-
公开(公告)号:US09900861B2
公开(公告)日:2018-02-20
申请号:US15210341
申请日:2016-07-14
Applicant: Certicom Corp.
Inventor: Daniel Richard L. Brown
IPC: G08B13/14 , H04W64/00 , G08B5/36 , H04W4/02 , H04W4/20 , H04W12/12 , G08B21/24 , H04W8/22 , H04W88/02
CPC classification number: H04W64/006 , G08B5/36 , G08B13/1436 , G08B21/24 , H04W4/027 , H04W4/029 , H04W4/20 , H04W8/22 , H04W12/12 , H04W88/02
Abstract: A method for a device to determine that it has been lost is provided. The method comprises the device determining its current location, the device comparing its current location to a plurality of stored locations, and the device determining that it has been lost when its current location is a stored location that has been designated as a location where the device is unlikely to be located or is not a stored location that has been designated as a location where the device is likely to be located.
-
公开(公告)号:US09621545B2
公开(公告)日:2017-04-11
申请号:US14799392
申请日:2015-07-14
Applicant: Certicom Corp.
CPC classification number: H04L63/0823 , H04L9/0847 , H04L9/0869 , H04L9/3066 , H04L63/08 , H04L63/126 , H04L63/166 , H04L63/18 , H04L67/14
Abstract: A system and method are provided for enabling a client device to connect to a network. The method comprises: obtaining an authorization code via a communication channel different from the network, the authorization code corresponding to the client device; and after detecting initiation of a security negotiation protocol by the client device, using the authorization code in at least one security negotiation operation.
-
33.
公开(公告)号:US20170063535A1
公开(公告)日:2017-03-02
申请号:US14691372
申请日:2015-04-20
Applicant: Certicom Corp.
Inventor: Daniel Richard L. Brown
CPC classification number: H04L9/0662 , G09C5/00 , H04L9/0869 , H04L9/3006 , H04L9/3066 , H04L63/0442 , H04L63/126
Abstract: Methods, systems, and computer programs for generating cryptographic function parameters are described. In some examples, a solution to a puzzle is obtained. A pseudorandom generator is seeded based on the solution. After seeding the pseudorandom generator, an output from the pseudorandom generator is obtained. A parameter for a cryptographic function is generated. The parameter is generated from the output from the pseudorandom generator.
Abstract translation: 描述用于生成加密功能参数的方法,系统和计算机程序。 在一些示例中,获得难题的解决方案。 基于该解决方案接种伪随机发生器。 在伪随机发生器接种之后,获得来自伪随机发生器的输出。 生成加密功能的参数。 该参数是从伪随机发生器的输出生成的。
-
公开(公告)号:US20150156019A1
公开(公告)日:2015-06-04
申请号:US14575844
申请日:2014-12-18
Applicant: Certicom Corp.
Inventor: Daniel Richard L. Brown , Scott Alexander Vanstone
IPC: H04L9/08
CPC classification number: H04L9/0869 , G06F7/582 , G06F7/588 , G06F7/725 , H04L9/0662 , H04L9/0816 , H04L9/0894 , H04L9/3066 , H04L2209/20 , H04L2209/24 , H04L2209/26
Abstract: An elliptic curve random number generator avoids escrow keys by choosing a point Q on the elliptic curve as verifiably random. An arbitrary string is chosen and a hash of that string computed. The hash is then converted to a field element of the desired field, the field element regarded as the x-coordinate of a point Q on the elliptic curve and the x-coordinate is tested for validity on the desired elliptic curve. If valid, the x-coordinate is decompressed to the point Q, wherein the choice of which is the two points is also derived from the hash value. intentional use of escrow keys can provide for back up functionality. The relationship between P and Q is used as an escrow key and stored by for a security domain. The administrator logs the output of the generator to reconstruct the random number with the escrow key.
Abstract translation: 椭圆曲线随机数发生器通过选择椭圆曲线上的点Q可以无限次地避免代管钥匙。 选择一个任意的字符串,并计算该字符串的散列。 然后将散列转换为所需场的场元素,将该场元素视为椭圆曲线上的点Q的x坐标,并且在期望的椭圆曲线上测试x坐标的有效性。 如果有效,则将x坐标解压缩到点Q,其中,从哈希值得出两个点的选择。 有意使用代管密钥可以提供备份功能。 P和Q之间的关系用作托管密钥,并由安全域存储。 管理员记录生成器的输出,用代管密钥重构随机数。
-
公开(公告)号:US20140354409A1
公开(公告)日:2014-12-04
申请号:US14459101
申请日:2014-08-13
Applicant: Certicom Corp.
Inventor: Daniel Richard L. Brown
IPC: G08B21/24
CPC classification number: H04W64/006 , G08B5/36 , G08B13/1436 , G08B21/24 , H04W4/027 , H04W4/029 , H04W4/20 , H04W8/22 , H04W12/12 , H04W88/02
Abstract: A method for a device to determine that it has been lost is provided. The method comprises the device determining its current location, the device comparing its current location to a plurality of stored locations, and the device determining that it has been lost when its current location is a stored location that has been designated as a location where the device is unlikely to be located or is not a stored location that has been designated as a location where the device is likely to be located.
Abstract translation: 提供了一种用于确定其已经丢失的装置的方法。 该方法包括确定其当前位置的设备,该设备将其当前位置与多个存储位置进行比较,并且该设备确定当其当前位置是被指定为该设备的位置时的存储位置已丢失的设备 不太可能被定位或不被指定为设备可能位于的位置的存储位置。
-
公开(公告)号:US10944751B2
公开(公告)日:2021-03-09
申请号:US16529629
申请日:2019-08-01
Applicant: Certicom Corp.
Inventor: Daniel Richard L. Brown
Abstract: Methods, systems, and computer programs for generating cryptographic function parameters are described. In some examples, source code that defines seed information and a pseudorandom function is accessed. A parameter for a cryptographic function by operation of one or more data processors is generated. The parameter is generated from the seed information and the pseudorandom function. The parameter has a larger size in memory than the source code that defines the seed information and the pseudorandom function.
-
公开(公告)号:US10375070B2
公开(公告)日:2019-08-06
申请号:US14691337
申请日:2015-04-20
Applicant: Certicom Corp.
Inventor: Daniel Richard L. Brown
Abstract: Methods, systems, and computer programs for generating cryptographic function parameters are described. In some examples, source code that defines seed information and a pseudorandom function is accessed. A parameter for a cryptographic function by operation of one or more data processors is generated. The parameter is generated from the seed information and the pseudorandom function. The parameter has a larger size in memory than the source code that defines the seed information and the pseudorandom function.
-
公开(公告)号:US10284370B2
公开(公告)日:2019-05-07
申请号:US14318313
申请日:2014-06-27
Applicant: Certicom Corp.
Inventor: Marinus Struik , Daniel Richard L. Brown , Scott Alexander Vanstone , Robert Philip Gallant , Adrian Antipa , Robert John Lambert
Abstract: Accelerated computation of combinations of group operations in a finite field is provided by arranging for at least one of the operands to have a relatively small bit length. In a elliptic curve group, verification that a value representative of a point R corresponds the sum of two other points uG and vG is obtained by deriving integers w,z of reduced bit length and that v=w/z. The verification equality R=uG+vQ may then be computed as −zR+(uz mod n)G+wQ=O with z and w of reduced bit length. This is beneficial in digital signature verification where increased verification can be attained.
-
公开(公告)号:US10129026B2
公开(公告)日:2018-11-13
申请号:US15145428
申请日:2016-05-03
Applicant: Certicom Corp.
Inventor: Daniel Richard L. Brown
Abstract: A method for providing Cheon-resistance security for a static elliptic curve Diffie-Hellman cryptosystem (ECDH), the method including providing a system for message communication between a pair of correspondents, a message being exchanged in accordance with ECDH instructions executable on computer processors of the respective correspondents, the ECDH instructions using a curve selected from a plurality of curves, the selecting including choosing a range of curves; selecting, from the range of curves, curves matching a threshold efficiency; excluding, within the selected curves, curves which may include intentional vulnerabilities; and electing, from non-excluded selected curves, a curve with Cheon resistance, the electing comprising a curve from an additive group of order q, wherein q is prime, such that q−1=cr and q+1=ds, where r and s are primes and c and d are integer Cheon cofactors of the group, such that cd≤48.
-
公开(公告)号:US09825919B2
公开(公告)日:2017-11-21
申请号:US14930179
申请日:2015-11-02
Applicant: BlackBerry Limited , Certicom Corp.
Inventor: Robert John Lambert , Daniel Richard L. Brown , Atsushi Yamada
CPC classification number: H04L63/0428 , H04L9/0637 , H04L9/0841 , H04L9/0861 , H04L9/14 , H04L9/3066 , H04L9/3242 , H04L63/06
Abstract: In some aspects, an encryption method comprises encrypting a first portion of a message using a first secret key. The first secret key is generated based on the public key of an entity. A one-way function is used to generate a second secret key from the first secret key, and the first secret key is subsequently discarded. A second portion of the message is encrypted using the second secret key. The encrypted first portion of the message and the encrypted second portion of the message are provided to the entity.
-
-
-
-
-
-
-
-
-