KEY AGREEMENT FOR WIRELESS COMMUNICATION
    25.
    发明申请
    KEY AGREEMENT FOR WIRELESS COMMUNICATION 审中-公开
    无线通信的主要协议

    公开(公告)号:US20150139424A1

    公开(公告)日:2015-05-21

    申请号:US14603637

    申请日:2015-01-23

    Applicant: Certicom Corp.

    Abstract: Methods, systems, and computer programs for performing key agreement operations in a communication system are described. In some aspects, a wireless network operator receives a mobile device identifier and accesses a secret key associated with the mobile device. A message authentication code function is evaluated based on the secret key to produce an output value. A session key and a challenge value are obtained based on the output value. In some aspects, a mobile device accesses a secret key in response to receiving the challenge value from the wireless network operator. A message authentication code function is evaluated based on the secret key to produce an output value. A response value and a session key are obtained based on the output value. The response value is transmitted to the wireless network operator.

    Abstract translation: 描述用于在通信系统中执行密钥协商操作的方法,系统和计算机程序。 在一些方面,无线网络运营商接收移动设备标识符并访问与移动设备相关联的秘密密钥。 基于秘密密钥来评估消息认证码功能以产生输出值。 基于输出值获得会话密钥和质询值。 在一些方面,响应于从无线网络运营商接收到挑战值,移动设备访问秘密密钥。 基于秘密密钥来评估消息认证码功能以产生输出值。 基于输出值获得响应值和会话密钥。 响应值被发送到无线网络运营商。

    System and method for operating pseudorandom generators

    公开(公告)号:US11310033B2

    公开(公告)日:2022-04-19

    申请号:US16431845

    申请日:2019-06-05

    Applicant: Certicom Corp.

    Abstract: A method for operating a pseudorandom generator is disclosed. The method may be implemented by a processor of a mobile computing device. The method includes: collecting raw sensor data from at least one sensor associated with the mobile computing device; selecting a subset of the raw sensor data; retrieving first representation representing accumulated entropy associated with one or more previously acquired raw sensor data sets for the at least one sensor; and generating a seed for a pseudorandom generator based on combining the first representation and the selected subset of raw sensor data.

    Generating Cryptographic Function Parameters Based on an Observed Astronomical Event

    公开(公告)号:US20190319783A1

    公开(公告)日:2019-10-17

    申请号:US16449288

    申请日:2019-06-21

    Applicant: Certicom Corp.

    Abstract: Methods, systems, and computer programs for generating cryptographic function parameters are described. In some examples, astronomical data from an observed astronomical event is obtained. A pseudorandom generator is seeded based on the astronomical data. After seeding the pseudorandom generator, an output from the pseudorandom generator is obtained. A parameter for a cryptographic function is generated by operation of one or more data processors. The parameter is generated from the output from the pseudorandom generator.

    Generating cryptographic function parameters based on an observed astronomical event

    公开(公告)号:US10361844B2

    公开(公告)日:2019-07-23

    申请号:US14691383

    申请日:2015-04-20

    Applicant: Certicom Corp.

    Abstract: Methods, systems, and computer programs for generating cryptographic function parameters are described. In some examples, astronomical data from an observed astronomical event is obtained. A pseudorandom generator is seeded based on the astronomical data. After seeding the pseudorandom generator, an output from the pseudorandom generator is obtained. A parameter for a cryptographic function is generated by operation of one or more data processors. The parameter is generated from the output from the pseudorandom generator.

    Generating an elliptic curve point in an elliptic curve cryptographic system

    公开(公告)号:US10320565B2

    公开(公告)日:2019-06-11

    申请号:US15445888

    申请日:2017-02-28

    Applicant: Certicom Corp.

    Abstract: Systems, methods, and software can be used to generate elliptic curve points. In some aspect, the method includes: selecting a field size of 8^91+5; selecting a curve equation that is compatible to the field size; using, by a hardware processor, the selected field size to generate an elliptic curve point; and using, by the hardware processor, the elliptic curve point in an Elliptic Curve Cryptography (ECC) operation.

Patent Agency Ranking