Method and apparatus to conduct a commercial transaction over wireless networks
    1.
    发明授权
    Method and apparatus to conduct a commercial transaction over wireless networks 有权
    通过无线网络进行商业交易的方法和装置

    公开(公告)号:US08645282B2

    公开(公告)日:2014-02-04

    申请号:US11434633

    申请日:2006-05-16

    IPC分类号: G06Q10/00 G06Q20/00

    摘要: A Secure Virtual Point of Service (SVPOS) that coordinates the authentication, authorization, and identity, settlement, arbitration and non-repudiation for an electronic commercial transaction. For each commercial transaction, both the buyer and merchant authenticate itself to the SVPOS and create two unique transaction encryption keys, one for the buyer and one for the merchant. The merchant uses both encryption keys to encrypt a package that include at least product identification. The merchant and buyer calculate a hash of the package and transmit the calculated hash to the SVPOS for comparison to prevent repudiation. If the calculated hash is identical the buyer receives the merchants encryption key and decrypts the package. Payment is released by the SVPOS if the buyer is satisfied with the package via a Parlay system. If the buyer is not satisfied, said SVPOS performs arbitration between the buyer and merchant to determine if the package is correct.

    摘要翻译: 一个安全的虚拟服务点(SVPOS),用于协调电子商业交易的认证,授权和身份,结算,仲裁和不可否认性。 对于每个商业交易,买方和商家都向SVPOS进行身份验证,并创建两个独特的交易加密密钥,一个用于买方,一个用于商家。 商家使用两个加密密钥对至少包括产品标识的包进行加密。 商家和买方计算包的散列,并将计算出的散列传送到SVPOS进行比较以防止否认。 如果计算的散列是相同的,买方将收到商家加密密钥并解密该包。 如果买方通过Parlay系统对包裹感到满意,SVPOS将发放付款。 如果买方不满意,SVPOS将在买方和商家之间进行仲裁,以确定包裹是否正确。

    Secure virtual point of service for 3G wireless networks
    2.
    发明申请
    Secure virtual point of service for 3G wireless networks 有权
    为3G无线网络提供安全的虚拟服务点

    公开(公告)号:US20060265339A1

    公开(公告)日:2006-11-23

    申请号:US11434633

    申请日:2006-05-16

    IPC分类号: G06Q99/00

    摘要: A Secure Virtual Point of Service (SVPOS) that coordinates the authentication, authorization, and identity, settlement, arbitration and non-repudiation for an electronic commercial transaction. For each commercial transaction, both the buyer and merchant authenticate itself to the SVPOS and create two unique transaction encryption keys, one for the buyer and one for the merchant. The merchant uses both encryption keys to encrypt a package that include at least product identification. The merchant and buyer calculate a hash of the package and transmit the calculated hash to the SVPOS for comparison to prevent repudiation. If the calculated hash is identical the buyer receives the merchants encryption key and decrypts the package. Payment is released by the SVPOS if the buyer is satisfied with the package via a Parlay system. If the buyer is not satisfied, said SVPOS performs arbitration between the buyer and merchant to determine if the package is correct.

    摘要翻译: 一个安全的虚拟服务点(SVPOS),用于协调电子商业交易的认证,授权和身份,结算,仲裁和不可否认性。 对于每个商业交易,买方和商家都向SVPOS进行身份验证,并创建两个独特的交易加密密钥,一个用于买方,一个用于商家。 商家使用两个加密密钥对至少包括产品标识的包进行加密。 商家和买方计算包的散列,并将计算出的散列传送到SVPOS进行比较以防止否认。 如果计算的散列是相同的,买方将收到商家加密密钥并解密该包。 如果买方通过Parlay系统对包裹感到满意,SVPOS将发放付款。 如果买方不满意,SVPOS将在买方和商家之间进行仲裁,以确定包裹是否正确。

    Virus Localization Using Cryptographic Hashing

    公开(公告)号:US20120167223A1

    公开(公告)日:2012-06-28

    申请号:US13408690

    申请日:2012-02-29

    IPC分类号: G06F21/00

    CPC分类号: H04L9/3239 G06F21/565

    摘要: Methods for using integrity checking techniques to identify and locate computer viruses are provided. A method for virus localization for each of three types of virus infections is provided, including the steps of computing a sequence of file blocks, calculating hashes for the sequences of file blocks from a host file and calculating hashes for the same or related sequences of file blocks from an infected file, and comparing the hashes from host file to the hashes from the infected file from the same or related sequences of file blocks such that when some of said first hashes and said second hashes do not match, a location of a virus is output. Methods for computing the sequence of file blocks depending on the type of virus infection, and for calculating the hashes using a collision resistant hash function, a digital signature scheme, a message authentication code, or a pseudo-random function.

    Virus localization using cryptographic hashing
    4.
    发明授权
    Virus localization using cryptographic hashing 有权
    病毒本地化使用密码散列

    公开(公告)号:US08578498B2

    公开(公告)日:2013-11-05

    申请号:US13408690

    申请日:2012-02-29

    IPC分类号: H04L29/14

    CPC分类号: H04L9/3239 G06F21/565

    摘要: Methods for using integrity checking techniques to identify and locate computer viruses are provided. A method for virus localization for each of three types of virus infections is provided, including the steps of computing a sequence of file blocks, calculating hashes for the sequences of file blocks from a host file and calculating hashes for the same or related sequences of file blocks from an infected file, and comparing the hashes from host file to the hashes from the infected file from the same or related sequences of file blocks such that when some of said first hashes and said second hashes do not match, a location of a virus is output. Methods for computing the sequence of file blocks depending on the type of virus infection, and for calculating the hashes using a collision resistant hash function, a digital signature scheme, a message authentication code, or a pseudo-random function.

    摘要翻译: 提供了使用完整性检查技术来识别和定位计算机病毒的方法。 提供了用于三种类型的病毒感染中的每种病毒定位的方法,包括计算文件块序列的步骤,从主机文件中计算文件块序列的散列,以及计算相同或相关文件序列的散列 来自被感染文件的块,并且将来自主机文件的散列与来自受感染文件的散列从文件块的相同或相关序列进行比较,使得当所述第一散列和所述第二散列中的某些不匹配时,病毒的位置 被输出。 用于根据病毒感染的类型计算文件块序列的方法,以及用于使用防冲突散列函数计算散列的数据,数字签名方案,消息认证码或伪随机函数。

    Virus Localization Using Cryptographic Hashing
    5.
    发明申请
    Virus Localization Using Cryptographic Hashing 有权
    病毒本地化使用密码散列

    公开(公告)号:US20120159181A1

    公开(公告)日:2012-06-21

    申请号:US13408728

    申请日:2012-02-29

    IPC分类号: G06F21/00

    CPC分类号: H04L9/3239 G06F21/565

    摘要: Methods for using integrity checking techniques to identify and locate computer viruses are provided. A method for virus localization for each of three types of virus infections is provided, including the steps of computing a sequence of file blocks, calculating hashes for the sequences of file blocks from a host file and calculating hashes for the same or related sequences of file blocks from an infected file, and comparing the hashes from host file to the hashes from the infected file from the same or related sequences of file blocks such that when some of said first hashes and said second hashes do not match, a location of a virus is output. Methods for computing the sequence of file blocks depending on the type of virus infection, and for calculating the hashes using a collision resistant hash function, a digital signature scheme, a message authentication code, or a pseudo-random function.

    摘要翻译: 提供了使用完整性检查技术来识别和定位计算机病毒的方法。 提供了用于三种类型的病毒感染中的每种病毒定位的方法,包括计算文件块序列的步骤,从主机文件中计算文件块序列的散列,以及计算相同或相关文件序列的散列 来自被感染文件的块,并且将来自主机文件的散列与来自受感染文件的散列从文件块的相同或相关序列进行比较,使得当所述第一散列和所述第二散列中的某些不匹配时,病毒的位置 被输出。 用于根据病毒感染的类型计算文件块序列的方法,以及用于使用防冲突散列函数计算散列的数据,数字签名方案,消息认证码或伪随机函数。

    Virus localization using cryptographic hashing

    公开(公告)号:US08572743B2

    公开(公告)日:2013-10-29

    申请号:US13408728

    申请日:2012-02-29

    IPC分类号: H04L29/14

    CPC分类号: H04L9/3239 G06F21/565

    摘要: Methods for using integrity checking techniques to identify and locate computer viruses are provided. A method for virus localization for each of three types of virus infections is provided, including the steps of computing a sequence of file blocks, calculating hashes for the sequences of file blocks from a host file and calculating hashes for the same or related sequences of file blocks from an infected file, and comparing the hashes from host file to the hashes from the infected file from the same or related sequences of file blocks such that when some of said first hashes and said second hashes do not match, a location of a virus is output. Methods for computing the sequence of file blocks depending on the type of virus infection, and for calculating the hashes using a collision resistant hash function, a digital signature scheme, a message authentication code, or a pseudo-random function.

    Virus localization using cryptographic hashing
    7.
    发明授权
    Virus localization using cryptographic hashing 有权
    病毒本地化使用密码散列

    公开(公告)号:US08191146B2

    公开(公告)日:2012-05-29

    申请号:US11978773

    申请日:2007-10-30

    IPC分类号: H04L29/14

    CPC分类号: H04L9/3239 G06F21/565

    摘要: Methods for using integrity checking techniques to identify and locate computer viruses are provided. A method for virus localization for each of three types of virus infections is provided, including the steps of computing a sequence of file blocks, calculating hashes for the sequences of file blocks from a host file and calculating hashes for the same or related sequences of file blocks from an infected file, and comparing the hashes from host file to the hashes from the infected file from the same or related sequences of file blocks such that when some of said first hashes and said second hashes do not match, a location of a virus is output. Methods are provided for computing the sequence of file blocks depending on the type of virus infection, and for calculating the hashes using a collision resistant hash function, a digital signature scheme, a message authentication code, or a pseudo-random function.

    摘要翻译: 提供了使用完整性检查技术来识别和定位计算机病毒的方法。 提供了用于三种类型的病毒感染中的每种病毒定位的方法,包括计算文件块序列的步骤,从主机文件中计算文件块序列的散列,以及计算相同或相关文件序列的散列 来自被感染文件的块,并且将来自主机文件的散列与来自受感染文件的散列从文件块的相同或相关序列进行比较,使得当所述第一散列和所述第二散列中的某些不匹配时,病毒的位置 被输出。 提供了用于根据病毒感染的类型来计算文件块序列的方法,以及使用防冲突散列函数,数字签名方案,消息认证码或伪随机函数来计算散列的方法。

    Method for a public-key infrastructure providing communication integrity and anonymity while detecting malicious communication
    8.
    发明授权
    Method for a public-key infrastructure providing communication integrity and anonymity while detecting malicious communication 有权
    在检测恶意通信时提供通信完整性和匿名性的公钥基础设施的方法

    公开(公告)号:US08767965B2

    公开(公告)日:2014-07-01

    申请号:US12175807

    申请日:2008-07-18

    IPC分类号: H04L9/06 H04L9/08

    摘要: An inventive scheme for detecting parties responsible for repeated malicious activities in secure and anonymous communication is presented. The scheme comprises generating a pool of keys, distributing to and associating with each party a small number of keys chosen randomly from the pool, revoking a key when it is detected as used in a malicious activity, creating a set of parties associated with the revoked key, revoking additional keys randomly chosen among the keys not currently revoked, selecting new keys, and when a party requests an updated key, sending the updated key selected from among the new keys to the requesting party, wherein if an other malicious activity is detected, creating another set of the parties associated with the other malicious activity and identifying the parties in both sets. The steps of the inventive scheme are repeated until only one party is in the intersection set.

    摘要翻译: 提出了一种用于检测在安全和匿名通信中负责重复恶意活动的各方的创新方案。 该方案包括生成一个密钥池,向每一方分配少量从池中随机选择的密钥并将其关联,当被检测为在恶意活动中被使用时撤销密钥,创建一组与被撤销的关联的一方 密钥,撤销在当前未被撤销的密钥中随机选择的附加密钥,选择新密钥,以及当一方请求更新密钥时,将从新密钥中选择的更新密钥发送给请求方,其中如果检测到其他恶意活动 ,创建另一组与其他恶意活动相关联的各方,并确定两方的各方。 重复本发明方案的步骤,直到只有一方在交集中。

    Vehicle Segment Certificate Management Using Short-Lived, Unlinked Certificate Schemes
    9.
    发明申请
    Vehicle Segment Certificate Management Using Short-Lived, Unlinked Certificate Schemes 有权
    使用短期,未连接证书方案的车辆段证书管理

    公开(公告)号:US20080232595A1

    公开(公告)日:2008-09-25

    申请号:US12051309

    申请日:2008-03-19

    IPC分类号: H04L9/14

    摘要: The present invention advantageously provides a system and method for management of cryptographic keys and certificates for a plurality of vehicles. Each vehicle of the plurality of vehicles generates public/private key pairs, requests multiple time-distributed certificates, creates an encrypted identity, and surrenders expired certificates. An assigning authority receives the public/private key pairs, the request for multiple time-distributed certificates, the encrypted identity, and the expired certificates from said vehicle. The assigning authority authorizes the vehicle with an authorizing authority, validates the expired certificates, proves ownership, and distributes the requested time-distributed certificates to said vehicle. Validation can comprise checking expired certificates against misused, compromised and/or previously surrendered certificates. Time-distributed certificates can have lifetimes adjustable based on certificate misuse detection system algorithms, amount of malicious activity detected, and/or certificate authority capacity.

    摘要翻译: 本发明有利地提供了一种用于管理多个车辆的密码密钥和证书的系统和方法。 多个车辆中的每个车辆产生公共/私人密钥对,请求多个时间分布证书,创建加密身份,并交出过期证书。 分配机构从所述车辆接收公钥/私钥对,多个时间分布证书的请求,加密的身份和过期的证书。 分配机构授权车辆授权,验证过期的证书,证明所有权,并将所要求的分发时间的证书分发给所述车辆。 验证可以包括检查过期的证书,以防被滥用,受到损害和/或以前交出的证书。 基于证书滥用检测系统算法,检测到的恶意活动量和/或证书颁发机构容量,分布式证书的生命周期可以调整。

    Method and system for timed-release cryptosystems
    10.
    发明授权
    Method and system for timed-release cryptosystems 有权
    定时释放密码系统的方法和系统

    公开(公告)号:US06813358B1

    公开(公告)日:2004-11-02

    申请号:US09441740

    申请日:1999-11-17

    IPC分类号: H04L900

    摘要: A method and system are provided for timed-release cryptography. A sender encrypts data in a timed-release fashion such that a receiver based on information exchanged with a server decrypts the encrypted data at or after a release time without revealing to the server any information about the sender, the data, and the release time. In one embodiment, the sender encrypts a key and a release time based on a public key of the receiver and encrypts the data based on the encrypted key. The server determines a condition, which is a function of the encrypted key, the encrypted release time, and a current time. The server then sends the condition to the receiver using a conditional oblivious transfer method. If the current time as determined by the server is greater than or equal to the release time, the receiver determines the encrypted key based on the condition. The receiver then uses the encrypted key to decrypt the encrypted data. However, if the current time is less than the release time, the receiver fails to determine the encrypted key based on the condition, and thus, fails to decrypt the encrypted data.

    摘要翻译: 提供了一种定时释放加密技术的方法和系统。 发送方以定时发布的方式加密数据,使得基于与服务器交换的信息的接收者在释放时间之内或之后解密加密数据,而不向服务器透露关于发送者,数据和释放时间的任何信息。 在一个实施例中,发送者基于接收者的公钥加密密钥和释放时间,并且基于加密的密钥对数据进行加密。 服务器确定一个条件,它是加密密钥的函数,加密的释放时间和当前时间。 然后,服务器使用条件忽略传输方法将条件发送给接收方。 如果由服务器确定的当前时间大于或等于发布时间,接收者将根据条件确定加密的密钥。 然后,接收器使用加密的密钥来解密加密的数据。 然而,如果当前时间小于释放时间,则接收机根据条件无法确定加密密钥,因此无法解密加密数据。