CODE EXCHANGE PROTOCOL
    83.
    发明申请
    CODE EXCHANGE PROTOCOL 审中-公开
    密钥交换协议

    公开(公告)号:WO99048240A1

    公开(公告)日:1999-09-23

    申请号:PCT/DE1999/000771

    申请日:1999-03-18

    CPC classification number: H04L9/0844

    Abstract: The invention relates to a code exchange protocol in which communication partners (A, B) each have a secret code (S) and a public code (P). According to the invention, communication partner (A) selects a random number (x), and communication partner (B) selects a random number (y). A first partial code (Ax) is formed by communication partner (A), and a second partial code (By) is formed by communication partner (B) by using the public code (P) of the respective partner (B, A). Each partial code is transmitted to the other communication partner (B, A). A session code (g , g ) is formed from each of the personal random numbers (x, y) and from the partial code (By, Ax) of the respective communication partner (B, A) by using the personal secret code (S), whereby the partial codes (Ax, By), and the session codes (g , g ) can be calculated in a manner which is analogous to the Diffie-Hellman protocol.

    Abstract translation: 本发明涉及一种密钥交换协议,其中的通信伙伴(A,B)分别具有秘密(S)和公共密钥(P)有,在该通信伙伴(A)的随机数(x)和通信对方(B)的随机数( y)的选择,其中(从通信伙伴a)第一部分密钥(AX)和(从通信伙伴B)的第二部分密钥(由)(使用相应的伙伴(B的公开密钥P),a)中形成,并且彼此 通信伙伴(B,A)被传输,并且其中在从他自己的随机数(X,Y)和相应的通信伙伴的部分密钥(由,斧)每一种情况下(B,A),使用自己的密钥(S),一个会话密钥( 克,克)形成,其中,所述键部分(AX,BY)和会话密钥(g分别,克)被类似地计算迪菲 - 赫尔曼协议。

    CRYPTOGRAPHIC SYSTEM AND PROTOCOL FOR ESTABLISHING SECURE AUTHENTICATED REMOTE ACCESS
    84.
    发明申请
    CRYPTOGRAPHIC SYSTEM AND PROTOCOL FOR ESTABLISHING SECURE AUTHENTICATED REMOTE ACCESS 审中-公开
    用于建立安全认证的远程访问的编组系统和协议

    公开(公告)号:WO9845981A2

    公开(公告)日:1998-10-15

    申请号:PCT/US9804902

    申请日:1998-03-12

    CPC classification number: H04L9/0844

    Abstract: A cryptographic protocol establishes shared secrets such as encryption/decryption keys by exchanging public signals generated from transformations of private signals and one or more authentication factors including "what you know", "what you have" and "what you are" factors. A novel use of the authentication factors provides resistance against various types of cryptanalysis including dictionary attacks and man-in-the-middle attacks, allows detection of prior occurrences of unauthorized parties successfully masquerading as an authorized party, and provides enhanced security in cryptosystems that rely on "what you know" authentication factors such as passwords which are often weak in a cryptographic sense.

    Abstract translation: 加密协议通过交换从私有信号转换产生的公共信号和一个或多个认证因素,包括“你所知道的”,“你有什么”和“你是什么”因素来建立共享秘密,如加密/解密密钥。 认证因素的新颖使用提供了对各种类型的密码分析的抵制,包括字典攻击和中间人攻击,允许检测先前发生的未经授权的成员伪装成授权方,并提供依赖的密码系统中的增强的安全性 关于“你所知道的”认证因素,如加密常常较弱的密码。

    METHOD FOR SIGNATURE AND SESSION KEY GENERATION
    85.
    发明申请
    METHOD FOR SIGNATURE AND SESSION KEY GENERATION 审中-公开
    签名和会话密钥生成方法

    公开(公告)号:WO1996033565A1

    公开(公告)日:1996-10-24

    申请号:PCT/CA1996000239

    申请日:1996-04-15

    Applicant: CERTICOM CORP.

    CPC classification number: H04L9/0844 G06F7/725 H04L9/3247

    Abstract: A key establishment protocol between a pair of correspondents includes the generation by each correspondent of respective signatures. The signatures are derived from information that is private to the correspondent and information that is public. After exchange of signatures, the integrity of exchange messages can be verified by extracting the public information contained in the signature and comparing it with information used to generate the signature. A common session key may then be generated from the public and private information of respective ones of the correspondents.

    Abstract translation: 一对记者之间的密钥建立协议包括每个记者生成各个签名。 签名来自对记者的私人信息和公开的信息。 在签名交换之后,可以通过提取签名中包含的公开信息并将其与用于生成签名的信息进行比较来验证交换消息的完整性。 然后可以从相应记者的公共和私人信息生成公共会话密钥。

    METHOD FOR SECRET ORIGINATION SERVICE TO DISTRIBUTE A SHARED SECRET
    87.
    发明申请
    METHOD FOR SECRET ORIGINATION SERVICE TO DISTRIBUTE A SHARED SECRET 审中-公开
    秘密发布服务分发共享秘密的方法

    公开(公告)号:WO2018080864A1

    公开(公告)日:2018-05-03

    申请号:PCT/US2017/057136

    申请日:2017-10-18

    Abstract: A method and secret origination service are provided for calculating and distributing a shared secret. The secret origination service receives a first shared secret request from a first device. The first shared secret request includes a first identity token associated with a first user of the first device and a second participant identifier associated with a second user. The secret origination service verifies the first identity token to produce a first verified requestor identity and calculates a first shared secret based on the first verified requestor identity and the second user. The secret origination service sends the first shared secret to the first device. The secret origination service also receives a second shared secret request from the second device, which includes a second identity token associated with the second user of the second device and a first participant identifier associated with the first user. The secret origination service verifies the second identity token to produce a second verified requestor identity and calculates a second shared secret based on the second verified requestor identity and the first user. Because the inputs are the same, the second shared secret is identical to the first shared secret. The secret origination service sends the second shared secret to the second device.

    Abstract translation: 为计算和分配共享秘密提供了一种方法和秘密发起服务。 秘密发起服务从第一设备接收第一共享秘密请求。 第一共享秘密请求包括与第一设备的第一用户相关联的第一身份令牌和与第二用户相关联的第二参与者标识符。 秘密发起服务验证第一身份令牌以产生第一经验证的请求者身份并基于第一经验证的请求者身份和第二用户计算第一共享秘密。 秘密发起服务将第一个共享密钥发送给第一个设备。 该秘密发起服务还从第二设备接收第二共享秘密请求,该第二共享秘密请求包括与第二设备的第二用户相关联的第二身份令牌和与第一用户相关联的第一参与者标识符。 秘密发起服务验证第二身份令牌以产生第二经验证的请求者身份并基于第二经验证的请求者身份和第一用户计算第二共享秘密。 由于输入相同,第二个共享密钥与第一个共享密钥相同。 秘密发起服务将第二个共享秘密发送给第二个设备。

    HANDSHAKE PROTOCOLS FOR IDENTITY-BASED KEY MATERIAL AND CERTIFICATES
    88.
    发明申请
    HANDSHAKE PROTOCOLS FOR IDENTITY-BASED KEY MATERIAL AND CERTIFICATES 审中-公开
    用于基于身份的重要资料和证书的握手协议

    公开(公告)号:WO2017167771A1

    公开(公告)日:2017-10-05

    申请号:PCT/EP2017/057349

    申请日:2017-03-29

    CPC classification number: H04L9/0847 H04L9/083 H04L9/0844

    Abstract: A first network node is provided arranged to obtain a second certificate and a second authentication token from a second network node. An identity unit is arranged to obtain a second identifier from the second certificate. An identity-based shared key unit (147) arranged to generate an identity-based shared key by applying a key establishment algorithm of the identity-based key pre-distribution scheme on the second identifier and the first local 5 key material. An authentication unit (148) is arranged to authenticate the second network node by cryptographically verifying that the second authentication token has been computed from at least the identity-based shared key.

    Abstract translation: 提供了第一网络节点,其被设置为从第二网络节点获得第二证书和第二认证令牌。 身份单元被设置为从第二证书获得第二标识符。 基于身份的共享密钥单元(147),被配置为通过将基于身份的密钥预分发方案的密钥建立算法应用于第二标识符和第一本地密钥材料来生成基于身份的共享密钥。 认证单元(148)被配置为通过密码验证第二认证令牌已经从至少基于身份的共享密钥计算出来来认证第二网络节点。

    DETERMINING A COMMON SECRET FOR THE SECURE EXCHANGE OF INFORMATION AND HIERARCHICAL, DETERMINISTIC CRYPTOGRAPHIC KEYS
    89.
    发明申请
    DETERMINING A COMMON SECRET FOR THE SECURE EXCHANGE OF INFORMATION AND HIERARCHICAL, DETERMINISTIC CRYPTOGRAPHIC KEYS 审中-公开
    确定用于安全交换信息和分级,确定性密码键的通用密码

    公开(公告)号:WO2017145016A1

    公开(公告)日:2017-08-31

    申请号:PCT/IB2017/050856

    申请日:2017-02-16

    CPC classification number: H04L9/0844 H04L9/3066 H04L2209/56

    Abstract: A method (300) and system (1) of determining a common secret for two nodes (3, 7). Each node (3, 7) has a respective asymmetric cryptography pair, each pair including a master private key and a master public key. Respective second private and public keys may be determined based on the master private key, master public key and a deterministic key. A common secret may be determined at each of the nodes based on the second private and public keys. In one example, a node (3, 7) may determine the common secret based on (i) a second private key based on the node's own master private key and the deterministic key; and (ii) a second public key based on the other node's master public key and the deterministic key. The invention may be suited for use with, but not limited to, digital wallets, blockchain (e.g. Bitcoin) technologies and personal device security.

    Abstract translation: 确定两个节点(3,7)的公共秘密的方法(300)和系统(1)。 每个节点(3,7)具有各自的非对称密码对,每对包括主私钥和主公钥。 可以基于主私钥,主公钥和确定性密钥来确定各自的第二私钥和公钥。 基于第二私钥和公钥可以在每个节点处确定公共秘密。 在一个示例中,节点(3,7)可以基于(i)基于节点自己的主私钥和确定性密钥的第二私钥来确定公共密钥; 和(ii)基于另一节点的主公钥和确定性密钥的第二公钥。 本发明可适用于但不限于数字钱包,区块链(例如比特币)技术和个人设备安全。

    IMPROVING SECURITY PROTOCOLS
    90.
    发明申请
    IMPROVING SECURITY PROTOCOLS 审中-公开
    改进安全协议

    公开(公告)号:WO2017125729A1

    公开(公告)日:2017-07-27

    申请号:PCT/GB2017/050111

    申请日:2017-01-18

    CPC classification number: H04L9/0844 H04L9/321 H04L9/3215

    Abstract: A computer implemented method of authenticating communication between a first node and a second node, using a function of combined information obtained from at least one of the nodes, the method comprising: sending a commitment message from the first node to the second node, the message containing content based on (at least) a first part of the combined information, which content commits the first node to a first value of the function, and wherein the first part of the combined information is communicated from the first node to the second node with a delay mechanism that only allows the first part of the information to be determined by the second node after a predetermined time; and in response to receiving notification at the first node that the second node has received the message, which receipt commits the second node to the first function value: sending a subsequent message comprising the first part of the information from the first node to the second node, or waiting until after the predetermined time; and in response to the second node receiving the subsequent message before the predetermined time, or in response to waiting until after the predetermined time: compiling the combined information at the second node by combining the first part of the information, obtained from the subsequent message or determined after the predetermined time using the delay mechanism, with the remainder of the combined information at least part of which has been received from the first node, calculating the function of the combined information at each of the first node and the second node, thereby to enable comparison of the calculated function values of each node using an empirical channel.

    Abstract translation: 一种使用从至少一个节点获得的组合信息的功能来认证第一节点和第二节点之间的通信的计算机实现的方法,所述方法包括:从第一节点 节点到第二节点,消息包含基于(至少)组合信息的第一部分的内容,该内容将第一节点提交给函数的第一值,并且其中组合信息的第一部分从 所述第一节点具有延迟机制,所述延迟机制仅允许所述第一节点在预定时间之后由所述第二节点确定; 以及响应于在所述第一节点处接收到所述第二节点已经接收到所述消息的通知,所述接收将所述第二节点提交到所述第一函数值:将包括所述信息的所述第一部分的后续消息从所述第一节点发送到所述第二节点 ,或者等到预定时间之后; 以及响应于第二节点在预定时间之前接收到随后的消息,或者响应于等待直到预定时间之后:通过组合从后续消息获得的信息的第一部分在第二节点处编译组合信息,或者 在预定时间之后使用延迟机制确定,其中至少部分已经从第一节点接收到的组合信息的剩余部分,计算第一节点和第二节点中的每一个处的组合信息的函数,从而 可以使用经验渠道比较每个节点的计算函数值。

Patent Agency Ranking