System and method for accessing private networks
    3.
    发明授权
    System and method for accessing private networks 有权
    用于访问专用网络的系统和方法

    公开(公告)号:US09118667B2

    公开(公告)日:2015-08-25

    申请号:US13487055

    申请日:2012-06-01

    IPC分类号: H04L29/06 H04L9/32 H04W12/06

    摘要: A system and method are provided for using a mobile device to authenticate access to a private network. The mobile device may operate to receive a challenge from an authentication server, the challenge having being generated according to a request to access a private network; obtain a private value; use the private value, the challenge, and a private key to generate a response to the challenge; and send the response to the authentication server. An authentication server may operate to generate a challenge; send the challenge to a mobile device; receive a response from the mobile device, the response having been generated by the mobile device using a private value, the challenge, and a private key; verify the response; and confirm verification of the response with a VPN gateway to permit a computing device to access a private network.

    摘要翻译: 提供了一种用于使用移动设备认证对专用网络的访问的系统和方法。 移动设备可以操作以从认证服务器接收挑战,所述挑战是根据访问专用网络的请求而生成的; 获得私人价值; 使用私有价值,挑战和私钥来产生对挑战的回应; 并将响应发送给认证服务器。 验证服务器可以操作以产生挑战; 将挑战发送到移动设备; 从所述移动设备接收响应,所述响应已由所述移动设备使用私有值,所述挑战和私钥生成; 验证回应; 并使用VPN网关确认响应的验证,以允许计算设备访问专用网络。

    DATA INTEGRITY FOR PROXIMITY-BASED COMMUNICATION
    5.
    发明申请
    DATA INTEGRITY FOR PROXIMITY-BASED COMMUNICATION 有权
    基于接近通信的数据完整性

    公开(公告)号:US20140141750A1

    公开(公告)日:2014-05-22

    申请号:US14131129

    申请日:2011-07-11

    IPC分类号: H04W12/10 H04W4/00

    摘要: Methods, systems, and computer programs for trusted communication among mobile devices are described. In some aspects, information is wirelessly transmitted from a first mobile device to a second mobile device. The information permits the second mobile device to detect proximity of the first mobile device. In some implementations, the information can be wirelessly transmitted by a proximity-activated wireless interface, such as, for example, a Near Field Communication (NFC) interface. In response to the information, the first mobile device receives a message and a first authentication value wirelessly transmitted from the second mobile device to the first mobile device. A second authentication value is generated at the first mobile device based on the message and the shared secret value. Integrity of the message is verified based on comparing the first authentication value and the second authentication value.

    摘要翻译: 描述了用于移动设备之间的可信通信的方法,系统和计算机程序。 在一些方面,信息从第一移动设备无线传输到第二移动设备。 该信息允许第二移动设备检测第一移动设备的接近度。 在一些实现中,信息可以通过接近激活的无线接口(例如近场通信(NFC))接口进行无线传输。 响应于该信息,第一移动设备接收从第二移动设备无线发送到第一移动设备的消息和第一认证值。 基于消息和共享秘密值在第一移动设备处生成第二认证值。 通过比较第一认证值和第二认证值来验证消息的完整性。

    Key agreement and transport protocol with implicit signatures
    7.
    发明授权
    Key agreement and transport protocol with implicit signatures 失效
    具有隐式签名的密钥协商和传输协议

    公开(公告)号:US08090947B2

    公开(公告)日:2012-01-03

    申请号:US12837104

    申请日:2010-07-15

    IPC分类号: H04L9/30

    摘要: A key establishment protocol between a pair of correspondents includes the generation by each correspondent of respective signatures. The signatures are derived from information that is private to the correspondent and information that is public. After exchange of signatures, the integrity of exchange messages can be verified by extracting the public information contained in the signature and comparing it with information used to generate the signature. A common session key may then be generated from the public and private information of respective ones of the correspondents.

    摘要翻译: 一对记者之间的密钥建立协议包括每个记者生成各个签名。 签名来自对记者的私人信息和公开的信息。 在签名交换之后,可以通过提取签名中包含的公开信息并将其与用于生成签名的信息进行比较来验证交换消息的完整性。 然后可以从相应记者的公共和私人信息生成公共会话密钥。

    RESILIENT CRYPTOGRAPHIC SCHEME
    8.
    发明申请
    RESILIENT CRYPTOGRAPHIC SCHEME 有权
    灵活的CRYPTOGRAPHIC计划

    公开(公告)号:US20100284540A1

    公开(公告)日:2010-11-11

    申请号:US12840008

    申请日:2010-07-20

    IPC分类号: H04L9/08

    CPC分类号: H04L9/3242 H04L9/3249

    摘要: A system and method are provided for enabling a symmetric key to be derived, the method comprising: obtaining a plurality of key parts, wherein the plurality of key parts when combined equal the symmetric key; encrypting a first of the key parts using a first cryptographic algorithm to generate a first encrypted value; encrypting one or more remaining key parts of the plurality of key parts using respective cryptographic algorithms to generate one or more additional encrypted values, wherein each key part encrypted is encrypted using a different cryptographic algorithm; and providing the first encrypted value and the one or more additional encrypted values to an other entity to enable the other entity to derive the symmetric key.

    摘要翻译: 提供了一种用于使得能够导出对称密钥的系统和方法,所述方法包括:获得多个密钥部分,其中所述多个密钥部分在组合时等于所述对称密钥; 使用第一密码算法加密第一密钥部分以生成第一加密值; 使用相应的密码算法加密所述多个密钥部分中的一个或多个剩余的关键部分以生成一个或多个附加的加密值,其中使用不同的加密算法加密加密的每个密钥部分; 以及将第一加密值和所述一个或多个附加加密值提供给另一实体以使所述另一实体能够导出所述对称密钥。

    Incorporating data into cryptographic components of an ECQV certificate
    9.
    发明授权
    Incorporating data into cryptographic components of an ECQV certificate 有权
    将数据合并到ECQV证书的加密组件中

    公开(公告)号:US09003181B2

    公开(公告)日:2015-04-07

    申请号:US13070178

    申请日:2011-03-23

    摘要: During generation of an implicit certificate for a requestor, a certificate authority incorporates information in the public-key reconstruction data, where the public-key reconstruction data is to be used to compute the public key of the requestor. The information may be related to one or more of the requestor, the certificate authority, and the implicit certificate. The certificate authority reversibly encodes the public-key reconstruction data in the implicit certificate and sends it to the requestor. After receiving the implicit certificate from the certificate authority, the requestor can extract the incorporated information from the public-key reconstruction data. The implicit certificate can be made available to a recipient, and the recipient can also extract the incorporated information.

    摘要翻译: 在为请求者生成隐式证书期间,证书颁发机构将公钥重构数据中的信息合并在一起,其中公钥重构数据将用于计算请求者的公开密钥。 信息可能与请求者,证书颁发机构和隐含证书中的一个或多个有关。 证书颁发机构对隐含证书中的公钥重构数据进行可逆编码,并将其发送给请求者。 从认证机构收到隐含证书后,请求者可以从公钥重构数据中提取合并信息。 隐式证书可以提供给收件人,收件人还可以提取合并的信息。

    Hybrid signature scheme
    10.
    发明授权
    Hybrid signature scheme 有权
    混合签名方案

    公开(公告)号:US08793500B2

    公开(公告)日:2014-07-29

    申请号:US13421589

    申请日:2012-03-15

    IPC分类号: H04L9/28

    CPC分类号: H04L9/3247 H04L9/3252

    摘要: A signature scheme is provided in which a message is divided in to a first portion which is hidden and is recovered during verification, and a second portion which is visible and is required as input to the verification algorithm. A first signature component is generated by encrypting the first portion alone. An intermediate component is formed by combining the first component and the visible portion and cryptographically hashing them. A second signature component is then formed using the intermediate component and the signature comprises the first and second components with the visible portion. A verification of the signature combines a first component derived only from the hidden portion of the message with the visible portion and produces a hash of the combination.

    摘要翻译: 提供一种签名方案,其中消息被分成隐藏的第一部分,并且在验证期间被恢复,并且第二部分是可见的并且被要求作为验证算法的输入。 通过单独加密第一部分来产生第一签名组件。 通过组合第一组件和可见部分并对其进行密码散列来形成中间组件。 然后使用中间部件形成第二签名部件,并且签名包括具有可见部分的第一和第二部件。 签名的验证将仅从消息的隐藏部分导出的第一组件与可见部分组合,并产生组合的散列。