Supplying cryptographic algorithm constants to a storage-constrained target
    1.
    发明授权
    Supplying cryptographic algorithm constants to a storage-constrained target 失效
    将密码算法常量提供给存储受限目标

    公开(公告)号:US08086865B2

    公开(公告)日:2011-12-27

    申请号:US12116258

    申请日:2008-05-07

    IPC分类号: H04L9/12

    CPC分类号: H04L9/3242

    摘要: The present invention provides for authenticating a message, A security function is performed upon the message, The message is sent to a target. The output of the security function is sent to the target. At least one publicly known constant is sent to the target. The received message is authenticated as a function of at least a shared key, the received publicly known constants, the security function, the received message, and the output of the security function. If the output of the security function received by the target is the same as the output generated as a function of at least the received message, the received publicly known constants, the security function, and the shared key, neither the message nor the constants have been altered.

    摘要翻译: 本发明提供了对消息的认证,对该消息执行安全功能。该消息被发送到目标。 安全功能的输出被发送到目标。 至少有一个公认的常数被发送到目标。 接收到的消息被认证为至少共享密钥,接收的公知常数,安全功能,接收到的消息和安全功能的输出的功能。 如果目标接收到的安全功能的输出与至少作为接收到的消息的函数产生的输出相同,则所接收的已知常数,安全功能和共享密钥,消息和常数都不具有 被改变了

    Technique for detecting and blocking unwanted instant messages
    2.
    发明授权
    Technique for detecting and blocking unwanted instant messages 有权
    检测和阻止不需要的即时消息的技术

    公开(公告)号:US07711781B2

    公开(公告)日:2010-05-04

    申请号:US10984299

    申请日:2004-11-09

    IPC分类号: G06F15/16

    摘要: A technique for tracking one or more thresholds relating to the blocking of a particular screen name used on an IM system is disclosed. If the number of people who have blocked a particular screen name reaches a threshold amount, a determination is made that the screen name is being used by a spimmer or other bothersome person, and disciplinary action can be taken. In a preferred embodiment, the email address associated with a user name of a suspected spimmer is identified and all screen names associated with that email address are also subjected to disciplinary action, if desired. Thus, an IM company can suspend all screen names of a spimmer that are tied to the same email address, even though not all (or even none) of the screen names individually have reached a threshold level for discipline/suspension.

    摘要翻译: 公开了一种用于跟踪与在IM系统上使用的特定屏幕名称的阻塞相关的一个或多个阈值的技术。 如果阻止特定屏幕名称的人数达到阈值数量,则确定屏幕名称正被微笑者或其他麻烦的人使用,并且可以采取纪律处分。 在优选实施例中,如果需要,识别与疑似微分器的用户名相关联的电子邮件地址,并且与该电子邮件地址相关联的所有屏幕名称也受到纪律处分。 因此,即使不是所有(甚至没有)屏幕名称的个人都已达到纪律/暂停的阈值水平,因此IM公司可以暂停连接到相同电子邮件地址的所有屏幕快照的屏幕名称。

    Methods for Supplying Cryptographic Algorithm Constants to a Storage-Constrained Target
    3.
    发明申请
    Methods for Supplying Cryptographic Algorithm Constants to a Storage-Constrained Target 失效
    向存储约束目标提供加密算法常数的方法

    公开(公告)号:US20090327728A1

    公开(公告)日:2009-12-31

    申请号:US12116258

    申请日:2008-05-07

    IPC分类号: H04L9/32

    CPC分类号: H04L9/3242

    摘要: The present invention provides for authenticating a message. A security function is performed upon the message. The message is sent to a target. The output of the security function is sent to the target. At least one publicly known constant is sent to the target. The received message is authenticated as a function of at least a shared key, the received publicly known constants, the security function, the received message, and the output of the security function. If the output of the security function received by the target is the same as the output generated as a function of at least the received message, the received publicly known constants, the security function, and the shared key, neither the message nor the constants have been altered.

    摘要翻译: 本发明提供用于认证消息。 对消息执行安全功能。 该消息被发送到目标。 安全功能的输出被发送到目标。 至少有一个公认的常数被发送到目标。 接收到的消息被认证为至少共享密钥,接收的公知常数,安全功能,接收到的消息和安全功能的输出的功能。 如果目标接收到的安全功能的输出与至少作为接收到的消息的函数产生的输出相同,则所接收的公知常数,安全功能和共享密钥,消息和常数都不具有 被改变了

    DISTRIBUTION AND AUTHENTICATION OF PUBLIC KEYS USING RANDOM NUMBERS AND DIFFIE-HELLMAN PUBLIC KEYS
    4.
    发明申请
    DISTRIBUTION AND AUTHENTICATION OF PUBLIC KEYS USING RANDOM NUMBERS AND DIFFIE-HELLMAN PUBLIC KEYS 失效
    公开号码使用随机数和分布式公钥的分布和认证

    公开(公告)号:US20090169014A1

    公开(公告)日:2009-07-02

    申请号:US12352658

    申请日:2009-01-13

    IPC分类号: H04L9/00

    CPC分类号: H04L9/3013 H04L9/0844

    摘要: A system to exchange and authenticate public cryptographic keys between parties that share a common but secret password, using a pair of random numbers, a pair of Diffie-Hellman public keys computed from the random numbers and the password, a Diffie-Hellman symmetric secret key computed from the Diffie-Hellman public keys and the random numbers, and hashed values of arguments that depend upon these elements.

    摘要翻译: 使用一对随机数,根据随机数和密码计算的一对Diffie-Hellman公钥来交换和认证共享公共密码的各方之间的公共密钥的系统,Diffie-Hellman对称密钥 根据Diffie-Hellman公钥和随机数计算出的散列值,并根据这些元素的参数进行散列。

    Time stamping method employing a separate ticket and stub
    5.
    发明授权
    Time stamping method employing a separate ticket and stub 失效
    时间戳方法采用单独的机票和存根

    公开(公告)号:US07487359B2

    公开(公告)日:2009-02-03

    申请号:US11846562

    申请日:2007-08-29

    IPC分类号: H04L9/00 G06F7/04 H04K1/00

    CPC分类号: H04L9/3297 H04L9/3242

    摘要: A time stamping protocol has two stages referred to as the ticketing stage and the certification stage. During the ticketing stage, the document or other identifying data is sent to the TSA. The TSA generates a “ticket” based on the document or other identifying data and a time indication derived from a trusted clock. The ticket, which serves as an unsigned time stamp receipt, is transmitted back to the document originator. During the certification stage, the holder of the ticket requests a certified time stamp receipt by presenting the ticket to the TSA. The TSA verifies the ticket and generates a signed time stamp receipt, called the ticket stub, which is then transmitted back to the document originator. The ticket stub serves as a “universal time-stamp” that the holder of the ticket stub can use to prove the date of the document.

    摘要翻译: 时间戳协议有两个阶段,称为票务阶段和认证阶段。 在票务阶段,文件或其他识别数据被发送到TSA。 TSA根据文档或其他标识数据和从可信时钟导出的时间指示生成“票证”。 作为未签名的时间戳收据的票据被传回给文件发起者。 在认证阶段,机票持有人通过向TSA提供机票来申请经过认证的时间戳收据。 TSA验证票据并生成一个称为票据存根的签名时间戳收据,然后将其传回给文档发起者。 票据桩作为票据存根的持有者可以用来证明文件的日期的“通用时间戳”。

    System, method and program to filter out login attempts by unauthorized entities
    6.
    发明授权
    System, method and program to filter out login attempts by unauthorized entities 失效
    系统,方法和程序过滤掉未经授权的实体的登录尝试

    公开(公告)号:US07475252B2

    公开(公告)日:2009-01-06

    申请号:US10918523

    申请日:2004-08-12

    IPC分类号: H04L9/32

    摘要: System, method and computer program for authenticating a user of a client computer to a remote server computer. A client computer initially sends a userID but not a password of the user to the remote server computer. In response to the userID, the server computer determines a subsequent time window during which the server computer will consider for authentication submission of a combination of the userID and a password. The server computer notifies the client computer of the time window. After receipt of the notification from the server computer, during the time window, the client computer sends the userID and a corresponding password to the server computer. In response to receipt of the userID and the corresponding password from the client computer, the server computer determines if the combination of the userID and the corresponding password is valid. If the combination of the userID and the corresponding password is valid, the server computer notifies the client computer that the combination of the userID and the corresponding password is valid. In response, the client computer establishes a session with the server computer and accesses a resource requiring a valid combination of userID and password to access. The server computer ignores combinations of userIDs and passwords submitted before or after the time window.

    摘要翻译: 用于向远程服务器计算机认证客户端计算机的用户的系统,方法和计算机程序。 客户端计算机最初向远程服务器计算机发送用户ID而不是用户的密码。 响应于用户ID,服务器计算机确定服务器计算机将考虑为用户ID和密码的组合的认证提交的后续时间窗口。 服务器计算机通知客户端计算机的时间窗口。 在从服务器计算机接收到通知之后,在时间窗口期间,客户端计算机向服务器计算机发送用户ID和相应的密码。 响应于从客户端计算机接收到用户ID和相应的密码,服务器计算机确定用户ID和对应密码的组合是否有效。 如果userID和相应密码的组合有效,则服务器计算机通知客户端计算机userID和相应密码的组合有效。 作为响应,客户端计算机与服务器计算机建立会话,并访问需要用户ID和密码的有效组合以访问的资源。 服务器计算机忽略在时间窗口之前或之后提交的用户ID和密码的组合。

    Efficient method for providing secure remote access
    7.
    发明授权
    Efficient method for providing secure remote access 失效
    提供安全远程访问的高效方法

    公开(公告)号:US07434050B2

    公开(公告)日:2008-10-07

    申请号:US10733713

    申请日:2003-12-11

    IPC分类号: H04L9/30

    摘要: A remote user, two-way authentication and password change protocol that also allows parties to optionally establish a session key which can be used to protect subsequent communication. In a preferred embodiment, a challenge token is generated and exchanged which is a one-time value that includes a random value that changes from session to session. The construction and use of the challenge token avoids transmission of the password or even the transmission of a digest of the password itself. Thus the challenge token does not reveal any information about a secret password or a digest of the password.

    摘要翻译: 远程用户双向认证和密码更改协议,还允许各方可选地建立可用于保护后续通信的会话密钥。 在优选实施例中,生成和交换挑战令牌,其是包括从会话到会话改变的随机值的一次值。 挑战令牌的构建和使用避免了密码的传输,甚至传输密码本身的摘要。 因此,挑战令牌不会显示关于密码的秘密密码或摘要的任何信息。

    SYSTEM AND METHOD TO TRACK INVENTORY USING RFID TAGS
    8.
    发明申请
    SYSTEM AND METHOD TO TRACK INVENTORY USING RFID TAGS 有权
    使用RFID标签跟踪库存的系统和方法

    公开(公告)号:US20080211673A1

    公开(公告)日:2008-09-04

    申请号:US12035526

    申请日:2008-02-22

    IPC分类号: G08B13/14

    摘要: System and method for tracking inventory of a multiplicity of products. First RFID tags are associated with respective products or groups of products. Second Active RFID tags are associated with respective first containers for the multiplicity products. A third Active RFID tag is associated with a second container for the first containers. First RFID tags broadcast their respective identifications. Second Active RFID tags hash the identities of the first RFID tags within their respective first containers and broad their hashed values. Third Active RFID tag hash the hashed values broadcast by the second Active RFID tags. An expected value is compared to a result of the third Active RFID tag hashing the hashed values broadcast by the second Active RFID tags.

    摘要翻译: 用于跟踪多种产品的库存的系统和方法。 第一个RFID标签与相应的产品或产品组相关联。 第二个有源RFID标签与多个产品的相应的第一容器相关联。 第三个有源RFID标签与用于第一容器的第二容器相关联。 第一个RFID标签广播其各自的标识。 第二个有源RFID标签将第一个RFID标签的标识散列在其各自的第一个容器内,并扩大其散列值。 第三个有源RFID标签散列由第二个有源RFID标签广播的散列值。 将期望值与第三有源RFID标签的结果进行比较,从而使由第二有源RFID标签广播的散列值进行散列。

    BUFFER ALLOCATION METHOD FOR MULTI-CLASS TRAFFIC WITH DYNAMIC SPARE BUFFERING
    9.
    发明申请
    BUFFER ALLOCATION METHOD FOR MULTI-CLASS TRAFFIC WITH DYNAMIC SPARE BUFFERING 审中-公开
    具有动态备件缓冲功能的多级交通缓冲区分配方法

    公开(公告)号:US20080063004A1

    公开(公告)日:2008-03-13

    申请号:US11531473

    申请日:2006-09-13

    IPC分类号: H04L12/26 H04L12/56

    摘要: Disclosed are a method of and system for allocating a buffer. The method comprises the steps of partitioning less than the total buffer storage capacity to a plurality of queue classes, allocating the remaining buffer storage as a spare buffer, and assigning incoming packets into said queue classes based on the packet type. When a queue becomes congested, incoming packets are tagged with the assigned queue class and these additional incoming packets are sent to said spare buffer. When the congested queue class has space available, the additional incoming packets in said spare buffer are pushed into the tail of the congested queue class.

    摘要翻译: 公开了一种用于分配缓冲器的方法和系统。 该方法包括以下步骤:将少于总缓冲存储容量划分为多个队列类别,将剩余缓冲存储器分配为备用缓冲器,并基于分组类型将传入分组分配到所述队列类中。 当队列变得拥塞时,传入的分组被标记为分配的队列类,并且这些额外的传入分组被发送到所述备用缓冲器。 当拥塞的队列类具有可用空间时,所述备用缓冲器中的额外的传入分组被推入拥塞的队列类的尾部。

    System and method to record environmental condition on an RFID tag

    公开(公告)号:US20060261946A1

    公开(公告)日:2006-11-23

    申请号:US11132535

    申请日:2005-05-19

    IPC分类号: G08B13/14

    CPC分类号: G06K19/0723 G06K19/0717

    摘要: System and method for recording temperature on an RFID tag. A first RFID tag is attached to a container. The first RFID tag includes a temperature sensor. The container contains a multiplicity of packages. A multiplicity of second RFID tags are attached to the multiplicity of packages, respectively. The first RFID tag transmits temperature information to the multiplicity of second RFID tags. In response, the multiplicity of second RFID tags record the temperature information. Consequently, there is no need for expensive temperature sensors on the multiplicity of RFID tags on the packages. According to features of the present invention, the first RFID tag is an active RFID tag, and the multiplicity of second RFID tags are passive RFID tags. The first RFID tag also transmits other information to the multiplicity of second RFID tags to enable the second RFID tags to authenticate the temperature information. Other types of environmental sensors such as a humidity sensor or vibration sensor can substitute for the temperature sensor.