GENERATING CRYPTOGRAPHIC FUNCTION PARAMETERS FROM A PUZZLE
    1.
    发明申请
    GENERATING CRYPTOGRAPHIC FUNCTION PARAMETERS FROM A PUZZLE 审中-公开
    从一个PUZZLE生成CRYPTOGRAPHIC功能参数

    公开(公告)号:WO2016168926A1

    公开(公告)日:2016-10-27

    申请号:PCT/CA2016/050451

    申请日:2016-04-20

    Applicant: CERTICOM CORP.

    Abstract: Methods, systems, and computer programs for generating cryptographic function parameters are described. In some examples, a solution to a puzzle is obtained. A pseudorandom generator is seeded based on the solution. After seeding the pseudorandom generator, an output from the pseudorandom generator is obtained. A parameter for a cryptographic function is generated. The parameter is generated from the output from the pseudorandom generator.

    Abstract translation: 描述用于生成加密功能参数的方法,系统和计算机程序。 在一些示例中,获得难题的解决方案。 基于该解决方案接种伪随机发生器。 在伪随机发生器接种之后,获得来自伪随机发生器的输出。 生成加密功能的参数。 该参数是从伪随机发生器的输出生成的。

    METHODS AND APPARATUS FOR USE IN TRANSFERRING AN ASSIGNMENT OF A SECURE CHIP BETWEEN SUBSCRIPTION MANAGERS
    2.
    发明申请
    METHODS AND APPARATUS FOR USE IN TRANSFERRING AN ASSIGNMENT OF A SECURE CHIP BETWEEN SUBSCRIPTION MANAGERS 审中-公开
    用于转让订阅经理之间安全芯片转让的方法和装置

    公开(公告)号:WO2014005211A1

    公开(公告)日:2014-01-09

    申请号:PCT/CA2012/050465

    申请日:2012-07-09

    Abstract: Techniques for use in transferring an assignment of a secure chip of a wireless device from a current subscription manager (SM) of a current mobile network operator (MNO) to a new SM of a new MNO are described. In one illustrative example, the current SM receives a request for transferring the assignment and produces transfer permission data in response. The transfer permission data includes an identifier of the secure chip, an identifier of the current SM, and a digital signature of the current SM. The current SM then sends to the secure chip a transfer permission message which includes the transfer permission data. The transfer permission data indicates a permission for the secure chip to transfer the assignment from the current SM to the new SM. Additional techniques are performed by the secure chip, and the new SM, as described.

    Abstract translation: 描述了用于将无线设备的安全芯片的分配从当前移动网络运营商(MNO)的当前订阅管理器(SM)传送到新的MNO的新SM的技术。 在一个说明性示例中,当前SM接收到传送分配的请求,并作为响应产生传送许可数据。 传输许可数据包括安全芯片的标识符,当前SM的标识符和当前SM的数字签名。 当前的SM然后向安全芯片发送包括传输许可数据的传输许可消息。 传输许可数据指示安全芯片允许从当前SM传送分配到新的SM。 附加技术由安全芯片和新SM执行,如所述。

    KEY AGREEMENT FOR WIRELESS COMMUNICATION
    3.
    发明申请
    KEY AGREEMENT FOR WIRELESS COMMUNICATION 审中-公开
    无线通信的主要协议

    公开(公告)号:WO2014004688A1

    公开(公告)日:2014-01-03

    申请号:PCT/US2013/047921

    申请日:2013-06-26

    Abstract: Methods, systems, and computer programs for performing key agreement operations in a communication system are described. In some aspects, a wireless network operator receives a mobile device identifier and accesses a secret key associated with the mobile device. A message authentication code function is evaluated based on the secret key to produce an output value. A session key and a challenge value are obtained based on the output value. In some aspects, a mobile device accesses a secret key in response to receiving the challenge value from the wireless network operator. A message authentication code function is evaluated based on the secret key to produce an output value. A response value and a session key are obtained based on the output value. The response value is transmitted to the wireless network operator.

    Abstract translation: 描述用于在通信系统中执行密钥协商操作的方法,系统和计算机程序。 在一些方面,无线网络运营商接收移动设备标识符并访问与移动设备相关联的秘密密钥。 基于秘密密钥来评估消息认证码功能以产生输出值。 基于输出值获得会话密钥和质询值。 在一些方面,响应于从无线网络运营商接收到挑战值,移动设备访问秘密密钥。 基于秘密密钥来评估消息认证码功能以产生输出值。 基于输出值获得响应值和会话密钥。 响应值被发送到无线网络运营商。

    MANAGING MOBILE DEVICE APPLICATIONS IN A WIRELESS NETWORK
    5.
    发明申请
    MANAGING MOBILE DEVICE APPLICATIONS IN A WIRELESS NETWORK 审中-公开
    在无线网络中管理移动设备应用

    公开(公告)号:WO2013044088A1

    公开(公告)日:2013-03-28

    申请号:PCT/US2012/056653

    申请日:2012-09-21

    Abstract: Methods, systems, and computer programs for managing mobile device applications are described. In some aspects, a mobile device application is prevented from accessing resources of a wireless network. For example, a wireless network operator system can determine that one or more mobile device applications are disapproved for use in the wireless network. In some implementations, the wireless network operator denies the disapproved mobile device applications access to the wireless network resources. In some implementations, mobile devices disable access to the wireless network by the disapproved mobile device applications.

    Abstract translation: 描述了用于管理移动设备应用的方法,系统和计算机程序。 在一些方面,防止移动设备应用访问无线网络的资源。 例如,无线网络运营商系统可以确定一个或多个移动设备应用被拒绝在无线网络中使用。 在一些实现中,无线网络运营商拒绝被拒绝的移动设备应用访问无线网络资源。 在一些实施方式中,移动设备通过拒绝的移动设备应用来禁止对无线网络的访问。

    DATA INTEGRITY FOR PROXIMITY-BASED COMMUNICATION
    6.
    发明申请
    DATA INTEGRITY FOR PROXIMITY-BASED COMMUNICATION 审中-公开
    基于接近通信的数据完整性

    公开(公告)号:WO2013009288A1

    公开(公告)日:2013-01-17

    申请号:PCT/US2011/043538

    申请日:2011-07-11

    Abstract: Methods, systems, and computer programs for trusted communication among mobile devices are described. In some aspects, information is wirelessly transmitted from a first mobile device to a second mobile device. The information permits the second mobile device to detect proximity of the first mobile device. In some implementations, the information can be wirelessly transmitted by a proximity- activated wireless interface, such as, for example, a Near Field Communication (NFC) interface. In response to the information, the first mobile device receives a message and a first authentication value wirelessly transmitted from the second mobile device to the first mobile device. A second authentication value is generated at the first mobile device based on the message and the shared secret value. Integrity of the message is verified based on comparing the first authentication value and the second authentication value.

    Abstract translation: 描述了用于移动设备之间的可信通信的方法,系统和计算机程序。 在一些方面,信息从第一移动设备无线传输到第二移动设备。 该信息允许第二移动设备检测第一移动设备的接近度。 在一些实现中,信息可以由接近激活的无线接口(例如近场通信(NFC))接口无线地发送。 响应于该信息,第一移动设备接收从第二移动设备无线发送到第一移动设备的消息和第一认证值。 基于消息和共享秘密值在第一移动设备处生成第二认证值。 通过比较第一认证值和第二认证值来验证消息的完整性。

    COLLISION-RESISTANT ELLIPTIC CURVE HASH FUNCTIONS
    8.
    发明申请
    COLLISION-RESISTANT ELLIPTIC CURVE HASH FUNCTIONS 审中-公开
    抗冲击曲线冲击功能

    公开(公告)号:WO2010048721A1

    公开(公告)日:2010-05-06

    申请号:PCT/CA2009/001559

    申请日:2009-10-30

    CPC classification number: H04L9/0643 H04L9/3066 H04L2209/20

    Abstract: Elliptic curve hash functions are provided which do not require a pre-existing hash function, such as that required by the MuHash. The elliptic curve hash functions can be built from scratch and are collision free and can be incremental. In one embodiment, rather than a pre-existing hash function, the identity function with padding is used; and in another embodiment, rather than a pre-existing hash function, a block cipher with a fixed non-secret key is used.

    Abstract translation: 提供了椭圆曲线散列函数,它不需要预先存在的哈希函数,如MuHash所要求的哈希函数。 椭圆曲线哈希函数可以从头开始构建,并且是无冲突的并且可以是增量的。 在一个实施例中,使用具有填充的身份函数,而不是预先存在的散列函数; 并且在另一个实施例中,使用具有固定非秘密密钥的块密码而不是预先存在的散列函数。

    SYSTEM FOR DETECTING A RESET CONDITION IN AN ELECTRONIC CIRCUIT
    9.
    发明申请
    SYSTEM FOR DETECTING A RESET CONDITION IN AN ELECTRONIC CIRCUIT 审中-公开
    用于检测电子电路中的复位条件的系统

    公开(公告)号:WO2010048720A1

    公开(公告)日:2010-05-06

    申请号:PCT/CA2009/001558

    申请日:2009-10-30

    CPC classification number: H03K17/20 G06F1/24 H03K5/19 H03K17/223

    Abstract: There is disclosed a system for detecting the assertion of a reset signal. A plurality of circuit elements are configurable by a reset signal to output a string of data values in a predetermined pattern. A comparator receives the string of data values and determines whether the string of data values matches the predetermined pattern. If so, the comparator generates an output signal indicative of a reset. In one embodiment, the output signal of the comparator can be used to automatically trigger a reset if the reset signal has not been asserted.

    Abstract translation: 公开了一种用于检测复位信号的断言的系统。 多个电路元件可由复位信号配置,以预定模式输出一串数据值。 比较器接收数据值串,并确定数据值串是否符合预定模式。 如果是,则比较器产生指示复位的输出信号。 在一个实施例中,如果复位信号尚未被断言,比较器的输出信号可用于自动触发复位。

Patent Agency Ranking