Generating Cryptographic Function Parameters From a Puzzle
    33.
    发明申请
    Generating Cryptographic Function Parameters From a Puzzle 审中-公开
    从拼图生成加密函数参数

    公开(公告)号:US20170063535A1

    公开(公告)日:2017-03-02

    申请号:US14691372

    申请日:2015-04-20

    Applicant: Certicom Corp.

    Abstract: Methods, systems, and computer programs for generating cryptographic function parameters are described. In some examples, a solution to a puzzle is obtained. A pseudorandom generator is seeded based on the solution. After seeding the pseudorandom generator, an output from the pseudorandom generator is obtained. A parameter for a cryptographic function is generated. The parameter is generated from the output from the pseudorandom generator.

    Abstract translation: 描述用于生成加密功能参数的方法,系统和计算机程序。 在一些示例中,获得难题的解决方案。 基于该解决方案接种伪随机发生器。 在伪随机发生器接种之后,获得来自伪随机发生器的输出。 生成加密功能的参数。 该参数是从伪随机发生器的输出生成的。

    Elliptic Curve Random Number Generation
    34.
    发明申请
    Elliptic Curve Random Number Generation 审中-公开
    椭圆曲线随机数生成

    公开(公告)号:US20150156019A1

    公开(公告)日:2015-06-04

    申请号:US14575844

    申请日:2014-12-18

    Applicant: Certicom Corp.

    Abstract: An elliptic curve random number generator avoids escrow keys by choosing a point Q on the elliptic curve as verifiably random. An arbitrary string is chosen and a hash of that string computed. The hash is then converted to a field element of the desired field, the field element regarded as the x-coordinate of a point Q on the elliptic curve and the x-coordinate is tested for validity on the desired elliptic curve. If valid, the x-coordinate is decompressed to the point Q, wherein the choice of which is the two points is also derived from the hash value. intentional use of escrow keys can provide for back up functionality. The relationship between P and Q is used as an escrow key and stored by for a security domain. The administrator logs the output of the generator to reconstruct the random number with the escrow key.

    Abstract translation: 椭圆曲线随机数发生器通过选择椭圆曲线上的点Q可以无限次地避免代管钥匙。 选择一个任意的字符串,并计算该字符串的散列。 然后将散列转换为所需场的场元素,将该场元素视为椭圆曲线上的点Q的x坐标,并且在期望的椭圆曲线上测试x坐标的有效性。 如果有效,则将x坐标解压缩到点Q,其中,从哈希值得出两个点的选择。 有意使用代管密钥可以提供备份功能。 P和Q之间的关系用作托管密钥,并由安全域存储。 管理员记录生成器的输出,用代管密钥重构随机数。

    Systems and Methods for Managing Lost Devices
    35.
    发明申请
    Systems and Methods for Managing Lost Devices 有权
    管理丢失设备的系统和方法

    公开(公告)号:US20140354409A1

    公开(公告)日:2014-12-04

    申请号:US14459101

    申请日:2014-08-13

    Applicant: Certicom Corp.

    Abstract: A method for a device to determine that it has been lost is provided. The method comprises the device determining its current location, the device comparing its current location to a plurality of stored locations, and the device determining that it has been lost when its current location is a stored location that has been designated as a location where the device is unlikely to be located or is not a stored location that has been designated as a location where the device is likely to be located.

    Abstract translation: 提供了一种用于确定其已经丢失的装置的方法。 该方法包括确定其当前位置的设备,该设备将其当前位置与多个存储位置进行比较,并且该设备确定当其当前位置是被指定为该设备的位置时的存储位置已丢失的设备 不太可能被定位或不被指定为设备可能位于的位置的存储位置。

    Generating cryptographic function parameters from compact source code

    公开(公告)号:US10944751B2

    公开(公告)日:2021-03-09

    申请号:US16529629

    申请日:2019-08-01

    Applicant: Certicom Corp.

    Abstract: Methods, systems, and computer programs for generating cryptographic function parameters are described. In some examples, source code that defines seed information and a pseudorandom function is accessed. A parameter for a cryptographic function by operation of one or more data processors is generated. The parameter is generated from the seed information and the pseudorandom function. The parameter has a larger size in memory than the source code that defines the seed information and the pseudorandom function.

    Generating cryptographic function parameters from compact source code

    公开(公告)号:US10375070B2

    公开(公告)日:2019-08-06

    申请号:US14691337

    申请日:2015-04-20

    Applicant: Certicom Corp.

    Abstract: Methods, systems, and computer programs for generating cryptographic function parameters are described. In some examples, source code that defines seed information and a pseudorandom function is accessed. A parameter for a cryptographic function by operation of one or more data processors is generated. The parameter is generated from the seed information and the pseudorandom function. The parameter has a larger size in memory than the source code that defines the seed information and the pseudorandom function.

    Method and system for cheon resistant static diffie-hellman security

    公开(公告)号:US10129026B2

    公开(公告)日:2018-11-13

    申请号:US15145428

    申请日:2016-05-03

    Applicant: Certicom Corp.

    Abstract: A method for providing Cheon-resistance security for a static elliptic curve Diffie-Hellman cryptosystem (ECDH), the method including providing a system for message communication between a pair of correspondents, a message being exchanged in accordance with ECDH instructions executable on computer processors of the respective correspondents, the ECDH instructions using a curve selected from a plurality of curves, the selecting including choosing a range of curves; selecting, from the range of curves, curves matching a threshold efficiency; excluding, within the selected curves, curves which may include intentional vulnerabilities; and electing, from non-excluded selected curves, a curve with Cheon resistance, the electing comprising a curve from an additive group of order q, wherein q is prime, such that q−1=cr and q+1=ds, where r and s are primes and c and d are integer Cheon cofactors of the group, such that cd≤48.

Patent Agency Ranking