Method for secure device discovery and introduction
    4.
    发明授权
    Method for secure device discovery and introduction 有权
    安全设备发现和介绍的方法

    公开(公告)号:US08001584B2

    公开(公告)日:2011-08-16

    申请号:US11241589

    申请日:2005-09-30

    IPC分类号: H04L9/32

    摘要: A first message is transmitted over a communication channel to initiate a transaction. The first message contains a random number and a public key of a device. Continuing the transaction, a second message is received. The second message also contains a random number and a public key of a second device. At least one message is received that contains a proof-of-possession of the device's password, along with a credential that is encrypted with a credential key.

    摘要翻译: 通过通信信道发送第一消息以发起交易。 第一个消息包含一个设备的随机数和公钥。 继续交易,收到第二条消息。 第二个消息还包含第二个设备的随机数和公钥。 接收到至少一个包含设备密码证明的消息,以及使用证书密钥加密的证书。

    System and method for correct execution of software based on baseline and real time information
    6.
    发明授权
    System and method for correct execution of software based on baseline and real time information 有权
    基于基线和实时信息正确执行软件的系统和方法

    公开(公告)号:US09003236B2

    公开(公告)日:2015-04-07

    申请号:US13631317

    申请日:2012-09-28

    IPC分类号: G06F11/00 G06F11/34

    摘要: In an embodiment of the invention an application provider may include “tracing elements” in a target software application. While working with the application the trace elements are detected and provide a “baseline trace” indicating proper application execution. The provider then supplies the application, which still includes the trace elements, and the baseline trace to a user. The user operates the application to produce a “real-time trace” based on the application still having trace elements that produce trace events. A comparator then compares the baseline and real-time traces. If the traces are within a pre-determined range of each other the user has a level of assurance the software is operating correctly. If the level of assurance is low, an embodiment may trigger a hardware interrupt or similar event to prevent further execution of software. Other embodiments are described herein.

    摘要翻译: 在本发明的实施例中,应用提供者可以在目标软件应用中包括“跟踪元素”。 在处理应用程序时,将检测到跟踪元素,并提供一个“基线跟踪”,指示正确的应用程序执行。 然后,提供商将仍然包含跟踪元素的应用程序和基准跟踪提供给用户。 用户根据仍然具有产生跟踪事件的微量元素的应用来操作应用以产生“实时跟踪”。 比较器然后比较基线和实时迹线。 如果迹线在彼此的预定范围内,则用户具有软件正确操作的保证级别。 如果保证级别低,则实施例可以触发硬件中断或类似事件以防止进一步执行软件。 本文描述了其它实施例。

    BARCODE AUTHENTICATION FOR RESOURCE REQUESTS
    8.
    发明申请
    BARCODE AUTHENTICATION FOR RESOURCE REQUESTS 有权
    BARCODE认证资源要求

    公开(公告)号:US20140230039A1

    公开(公告)日:2014-08-14

    申请号:US13763116

    申请日:2013-02-08

    IPC分类号: G06F21/35

    摘要: Mobile device, client device and server associated with client-server authentication are described. In embodiments, the mobile device may comprise a camera and a token extractor. The token extractor may be coupled to the camera and configured to analyze an image, captured by the camera. The captured image may contain a barcode and may be displayed on a client device in response to a request of a server for access to a resource. The barcode may contain a token, which may be extracted by the token extractor to be used to gain access to a resource requested from a server. Other embodiments may be described and/or claimed.

    摘要翻译: 描述了与客户机 - 服务器认证相关联的移动设备,客户端设备和服务器。 在实施例中,移动设备可以包括相机和令牌提取器。 令牌提取器可以耦合到相机并且被配置为分析由相机捕获的图像。 捕获的图像可以包含条形码,并且可以响应于服务器访问资源的请求而在客户端设备上显示。 条形码可以包含令牌,其可以由令牌提取器提取以被用于获得对从服务器请求的资源的访问。 可以描述和/或要求保护其他实施例。

    APPARATUS AND METHOD FOR SKEIN HASHING
    9.
    发明申请
    APPARATUS AND METHOD FOR SKEIN HASHING 有权
    装置和方法进行滑雪

    公开(公告)号:US20120328097A1

    公开(公告)日:2012-12-27

    申请号:US13165269

    申请日:2011-06-21

    IPC分类号: H04L9/28

    摘要: Described herein are an apparatus and method for Skein hashing. The apparatus comprises a block cipher operable to receive an input data and to generate a hashed output data by applying Unique Block Iteration (UBI) modes, the block cipher comprising at least two mix and permute logic units which are pipelined by registers; and a counter, coupled to the block cipher, to determine a sequence of the UBI modes and to cause the block cipher to process at least two input data simultaneously for generating the hashed output data.

    摘要翻译: 这里描述了用于Skein散列的装置和方法。 该装置包括可以用于接收输入数据并通过应用唯一块迭代(UBI)模式来产生散列输出数据的块密码,所述块密码包括由寄存器流水线化的至少两个混合和置换逻辑单元; 以及耦合到所述块密码的计数器,以确定所述UBI模式的序列,并且使所述块密码同时处理至少两个输入数据以产生所述散列输出数据。

    END-TO-END NETWORK SECURITY WITH TRAFFIC VISIBILITY
    10.
    发明申请
    END-TO-END NETWORK SECURITY WITH TRAFFIC VISIBILITY 审中-公开
    具有交通可见性的端到端网络安全

    公开(公告)号:US20120096270A1

    公开(公告)日:2012-04-19

    申请号:US13337919

    申请日:2011-12-27

    IPC分类号: H04L9/32

    摘要: End-to-end security between clients and a server, and traffic visibility to intermediate network devices, achieved through combined mode, single pass encryption and authentication using two keys is disclosed. In various embodiments, a combined encryption-authentication unit includes a cipher unit and an authentication unit coupled in parallel to the cipher unit, and generates an authentication tag using an authentication key in parallel with the generation of the cipher text using an encryption key, where the authentication and encryption key have different key values. In various embodiments, the cipher unit operates in AES counter mode, and the authentication unit operates in parallel, in AES-GMAC mode Using a two key, single pass combined mode algorithm preserves network performance using a limited number of HW gates, while allowing an intermediate device access to the encryption key for deciphering the data, without providing that device the ability to compromise data integrity, which is preserved between the end to end devices.

    摘要翻译: 公开了客户机与服务器之间的端到端安全性,以及通过组合模式,单程加密和使用两个密钥的认证实现的对中间网络设备的流量可见性。 在各种实施例中,组合加密认证单元包括与密码单元并行耦合的密码单元和认证单元,并且使用加密密钥与密文生成并行地使用认证密钥生成认证标签,其中 认证和加密密钥具有不同的密钥值。 在各种实施例中,密码单元以AES计数器模式运行,并且认证单元以AES-GMAC模式并行操作。使用双键单通组合模式算法使用有限数量的HW门保留网络性能,同时允许 中间设备访问用于解密数据的加密密钥,而不提供该设备损害数据完整性的能力,这在端到端设备之间保留。