SECURE KEY CREATION
    14.
    发明申请
    SECURE KEY CREATION 失效
    安全关键创建

    公开(公告)号:US20120275600A1

    公开(公告)日:2012-11-01

    申请号:US13095226

    申请日:2011-04-27

    IPC分类号: H04L9/00

    摘要: A system for creating a secure key is provided that includes a computer processor and an application configured to execute on the computer processor, the application implementing a method that includes creating a token and populating a key control information section of the token with a value to indicate a minimum number of key parts used to form a key. Creating the secure key also includes populating a payload section of the token with a first key part, binding the key control information section to the payload section, adding a second key part to the first key part and iterating the value and binding the key control information section to the payload section after the second key part has been added. Creating the secure key further includes indicating the key is complete, wherein the key comprises a combination of the first and second key parts.

    摘要翻译: 提供了一种用于创建安全密钥的系统,其包括计算机处理器和被配置为在计算机处理器上执行的应用程序,所述应用程序实现包括创建令牌的方法,并且以指示值的值填充令牌的密钥控制信息部分 用于形成钥匙的最少数量的关键部件。 创建安全密钥还包括用第一密钥部分填充令牌的有效载荷部分,将密钥控制信息部分绑定到有效负载部分,向第一密钥部分添加第二密钥部分,并迭代该值并绑定密钥控制信息 在添加第二个关键部分之后的部分到有效载荷部分。 创建安全密钥还包括指示密钥是完整的,其中密钥包括第一和第二密钥部分的组合。

    METHOD FOR CONTROLLING SECURITY FUNCTION EXECUTION WITH A FLEXIBLE, ENTENDABLE, AND NON-FORGABLE BLOCK

    公开(公告)号:US20080077794A1

    公开(公告)日:2008-03-27

    申请号:US11534236

    申请日:2006-09-22

    摘要: A method, article, and system for providing an effective implementation of data structures, and application programming interface (API) functions that allow secure execution of functions behind a secure boundary. The controlling mechanism is a flexible, extendable, and non-forgeable block that details how values and parameters behind the secure boundary can be changed. The invention allows for one entity to execute a security function that will normally require extensive authorizations or dual or multiple control. The method and system comprise instructions that are cryptographically protected against alteration or misuse, wherein the instructions further comprise a trusted block that defines security policies that are permitted when an application program employs the trusted block in APIs. The trusted block has a number of fields containing rules that provide an ability to limit how the trusted block is used, thereby reducing the risk of the trusted block being employed in unintended ways. This trusted block controls the critical values or parameters behind the secure boundary. Cryptographically secured data structures are provided that allow for breaking up the instructions in the trusted blocks in a number of steps without reducing the level of security. Systems that make use of the trusted block must provide two API functions; one that encapsulates the block under at least dual control, and one that process the instructions or rules in the trusted block. In particular the invention provides a method, article, and system for the effective implementation for securely transferring symmetric encryption keys to remote devices, such as Automated Teller Machines (ATMs), PIN entry devices, and point of sale terminals. It may also be used to exchange symmetric keys with another cryptographic system of any type, such as a Host Security Module (HSM) in a computer server.

    Method for controlling security function execution with a flexible, extendable, and non-forgable block
    17.
    发明授权
    Method for controlling security function execution with a flexible, extendable, and non-forgable block 失效
    用灵活,可扩展和不可阻止的块来控制安全功能执行的方法

    公开(公告)号:US07779258B2

    公开(公告)日:2010-08-17

    申请号:US11534236

    申请日:2006-09-22

    摘要: A method, article, and system for providing an effective implementation of data structures, and application programming interface (API) functions that allow secure execution of functions behind a secure boundary. The controlling mechanism is a flexible, extendable, and non-forgeable block that details how values and parameters behind the secure boundary can be changed. The invention allows for one entity to execute a security function that will normally require extensive authorizations or dual or multiple control. The method and system comprise instructions that are cryptographically protected against alteration or misuse, wherein the instructions further comprise a trusted block that defines security policies that are permitted when an application program employs the trusted block in APIs. The trusted block has a number of fields containing rules that provide an ability to limit how the trusted block is used, thereby reducing the risk of the trusted block being employed in unintended ways.

    摘要翻译: 一种用于提供有效实施数据结构的方法,文章和系统,以及允许安全执行安全边界后面的功能的应用程序编程接口(API)功能。 控制机制是一个灵活,可扩展和不可伪造的块,详细介绍了安全边界背后的值和参数如何改变。 本发明允许一个实体执行通常需要广泛授权或双重或多重控制的安全功能。 所述方法和系统包括密码保护以防止改变或误用的指令,其中所述指令还包括定义在应用程序在API中使用所述可信块时允许的安全策略的可信块。 可信块具有包含规则的多个字段,这些规则提供了限制如何使用受信任块的能力,从而降低以非预期的方式使用可信块的风险。

    Cipher text translation
    18.
    发明授权
    Cipher text translation 有权
    密码文本翻译

    公开(公告)号:US09369274B2

    公开(公告)日:2016-06-14

    申请号:US13542841

    申请日:2012-07-06

    摘要: A computer system includes memory configured to store information regarding predetermined conditions of an encryption operation and a processor configured to analyze an inbound key and an outbound key of the encryption operation. The processor is also configured to determine that the encryption operation includes a translation from a first class of encryption to a second class of encryption based on the analyzing the inbound key and the outbound key, and to determine whether the translation is permitted based on the predetermined conditions.

    摘要翻译: 计算机系统包括被配置为存储关于加密操作的预定条件的信息的存储器和被配置为分析加密操作的入站密钥和出站密钥的处理器。 处理器还被配置为基于分析入站密钥和出站密钥来确定加密操作包括从第一类加密到第二类加密的翻译,并且基于预定的密码来确定是否允许翻译 条件。

    Personal identification number security enhancement
    19.
    发明授权
    Personal identification number security enhancement 失效
    个人识别号码安全增强

    公开(公告)号:US08639938B2

    公开(公告)日:2014-01-28

    申请号:US13099509

    申请日:2011-05-03

    IPC分类号: H04L29/06

    摘要: A system for enhancing security of a personal identification number is configned for performing a method that includes receiving, from a first entity having an input permission, a first data structure into a HSM, wherein the first data structure maps a first many-to-one mapping between a first and a second PIN numeral system. The method also includes determining whether the content of the first data structure is valid, storing the first data structure in the HSM if the first data structure is valid and marking the stored first data structure as inactive. The method further includes activating the first data structure if a second data structure is input into the HSM by a second entity having an activation permission, wherein the first entity is different from the second entity, the first data structure is identical to the second data structure. The method additionally includes converting from the first to the second PIN numeral system responsive to the activated first data structure.

    摘要翻译: 用于增强个人识别号码的安全性的系统用于执行包括从具有输入许可的第一实体接收第一数据结构到HSM的方法,其中所述第一数据结构映射第一多对一 第一和第二PIN数字系统之间的映射。 该方法还包括确定第一数据结构的内容是否有效,如果第一数据结构有效并将所存储的第一数据结构标记为不活动,则将第一数据结构存储在HSM中。 该方法还包括:如果第二数据结构由具有激活许可的第二实体输入到HSM中,则激活第一数据结构,其中第一实体与第二实体不同,第一数据结构与第二数据结构相同 。 该方法还包括响应于激活的第一数据结构从第一PIN数字系统转换为第二PIN数字系统。

    CIPHER TEXT TRANSLATION
    20.
    发明申请
    CIPHER TEXT TRANSLATION 有权
    CIPHER文本翻译

    公开(公告)号:US20140013122A1

    公开(公告)日:2014-01-09

    申请号:US13542841

    申请日:2012-07-06

    IPC分类号: G06F21/00

    摘要: A computer system includes memory configured to store information regarding predetermined conditions of an encryption operation and a processor configured to analyze an inbound key and an outbound key of the encryption operation. The processor is also configured to determine that the encryption operation includes a translation from a first class of encryption to a second class of encryption based on the analyzing the inbound key and the outbound key, and to determine whether the translation is permitted based on the predetermined conditions.

    摘要翻译: 计算机系统包括被配置为存储关于加密操作的预定条件的信息的存储器和被配置为分析加密操作的入站密钥和出站密钥的处理器。 处理器还被配置为基于分析入站密钥和出站密钥来确定加密操作包括从第一类加密到第二类加密的翻译,并且基于预定的密码来确定是否允许翻译 条件。