SECURE KEY CREATION
    12.
    发明申请
    SECURE KEY CREATION 失效
    安全关键创建

    公开(公告)号:US20120275600A1

    公开(公告)日:2012-11-01

    申请号:US13095226

    申请日:2011-04-27

    IPC分类号: H04L9/00

    摘要: A system for creating a secure key is provided that includes a computer processor and an application configured to execute on the computer processor, the application implementing a method that includes creating a token and populating a key control information section of the token with a value to indicate a minimum number of key parts used to form a key. Creating the secure key also includes populating a payload section of the token with a first key part, binding the key control information section to the payload section, adding a second key part to the first key part and iterating the value and binding the key control information section to the payload section after the second key part has been added. Creating the secure key further includes indicating the key is complete, wherein the key comprises a combination of the first and second key parts.

    摘要翻译: 提供了一种用于创建安全密钥的系统,其包括计算机处理器和被配置为在计算机处理器上执行的应用程序,所述应用程序实现包括创建令牌的方法,并且以指示值的值填充令牌的密钥控制信息部分 用于形成钥匙的最少数量的关键部件。 创建安全密钥还包括用第一密钥部分填充令牌的有效载荷部分,将密钥控制信息部分绑定到有效负载部分,向第一密钥部分添加第二密钥部分,并迭代该值并绑定密钥控制信息 在添加第二个关键部分之后的部分到有效载荷部分。 创建安全密钥还包括指示密钥是完整的,其中密钥包括第一和第二密钥部分的组合。

    Method for controlling security function execution with a flexible, extendable, and non-forgable block
    13.
    发明授权
    Method for controlling security function execution with a flexible, extendable, and non-forgable block 失效
    用灵活,可扩展和不可阻止的块来控制安全功能执行的方法

    公开(公告)号:US07779258B2

    公开(公告)日:2010-08-17

    申请号:US11534236

    申请日:2006-09-22

    摘要: A method, article, and system for providing an effective implementation of data structures, and application programming interface (API) functions that allow secure execution of functions behind a secure boundary. The controlling mechanism is a flexible, extendable, and non-forgeable block that details how values and parameters behind the secure boundary can be changed. The invention allows for one entity to execute a security function that will normally require extensive authorizations or dual or multiple control. The method and system comprise instructions that are cryptographically protected against alteration or misuse, wherein the instructions further comprise a trusted block that defines security policies that are permitted when an application program employs the trusted block in APIs. The trusted block has a number of fields containing rules that provide an ability to limit how the trusted block is used, thereby reducing the risk of the trusted block being employed in unintended ways.

    摘要翻译: 一种用于提供有效实施数据结构的方法,文章和系统,以及允许安全执行安全边界后面的功能的应用程序编程接口(API)功能。 控制机制是一个灵活,可扩展和不可伪造的块,详细介绍了安全边界背后的值和参数如何改变。 本发明允许一个实体执行通常需要广泛授权或双重或多重控制的安全功能。 所述方法和系统包括密码保护以防止改变或误用的指令,其中所述指令还包括定义在应用程序在API中使用所述可信块时允许的安全策略的可信块。 可信块具有包含规则的多个字段,这些规则提供了限制如何使用受信任块的能力,从而降低以非预期的方式使用可信块的风险。

    Personal identification number security enhancement
    14.
    发明授权
    Personal identification number security enhancement 失效
    个人识别号码安全增强

    公开(公告)号:US08639938B2

    公开(公告)日:2014-01-28

    申请号:US13099509

    申请日:2011-05-03

    IPC分类号: H04L29/06

    摘要: A system for enhancing security of a personal identification number is configned for performing a method that includes receiving, from a first entity having an input permission, a first data structure into a HSM, wherein the first data structure maps a first many-to-one mapping between a first and a second PIN numeral system. The method also includes determining whether the content of the first data structure is valid, storing the first data structure in the HSM if the first data structure is valid and marking the stored first data structure as inactive. The method further includes activating the first data structure if a second data structure is input into the HSM by a second entity having an activation permission, wherein the first entity is different from the second entity, the first data structure is identical to the second data structure. The method additionally includes converting from the first to the second PIN numeral system responsive to the activated first data structure.

    摘要翻译: 用于增强个人识别号码的安全性的系统用于执行包括从具有输入许可的第一实体接收第一数据结构到HSM的方法,其中所述第一数据结构映射第一多对一 第一和第二PIN数字系统之间的映射。 该方法还包括确定第一数据结构的内容是否有效,如果第一数据结构有效并将所存储的第一数据结构标记为不活动,则将第一数据结构存储在HSM中。 该方法还包括:如果第二数据结构由具有激活许可的第二实体输入到HSM中,则激活第一数据结构,其中第一实体与第二实体不同,第一数据结构与第二数据结构相同 。 该方法还包括响应于激活的第一数据结构从第一PIN数字系统转换为第二PIN数字系统。

    METHOD FOR CONTROLLING SECURITY FUNCTION EXECUTION WITH A FLEXIBLE, ENTENDABLE, AND NON-FORGABLE BLOCK

    公开(公告)号:US20080077794A1

    公开(公告)日:2008-03-27

    申请号:US11534236

    申请日:2006-09-22

    摘要: A method, article, and system for providing an effective implementation of data structures, and application programming interface (API) functions that allow secure execution of functions behind a secure boundary. The controlling mechanism is a flexible, extendable, and non-forgeable block that details how values and parameters behind the secure boundary can be changed. The invention allows for one entity to execute a security function that will normally require extensive authorizations or dual or multiple control. The method and system comprise instructions that are cryptographically protected against alteration or misuse, wherein the instructions further comprise a trusted block that defines security policies that are permitted when an application program employs the trusted block in APIs. The trusted block has a number of fields containing rules that provide an ability to limit how the trusted block is used, thereby reducing the risk of the trusted block being employed in unintended ways. This trusted block controls the critical values or parameters behind the secure boundary. Cryptographically secured data structures are provided that allow for breaking up the instructions in the trusted blocks in a number of steps without reducing the level of security. Systems that make use of the trusted block must provide two API functions; one that encapsulates the block under at least dual control, and one that process the instructions or rules in the trusted block. In particular the invention provides a method, article, and system for the effective implementation for securely transferring symmetric encryption keys to remote devices, such as Automated Teller Machines (ATMs), PIN entry devices, and point of sale terminals. It may also be used to exchange symmetric keys with another cryptographic system of any type, such as a Host Security Module (HSM) in a computer server.

    PERSONAL IDENTIFICATION NUMBER SECURITY ENHANCEMENT
    18.
    发明申请
    PERSONAL IDENTIFICATION NUMBER SECURITY ENHANCEMENT 失效
    个人识别号码安全增强

    公开(公告)号:US20120284526A1

    公开(公告)日:2012-11-08

    申请号:US13099509

    申请日:2011-05-03

    IPC分类号: G06F21/00

    摘要: A system for enhancing security of a personal identification number is configned for performing a method that includes receiving, from a first entity having an input permission, a first data structure into a HSM, wherein the first data structure maps a first many-to-one mapping between a first and a second PIN numeral system. The method also includes determining whether the content of the first data structure is valid, storing the first data structure in the HSM if the first data structure is valid and marking the stored first data structure as inactive. The method further includes activating the first data structure if a second data structure is input into the HSM by a second entity having an activation permission, wherein the first entity is different from the second entity, the first data structure is identical to the second data structure. The method additionally includes converting from the first to the second PIN numeral system responsive to the activated first data structure.

    摘要翻译: 用于增强个人识别号码的安全性的系统用于执行包括从具有输入许可的第一实体接收第一数据结构到HSM的方法,其中所述第一数据结构映射第一多对一 第一和第二PIN数字系统之间的映射。 该方法还包括确定第一数据结构的内容是否有效,如果第一数据结构有效并将所存储的第一数据结构标记为不活动,则将第一数据结构存储在HSM中。 该方法还包括:如果第二数据结构由具有激活许可的第二实体输入到HSM中,则激活第一数据结构,其中第一实体与第二实体不同,第一数据结构与第二数据结构相同 。 该方法还包括响应于激活的第一数据结构从第一PIN数字系统转换为第二PIN数字系统。

    SECURE KEY CREATION
    19.
    发明申请
    SECURE KEY CREATION 有权
    安全关键创建

    公开(公告)号:US20120308001A1

    公开(公告)日:2012-12-06

    申请号:US13150592

    申请日:2011-06-01

    IPC分类号: H04L9/06

    摘要: Key creation includes sending a first public key part from a first system to a second system, receiving a second public key part sent by the second system to the first system and establishing a first secret material in the first system using the first and second public key parts, wherein the first secret material is identical to a second secret material established on the second system using the first and second key parts. Key creation also includes binding key control information to the first secret material in the first system, wherein the key control information includes information relating to key type and key management and deriving a first key material from the combination of the key control information and the first secret material, wherein the first key material is identical to a second key material derived by the second system.

    摘要翻译: 密钥创建包括将第一公钥部分从第一系统发送到第二系统,接收由第二系统发送给第一系统的第二公共密钥部分,并使用第一和第二公钥在第一系统中建立第一秘密资料 其中所述第一秘密材料与使用所述第一和第二关键部分在所述第二系统上建立的第二秘密材料相同。 密钥创建还包括将密钥控制信息绑定到第一系统中的第一秘密资料,其中密钥控制信息包括与密钥类型和密钥管理有关的信息,并从密钥控制信息和第一密钥的组合中导出第一密钥资料 材料,其中所述第一密钥材料与由所述第二系统导出的第二密钥材料相同。

    Secure key creation
    20.
    发明授权
    Secure key creation 有权
    安全密钥创建

    公开(公告)号:US08615081B2

    公开(公告)日:2013-12-24

    申请号:US13150592

    申请日:2011-06-01

    IPC分类号: H04L9/00

    摘要: Key creation includes sending a first public key part from a first system to a second system, receiving a second public key part sent by the second system to the first system and establishing a first secret material in the first system using the first and second public key parts, wherein the first secret material is identical to a second secret material established on the second system using the first and second key parts. Key creation also includes binding key control information to the first secret material in the first system, wherein the key control information includes information relating to key type and key management and deriving a first key material from the combination of the key control information and the first secret material, wherein the first key material is identical to a second key material derived by the second system.

    摘要翻译: 密钥创建包括将第一公钥部分从第一系统发送到第二系统,接收由第二系统发送给第一系统的第二公共密钥部分,并且使用第一和第二公钥在第一系统中建立第一秘密资料 其中所述第一秘密材料与使用所述第一和第二关键部分在所述第二系统上建立的第二秘密材料相同。 密钥创建还包括将密钥控制信息绑定到第一系统中的第一秘密资料,其中密钥控制信息包括与密钥类型和密钥管理有关的信息,并从密钥控制信息和第一密钥的组合中导出第一密钥资料 材料,其中所述第一密钥材料与由所述第二系统导出的第二密钥材料相同。