Systems and methods for authenticating and protecting the integrity of data streams and other data

    公开(公告)号:US10025953B2

    公开(公告)日:2018-07-17

    申请号:US15188737

    申请日:2016-06-21

    摘要: Systems and methods are disclosed for enabling a recipient of a cryptographically-signed electronic communication to verify the authenticity of the communication on-the-fly using a signed chain of check values, the chain being constructed from the original content of the communication, and each check value in the chain being at least partially dependent on the signed root of the chain and a portion of the communication. Fault tolerance can be provided by including error-check values in the communication that enable a decoding device to maintain the chain's security in the face of communication errors. In one embodiment, systems and methods are provided for enabling secure quasi-random access to a content file by constructing a hierarchy of hash values from the file, the hierarchy deriving its security in a manner similar to that used by the above-described chain. The hierarchy culminates with a signed hash that can be used to verify the integrity of other hash values in the hierarchy, and these other hash values can, in turn, be used to efficiently verify the authenticity of arbitrary portions of the content file.

    Trust management systems and methods

    公开(公告)号:US09077545B2

    公开(公告)日:2015-07-07

    申请号:US14071586

    申请日:2013-11-04

    IPC分类号: H04L29/06 H04L9/32 G06F21/60

    摘要: The present invention provides systems and methods for making efficient trust management decisions. A trust management engine is provided that processes requests for system resources, authorizations or certificates, and the identity of one or more root authorities that are ultimately responsible for granting or denying the requests. To determine whether a request should be granted, the trust management engine identifies a set principals from whom authorization may flow, and interprets each of the certificates as a function of the state of one or more of the principals. The processing logic iteratively evaluates the functions represented by the certificates, updates the states of the principals, and repeats this process until a reliable determination can be made as to whether the request should be granted or denied. The certificates may be evaluated until the state of the root authority indicates that the request should be granted, or until further evaluation of the certificates is ineffective in changing the state of the principals.

    SYSTEMS AND METHODS FOR AUTHENTICATING AND PROTECTING THE INTEGRITY OF DATA STREAMS AND OTHER DATA
    4.
    发明申请
    SYSTEMS AND METHODS FOR AUTHENTICATING AND PROTECTING THE INTEGRITY OF DATA STREAMS AND OTHER DATA 审中-公开
    用于认证和保护数据流和其他数据的完整性的系统和方法

    公开(公告)号:US20160292458A1

    公开(公告)日:2016-10-06

    申请号:US15188737

    申请日:2016-06-21

    IPC分类号: G06F21/64 H04L9/32 G06F21/53

    摘要: Systems and methods are disclosed for enabling a recipient of a cryptographically-signed electronic communication to verify the authenticity of the communication on-the-fly using a signed chain of check values, the chain being constructed from the original content of the communication, and each check value in the chain being at least partially dependent on the signed root of the chain and a portion of the communication. Fault tolerance can be provided by including error-check values in the communication that enable a decoding device to maintain the chain's security in the face of communication errors. In one embodiment, systems and methods are provided for enabling secure quasi-random access to a content file by constructing a hierarchy of hash values from the file, the hierarchy deriving its security in a manner similar to that used by the above-described chain. The hierarchy culminates with a signed hash that can be used to verify the integrity of other hash values in the hierarchy, and these other hash values can, in turn, be used to efficiently verify the authenticity of arbitrary portions of the content file.

    摘要翻译: 公开了系统和方法,用于使密码签名的电子通信的接收者能够使用签署的检查值链来验证通信的真实性,该链由正在通信的原始内容构成,并且每个 检查链中的值至少部分地取决于链的签名根和通信的一部分。 可以通过在通信中包括错误检查值来提供容错,使得解码设备能够在面对通信错误时保持链的安全性。 在一个实施例中,提供了系统和方法,用于通过从文件中构建散列值的层级来实现对内容文件的安全准随机访问,层级以与上述链类似的方式导出其安全性。 层次结构最终得到一个可用于验证层次结构中其他哈希值的完整性的签名散列,而这些哈希值又可用于有效地验证内容文件的任意部分的真实性。

    TRUST MANAGEMENT SYSTEMS AND METHODS
    5.
    发明申请
    TRUST MANAGEMENT SYSTEMS AND METHODS 审中-公开
    信托管理系统与方法

    公开(公告)号:US20140068249A1

    公开(公告)日:2014-03-06

    申请号:US14071586

    申请日:2013-11-04

    IPC分类号: H04L9/32

    摘要: The present invention provides systems and methods for making efficient trust management decisions. A trust management engine is provided that processes requests for system resources, authorizations or certificates, and the identity of one or more root authorities that are ultimately responsible for granting or denying the requests. To determine whether a request should be granted, the trust management engine identifies a set principals from whom authorization may flow, and interprets each of the certificates as a function of the state of one or more of the principals. The processing logic iteratively evaluates the functions represented by the certificates, updates the states of the principals, and repeats this process until a reliable determination can be made as to whether the request should be granted or denied. The certificates may be evaluated until the state of the root authority indicates that the request should be granted, or until further evaluation of the certificates is ineffective in changing the state of the principals.

    摘要翻译: 本发明提供了用于进行有效信任管理决策的系统和方法。 提供了一个信任管理引擎来处理对系统资源,授权或证书的请求以及最终负责授予或拒绝请求的一个或多个root权限的身份。 为了确定是否应该授予请求,信任管理引擎识别从其授权可能流动的集合主体,并且将每个证书解释为一个或多个主体的状态的函数。 处理逻辑迭代地评估由证书表示的功能,更新主体的状态,并重复该过程,直到可以确定是否应该请求被授予或被拒绝为止。 可以评估证书,直到根管理员的状态表明该请求应被授予,或者直到进一步评估证书在改变主体状态方面无效时。

    Systems and methods for authenticating and protecting the integrity of data streams and other data
    6.
    发明授权
    Systems and methods for authenticating and protecting the integrity of data streams and other data 有权
    用于认证和保护数据流和其他数据完整性的系统和方法

    公开(公告)号:US09401896B2

    公开(公告)日:2016-07-26

    申请号:US14304422

    申请日:2014-06-13

    IPC分类号: H04L29/06 G06F21/64 H04L9/32

    摘要: Systems and methods are disclosed for enabling a recipient of a cryptographically-signed electronic communication to verify the authenticity of the communication on-the-fly using a signed chain of check values, the chain being constructed from the original content of the communication, and each check value in the chain being at least partially dependent on the signed root of the chain and a portion of the communication. Fault tolerance can be provided by including error-check values in the communication that enable a decoding device to maintain the chain's security in the face of communication errors. In one embodiment, systems and methods are provided for enabling secure quasi-random access to a content file by constructing a hierarchy of hash values from the file, the hierarchy deriving its security in a manner similar to that used by the above-described chain. The hierarchy culminates with a signed hash that can be used to verify the integrity of other hash values in the hierarchy, and these other hash values can, in turn, be used to efficiently verify the authenticity of arbitrary portions of the content file.

    摘要翻译: 公开了系统和方法,用于使密码签名的电子通信的接收者能够使用签署的检查值链来验证通信的真实性,该链由正在通信的原始内容构成,并且每个 检查链中的值至少部分地取决于链的签名根和通信的一部分。 可以通过在通信中包括错误检查值来提供容错,使得解码设备能够在面对通信错误时保持链的安全性。 在一个实施例中,提供了系统和方法,用于通过从文件中构建散列值的层级来实现对内容文件的安全准随机访问,层级以与上述链类似的方式导出其安全性。 层次结构最终得到一个可用于验证层次结构中其他哈希值的完整性的签名散列,而这些哈希值又可用于有效地验证内容文件的任意部分的真实性。

    Trust management systems and methods

    公开(公告)号:US09485100B2

    公开(公告)日:2016-11-01

    申请号:US14739277

    申请日:2015-06-15

    IPC分类号: H04L9/32 G06F21/60

    摘要: The present invention provides systems and methods for making efficient trust management decisions. A trust management engine is provided that processes requests for system resources, authorizations or certificates, and the identity of one or more root authorities that are ultimately responsible for granting or denying the requests. To determine whether a request should be granted, the trust management engine identifies a set principals from whom authorization may flow, and interprets each of the certificates as a function of the state of one or more of the principals. The processing logic iteratively evaluates the functions represented by the certificates, updates the states of the principals, and repeats this process until a reliable determination can be made as to whether the request should be granted or denied. The certificates may be evaluated until the state of the root authority indicates that the request should be granted, or until further evaluation of the certificates is ineffective in changing the state of the principals.

    SYSTEMS AND METHODS FOR AUTHENTICATING AND PROTECTING THE INTEGRITY OF DATA STREAMS AND OTHER DATA
    10.
    发明申请
    SYSTEMS AND METHODS FOR AUTHENTICATING AND PROTECTING THE INTEGRITY OF DATA STREAMS AND OTHER DATA 有权
    用于认证和保护数据流和其他数据的完整性的系统和方法

    公开(公告)号:US20140289523A1

    公开(公告)日:2014-09-25

    申请号:US14304422

    申请日:2014-06-13

    IPC分类号: H04L29/06

    摘要: Systems and methods are disclosed for enabling a recipient of a cryptographically-signed electronic communication to verify the authenticity of the communication on-the-fly using a signed chain of check values, the chain being constructed from the original content of the communication, and each check value in the chain being at least partially dependent on the signed root of the chain and a portion of the communication. Fault tolerance can be provided by including error-check values in the communication that enable a decoding device to maintain the chain's security in the face of communication errors. In one embodiment, systems and methods are provided for enabling secure quasi-random access to a content file by constructing a hierarchy of hash values from the file, the hierarchy deriving its security in a manner similar to that used by the above-described chain. The hierarchy culminates with a signed hash that can be used to verify the integrity of other hash values in the hierarchy, and these other hash values can, in turn, be used to efficiently verify the authenticity of arbitrary portions of the content file.

    摘要翻译: 公开了系统和方法,用于使密码签名的电子通信的接收者能够使用签署的检查值链来验证通信的真实性,该链由正在通信的原始内容构成,并且每个 检查链中的值至少部分地取决于链的签名根和通信的一部分。 可以通过在通信中包括错误检查值来提供容错,使得解码设备能够在面对通信错误时保持链的安全性。 在一个实施例中,提供了系统和方法,用于通过从文件中构建散列值的层级来实现对内容文件的安全准随机访问,层级以与上述链类似的方式导出其安全性。 层次结构最终得到一个可用于验证层次结构中其他哈希值的完整性的签名散列,而这些哈希值又可用于有效地验证内容文件的任意部分的真实性。