Systems and Methods Using Cryptography to Protect Secure Computing Environments
    82.
    发明申请
    Systems and Methods Using Cryptography to Protect Secure Computing Environments 失效
    使用密码术来保护安全计算环境的系统和方法

    公开(公告)号:US20080031457A1

    公开(公告)日:2008-02-07

    申请号:US11841600

    申请日:2007-08-20

    IPC分类号: H04L9/08 H04L9/00 H04L9/30

    摘要: Secure computation environments are protected from bogus or rogue load modules, executables and other data elements through use of digital signatures, seals and certificates issued by a verifying authority. A verifying authority—which may be a trusted independent third party—tests the load modules or other executables to verify that their corresponding specifications are accurate and complete, and then digitally signs the load module or other executable based on tamper resistance work factor classification. Secure computation environments with different tamper resistance work factors use different verification digital signature authentication techniques (e.g., different signature algorithms and/or signature verification keys)—allowing one tamper resistance work factor environment to protect itself against load modules from another, different tamper resistance work factor environment. Several dissimilar digital signature algorithms may be used to reduce vulnerability from algorithm compromise, and subsets of multiple digital signatures may be used to reduce the scope of any specific compromise.

    摘要翻译: 通过使用验证机构颁发的数字签名,封条和证书,可以保护安全的计算环境免受假冒或流氓加载模块,可执行文件和其他数据元素的影响。 验证机构可以是可靠的独立第三方 - 测试加载模块或其他可执行文件,以验证其相应的规范是否准确和完整,然后基于篡改工作因素分类对加载模块或其他可执行文件进行数字签名。 使用不同防篡改工作因子的安全计算环境使用不同的验证数字签名认证技术(例如,不同的签名算法和/或签名验证密钥) - 允许一个防篡改工作因子环境来保护自身免受另一个不同的篡改电阻工作的负载模块 因素环境。 可以使用几种不相似的数字签名算法来减少算法折中的脆弱性,并且可以使用多个数字签名的子集来减少任何特定折中的范围。

    Managing interactions in a network communications environment

    公开(公告)号:US09813522B2

    公开(公告)日:2017-11-07

    申请号:US12631026

    申请日:2009-12-04

    申请人: David Van Wie

    发明人: David Van Wie

    CPC分类号: H04L67/306 G06Q10/10

    摘要: A network communications environment has advanced interaction management functionality that enables the opportunities for users to interact with one another to be expanded beyond the opportunities that exist with closed interaction management approaches while still providing reasonable privacy and security protections that are not available with open interaction management approaches. The advanced interaction management functionality also encourages the proliferation of trust-based interactions.