Challenge-response authentication using a masked response value

    公开(公告)号:US09727720B2

    公开(公告)日:2017-08-08

    申请号:US13690996

    申请日:2012-11-30

    Applicant: Certicom Corp.

    Abstract: Challenge-response authentication protocols are disclosed herein, including systems and methods for a first device to authenticate a second device. In one embodiment, the following operations are performed by the first device: (a) sending to the second device: (i) a challenge value corresponding to an expected response value known by the first device, and (ii) a hiding value; (b) receiving from the second device a masked response value; (c) obtaining an expected masked response value from the expected response value and the hiding value; and (d) determining whether the expected masked response value matches the masked response value received from the second device. The operations from the perspective of the second device are also disclosed, which in some embodiments include computing the masked response value using the challenge value, the hiding value, and secret information known to the second device.

    Generating Cryptographic Function Parameters From a Puzzle
    124.
    发明申请
    Generating Cryptographic Function Parameters From a Puzzle 审中-公开
    从拼图生成加密函数参数

    公开(公告)号:US20170063535A1

    公开(公告)日:2017-03-02

    申请号:US14691372

    申请日:2015-04-20

    Applicant: Certicom Corp.

    Abstract: Methods, systems, and computer programs for generating cryptographic function parameters are described. In some examples, a solution to a puzzle is obtained. A pseudorandom generator is seeded based on the solution. After seeding the pseudorandom generator, an output from the pseudorandom generator is obtained. A parameter for a cryptographic function is generated. The parameter is generated from the output from the pseudorandom generator.

    Abstract translation: 描述用于生成加密功能参数的方法,系统和计算机程序。 在一些示例中,获得难题的解决方案。 基于该解决方案接种伪随机发生器。 在伪随机发生器接种之后,获得来自伪随机发生器的输出。 生成加密功能的参数。 该参数是从伪随机发生器的输出生成的。

    Challenge-response authentication using a masked response value
    127.
    发明授权
    Challenge-response authentication using a masked response value 有权
    使用屏蔽响应值进行挑战响应认证

    公开(公告)号:US09369290B2

    公开(公告)日:2016-06-14

    申请号:US13691101

    申请日:2012-11-30

    Applicant: Certicom Corp.

    CPC classification number: H04L9/3271 H04L9/28 H04L9/3236 H04L2209/04 H04W12/06

    Abstract: Challenge-response authentication protocols are disclosed herein, including systems and methods for a first device to authenticate a second device. In one embodiment, the following operations are performed by the first device: (a) sending to the second device: (i) a challenge value corresponding to an expected response value known by the first device, and (ii) a hiding value; (b) receiving from the second device a masked response value; (c) obtaining an expected masked response value from the expected response value and the hiding value; and (d) determining whether the expected masked response value matches the masked response value received from the second device. The operations from the perspective of the second device are also disclosed, which in some embodiments include computing the masked response value using the challenge value, the hiding value, and secret information known to the second device.

    Abstract translation: 本文公开了挑战响应认证协议,包括用于第一设备认证第二设备的系统和方法。 在一个实施例中,以下操作由第一设备执行:(a)向第二设备发送:(i)对应于由第一设备已知的预期响应值的挑战值,以及(ii)隐藏值; (b)从第二设备接收被屏蔽的响应值; (c)从预期响应值和隐藏值获得预期屏蔽响应值; 以及(d)确定预期的屏蔽响应值是否与从第二设备接收到的屏蔽的响应值相匹配。 还公开了从第二设备的角度的操作,在一些实施例中,这些操作包括使用挑战值,隐藏值和第二设备已知的秘密信息来计算被屏蔽的响应值。

    Verifying passwords on a mobile device
    128.
    发明授权
    Verifying passwords on a mobile device 有权
    验证移动设备上的密码

    公开(公告)号:US09251325B2

    公开(公告)日:2016-02-02

    申请号:US14083852

    申请日:2013-11-19

    Abstract: Methods, systems, and computer programs for verifying a password are disclosed. For example, the password can be verified on a mobile device to control user access to the mobile device. In some implementations, a mobile device includes a user interface, a main processor, and a co-processor. The user interface receives a submitted password value from a user. The main processor calls the co-processor to provide a hash chain input value based on the submitted password value. The main processor evaluates a hash chain based on the hash chain input value provided by the co-processor. Evaluating the hash chain generates a submitted password verification value. The submitted password verification value is compared to a stored password verification value stored on the mobile device. Access to mobile device functionality may be permitted or denied based on a result of the comparison.

    Abstract translation: 公开了用于验证密码的方法,系统和计算机程序。 例如,可以在移动设备上验证密码以控制用户对移动设备的访问。 在一些实现中,移动设备包括用户接口,主处理器和协处理器。 用户界面从用户那里接收提交的密码值。 主处理器根据提交的密码值调用协处理器提供散列链输入值。 主处理器基于由协处理器提供的散列链输入值来评估散列链。 评估散列链生成提交的密码验证值。 将提交的密码验证值与存储在移动设备上的存储密码验证值进行比较。 可以基于比较的结果来允许或拒绝对移动设备功能的访问。

    SYSTEM AND METHOD FOR MANAGING ELECTRONIC ASSETS
    129.
    发明申请
    SYSTEM AND METHOD FOR MANAGING ELECTRONIC ASSETS 审中-公开
    用于管理电子资产的系统和方法

    公开(公告)号:US20150309921A1

    公开(公告)日:2015-10-29

    申请号:US14734467

    申请日:2015-06-09

    Applicant: Certicom Corp.

    Abstract: An asset management system is provided which comprises one or more controllers, which operate as main servers and can be located at the headquarters of an electronic device manufacturer to remotely control their operations at any global location. The controller can communicate remotely over the Internet or other network to control one or more secondary or remote servers, herein referred to as appliances. The appliances can be situated at different manufacturing, testing or distribution sites. The controller and appliances comprise hardware security modules (HSMs) to perform sensitive and high trust computations, store sensitive information such as private keys, perform other cryptographic operations, and establish secure connections between components. The HSMs are used to create secure end-points between the controller and the appliance and between the appliance and the secure point of trust in an asset control core embedded in a device.

    Abstract translation: 提供了一种资产管理系统,其包括一个或多个控制器,其作为主服务器操作,并且可以位于电子设备制造商的总部,以在任何全球位置远程控制其操作。 控制器可以通过互联网或其他网络进行远程通信,以控制一个或多个辅助或远程服务器,这里称为设备。 电器可以位于不同的制造,测试或分销现场。 控制器和设备包括执行敏感和高可靠性计算的硬件安全模块(HSM),存储诸如私钥的敏感信息,执行其他加密操作,以及在组件之间建立安全连接。 HSM用于在控制器和设备之间以及设备与嵌入在设备中的资产控制核心的安全信任点之间创建安全端点。

Patent Agency Ranking