Self-signed implicit certificates
    31.
    发明授权
    Self-signed implicit certificates 有权
    自签名隐式证书

    公开(公告)号:US09154494B2

    公开(公告)日:2015-10-06

    申请号:US13856915

    申请日:2013-04-04

    Applicant: Certicom Corp.

    Abstract: There are disclosed systems and methods for creating a self-signed implicit certificate. In one embodiment, the self-signed implicit certificate is generated and operated upon using transformations of a nature similar to the transformations used in the ECQV protocol. In such a system, a root CA or other computing device avoids having to generate an explicit self-signed certificate by instead generating a self-signed implicit certificate.

    Abstract translation: 公开了用于创建自签名隐式证书的系统和方法。 在一个实施例中,使用与ECQV协议中使用的转换类似的性质的变换来生成和操作自签名隐式证书。 在这样的系统中,根CA或其他计算设备避免必须通过代替生成自签名隐式证书来生成显式的自签名证书。

    Key agreement and transport protocol
    33.
    发明授权
    Key agreement and transport protocol 有权
    密钥协议和传输协议

    公开(公告)号:US08892890B2

    公开(公告)日:2014-11-18

    申请号:US14039186

    申请日:2013-09-27

    Applicant: Certicom Corp.

    Inventor: Marinus Struik

    CPC classification number: H04L9/0838 G06F7/725 H04L9/0844

    Abstract: A key establishment protocol includes the generation of a value of cryptographic function, typically a hash, of a session key and public information. This value is transferred between correspondents together with the information necessary to generate the session key. Provided the session key has not been compromised, the value of the cryptographic function will be the same at each of the correspondents. The value of the cryptographic function cannot be compromised or modified without access to the session key.

    Abstract translation: 密钥建立协议包括生成会话密钥和公共信息的加密函数的值,通常是散列值。 该值在通讯者之间传送,以及生成会话密钥所需的信息。 如果会话密钥尚未被泄露,则密码功能的值在每个记者端都是相同的。 加密功能的值不能在不访问会话密钥的情况下被破坏或修改。

    Local Area Network
    34.
    发明申请
    Local Area Network 有权
    局域网

    公开(公告)号:US20140173276A1

    公开(公告)日:2014-06-19

    申请号:US14176803

    申请日:2014-02-10

    Applicant: Certicom Corp.

    Abstract: A method and system for distributed security for a plurality of devices in a communication network, each of the devices being responsible for generating, distributing and controlling its own keys for access to the communication network and using the keys to establish a trusted network, each device's membership to the communication network being checked periodically by other devices by using a challenge response protocol to establish which devices arc allowed access to the communication network and the trusted network.

    Abstract translation: 一种用于通信网络中的多个设备的分布式安全性的方法和系统,每个设备负责生成,分发和控制其自己的密钥以访问通信网络并使用密钥建立可信网络,每个设备的 通过使用挑战响应协议来确定哪些设备允许访问通信网络和可信网络,由其他设备周期性地检查通信网络的成员资格。

Patent Agency Ranking