Key agreement for wireless communication

    公开(公告)号:US10187202B2

    公开(公告)日:2019-01-22

    申请号:US15789399

    申请日:2017-10-20

    Applicant: Certicom Corp.

    Abstract: Methods, systems, and computer programs for performing key agreement operations in a communication system are described. In some aspects, a wireless network operator receives a mobile device identifier and accesses a secret key associated with the mobile device. A message authentication code function is evaluated based on the secret key to produce an output value. A session key and a challenge value are obtained based on the output value. In some aspects, a mobile device accesses a secret key in response to receiving the challenge value from the wireless network operator. A message authentication code function is evaluated based on the secret key to produce an output value. A response value and a session key are obtained based on the output value. The response value is transmitted to the wireless network operator.

    System and method for authenticating RFID tags

    公开(公告)号:US09734322B2

    公开(公告)日:2017-08-15

    申请号:US14319545

    申请日:2014-06-30

    Applicant: Certicom Corp.

    Abstract: A system and method of providing authenticity to a radio frequency identification (RFID) tag are provided. The method comprises generating a plurality of digital signatures, wherein each digital signature is generated using an index value unique to that digital signature and using information associated with the RFID tag; and storing the plurality of digital signatures on the RFID tag in association with respective index values to enable a desired digital signature to be selected according to a provided index value. Also provided are a system and method of enabling an RFID reader to authenticate an RFID tag, which utilize a challenge comprising an index value to request one of the stored signature and authenticating same. Also provided is an RFID tag that is configured to participate in the challenge-response protocol.

    Generating Cryptographic Function Parameters Based on an Observed Astronomical Event
    3.
    发明申请
    Generating Cryptographic Function Parameters Based on an Observed Astronomical Event 审中-公开
    基于观测天文事件生成加密函数参数

    公开(公告)号:US20170063536A1

    公开(公告)日:2017-03-02

    申请号:US14691383

    申请日:2015-04-20

    Applicant: CERTICOM CORP.

    CPC classification number: H04L9/0662 G06F7/582 G09C5/00 H04L9/3006 H04L9/3066

    Abstract: Methods, systems, and computer programs for generating cryptographic function parameters are described. In some examples, astronomical data from an observed astronomical event is obtained. A pseudorandom generator is seeded based on the astronomical data. After seeding the pseudorandom generator, an output from the pseudorandom generator is obtained. A parameter for a cryptographic function is generated by operation of one or more data processors. The parameter is generated from the output from the pseudorandom generator.

    Abstract translation: 描述用于生成加密功能参数的方法,系统和计算机程序。 在一些实例中,获得了观测到的天文学事件的天文数据。 基于天文数据种植了伪随机发生器。 在伪随机发生器接种之后,获得来自伪随机发生器的输出。 通过一个或多个数据处理器的操作产生加密功能的参数。 该参数是从伪随机发生器的输出生成的。

    METHOD AND APPARATUS FOR VERIFIABLE GENERATION OF PUBLIC KEYS
    4.
    发明申请
    METHOD AND APPARATUS FOR VERIFIABLE GENERATION OF PUBLIC KEYS 有权
    公共密钥可验证生成的方法和装置

    公开(公告)号:US20160248735A1

    公开(公告)日:2016-08-25

    申请号:US14992397

    申请日:2016-01-11

    Applicant: Certicom Corp.

    Abstract: The invention provides a method of verifiable generation of public keys. According to the method, a self-signed signature is first generated and then used as input to the generation of a pair of private and public keys. Verification of the signature proves that the keys are generated from a key generation process utilizing the signature. A certification authority can validate and verify a public key generated from a verifiable key generation process.

    Abstract translation: 本发明提供了可验证地生成公钥的方法。 根据该方法,首先生成自签名签名,然后将其用作生成一对私钥和公钥的输入。 签名的验证证明密钥是利用签名的密钥生成过程产生的。 认证机构可以验证和验证从可验证密钥生成过程产生的公钥。

    Incorporating data into an ECDSA signature component
    5.
    发明授权
    Incorporating data into an ECDSA signature component 有权
    将数据合并到ECDSA签名组件中

    公开(公告)号:US08972738B2

    公开(公告)日:2015-03-03

    申请号:US14218513

    申请日:2014-03-18

    CPC classification number: H04L9/3066 H04L9/3252 H04L2209/38 H04L2209/80

    Abstract: During generation of a signature on a message to create a signed message, a signer determines one of the signature components such that particular information can be extracted from the signature component. The particular information may be related to one or more of the signer and the message to be signed. After receiving a signed message purported to be signed by the signer, a verifier can extract the particular information from the signature component.

    Abstract translation: 在生成消息的签名以产生签名消息时,签名者确定签名组件中的一个,从而可以从签名组件提取特定信息。 特定信息可以与签名者和要签名的消息中的一个或多个有关。 在收到签名者签名的签名信息后,验证者可以从签名组件中提取特定信息。

    INCORPORATING DATA INTO AN ECDSA SIGNATURE COMPONENT
    6.
    发明申请
    INCORPORATING DATA INTO AN ECDSA SIGNATURE COMPONENT 有权
    将数据合并到ECDSA签名组件中

    公开(公告)号:US20140201535A1

    公开(公告)日:2014-07-17

    申请号:US14218513

    申请日:2014-03-18

    CPC classification number: H04L9/3066 H04L9/3252 H04L2209/38 H04L2209/80

    Abstract: During generation of a signature on a message to create a signed message, a signer determines one of the signature components such that particular information can be extracted from the signature component. The particular information may be related to one or more of the signer and the message to be signed. After receiving a signed message purported to be signed by the signer, a verifier can extract the particular information from the signature component.

    Abstract translation: 在生成消息的签名以产生签名消息时,签名者确定签名组件中的一个,从而可以从签名组件提取特定信息。 特定信息可以与签名者和要签名的消息中的一个或多个有关。 在收到签名者签名的签名信息后,验证者可以从签名组件中提取特定信息。

    ELLIPTIC CURVE RANDOM NUMBER GENERATION
    7.
    发明申请
    ELLIPTIC CURVE RANDOM NUMBER GENERATION 有权
    ELLIPTIC曲线随机数生成

    公开(公告)号:US20130170642A1

    公开(公告)日:2013-07-04

    申请号:US13770533

    申请日:2013-02-19

    Applicant: CERTICOM CORP.

    Abstract: An elliptic curve random number generator avoids escrow keys by choosing a point Q on the elliptic curve as verifiably random. An arbitrary string is chosen and a hash of that string computed. The hash is then converted to a field element of the desired field, the field element regarded as the x-coordinate of a point Q on the elliptic curve and the x-coordinate is tested for validity on the desired elliptic curve. If valid, the x-coordinate is decompressed to the point Q, wherein the choice of which is the two points is also derived from the hash value. Intentional use of escrow keys can provide for back up functionality. The relationship between P and Q is used as an escrow key and stored by for a security domain. The administrator logs the output of the generator to reconstruct the random number with the escrow key.

    Abstract translation: 椭圆曲线随机数发生器通过选择椭圆曲线上的点Q可以无限次地避免代管钥匙。 选择一个任意的字符串,并计算该字符串的散列。 然后将散列转换为所需场的场元素,将该场元素视为椭圆曲线上的点Q的x坐标,并且在期望的椭圆曲线上测试x坐标的有效性。 如果有效,则将x坐标解压缩到点Q,其中,从哈希值导出哪个是两点的选择。 意向使用代管键可以提供备份功能。 P和Q之间的关系用作托管密钥,并由安全域存储。 管理员记录生成器的输出,用代管密钥重构随机数。

    Elliptic curve random number generation

    公开(公告)号:US10243734B2

    公开(公告)日:2019-03-26

    申请号:US14575844

    申请日:2014-12-18

    Applicant: Certicom Corp.

    Abstract: An elliptic curve random number generator avoids escrow keys by choosing a point Q on the elliptic curve as verifiably random. An arbitrary string is chosen and a hash of that string computed. The hash is then converted to a field element of the desired field, the field element regarded as the x-coordinate of a point Q on the elliptic curve and the x-coordinate is tested for validity on the desired elliptic curve. If valid, the x-coordinate is decompressed to the point Q, wherein the choice of which is the two points is also derived from the hash value. Intentional use of escrow keys can provide for back up functionality. The relationship between P and Q is used as an escrow key and stored by for a security domain. The administrator logs the output of the generator to reconstruct the random number with the escrow key.

Patent Agency Ranking