SYSTEM AND METHOD OF LAWFUL ACCESS TO SECURE COMMUNICATIONS
    1.
    发明申请
    SYSTEM AND METHOD OF LAWFUL ACCESS TO SECURE COMMUNICATIONS 审中-公开
    系统和方法进行安全通信

    公开(公告)号:WO2013104072A1

    公开(公告)日:2013-07-18

    申请号:PCT/CA2013/050015

    申请日:2013-01-11

    Abstract: The present disclosure relates to systems and methods for secure communications. In some aspects, an initiator KMS receives, from an initiator UE, one or more values used in generation of an encryption key, which includes obtaining at least one value associated with a RANDRi. The initiator KMS sends the at least one value associated with the RANDRi to a responder KMS. The responder KMS generates the encryption key using the one or more values.

    Abstract translation: 本公开涉及用于安全通信的系统和方法。 在一些方面,发起方KMS从发起方UE接收用于生成加密密钥的一个或多个值,其包括获得与RANDRi相关联的至少一个值。 启动器KMS将与RANDRi相关联的至少一个值发送到响应者KMS。 响应者KMS使用一个或多个值生成加密密钥。

    AUTHENTICATED ENCRYPTION METHOD USING WORKING BLOCKS
    5.
    发明申请
    AUTHENTICATED ENCRYPTION METHOD USING WORKING BLOCKS 审中-公开
    使用工作块的认证加密方法

    公开(公告)号:WO2014084886A1

    公开(公告)日:2014-06-05

    申请号:PCT/US2013/030158

    申请日:2013-03-11

    CPC classification number: H04L9/30 H04L9/0637 H04L9/0643 H04L2209/125

    Abstract: A computer-implemented authenticated encryption method for converting a plaintext message into a ciphertext message. The method includes dividing the plaintext message into at least two working blocks, each working block having a mathematical relationship to the plaintext message. For each working block, a working block ciphertext is computed as a function of such working block, a deterministic working block initialization vector, and a deterministic working block encryption key. For each working block, a message authentication tag is computed as a function of a deterministic working block message authentication key and at least one of (a) the working block ciphertext computed for such working block and an indication corresponding to the mathematical relationship of such working block to the plaintext message and (b) such working block. The method further includes computing a global message authentication tag as a function of the message authentication tag computed for each working block and a global message authentication key. The ciphertext message comprises the working block ciphertext computed for each working block and the global message authentication tag.

    Abstract translation: 一种用于将明文消息转换为密文消息的计算机实现的认证加密方法。 该方法包括将明文消息划分为至少两个工作块,每个工作块与明文消息具有数学关系。 对于每个工作块,根据这种工作块,确定性工作块初始化向量和确定性工作块加密密钥来计算工作块密文。 对于每个工作块,消息认证标签被计算为确定性工作块消息认证密钥的函数,并且(a)为这种工作块计算的工作块密文和对应于这种工作块的数学关系的指示中的至少一个 封闭明文信息,(b)这样的工作块。 该方法还包括根据为每个工作块计算的消息认证标签和全局消息认证密钥来计算全局消息认证标签。 密文消息包括为每个工作块和全局消息认证标签计算的工作块密文。

    AUTHENTICATED ENCRYPTION METHOD USING WORKING BLOCKS

    公开(公告)号:WO2014084886A9

    公开(公告)日:2014-06-05

    申请号:PCT/US2013/030158

    申请日:2013-03-11

    Abstract: A computer-implemented authenticated encryption method for converting a plaintext message into a ciphertext message. The method includes dividing the plaintext message into at least two working blocks, each working block having a mathematical relationship to the plaintext message. For each working block, a working block ciphertext is computed as a function of such working block, a deterministic working block initialization vector, and a deterministic working block encryption key. For each working block, a message authentication tag is computed as a function of a deterministic working block message authentication key and at least one of (a) the working block ciphertext computed for such working block and an indication corresponding to the mathematical relationship of such working block to the plaintext message and (b) such working block. The method further includes computing a global message authentication tag as a function of the message authentication tag computed for each working block and a global message authentication key. The ciphertext message comprises the working block ciphertext computed for each working block and the global message authentication tag.

    DIGITAL SIGNATURES WITH IMPLICIT CERTIFICATE CHAINS
    7.
    发明申请
    DIGITAL SIGNATURES WITH IMPLICIT CERTIFICATE CHAINS 审中-公开
    数字签名与隐私证书链

    公开(公告)号:WO2012170131A1

    公开(公告)日:2012-12-13

    申请号:PCT/US2012/036541

    申请日:2012-05-04

    CPC classification number: H04L9/3252 H04L9/3265

    Abstract: Methods, systems, and computer programs for using an implicit certificate are disclosed. In some aspects, a message and an implicit certificate are accessed. The implicit certificate is associated with an entity. A modified message is generated by combining the message with a value based on the implicit certificate. A digital signature can be generated based on the modified message and transmitted to a recipient. In some aspects, a digital signature from an entity and a message to be verified based on the digital signature are accessed. An implicit certificate associated with the entity is accessed. A modified message is generated by combining the message with a value based on the implicit certificate. The message is verified based on the digital signature and the modified message.

    Abstract translation: 公开了使用隐式证书的方法,系统和计算机程序。 在某些方面,访问消息和隐式证书。 隐式证书与实体相关联。 通过将消息与基于隐式证书的值组合来生成修改的消息。 可以基于修改的消息生成数字签名并发送给接收者。 在一些方面,访问来自实体的数字签名和基于数字签名的要被验证的消息。 访问与该实体相关联的隐式证书。 通过将消息与基于隐式证书的值组合来生成修改的消息。 消息基于数字签名和修改的消息进行验证。

    IMPLICITLY CERTIFIED PUBLIC KEYS
    10.
    发明申请
    IMPLICITLY CERTIFIED PUBLIC KEYS 审中-公开
    明确的公证人

    公开(公告)号:WO2012170130A1

    公开(公告)日:2012-12-13

    申请号:PCT/US2012/036535

    申请日:2012-05-04

    CPC classification number: H04L9/007 H04L9/3066 H04L9/321 H04L9/3247

    Abstract: Methods, systems, and computer programs for using an implicit certificate are described. In some aspects, an implicit certificate is accessed. The implicit certificate is associated with an entity and generated by a certificate authority. The implicit certificate includes a public key reconstruction value of the entity. Certificate authority public key information is accessed. The certificate authority public key information is associated with the certificate authority that issued the implicit certificate. A first value is generated based on evaluating a hash function. The hash function is evaluated based on the certificate authority public key information and the public key reconstruction value of the entity. A public key value of the entity can be generated or otherwise used based on the first value.

    Abstract translation: 描述了使用隐式证书的方法,系统和计算机程序。 在某些方面,访问隐式证书。 隐式证书与实体相关联,并由证书颁发机构生成。 隐式证书包括实体的公钥重构值。 证书授权公钥信息被访问。 证书颁发机构的公钥信息与颁发隐式证书的证书颁发机构相关联。 基于评估散列函数生成第一值。 基于证书颁发机构公开密钥信息和实体的公钥重构值来评估散列函数。 可以基于第一个值生成或以其他方式使用该实体的公钥值。

Patent Agency Ranking