-
151.
公开(公告)号:US10341356B2
公开(公告)日:2019-07-02
申请号:US15811194
申请日:2017-11-13
Applicant: Certicom Corp.
Inventor: Marinus Struik
Abstract: A method of communicating in a secure communication system, comprises the steps of assembling a message at a sender, then determining a security level, and including an indication of the security level in a header of the message. The message is then sent to a recipient.
-
公开(公告)号:US20190190711A1
公开(公告)日:2019-06-20
申请号:US16277017
申请日:2019-02-15
Applicant: Certicom Corp.
Inventor: Daniel Richard L. BROWN , Scott Alexander VANSTONE
CPC classification number: H04L9/0869 , G06F7/582 , G06F7/588 , G06F7/725 , H04L9/0662 , H04L9/0816 , H04L9/0894 , H04L9/3066 , H04L2209/20 , H04L2209/24 , H04L2209/26
Abstract: An elliptic curve random number generator avoids escrow keys by choosing a point on the elliptic curve as verifiably random. An arbitrary string is chosen and a hash of that string computed. The hash is then converted to a field element of the desired field, the field element regarded as the x-coordinate of a point on the elliptic curve and the x-coordinate is tested for validity on the desired elliptic curve. If valid, the x-coordinate is decompressed to the point , wherein the choice of which is the two points is also derived from the hash value. Intentional use of escrow keys can provide for back up functionality. The relationship between P and is used as an escrow key and stored by for a security domain. The administrator logs the output of the generator to reconstruct the random number with the escrow key.
-
公开(公告)号:US20180278416A1
公开(公告)日:2018-09-27
申请号:US15470259
申请日:2017-03-27
Applicant: Certicom Corp.
Inventor: Daniel Richard BROWN
CPC classification number: H04L9/0861 , G06F7/00 , H04L9/0841 , H04L9/3013 , H04L9/3033
Abstract: A method for a Diffie Hellman key exchange, the method including selecting a field size p in the form p=hq+1, where q is a prime number that is one plus a factorial number b, such that q=(b!+1), and h is a cofactor, such that p=hq+1 is prime; selecting a generator integer g whose order modulo p is the prime q or is divisible by q; choosing a private key x; computing a public key gx mod p by raising said generator g to the power of said private key x, using arithmetic modulo said prime field size p; sending said public key gx mod p to a correspondent; receiving, from the correspondent, a second public key B comprising g raised to a second private key y selected by the correspondent, in the form gy; and creating a key Bx from the received second public key B, by raising said second public key B to the power of said private key x, using arithmetic modulo said prime field size p.
-
公开(公告)号:US10079675B2
公开(公告)日:2018-09-18
申请号:US14691372
申请日:2015-04-20
Applicant: Certicom Corp.
Inventor: Daniel Richard L. Brown
CPC classification number: H04L9/0662 , G06F7/582 , G09C5/00 , H04L9/0869 , H04L9/3006 , H04L9/3066 , H04L63/0442 , H04L63/126
Abstract: Methods, systems, and computer programs for generating cryptographic function parameters are described. In some examples, a solution to a puzzle is obtained. A pseudorandom generator is seeded based on the solution. After seeding the pseudorandom generator, an output from the pseudorandom generator is obtained. A parameter for a cryptographic function is generated. The parameter is generated from the output from the pseudorandom generator.
-
公开(公告)号:US10079673B2
公开(公告)日:2018-09-18
申请号:US14318005
申请日:2014-06-27
Applicant: Certicom Corp.
Inventor: Daniel Richard L. Brown
CPC classification number: H04L9/001 , H04L9/0869 , H04L2209/26
Abstract: Systems, methods, software, and combinations thereof for evaluating entropy in a cryptography system are described. In some aspects, sample values are produced by an entropy source system. A typicality can be determined for each of the sample values. A grading is determined for preselected distributions based on the typicalities of the sample values. A subset of the preselected distributions are selected based on the gradings. An entropy of the entropy source system is calculated based on the subset of the plurality of distributions.
-
公开(公告)号:US20180248695A1
公开(公告)日:2018-08-30
申请号:US15445888
申请日:2017-02-28
Applicant: Certicom Corp.
Inventor: Daniel Richard L. BROWN
CPC classification number: H04L9/3066 , H04L9/0841 , H04L9/3252 , H04L9/3263 , H04L2209/122
Abstract: Systems, methods, and software can be used to generate elliptic curve points. In some aspect, the method includes: selecting a field size of 8̂91+5; selecting a curve equation that is compatible to the field size; using, by a hardware processor, the selected field size to generate an elliptic curve point; and using, by the hardware processor, the elliptic curve point in an Elliptic Curve Cryptography (ECC) operation.
-
公开(公告)号:US09967239B2
公开(公告)日:2018-05-08
申请号:US14992397
申请日:2016-01-11
Applicant: Certicom Corp.
Inventor: Daniel R. Brown
CPC classification number: H04L63/045 , H04L9/0861 , H04L9/3066 , H04L9/321 , H04L9/3236 , H04L9/3247 , H04L9/3252 , H04L9/3263 , H04L63/0823
Abstract: The invention provides a method of verifiable generation of public keys. According to the method, a self-signed signature is first generated and then used as input to the generation of a pair of private and public keys. Verification of the signature proves that the keys are generated from a key generation process utilizing the signature. A certification authority can validate and verify a public key generated from a verifiable key generation process.
-
公开(公告)号:US20180109374A1
公开(公告)日:2018-04-19
申请号:US15789399
申请日:2017-10-20
Applicant: Certicom Corp.
CPC classification number: H04L9/0819 , H04L9/0866 , H04L9/14 , H04L9/3271 , H04L63/123 , H04L2209/24 , H04L2209/80 , H04L2463/061 , H04W12/02 , H04W12/04 , H04W12/10
Abstract: Methods, systems, and computer programs for performing key agreement operations in a communication system are described. In some aspects, a wireless network operator receives a mobile device identifier and accesses a secret key associated with the mobile device. A message authentication code function is evaluated based on the secret key to produce an output value. A session key and a challenge value are obtained based on the output value. In some aspects, a mobile device accesses a secret key in response to receiving the challenge value from the wireless network operator. A message authentication code function is evaluated based on the secret key to produce an output value. A response value and a session key are obtained based on the output value. The response value is transmitted to the wireless network operator.
-
公开(公告)号:US09866396B2
公开(公告)日:2018-01-09
申请号:US15223920
申请日:2016-07-29
Applicant: BlackBerry Limited , Certicom Corp.
IPC: H04W4/12 , H04L9/32 , H04L29/06 , H04W12/10 , H04W12/12 , H04L9/14 , H04L9/30 , H04W12/04 , H04W12/06
CPC classification number: H04L9/3252 , H04L9/14 , H04L9/30 , H04L9/3242 , H04L9/3247 , H04L9/3263 , H04L63/0428 , H04L63/06 , H04L63/126 , H04L63/14 , H04W4/12 , H04W12/04 , H04W12/06 , H04W12/10 , H04W12/12
Abstract: There is provided a method for secure communications. The method includes a computing device receiving a notification comprising a message, a counter value, a signature signed by a signer and based on the message and the counter value, and an indication of the signer. The device obtains a current counter value based on an identity of the signer, checks the signature and compares the counter value with the current counter value; and, if the counter comparison and the signature checking is successful, accepting the message.
-
公开(公告)号:US09813249B2
公开(公告)日:2017-11-07
申请号:US14458971
申请日:2014-08-13
Applicant: CERTICOM CORP.
Inventor: Paul Neil Fahn , James Semple
CPC classification number: H04L9/3268 , H04L9/321 , H04L9/3263 , H04L63/04 , H04L63/0823 , H04L63/18 , H04L2463/102
Abstract: A method of requesting and issuing a certificate from certification authority for use by an initiating correspondent with a registration authority is provided. The initiating correspondent makes a request for a certificate to the registration authority, and the registration authority sends the request to a certificate authority, which issues the certificate to the registration authority. The certificate is stored at a location in a directory and this location is associated with a pointer such as uniform resource locator (URL) that is derived from information contained in the certificate request. The initiating correspondent computes the location using the same information and forwards it to other corespondents. The other correspondents can then locate the certificate to authenticate the public key of the initiating correspondent.
-
-
-
-
-
-
-
-
-