Apparatus and method for integrating authentication protocols in the establishment of connections between computing devices
    51.
    发明授权
    Apparatus and method for integrating authentication protocols in the establishment of connections between computing devices 有权
    用于在确定计算设备之间的连接的情况下集成认证协议的装置和方法

    公开(公告)号:US08533329B2

    公开(公告)日:2013-09-10

    申请号:US13046861

    申请日:2011-03-14

    IPC分类号: G06F15/173

    CPC分类号: H04L63/0815 G06F21/41

    摘要: An apparatus and method for integrating authentication protocols in the establishment of connections between a controlled-access first computing device and at least one second computing device. In one embodiment, network access user authentication data needed to access the at least one second computing device is transmitted to an authentication server automatically if the user has access to use the first computing device, thereby not requiring the user to manually enter the authentication data needed for such access at the first computing device. The network access user authentication data may be, for example, retrieved from a memory store of the first computing device and/or generated in accordance with an authentication data generating algorithm.

    摘要翻译: 一种用于将认证协议集成在控制访问第一计算设备与至少一个第二计算设备之间的连接建立中的装置和方法。 在一个实施例中,如果用户可以访问使用第一计算设备,则自动地将访问至少一个第二计算设备所需的网络访问用户认证数据传送到认证服务器,从而不要求用户手动输入所需的认证数据 用于在第一计算设备处的这种访问。 网络访问用户认证数据可以例如从第一计算设备的存储器存储器中检索和/或根据认证数据生成算法生成。

    System and method for authenticating streamed data
    55.
    发明授权
    System and method for authenticating streamed data 有权
    用于认证流数据的系统和方法

    公开(公告)号:US08407468B2

    公开(公告)日:2013-03-26

    申请号:US13299520

    申请日:2011-11-18

    IPC分类号: H04L29/06

    CPC分类号: H04L63/08 H04L63/123

    摘要: One embodiment of a method of authenticating data comprises: receiving, at a device, data in a plurality of indexed packets transmitted by a data server, the data of the indexed packets being at least a portion of a larger data stream; receiving, at the device, from a data authentication server connected to the device by a network, a server-computed authentication value based on a subset of the data transmitted by the data server, the data authentication server having access to the data that was transmitted from the data server to the device; and comparing a device-computed authentication value based on a subset of the received data, corresponding to the subset of the data transmitted by the data server, with the server-computed authentication value in order to determine whether the subset of the data received at the device is authentic.

    摘要翻译: 认证数据的方法的一个实施例包括:在设备处接收由数据服务器发送的多个索引分组中的数据,索引分组的数据是较大数据流的至少一部分; 在设备处从由网络连接到设备的数据认证服务器接收基于由数据服务器发送的数据的子集的服务器计算的认证值,数据认证服务器具有访问发送的数据的数据认证服务器 从数据服务器到设备; 以及将与数据服务器发送的数据对应的接收到的数据的子集的设备计算的认证值与服务器计算的认证值进行比较,以便确定是否在 设备是真实的

    System and method for processing attachments to messages sent to a mobile device
    56.
    发明授权
    System and method for processing attachments to messages sent to a mobile device 有权
    用于处理发送到移动设备的消息的附件的系统和方法

    公开(公告)号:US08315601B2

    公开(公告)日:2012-11-20

    申请号:US13459388

    申请日:2012-04-30

    IPC分类号: H04M1/66

    CPC分类号: H04L51/38

    摘要: A system and method for processing attachments to messages sent to a mobile device is described herein. Embodiments described herein apply to encrypted messages comprising multiple message parts, in which different encryption keys (e.g. session keys) have been used to encrypt the different message parts. In at least one example embodiment, the encrypted session keys for every message content part comprising an attachment is received at the mobile device. In one embodiment, all of the encrypted session keys are stored together in a main message header. The mobile device may then decrypt the encrypted session key associated with a user requested attachment, and transmits the decrypted session key to one or more remote servers in an attachment request for use in decrypting the requested attachment. Data associated with the requested attachment, in decrypted form, is returned to the mobile device.

    摘要翻译: 本文描述了用于处理发送到移动设备的消息的附件的系统和方法。 本文描述的实施例适用于包括多个消息部分的加密消息,其中已经使用不同的加密密钥(例如,会话密钥)来加密不同的消息部分。 在至少一个示例实施例中,在移动设备处接收包括附件的每个消息内容部分的加密会话密钥。 在一个实施例中,所有加密的会话密钥一起存储在主消息头中。 然后,移动设备可以解密与用户请求的附件相关联的加密的会话密钥,并将解密的会话密钥发送到附件请求中的一个或多个远程服务器,以用于解密所请求的附件。 与所请求的附件相关联的数据以解密格式返回给移动设备。

    System and method for processing attachments to messages sent to a mobile device

    公开(公告)号:US08195128B2

    公开(公告)日:2012-06-05

    申请号:US13089456

    申请日:2011-04-19

    IPC分类号: H04M1/66

    CPC分类号: H04L51/38

    摘要: A system and method for processing attachments to messages sent to a mobile device is described herein. Embodiments described herein apply to encrypted messages comprising multiple message parts, in which different encryption keys (e.g. session keys) have been used to encrypt the different message parts. In at least one example embodiment, the encrypted session keys for every message content part comprising an attachment is received at the mobile device. In one embodiment, all of the encrypted session keys are stored together in a main message header. The mobile device may then decrypt the encrypted session key associated with a user requested attachment, and transmits the decrypted session key to one or more remote servers in an attachment request for use in decrypting the requested attachment. Data associated with the requested attachment, in decrypted form, is returned to the mobile device.

    Key agreement and re-keying over a bidirectional communication path

    公开(公告)号:US08090107B2

    公开(公告)日:2012-01-03

    申请号:US12973485

    申请日:2010-12-20

    IPC分类号: H04L9/00

    摘要: A key agreement method is carried out by a first system in conjunction with a second system over a bidirectional communication path, including generating a first key pair having a first public key and a first private key, sending the first public key to the second system, receiving a second public key generated by the second system, and calculating a master key based upon the first private key, the second public key, a long-term private key, and a long-term public key. The long-term private key was generated by the first system during a previous key-agreement method as part of a long-term key pair. The long-term public key was generated by the second system and received during the previous key-agreement method. The previous key-agreement method required a secret to be known to the first system and the second system, thus conferring authentication based on the secret to the long-term public key.