Incorporating data into an ECDSA signature component
    1.
    发明授权
    Incorporating data into an ECDSA signature component 有权
    将数据合并到ECDSA签名组件中

    公开(公告)号:US08972738B2

    公开(公告)日:2015-03-03

    申请号:US14218513

    申请日:2014-03-18

    IPC分类号: H04L9/32 H04L9/30

    摘要: During generation of a signature on a message to create a signed message, a signer determines one of the signature components such that particular information can be extracted from the signature component. The particular information may be related to one or more of the signer and the message to be signed. After receiving a signed message purported to be signed by the signer, a verifier can extract the particular information from the signature component.

    摘要翻译: 在生成消息的签名以产生签名消息时,签名者确定签名组件中的一个,从而可以从签名组件提取特定信息。 特定信息可以与签名者和要签名的消息中的一个或多个有关。 在收到签名者签名的签名信息后,验证者可以从签名组件中提取特定信息。

    INCORPORATING DATA INTO AN ECDSA SIGNATURE COMPONENT
    2.
    发明申请
    INCORPORATING DATA INTO AN ECDSA SIGNATURE COMPONENT 有权
    将数据合并到ECDSA签名组件中

    公开(公告)号:US20140201535A1

    公开(公告)日:2014-07-17

    申请号:US14218513

    申请日:2014-03-18

    IPC分类号: H04L9/30 H04L9/32

    摘要: During generation of a signature on a message to create a signed message, a signer determines one of the signature components such that particular information can be extracted from the signature component. The particular information may be related to one or more of the signer and the message to be signed. After receiving a signed message purported to be signed by the signer, a verifier can extract the particular information from the signature component.

    摘要翻译: 在生成消息的签名以产生签名消息时,签名者确定签名组件中的一个,从而可以从签名组件提取特定信息。 特定信息可以与签名者和要签名的消息中的一个或多个有关。 在收到签名者签名的签名信息后,验证者可以从签名组件中提取特定信息。

    Public Key Encryption Algorithms for Hard Lock File Encryption
    4.
    发明申请
    Public Key Encryption Algorithms for Hard Lock File Encryption 有权
    用于硬锁文件加密的公钥加密算法

    公开(公告)号:US20170012946A1

    公开(公告)日:2017-01-12

    申请号:US14930179

    申请日:2015-11-02

    摘要: In some aspects, an encryption method comprises encrypting a first portion of a message using a first secret key. The first secret key is generated based on the public key of an entity. A one-way function is used to generate a second secret key from the first secret key, and the first secret key is subsequently discarded. A second portion of the message is encrypted using the second secret key. The encrypted first portion of the message and the encrypted second portion of the message are provided to the entity.

    摘要翻译: 在一些方面,加密方法包括使用第一秘密密钥加密消息的第一部分。 第一个秘密密钥是根据实体的公钥生成的。 单向函数用于从第一秘密密钥生成第二秘密密钥,并且随后丢弃第一秘密密钥。 消息的第二部分使用第二秘密密钥进行加密。 将消息的加密的第一部分和消息的加密的第二部分提供给实体。

    Public key encryption algorithms for hard lock file encryption
    5.
    发明授权
    Public key encryption algorithms for hard lock file encryption 有权
    用于硬锁文件加密的公钥加密算法

    公开(公告)号:US09178699B2

    公开(公告)日:2015-11-03

    申请号:US14073379

    申请日:2013-11-06

    摘要: In some aspects, an encryption method comprises encrypting a first portion of a message using a first secret key. The first secret key is generated based on the public key of an entity. A one-way function is used to generate a second secret key from the first secret key, and the first secret key is subsequently discarded. A second portion of the message is encrypted using the second secret key. The encrypted first portion of the message and the encrypted second portion of the message are provided to the entity.

    摘要翻译: 在一些方面,加密方法包括使用第一秘密密钥加密消息的第一部分。 第一个秘密密钥是根据实体的公钥生成的。 单向函数用于从第一秘密密钥生成第二秘密密钥,并且随后丢弃第一秘密密钥。 消息的第二部分使用第二秘密密钥进行加密。 将消息的加密的第一部分和消息的加密的第二部分提供给实体。

    Public Key Encryption Algorithms for Hard Lock File Encryption
    8.
    发明申请
    Public Key Encryption Algorithms for Hard Lock File Encryption 有权
    用于硬锁文件加密的公钥加密算法

    公开(公告)号:US20150124961A1

    公开(公告)日:2015-05-07

    申请号:US14073379

    申请日:2013-11-06

    IPC分类号: H04L9/08 H04L9/30

    摘要: In some aspects, an encryption method comprises encrypting a first portion of a message using a first secret key. The first secret key is generated based on the public key of an entity. A one-way function is used to generate a second secret key from the first secret key, and the first secret key is subsequently discarded. A second portion of the message is encrypted using the second secret key. The encrypted first portion of the message and the encrypted second portion of the message are provided to the entity.

    摘要翻译: 在一些方面,加密方法包括使用第一秘密密钥加密消息的第一部分。 第一个秘密密钥是根据实体的公钥生成的。 单向函数用于从第一秘密密钥生成第二秘密密钥,并且随后丢弃第一秘密密钥。 消息的第二部分使用第二秘密密钥进行加密。 将消息的加密的第一部分和消息的加密的第二部分提供给实体。

    Key agreement for wireless communication

    公开(公告)号:US10187202B2

    公开(公告)日:2019-01-22

    申请号:US15789399

    申请日:2017-10-20

    申请人: Certicom Corp.

    摘要: Methods, systems, and computer programs for performing key agreement operations in a communication system are described. In some aspects, a wireless network operator receives a mobile device identifier and accesses a secret key associated with the mobile device. A message authentication code function is evaluated based on the secret key to produce an output value. A session key and a challenge value are obtained based on the output value. In some aspects, a mobile device accesses a secret key in response to receiving the challenge value from the wireless network operator. A message authentication code function is evaluated based on the secret key to produce an output value. A response value and a session key are obtained based on the output value. The response value is transmitted to the wireless network operator.

    System and method for authenticating RFID tags

    公开(公告)号:US09734322B2

    公开(公告)日:2017-08-15

    申请号:US14319545

    申请日:2014-06-30

    申请人: Certicom Corp.

    摘要: A system and method of providing authenticity to a radio frequency identification (RFID) tag are provided. The method comprises generating a plurality of digital signatures, wherein each digital signature is generated using an index value unique to that digital signature and using information associated with the RFID tag; and storing the plurality of digital signatures on the RFID tag in association with respective index values to enable a desired digital signature to be selected according to a provided index value. Also provided are a system and method of enabling an RFID reader to authenticate an RFID tag, which utilize a challenge comprising an index value to request one of the stored signature and authenticating same. Also provided is an RFID tag that is configured to participate in the challenge-response protocol.