Stream cipher design with revolving buffers
    51.
    发明授权
    Stream cipher design with revolving buffers 有权
    流密码设计与旋转缓冲区

    公开(公告)号:US07505588B2

    公开(公告)日:2009-03-17

    申请号:US10815572

    申请日:2004-03-31

    IPC分类号: H04L9/00

    摘要: Techniques are disclosed to limit short-term correlations associated with outputs of stream cipher keystream generators. Output values of a generator are paired such that the paired outputs are sufficiently far apart to be considered independent. In one described implementation, a method includes sequentially storing a plurality of results provided by a stream cipher output rule in a first, second, and third storage units. A pairing function pairs individual values from the first and third storage units that are at least a threshold value apart. Upon reaching the threshold value of the output rule results, the contents of the first, second, and third storage units are rotated serially.

    摘要翻译: 公开了限制与流密码密钥流发生器的输出相关的短期相关性的技术。 发生器的输出值配对,使得配对输出足够远以被认为是独立的。 在一个描述的实现中,一种方法包括在第一,第二和第三存储单元中顺序地存储由流密码输出规则提供的多个结果。 配对功能将来自第一和第三存储单元的各个值对分开至少一个阈值。 当达到输出规则结果的阈值时,第一,第二和第三存储单元的内容被顺序旋转。

    Use of isogenies for design of cryptosystems
    52.
    发明授权
    Use of isogenies for design of cryptosystems 有权
    使用等基因设计密码系统

    公开(公告)号:US07499544B2

    公开(公告)日:2009-03-03

    申请号:US10816083

    申请日:2004-03-31

    IPC分类号: H04L9/30

    摘要: Techniques are disclosed to provide public-key encryption systems. More particularly, isogenies of Abelian varieties (e.g., elliptic curves in one-dimensional cases) are utilized to provide public-key encryption systems. For example, the isogenies permit the use of multiple curves instead of a single curve to provide more secure encryption. The techniques may be applied to digital signatures and/or identity based encryption (IBE) solutions. Furthermore, the isogenies may be used in other applications such as blind signatures, hierarchical systems, and the like. Additionally, solutions are disclosed for generating the isogenies.

    摘要翻译: 公开了提供公钥加密系统的技术。 更具体地,利用Abelian品种的同基因(例如,一维情况下的椭圆曲线)来提供公钥加密系统。 例如,等基因允许使用多个曲线而不是单个曲线来提供更安全的加密。 这些技术可以应用于数字签名和/或基于身份的加密(IBE)解决方案。 此外,等基因可以用于其他应用中,例如盲签名,分层系统等。 另外,公开了用于产生等量基因的解决方案。

    Graph-Based Tamper Resistance Modeling For Software Protection
    54.
    发明申请
    Graph-Based Tamper Resistance Modeling For Software Protection 审中-公开
    基于图形的防篡改建模软件保护

    公开(公告)号:US20080184041A1

    公开(公告)日:2008-07-31

    申请号:US11694695

    申请日:2007-03-30

    IPC分类号: G06F11/30

    CPC分类号: G06F21/554 G06F21/14

    摘要: Implementation of graph-based tamper resistance modeling for software protection is described. In one implementation, paths of execution of a program are modeled as a graph having nodes and edges. A tamper resistance tool receives an input program code corresponding to the program and generates a tamper-resistant program code using integrity checks. Values for the integrity checks are computed during program execution and are compared to pre-computed values to determine whether a section of the program has been tempered with. Values of the integrity checks may be accessed at any point in time during execution of the program.

    摘要翻译: 描述了用于软件保护的基于图形的防篡改建模的实现。 在一个实现中,程序的执行路径被建模为具有节点和边的图。 防篡改工具接收与程序相对应的输入程序代码,并使用完整性检查生成防篡改程序代码。 完整性检查的值在程序执行期间计算,并与预先计算的值进行比较,以确定程序的某个部分是否已被调整。 可以在执行程序期间的任何时间点访问完整性检查的值。

    Automated Secure Pairing for Wireless Devices
    55.
    发明申请
    Automated Secure Pairing for Wireless Devices 有权
    无线设备的自动安全配对

    公开(公告)号:US20080102793A1

    公开(公告)日:2008-05-01

    申请号:US11555093

    申请日:2006-10-31

    IPC分类号: H04M1/66

    摘要: Systems, methods, and/or techniques (“tools”) are described herein that relate to automated secure pairing for devices, and that relate to parallel downloads of content using devices. The tools for pairing the devices may perform authentication protocols that are based on addresses and on keys. The address-based authentication protocol may operate on address book entries maintained by the devices. The key-based authentication protocol may operate using a key exchange between the devices.

    摘要翻译: 这里描述了与设备的自动安全配对相关的系统,方法和/或技术(“工具”),并且涉及使用设备的内容的并行下载。 用于配对设备的工具可以执行基于地址和密钥的认证协议。 基于地址的认证协议可以对由设备维护的地址簿条目进行操作。 基于密钥的认证协议可以使用设备之间的密钥交换来操作。

    Software Protection Using Oblivious Data Structures
    56.
    发明申请
    Software Protection Using Oblivious Data Structures 有权
    使用有价值的数据结构进行软件保护

    公开(公告)号:US20080005476A1

    公开(公告)日:2008-01-03

    申请号:US11627833

    申请日:2007-01-26

    IPC分类号: G06F12/08

    摘要: Software protection using data structures is described. In one implementation, an engine between the processor and the memory of a computing device encrypts and stores data and program variables in blocks of memory that correspond to nodes of a tree-like data structure. When accessed, the nodes of this search tree are rearranged according to various schemata to obscure memory access patterns from being detected by cache attacks or side-channel attacks. In one implementation, the data structure is a splay tree that self-rearranges upon access and increases efficiency while providing security.

    摘要翻译: 描述使用数据结构的软件保护。 在一个实现中,处理器和计算设备的存储器之间的引擎将对应于树状数据结构的节点的数据块和程序变量加密并存储在存储器块中。 当访问时,根据各种模式重新排列该搜索树的节点,以掩盖由高速缓存攻击或侧向信道攻击检测到的存储器访问模式。 在一个实现中,数据结构是一个显示树,在访问时自我重新排列,并在提供安全性的同时提高效率。

    Cryptosystem Based on a Jacobian of a Curve
    58.
    发明申请

    公开(公告)号:US20070058802A1

    公开(公告)日:2007-03-15

    申请号:US11275218

    申请日:2005-12-19

    IPC分类号: H04L9/28

    摘要: A cryptosystem has a secret based on an order of a group of points on a Jacobian of a curve. In certain embodiments, the cryptosystem is used to generate a product identifier corresponding to a particular product. The product identifier is generated by initially receiving a value associated with a copy (or copies) of a product. The received value is padded using a recognizable pattern, and the padded value is converted to a number represented by a particular number of bits. The number is then converted to an element of the Jacobian of the curve, and the element is then raised to a particular power. The result of raising the element to the particular power is then compressed and output as the product identifier. Subsequently, the encryption process can be reversed and the decrypted value used to indicate validity and/or authenticity of the product identifier.

    Image comparison by metric embeddings

    公开(公告)号:US20060269167A1

    公开(公告)日:2006-11-30

    申请号:US11141362

    申请日:2005-05-31

    IPC分类号: G06K9/54 G06K9/68

    CPC分类号: G06K9/469 G06K9/6892

    摘要: Systems and methods are presented for image comparison by metric embeddings. In one implementation, a graph is created from each image to be compared. Graph metrics are then embedded in families of trees for each image. Minimum differences between the respective families of trees for different images are compiled into a matrix, from which a similarity measure is obtained for image comparison.

    Watermarking via quantization of statistics of overlapping regions
    60.
    发明授权
    Watermarking via quantization of statistics of overlapping regions 有权
    通过对重叠区域的统计量量化进行水印

    公开(公告)号:US07095873B2

    公开(公告)日:2006-08-22

    申请号:US10187073

    申请日:2002-06-28

    IPC分类号: G06K9/00

    摘要: An implementation of a technology, described herein, for facilitating watermarking of digital goods. At least one implementation, described herein, performs quantization watermarking based upon semi-global characteristics of multiple regions of the digital good. Such regions are permissively overlapping. The scope of the present invention is pointed out in the appending claims.

    摘要翻译: 本文描述的用于促进数字商品的水印加密的技术的实现。 这里描述的至少一个实施方式基于数字商品的多个区域的半全局特性执行量化水印。 这些区域是允许重叠的。 在所附权利要求中指出了本发明的范围。