开(公告)号:US08300809B2

    公开(公告)日:2012-10-30

    申请号:US13222245

    申请日:2011-08-31

    IPC分类号: H04L9/00

    CPC分类号: H04L9/00 H04L2209/16

    摘要: Disclosed herein are methods for obfuscating data via a modulus operation. A client device receives input data, stores an operation value, performs a modulus obfuscation on the operation value, performs a modulus operation on the operation value and the input data, performs a modulus transformation on the operation value and the input data to obtain client output data, and checks if the client output data matches corresponding server output data. A corresponding server device receives input data, performs a modulus transformation on the input data to obtain a result, performs a plain operation on the result and an operation value to obtain server output data, and checks if the server output data matches corresponding client output data from the client device. The client and/or server can optionally authenticate the client input data and the server input data if the server output data matches the client output data.

    摘要翻译: 这里公开的是通过模数运算来模糊数据的方法。 客户机接收输入数据,存储操作值,对运算值进行模糊混淆,对运算值和输入数据进行模运算,对运算值和输入数据进行模变换,得到客户输出 数据,并检查客户端输出数据是否匹配相应的服务器输出数据。 相应的服务器设备接收输入数据,对输入数据进行模数变换以获得结果,对结果执行简单操作,并获取操作值以获取服务器输出数据,并检查服务器输出数据是否与相应的客户端输出数据相匹配 从客户端设备。 如果服务器输出数据与客户端输出数据匹配,则客户端和/或服务器可以可选地认证客户端输入数据和服务器输入数据。

    SYSTEM AND METHOD FOR MODULUS OBFUSCATION
    7.
    发明申请
    SYSTEM AND METHOD FOR MODULUS OBFUSCATION 有权
    用于模块化的系统和方法

    公开(公告)号:US20110320806A1

    公开(公告)日:2011-12-29

    申请号:US13222245

    申请日:2011-08-31

    IPC分类号: H04L9/00

    CPC分类号: H04L9/00 H04L2209/16

    摘要: Disclosed herein are methods for obfuscating data via a modulus operation. A client device receives input data, stores an operation value, performs a modulus obfuscation on the operation value, performs a modulus operation on the operation value and the input data, performs a modulus transformation on the operation value and the input data to obtain client output data, and checks if the client output data matches corresponding server output data. A corresponding server device receives input data, performs a modulus transformation on the input data to obtain a result, performs a plain operation on the result and an operation value to obtain server output data, and checks if the server output data matches corresponding client output data from the client device. The client and/or server can optionally authenticate the client input data and the server input data if the server output data matches the client output data.

    摘要翻译: 这里公开的是通过模数运算来模糊数据的方法。 客户机接收输入数据,存储操作值,对运算值进行模糊混淆,对运算值和输入数据进行模运算,对运算值和输入数据进行模变换,得到客户输出 数据,并检查客户端输出数据是否匹配相应的服务器输出数据。 相应的服务器设备接收输入数据,对输入数据进行模数变换以获得结果,对结果执行简单操作,并获取操作值以获取服务器输出数据,并检查服务器输出数据是否与相应的客户端输出数据相匹配 从客户端设备。 如果服务器输出数据与客户端输出数据匹配,则客户端和/或服务器可以可选地认证客户端输入数据和服务器输入数据。

    SYSTEM AND METHOD FOR KEY SPACE DIVISION AND SUB-KEY DERIVATION FOR MIXED MEDIA DIGITAL RIGHTS MANAGEMENT CONTENT
    8.
    发明申请
    SYSTEM AND METHOD FOR KEY SPACE DIVISION AND SUB-KEY DERIVATION FOR MIXED MEDIA DIGITAL RIGHTS MANAGEMENT CONTENT 有权
    用于混合媒体数字权限管理内容的关键空间部分和次主要衍生的系统和方法

    公开(公告)号:US20130182842A1

    公开(公告)日:2013-07-18

    申请号:US13349451

    申请日:2012-01-12

    IPC分类号: H04L9/14 H04L9/08

    摘要: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for key space division and sub-key derivation for mixed media digital rights management content and secure digital asset distribution. A system practicing the exemplary method derives a set of family keys from a master key associated with an encrypted media asset using a one-way function, wherein each family key is uniquely associated with a respective client platform type, wherein the master key is received from a server account database, and identifies a client platform type for a client device and a corresponding family key from the set of family keys. The system encrypts an encrypted media asset with the corresponding family key to yield a platform-specific encrypted media asset, and transmits the platform-specific encrypted media asset to the client device. Thus, different client devices receive device-specific encrypted assets which can be all derived based on the same master key.

    摘要翻译: 本文公开了用于混合媒体数字版权管理内容和安全数字资产分配的关键空间划分和子密钥导出的系统,方法和非暂时的计算机可读存储介质。 实施示例性方法的系统使用单向函数从与加密的媒体资产相关联的主密钥导出一组家庭密钥,其中每个家庭密钥与相应的客户端平台类型唯一地相关联,其中主密钥从 一个服务器帐户数据库,并从一组家庭密钥中识别客户端设备的客户端平台类型和相应的家庭密钥。 该系统使用相应的家庭密钥对加密的媒体资产进行加密,以产生特定于平台的加密媒体资产,并将平台特定的加密媒体资产发送到客户端设备。 因此,不同的客户端设备接收可以全部基于相同主密钥导出的特定于设备的加密资产。

    System and method for key space division and sub-key derivation for mixed media digital rights management content
    9.
    发明授权
    System and method for key space division and sub-key derivation for mixed media digital rights management content 有权
    混合媒体数字版权管理内容的关键空间划分和子密钥派生的系统和方法

    公开(公告)号:US08638935B2

    公开(公告)日:2014-01-28

    申请号:US13349451

    申请日:2012-01-12

    IPC分类号: H04L9/14

    摘要: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for key space division and sub-key derivation for mixed media digital rights management content and secure digital asset distribution. A system practicing the exemplary method derives a set of family keys from a master key associated with an encrypted media asset using a one-way function, wherein each family key is uniquely associated with a respective client platform type, wherein the master key is received from a server account database, and identifies a client platform type for a client device and a corresponding family key from the set of family keys. The system encrypts an encrypted media asset with the corresponding family key to yield a platform-specific encrypted media asset, and transmits the platform-specific encrypted media asset to the client device. Thus, different client devices receive device-specific encrypted assets which can be all derived based on the same master key.

    摘要翻译: 本文公开了用于混合媒体数字版权管理内容和安全数字资产分配的关键空间划分和子密钥导出的系统,方法和非暂时的计算机可读存储介质。 实施示例性方法的系统使用单向函数从与加密的媒体资产相关联的主密钥导出一组家庭密钥,其中每个家庭密钥与相应的客户端平台类型唯一地相关联,其中主密钥从 一个服务器帐户数据库,并从一组家庭密钥中识别客户端设备的客户端平台类型和相应的家庭密钥。 该系统使用相应的家庭密钥对加密的媒体资产进行加密,以产生特定于平台的加密媒体资产,并将平台特定的加密媒体资产发送到客户端设备。 因此,不同的客户端设备接收可以全部基于相同主密钥导出的特定于设备的加密资产。

    SYSTEM AND METHOD FOR ENTROPY POOL VERIFICATION
    10.
    发明申请
    SYSTEM AND METHOD FOR ENTROPY POOL VERIFICATION 有权
    入侵池验证的系统和方法

    公开(公告)号:US20110307873A1

    公开(公告)日:2011-12-15

    申请号:US12815298

    申请日:2010-06-14

    IPC分类号: G06F9/44

    摘要: Disclosed are systems, methods, and non-transitory computer-readable storage media for detecting changes in a source of entropy. A system configured to practice the method generates a cyclic graph based at least in part on the values in the entropy pool. Using the cyclic graph and one or more starting points, the system establishes one or more baseline properties for the cyclic graph. These properties can include the number of steps required to identify a cycle in the graph or the number of steps required to traverse the graph from one or more starting points to a selected end point. The computed properties are then stored for later use. As execution progresses, the system monitors the entropy pool to detect a change by regenerating the cyclic graph and using the stored properties.

    摘要翻译: 公开了用于检测熵源中的变化的系统,方法和非暂时的计算机可读存储介质。 配置为实施该方法的系统至少部分地基于熵池中的值来生成循环图。 使用循环图和一个或多个起始点,系统建立循环图的一个或多个基线属性。 这些属性可以包括识别图中的周期所需的步骤数量,或者从一个或多个起始点到所选终点遍历图形所需的步骤数。 然后将计算的属性存储以供以后使用。 随着执行的进行,系统通过重新生成循环图并使用存储的属性来监视熵池来检测变化。