Generating Cryptographic Function Parameters From Compact Source Code
    12.
    发明申请
    Generating Cryptographic Function Parameters From Compact Source Code 审中-公开
    从紧凑源代码生成加密函数参数

    公开(公告)号:US20170063534A1

    公开(公告)日:2017-03-02

    申请号:US14691337

    申请日:2015-04-20

    Applicant: Certicom Corp.

    Abstract: Methods, systems, and computer programs for generating cryptographic function parameters are described. In some examples, source code that defines seed information and a pseudorandom function is accessed. A parameter for a cryptographic function by operation of one or more data processors is generated. The parameter is generated from the seed information and the pseudorandom function. The parameter has a larger size in memory than the source code that defines the seed information and the pseudorandom function.

    Abstract translation: 描述用于生成加密功能参数的方法,系统和计算机程序。 在一些示例中,访问定义种子信息和伪随机函数的源代码。 产生通过一个或多个数据处理器的操作的加密功能的参数。 该参数是从种子信息和伪随机函数生成的。 该参数的内存大于定义种子信息和伪随机函数的源代码。

    Public Key Encryption Algorithms for Hard Lock File Encryption
    13.
    发明申请
    Public Key Encryption Algorithms for Hard Lock File Encryption 有权
    用于硬锁文件加密的公钥加密算法

    公开(公告)号:US20170012946A1

    公开(公告)日:2017-01-12

    申请号:US14930179

    申请日:2015-11-02

    Abstract: In some aspects, an encryption method comprises encrypting a first portion of a message using a first secret key. The first secret key is generated based on the public key of an entity. A one-way function is used to generate a second secret key from the first secret key, and the first secret key is subsequently discarded. A second portion of the message is encrypted using the second secret key. The encrypted first portion of the message and the encrypted second portion of the message are provided to the entity.

    Abstract translation: 在一些方面,加密方法包括使用第一秘密密钥加密消息的第一部分。 第一个秘密密钥是根据实体的公钥生成的。 单向函数用于从第一秘密密钥生成第二秘密密钥,并且随后丢弃第一秘密密钥。 消息的第二部分使用第二秘密密钥进行加密。 将消息的加密的第一部分和消息的加密的第二部分提供给实体。

    System and method for providing a trust framework using a secondary network
    14.
    发明授权
    System and method for providing a trust framework using a secondary network 有权
    使用辅助网络提供信任框架的系统和方法

    公开(公告)号:US09473309B2

    公开(公告)日:2016-10-18

    申请号:US13793166

    申请日:2013-03-11

    CPC classification number: H04L9/3268 H04L63/0281 H04L63/18 H04W12/04

    Abstract: A system for providing security services to a mobile device where the mobile device is in communication with a public network through a first network path that is subject to interference by a third party. The system includes a security server and a private network. The security server is operative to communicate with the mobile device through the private network. The security server is also operative to communicate with the public network through a second network path that is less susceptible to the interference by the third party than is the first network path. The security server communicates with the public network through the second network path to provide security services to the mobile device that are delivered over the private network.

    Abstract translation: 一种用于向移动设备提供安全服务的系统,其中移动设备通过受第三方干扰的第一网络路径与公共网络通信。 该系统包括一个安全服务器和一个专用网络。 安全服务器可操作以通过专用网络与移动设备进行通信。 安全服务器还可操作以通过第二网络路径与公共网络进行通信,该第二网络路径比第一网络路径更不易受到第三方的干扰。 安全服务器通过第二网络路径与公共网络进行通信,以向通过专用网络传送的移动设备提供安全服务。

    Systems and methods for managing lost devices
    15.
    发明授权
    Systems and methods for managing lost devices 有权
    用于管理丢失设备的系统和方法

    公开(公告)号:US09396644B2

    公开(公告)日:2016-07-19

    申请号:US14459101

    申请日:2014-08-13

    Applicant: Certicom Corp.

    Abstract: A method for a device to determine that it has been lost is provided. The method comprises the device determining its current location, the device comparing its current location to a plurality of stored locations, and the device determining that it has been lost when its current location is a stored location that has been designated as a location where the device is unlikely to be located or is not a stored location that has been designated as a location where the device is likely to be located.

    Abstract translation: 提供了一种用于确定其已经丢失的装置的方法。 该方法包括确定其当前位置的设备,该设备将其当前位置与多个存储位置进行比较,并且该设备确定当其当前位置是被指定为该设备的位置时的存储位置已丢失的设备 不太可能被定位或不被指定为设备可能位于的位置的存储位置。

    SYSTEM AND METHOD FOR PERFORMING SERIALIZATION OF DEVICES
    16.
    发明申请
    SYSTEM AND METHOD FOR PERFORMING SERIALIZATION OF DEVICES 审中-公开
    用于执行设备串行化的系统和方法

    公开(公告)号:US20160162836A1

    公开(公告)日:2016-06-09

    申请号:US14961599

    申请日:2015-12-07

    Applicant: Certicom Corp.

    CPC classification number: G06Q10/0875 G06Q10/04 G06Q10/06

    Abstract: A serialization service module is provided for configuring an asset management system to provide a secure means of generating, assigning to chips (or other electronic objects or devices), and tracking unique serial numbers. To provide this service, a controller connects through a secure, encrypted connection to appliances at a manufacturer's location. Agents can then request serial number values from an appliance by product name. The serial numbers are generated by the appliance, metered, and provided to the agents. The serial numbers are then injected sequentially into each die in a chip manufacturing process using the agent. A log is reported to the controller.

    Abstract translation: 提供了一种序列化服务模块,用于配置资产管理系统以提供生成,分配给芯片(或其他电子对象或设备)以及跟踪唯一序列号的安全手段。 为了提供此服务,控制器通过安全的加密连接连接到制造商的位置的电器。 然后,代理可以按产品名称从设备中请求序列号值。 序列号由设备生成,计量并提供给代理。 然后在使用该试剂的芯片制造过程中将序列号顺序注入每个管芯。 向控制器报告一个日志。

    Apparatus, system and method for preventing data loss

    公开(公告)号:US09355254B2

    公开(公告)日:2016-05-31

    申请号:US13758149

    申请日:2013-02-04

    CPC classification number: G06F21/60 G06F21/31 G06F21/6245 G06F2221/2119

    Abstract: A device and method are provided for a device that communicates security information to a user entering content into the device. In an aspect, the device may access content from a server over a connection through the network. The device displays the content on a user interface of the device. The device detects information entered into a field of the displayed content and evaluates a security state of the device. If the security state is below a security threshold and, if the entered information is identified as protected information based on stored criteria, the device displaying a visual indication on the user interface.

    Public key encryption algorithms for hard lock file encryption
    20.
    发明授权
    Public key encryption algorithms for hard lock file encryption 有权
    用于硬锁文件加密的公钥加密算法

    公开(公告)号:US09178699B2

    公开(公告)日:2015-11-03

    申请号:US14073379

    申请日:2013-11-06

    Abstract: In some aspects, an encryption method comprises encrypting a first portion of a message using a first secret key. The first secret key is generated based on the public key of an entity. A one-way function is used to generate a second secret key from the first secret key, and the first secret key is subsequently discarded. A second portion of the message is encrypted using the second secret key. The encrypted first portion of the message and the encrypted second portion of the message are provided to the entity.

    Abstract translation: 在一些方面,加密方法包括使用第一秘密密钥加密消息的第一部分。 第一个秘密密钥是根据实体的公钥生成的。 单向函数用于从第一秘密密钥生成第二秘密密钥,并且随后丢弃第一秘密密钥。 消息的第二部分使用第二秘密密钥进行加密。 将消息的加密的第一部分和消息的加密的第二部分提供给实体。

Patent Agency Ranking