Elliptic curve cryptosystem optimization using two phase key generation
    1.
    发明授权
    Elliptic curve cryptosystem optimization using two phase key generation 有权
    椭圆曲线密码系统优化使用两阶段密钥生成

    公开(公告)号:US07912216B2

    公开(公告)日:2011-03-22

    申请号:US11366529

    申请日:2006-03-03

    申请人: Mehdi Sotoodeh

    发明人: Mehdi Sotoodeh

    IPC分类号: H04L9/00

    摘要: A computer-implemented method of generating an elliptic curve cryptosystem (ECC) signature includes the steps of: generating a first random key (k1) having n bits, where n is a natural number; calculating a first ECC point (V) from k1 and a base point; and storing k1 and V securely in a computer-readable medium. To digitally sign electronic data, the method further includes the steps of generating a second random key (k2), where k2 has fewer than n bits; calculating a second ECC point (Q) from V and k2; and digitally signing electronic data using Q.

    摘要翻译: 一种产生椭圆曲线加密系统(ECC)签名的计算机实现方法包括以下步骤:产生具有n位的第一随机密钥(k1),其中n是自然数; 从k1和基点计算第一ECC点(V); 并将k1和V安全地存储在计算机可读介质中。 为了对电子数据进行数字签名,该方法还包括以下步骤:产生第二随机密钥(k2),其中k2具有少于n个比特; 从V和k2计算第二ECC点(Q); 并使用Q对电子数据进行数字签名。

    USB-compliant personal key with integral input and output devices
    2.
    发明授权
    USB-compliant personal key with integral input and output devices 有权
    符合USB标准的个人钥匙,具有集成的输入和输出设备

    公开(公告)号:US07272723B1

    公开(公告)日:2007-09-18

    申请号:US09449159

    申请日:1999-11-24

    摘要: A compact, self-contained, personal key is disclosed. The personal key comprises a USB-compliant interface releaseably coupleable to a host processing device; a memory; and a processor. The processor provides the host processing device conditional access to data storable in the memory as well as the functionality required to manage files stored in the personal key and for performing computations based on the data in the files. In one embodiment, the personal key also comprises an integral user input device and an integral user output device. The input and output devices communicate with the processor by communication paths which are independent from the USB-compliant interface, and thus allow the user to communicate with the processor without manifesting any private information external to the personal key.

    摘要翻译: 公开了一种紧凑,独立的个人钥匙。 个人密钥包括可释放地耦合到主机处理设备的USB兼容接口; 记忆 和处理器。 处理器为主机处理设备提供条件访问存储在存储器中的数据以及管理存储在个人密钥中的文件所需的功能,并且用于基于文件中的数据进行计算。 在一个实施例中,个人密钥还包括整体用户输入设备和整体用户输出设备。 输入和输出设备通过独立于USB兼容接口的通信路径与处理器进行通信,从而允许用户与处理器进行通信,而不显示个人密钥外部的任何私人信息。

    Secure IR communication between a keypad and a token
    3.
    发明授权
    Secure IR communication between a keypad and a token 有权
    保护小键盘和令牌之间的IR通信

    公开(公告)号:US07269844B2

    公开(公告)日:2007-09-11

    申请号:US09899472

    申请日:2001-07-03

    IPC分类号: G06F17/30 H04B1/00 H04Q1/00

    摘要: A device that secures a token from unauthorized use is disclosed. The device comprises a user interface for accepting a personal identifier, a processor, communicatively coupled to the user interface device, and a token interface. The token interface includes a token interface IR emitter that produces an IR signal having information included in the PIN. The token IR emitter is coupled to the processor and is further communicatively coupled to a token IR sensor when the token is physically coupled with the token interface. The token interface also includes a shield, substantially opaque to the IR signal, for substantially confining the reception of the IR signal to the token IR sensor. In one embodiment, the shield substantially circumscribes the IR emitter. In another embodiment, the interface also comprises a token interface IR sensor, which allows communications from the token to the device as well.

    摘要翻译: 披露了保护令牌免受未经授权使用的设备。 该设备包括用于接受个人标识符的用户界面,通信地耦合到用户界面设备的处理器和令牌接口。 令牌接口包括令牌接口IR发射器,其产生具有PIN中包括的信息的IR信号。 令牌IR发射器耦合到处理器,并且当令牌与令牌接口物理耦合时,进一步通信地耦合到令牌IR传感器。 令牌接口还包括对IR信号基本不透明的屏蔽,用于将IR信号的接收基本上限制在令牌IR传感器上。 在一个实施例中,屏蔽件基本上包围IR发射器。 在另一个实施例中,接口还包括令牌接口IR传感器,其允许从令牌到设备的通信。

    Key generation performance improvement
    4.
    发明授权
    Key generation performance improvement 有权
    关键代码性能提升

    公开(公告)号:US07233663B2

    公开(公告)日:2007-06-19

    申请号:US10282700

    申请日:2002-10-29

    申请人: Mehdi Sotoodeh

    发明人: Mehdi Sotoodeh

    CPC分类号: H04L9/3033

    摘要: A method, apparatus, and article of manufacture provide the ability to rapidly generate a large prime number to be utilized in a cryptographic key of a cryptographic system. A candidate prime number is determined and a mod remainder table is initialized for the candidate prime number using conventional mod operations. If all mod remainder entries in the table are non-zero, the candidate number is tested for primality. If the candidate prime number tests positive for primality, the candidate number is utilized in a cryptographic key of a cryptographic system. If any of the table entries is zero, the candidate number and each mod remainder entry are decremented/incremented. If any mod remainder entry is less than zero or greater than the corresponding prime number, the corresponding prime number is added/subtracted to/from the mod remainder. The process then repeats until a satisfactory number is obtained.

    摘要翻译: 方法,装置和制品提供了在密码系统的密码密钥中快速生成要使用的大质数的能力。 确定候选素数,并使用常规的mod操作为候选素数初始化mod余数表。 如果表中的所有mod余数条目都不为零,则对候选号码进行初始化测试。 如果候选质数对于原始性测试为正,候选号码被用于密码系统的加密密钥。 如果任何一个表条目为零,候选号码和每个mod余数条目将递减/递增。 如果任何mod余数项小于零或大于相应的素数,则相应的素数被加/减从mod余数。 然后重复该过程,直到获得令人满意的数字。

    Software protection method utilizing hidden application code in a protection dynamic link library object
    6.
    发明授权
    Software protection method utilizing hidden application code in a protection dynamic link library object 有权
    在保护动态链接库对象中利用隐藏应用代码的软件保护方法

    公开(公告)号:US07320075B2

    公开(公告)日:2008-01-15

    申请号:US10298701

    申请日:2002-11-18

    IPC分类号: G06F12/14 H04L9/00

    CPC分类号: G06F21/125 G06F2221/0797

    摘要: A system and method in which the operating system of the user computer loads the software application and a DLL having a portion of the application execution code stored therein into memory is disclosed. At selected points during its execution, the software application calls the DLL to execute a portion of the application code that was saved into the DLL before delivery to the end user. Since this code is encrypted and the encryption key is stored in a hardware security device and not in the DLL or the software application, the application code portion cannot be executed without recovering the key.

    摘要翻译: 公开了一种系统和方法,其中用户计算机的操作系统将软件应用程序加载,并且具有其中存储有应用执行代码的一部分的DLL到存储器中。 在执行期间的选定点,软件应用程序调用DLL,以便在发送给最终用户之前执行保存到DLL中的应用程序代码的一部分。 由于该代码被加密并且加密密钥存储在硬件安全设备中,而不存储在DLL或软件应用程序中,所以在不恢复密钥的情况下不能执行应用程序代码部分。

    System, method, and computer security device having virtual memory cells
    8.
    发明授权
    System, method, and computer security device having virtual memory cells 有权
    具有虚拟存储单元的系统,方法和计算机安全设备

    公开(公告)号:US08935771B2

    公开(公告)日:2015-01-13

    申请号:US11593170

    申请日:2006-11-06

    申请人: Mehdi Sotoodeh

    发明人: Mehdi Sotoodeh

    IPC分类号: G06F21/00 G06F21/34 G06F21/79

    CPC分类号: G06F21/34 G06F21/79

    摘要: A computer security system may include a removable security device adapted to connect to the input/output port of a computer. The security device may include: a random access memory (RAM) cell; and a processor. The security system may further include: at least one encrypted update packet stored remotely from the security device and adapted to modify the contents of the RAM cell; and a private key located on the security device and adapted to decrypt the update packet; and at least one of a device driver, a software application, and/or a library stored remotely from, and in communication with, the security device and adapted to cause the contents of the at least one cell to be switched out of the cell, stored remotely from the cell, and loaded back into the cell.

    摘要翻译: 计算机安全系统可以包括适于连接到计算机的输入/输出端口的可拆卸安全装置。 安全设备可以包括:随机存取存储器(RAM)单元; 和处理器。 所述安全系统还可以包括:至少一个加密的更新包,其从所述安全设备远程存储并适于修改所述RAM单元的内容; 以及私钥,其位于所述安全设备上并且适于对所述更新分组进行解密; 以及从安全设备远程和与之通信的设备驱动程序,软件应用程序和/或库中的至少一个,并且适于使所述至少一个单元的内容被切换出该单元, 从单元远程存储,并加载回单元格。

    System, method, and computer security device having virtual memory cells
    9.
    发明申请
    System, method, and computer security device having virtual memory cells 有权
    具有虚拟存储单元的系统,方法和计算机安全设备

    公开(公告)号:US20080109661A1

    公开(公告)日:2008-05-08

    申请号:US11593170

    申请日:2006-11-06

    申请人: Mehdi Sotoodeh

    发明人: Mehdi Sotoodeh

    IPC分类号: G06F12/14

    CPC分类号: G06F21/34 G06F21/79

    摘要: A computer security system may include a removable security device adapted to connect to the input/output port of a computer. The security device may include: a random access memory (RAM) cell; and a processor. The security system may further include: at least one encrypted update packet stored remotely from the security device and adapted to modify the contents of the RAM cell; and a private key located on the security device and adapted to decrypt the update packet; and at least one of a device driver, a software application, and/or a library stored remotely from, and in communication with, the security device and adapted to cause the contents of the at least one cell to be switched out of the cell, stored remotely from the cell, and loaded back into the cell.

    摘要翻译: 计算机安全系统可以包括适于连接到计算机的输入/输出端口的可拆卸安全装置。 安全设备可以包括:随机存取存储器(RAM)单元; 和处理器。 所述安全系统还可以包括:至少一个加密的更新包,其从所述安全设备远程存储并适于修改所述RAM单元的内容; 以及私钥,其位于所述安全设备上并且适于对所述更新分组进行解密; 以及从安全设备远程和与之通信的设备驱动程序,软件应用程序和/或库中的至少一个,并且适于使所述至少一个单元的内容被切换出该单元, 从单元远程存储,并加载回单元格。

    Elliptic curve cryptosystem optimization using two phase key generation
    10.
    发明申请
    Elliptic curve cryptosystem optimization using two phase key generation 有权
    椭圆曲线密码系统优化使用两阶段密钥生成

    公开(公告)号:US20070206789A1

    公开(公告)日:2007-09-06

    申请号:US11366529

    申请日:2006-03-03

    申请人: Mehdi Sotoodeh

    发明人: Mehdi Sotoodeh

    IPC分类号: H04L9/00

    摘要: A computer-implemented method of generating an elliptic curve cryptosystem (ECC) signature includes the steps of: generating a first random key (k1) having n bits, where n is a natural number; calculating a first ECC point (V) from k1 and a base point; and storing k1 and V securely in a computer-readable medium. To digitally sign electronic data, the method further includes the steps of generating a second random key (k2), where k2 has fewer than n bits; calculating a second ECC point (Q) from V and k2; and digitally signing electronic data using Q.

    摘要翻译: 一种产生椭圆曲线密码系统(ECC)签名的计算机实现方法包括以下步骤:产生具有n位的第一随机密钥(k 1),其中n是自然数; 从k 1和基点计算第一ECC点(V); 并将k 1和V安全地存储在计算机可读介质中。 为了对电子数据进行数字签名,该方法还包括以下步骤:产生第二随机密钥(k 2),其中k 2具有少于n个比特; 从V和k 2计算第二ECC点(Q); 并使用Q对电子数据进行数字签名。