Generating Cryptographic Function Parameters From Compact Source Code
    11.
    发明申请
    Generating Cryptographic Function Parameters From Compact Source Code 审中-公开
    从紧凑源代码生成加密函数参数

    公开(公告)号:US20170063534A1

    公开(公告)日:2017-03-02

    申请号:US14691337

    申请日:2015-04-20

    Applicant: Certicom Corp.

    Abstract: Methods, systems, and computer programs for generating cryptographic function parameters are described. In some examples, source code that defines seed information and a pseudorandom function is accessed. A parameter for a cryptographic function by operation of one or more data processors is generated. The parameter is generated from the seed information and the pseudorandom function. The parameter has a larger size in memory than the source code that defines the seed information and the pseudorandom function.

    Abstract translation: 描述用于生成加密功能参数的方法,系统和计算机程序。 在一些示例中,访问定义种子信息和伪随机函数的源代码。 产生通过一个或多个数据处理器的操作的加密功能的参数。 该参数是从种子信息和伪随机函数生成的。 该参数的内存大于定义种子信息和伪随机函数的源代码。

    Public Key Encryption Algorithms for Hard Lock File Encryption
    12.
    发明申请
    Public Key Encryption Algorithms for Hard Lock File Encryption 有权
    用于硬锁文件加密的公钥加密算法

    公开(公告)号:US20170012946A1

    公开(公告)日:2017-01-12

    申请号:US14930179

    申请日:2015-11-02

    Abstract: In some aspects, an encryption method comprises encrypting a first portion of a message using a first secret key. The first secret key is generated based on the public key of an entity. A one-way function is used to generate a second secret key from the first secret key, and the first secret key is subsequently discarded. A second portion of the message is encrypted using the second secret key. The encrypted first portion of the message and the encrypted second portion of the message are provided to the entity.

    Abstract translation: 在一些方面,加密方法包括使用第一秘密密钥加密消息的第一部分。 第一个秘密密钥是根据实体的公钥生成的。 单向函数用于从第一秘密密钥生成第二秘密密钥,并且随后丢弃第一秘密密钥。 消息的第二部分使用第二秘密密钥进行加密。 将消息的加密的第一部分和消息的加密的第二部分提供给实体。

    Systems and methods for managing lost devices
    13.
    发明授权
    Systems and methods for managing lost devices 有权
    用于管理丢失设备的系统和方法

    公开(公告)号:US09396644B2

    公开(公告)日:2016-07-19

    申请号:US14459101

    申请日:2014-08-13

    Applicant: Certicom Corp.

    Abstract: A method for a device to determine that it has been lost is provided. The method comprises the device determining its current location, the device comparing its current location to a plurality of stored locations, and the device determining that it has been lost when its current location is a stored location that has been designated as a location where the device is unlikely to be located or is not a stored location that has been designated as a location where the device is likely to be located.

    Abstract translation: 提供了一种用于确定其已经丢失的装置的方法。 该方法包括确定其当前位置的设备,该设备将其当前位置与多个存储位置进行比较,并且该设备确定当其当前位置是被指定为该设备的位置时的存储位置已丢失的设备 不太可能被定位或不被指定为设备可能位于的位置的存储位置。

    Public key encryption algorithms for hard lock file encryption
    14.
    发明授权
    Public key encryption algorithms for hard lock file encryption 有权
    用于硬锁文件加密的公钥加密算法

    公开(公告)号:US09178699B2

    公开(公告)日:2015-11-03

    申请号:US14073379

    申请日:2013-11-06

    Abstract: In some aspects, an encryption method comprises encrypting a first portion of a message using a first secret key. The first secret key is generated based on the public key of an entity. A one-way function is used to generate a second secret key from the first secret key, and the first secret key is subsequently discarded. A second portion of the message is encrypted using the second secret key. The encrypted first portion of the message and the encrypted second portion of the message are provided to the entity.

    Abstract translation: 在一些方面,加密方法包括使用第一秘密密钥加密消息的第一部分。 第一个秘密密钥是根据实体的公钥生成的。 单向函数用于从第一秘密密钥生成第二秘密密钥,并且随后丢弃第一秘密密钥。 消息的第二部分使用第二秘密密钥进行加密。 将消息的加密的第一部分和消息的加密的第二部分提供给实体。

    Method and apparatus for verifiable generation of public keys
    15.
    发明授权
    Method and apparatus for verifiable generation of public keys 有权
    用于验证公钥生成的方法和装置

    公开(公告)号:US09160530B2

    公开(公告)日:2015-10-13

    申请号:US14203079

    申请日:2014-03-10

    Applicant: Certicom Corp.

    Abstract: The invention provides a method of verifiable generation of public keys. According to the method, a self-signed signature is first generated and then used as input to the generation of a pair of private and public keys. Verification of the signature proves that the keys are generated from a key generation process utilizing the signature. A certification authority can validate and verify a public key generated from a verifiable key generation process.

    Abstract translation: 本发明提供了可验证地生成公钥的方法。 根据该方法,首先生成自签名签名,然后将其用作生成一对私钥和公钥的输入。 签名的验证证明密钥是利用签名的密钥生成过程产生的。 认证机构可以验证和验证从可验证密钥生成过程产生的公钥。

    Elliptic curve random number generation
    16.
    发明授权
    Elliptic curve random number generation 有权
    椭圆曲线随机数生成

    公开(公告)号:US08948388B2

    公开(公告)日:2015-02-03

    申请号:US13770533

    申请日:2013-02-19

    Applicant: Certicom Corp.

    Abstract: An elliptic curve random number generator avoids escrow keys by choosing a point Q on the elliptic curve as verifiably random. An arbitrary string is chosen and a hash of that string computed. The hash is then converted to a field element of the desired field, the field element regarded as the x-coordinate of a point Q on the elliptic curve and the x-coordinate is tested for validity on the desired elliptic curve. If valid, the x-coordinate is decompressed to the point Q, wherein the choice of which is the two points is also derived from the hash value. Intentional use of escrow keys can provide for back up functionality. The relationship between P and Q is used as an escrow key and stored by for a security domain. The administrator logs the output of the generator to reconstruct the random number with the escrow key.

    Abstract translation: 椭圆曲线随机数发生器通过选择椭圆曲线上的点Q可以无限次地避免代管钥匙。 选择一个任意的字符串,并计算该字符串的散列。 然后将散列转换为所需场的场元素,将该场元素视为椭圆曲线上的点Q的x坐标,并且在期望的椭圆曲线上测试x坐标的有效性。 如果有效,则将x坐标解压缩到点Q,其中,从哈希值得出两个点的选择。 意向使用代管键可以提供备份功能。 P和Q之间的关系用作托管密钥,并由安全域存储。 管理员记录生成器的输出,用代管密钥重构随机数。

    Assessing Cryptographic Entropy
    17.
    发明申请
    Assessing Cryptographic Entropy 审中-公开
    评估密码熵

    公开(公告)号:US20140301547A1

    公开(公告)日:2014-10-09

    申请号:US14318005

    申请日:2014-06-27

    Applicant: Certicom Corp.

    CPC classification number: H04L9/001 H04L9/0869 H04L2209/26

    Abstract: Systems, methods, software, and combinations thereof for evaluating entropy in a cryptography system are described. In some aspects, sample values are produced by an entropy source system. A typicality can be determined for each of the sample values. A grading is determined for preselected distributions based on the typicalities of the sample values. A subset of the preselected distributions are selected based on the gradings. An entropy of the entropy source system is calculated based on the subset of the plurality of distributions.

    Abstract translation: 描述了用于评估加密系统中的熵的系统,方法,软件及其组合。 在某些方面,样本值由熵源系统产生。 可以为每个样本值确定典型性。 根据样本值的典型值确定预选分布的分级。 基于分级选择预选分布的子集。 基于多个分布的子集来计算熵源系统的熵。

    Assessing cryptographic entropy
    20.
    发明授权

    公开(公告)号:US10079673B2

    公开(公告)日:2018-09-18

    申请号:US14318005

    申请日:2014-06-27

    Applicant: Certicom Corp.

    CPC classification number: H04L9/001 H04L9/0869 H04L2209/26

    Abstract: Systems, methods, software, and combinations thereof for evaluating entropy in a cryptography system are described. In some aspects, sample values are produced by an entropy source system. A typicality can be determined for each of the sample values. A grading is determined for preselected distributions based on the typicalities of the sample values. A subset of the preselected distributions are selected based on the gradings. An entropy of the entropy source system is calculated based on the subset of the plurality of distributions.

Patent Agency Ranking