Method for securing credentials in a remote repository
    51.
    发明授权
    Method for securing credentials in a remote repository 有权
    在远程存储库中保护凭据的方法

    公开(公告)号:US09455830B2

    公开(公告)日:2016-09-27

    申请号:US14304057

    申请日:2014-06-13

    Abstract: A method of securing user credentials in a remote repository is provided. In accordance with one embodiment, there is provided a method comprising generating a first private key and a first public key pair from a registered password; generating a second private key and a second public key pair; generating a storage key from the second private key and the first public key; encrypting a set of credentials using the storage key; creating a encrypted credential signature from the encrypted set of credentials and the first private key; and storing the encrypted set of credentials, the encrypted credential signature, and the second public key in the remote repository.

    Abstract translation: 提供了一种在远程存储库中保护用户凭据的方法。 根据一个实施例,提供了一种方法,包括从注册密码生成第一私钥和第一公开密钥对; 生成第二私钥和第二公钥对; 从所述第二私钥和所述第一公钥生成存储密钥; 使用存储密钥加密一组凭证; 从加密的凭证集合和第一私钥中创建加密的凭证签名; 以及将加密的一组凭证,加密凭证签名和第二公钥存储在远程存储库中。

    Challenge-Response Authentication Using a Masked Response Value
    52.
    发明申请
    Challenge-Response Authentication Using a Masked Response Value 审中-公开
    使用掩蔽响应值进行挑战响应验证

    公开(公告)号:US20160261417A1

    公开(公告)日:2016-09-08

    申请号:US15158035

    申请日:2016-05-18

    Applicant: Certicom Corp.

    CPC classification number: H04L9/3271 H04L9/3236 H04L2209/04 H04W12/06

    Abstract: Challenge-response authentication protocols are disclosed herein, including systems and methods for a first device to authenticate a second device. In one embodiment, the following operations are performed by the first device: (a) sending to the second device: (i) a challenge value corresponding to an expected response value known by the first device, and (ii) a hiding value; (b) receiving from the second device a masked response value; (c) obtaining an expected masked response value from the expected response value and the hiding value; and (d) determining whether the expected masked response value matches the masked response value received from the second device. The operations from the perspective of the second device are also disclosed, which in some embodiments include computing the masked response value using the challenge value, the hiding value, and secret information known to the second device.

    Abstract translation: 本文公开了挑战响应认证协议,包括用于第一设备认证第二设备的系统和方法。 在一个实施例中,以下操作由第一设备执行:(a)向第二设备发送:(i)对应于由第一设备已知的预期响应值的挑战值,以及(ii)隐藏值; (b)从第二设备接收被屏蔽的响应值; (c)从预期响应值和隐藏值获得预期屏蔽响应值; 以及(d)确定预期的屏蔽响应值是否与从第二设备接收到的屏蔽的响应值相匹配。 还公开了从第二设备的角度的操作,在一些实施例中,这些操作包括使用挑战值,隐藏值和第二设备已知的秘密信息来计算被屏蔽的响应值。

    System and method of lawful access to secure communications
    54.
    发明授权
    System and method of lawful access to secure communications 有权
    合法访问安全通信的系统和方法

    公开(公告)号:US09413530B2

    公开(公告)日:2016-08-09

    申请号:US13739620

    申请日:2013-01-11

    CPC classification number: H04L63/306 H04L9/0861 H04L2209/80

    Abstract: Systems and methods for secure communications are provided. In some aspects, a method of signalling an interception time period is described. At least one keying information used by a key management service (KMS) to regenerate a key is stored. A start_interception message is signaled from an administration function (ADMF) to a call session control function (CSCF). A halt_message is signaled from the ADMF to the CSCF.

    Abstract translation: 提供了用于安全通信的系统和方法。 在一些方面,描述了用于发信号通知截取时间段的方法。 存储密钥管理服务(KMS)用于重新生成密钥的至少一个密钥信息。 start_interception消息从管理功能(ADMF)发送到呼叫会话控制功能(CSCF)。 从ADMF向CSCF发出halt_message信号。

    System and method of lawful access to secure communications
    55.
    发明授权
    System and method of lawful access to secure communications 有权
    合法访问安全通信的系统和方法

    公开(公告)号:US09264227B2

    公开(公告)日:2016-02-16

    申请号:US13739671

    申请日:2013-01-11

    Abstract: The present disclosure relates to systems and methods for secure communications. In some aspects, an initiator KMS receives, from an initiator UE, one or more values used in generation of an encryption key, which includes obtaining at least one value associated with a RANDRi. The initiator KMS sends the at least one value associated with the RANDRi to a responder KMS. The responder KMS generates the encryption key using the one or more values.

    Abstract translation: 本公开涉及用于安全通信的系统和方法。 在一些方面,发起方KMS从发起方UE接收用于生成加密密钥的一个或多个值,其包括获得与RANDRi相关联的至少一个值。 启动器KMS将与RANDRi相关联的至少一个值发送到响应者KMS。 响应者KMS使用一个或多个值生成加密密钥。

    Public Key Encryption Algorithms for Hard Lock File Encryption
    57.
    发明申请
    Public Key Encryption Algorithms for Hard Lock File Encryption 有权
    用于硬锁文件加密的公钥加密算法

    公开(公告)号:US20150124961A1

    公开(公告)日:2015-05-07

    申请号:US14073379

    申请日:2013-11-06

    Abstract: In some aspects, an encryption method comprises encrypting a first portion of a message using a first secret key. The first secret key is generated based on the public key of an entity. A one-way function is used to generate a second secret key from the first secret key, and the first secret key is subsequently discarded. A second portion of the message is encrypted using the second secret key. The encrypted first portion of the message and the encrypted second portion of the message are provided to the entity.

    Abstract translation: 在一些方面,加密方法包括使用第一秘密密钥加密消息的第一部分。 第一个秘密密钥是根据实体的公钥生成的。 单向函数用于从第一秘密密钥生成第二秘密密钥,并且随后丢弃第一秘密密钥。 消息的第二部分使用第二秘密密钥进行加密。 将消息的加密的第一部分和消息的加密的第二部分提供给实体。

    System and method for remote device registration
    58.
    发明授权
    System and method for remote device registration 有权
    用于远程设备注册的系统和方法

    公开(公告)号:US08972721B2

    公开(公告)日:2015-03-03

    申请号:US13861540

    申请日:2013-04-12

    Applicant: Certicom Corp.

    Abstract: A system and method for remote device registration, to monitor and meter the injection of keying or other confidential information onto a device, is provided. A producer who utilizes one or more separate manufacturers, operates a remote module that communicates over forward and backward channels with a local module at the manufacturer. Encrypted data transmissions are sent by producer to the manufacturer and are decrypted to obtain sensitive data used in the devices. As data transmissions are decrypted, credits from a credit pool are depleted and can be replenished by the producer through credit instructions. As distribution images are decrypted, usage records are created and eventually concatenated, and sent as usage reports back to the producer, to enable the producer to monitor and meter production at the manufacturer.

    Abstract translation: 提供了用于远程设备注册的系统和方法,用于监视和计量密钥或其他机密信息到设备上的注入。 使用一个或多个单独的制造商的生产商操作远程模块,其通过前向和后向通道与制造商的本地模块进行通信。 加密的数据传输由制造商发送给制造商,并被解密以获得在设备中使用的敏感数据。 当数据传输被解密时,来自信用卡的信用被用尽,并且可以通过信用指示由生产者补充。 随着分发图像被解密,创建使用记录并最终并入,并将其作为使用报告发送回制造商,以使制造商能够监视制造商的生产计量。

    Hashing Prefix-Free Values in a Signature Scheme
    59.
    发明申请
    Hashing Prefix-Free Values in a Signature Scheme 有权
    签名方案中的哈希前缀免费值

    公开(公告)号:US20140372765A1

    公开(公告)日:2014-12-18

    申请号:US14477073

    申请日:2014-09-04

    Applicant: Certicom Corp.

    CPC classification number: H04L9/3252 H04L9/3242 H04L9/3268

    Abstract: Methods, systems, and computer programs for producing hash values are disclosed. A prefix-free value is obtained based on input data. The prefix-free value can be based on an implicit certificate, a message to be signed, a message to be verified, or other suitable information. A hash value is obtained by applying a hash function to the prefix-free value. The hash value is used in a cryptographic scheme. In some instances, a public key or a private key is generated based on the hash value. In some instances, a digital signature is generated based on the hash value, or a digital signature is verified based on the hash value, as appropriate.

    Abstract translation: 公开了用于产生散列值的方法,系统和计算机程序。 基于输入数据获得无前缀值。 无前缀的值可以基于隐式证书,要签名的消息,要验证的消息或其他合适的信息。 通过将哈希函数应用于无前缀的值来获得哈希值。 哈希值用于加密方案。 在某些情况下,基于哈希值生成公钥或私钥。 在某些情况下,根据哈希值生成数字签名,或者根据哈希值,适当地验证数字签名。

    Method and Apparatus for Verifiable Generation of Public Keys
    60.
    发明申请
    Method and Apparatus for Verifiable Generation of Public Keys 有权
    可验证生成公钥的方法和装置

    公开(公告)号:US20140325227A1

    公开(公告)日:2014-10-30

    申请号:US14203079

    申请日:2014-03-10

    Applicant: Certicom Corp.

    Abstract: The invention provides a method of verifiable generation of public keys. According to the method, a self-signed signature is first generated and then used as input to the generation of a pair of private and public keys. Verification of the signature proves that the keys are generated from a key generation process utilizing the signature. A certification authority can validate and verify a public key generated from a verifiable key generation process.

    Abstract translation: 本发明提供了可验证地生成公钥的方法。 根据该方法,首先生成自签名签名,然后将其用作生成一对私钥和公钥的输入。 签名的验证证明密钥是利用签名的密钥生成过程产生的。 认证机构可以验证和验证从可验证密钥生成过程产生的公钥。

Patent Agency Ranking