CRYPTOGRAPHIC SYSTEM MANAGEMENT
    2.
    发明申请

    公开(公告)号:WO2018118252A1

    公开(公告)日:2018-06-28

    申请号:PCT/US2017/060282

    申请日:2017-11-07

    Abstract: A method is described for transferring secrets from a first cryptographic system installed on a computing device to a second cryptographic system installed on the computing device to enable the second cryptographic system to replace the first cryptographic system. The first cryptographic system has an identity, and a trusted party is trusted by the first cryptographic system and has a trusted party private key and a trusted party public key. The second cryptographic system provides a signature under the trusted party private key of the first cryptographic system identity and a second cryptographic system public key, the second cryptographic system having a second cryptographic system private key. The first cryptographic system confirms that the signature comprises the identity and uses a first cryptographic system private key and a first cryptographic system public key to establish a shared secret with the second cryptographic system. The first cryptographic system and the second cryptographic system use the shared secret to transfer secrets.

    TECHNOLOGIES FOR USER-MODE PERSISTENCE OF CERTIFICATES AND KEYS IN RESOURCE-CONSTRAINED DEVICES
    3.
    发明申请
    TECHNOLOGIES FOR USER-MODE PERSISTENCE OF CERTIFICATES AND KEYS IN RESOURCE-CONSTRAINED DEVICES 审中-公开
    用于资源受限设备中证书和密钥的用户模式持久性的技术

    公开(公告)号:WO2018056962A1

    公开(公告)日:2018-03-29

    申请号:PCT/US2016/052763

    申请日:2016-09-21

    Abstract: Technologies for secure certificate management include a computing device that receives a keystore command related to an encryption key, converts the keystore command into an encrypted database command, unlocks an encrypted database stored by the computing device with an obfuscated passphrase, and executes the encrypted database command. The encrypted database includes a key table to store binary copies of encryption keys and a metadata table to store metadata related to the encryption keys. The computing device returns a response to the keystore command in response to executing the encrypted database command. The keystore command may be received and the response may be returned via a command-line interface or a machine-to-machine interface. The computing device may load multiple encoded passphrase segments from corresponding predetermined file system locations, decode the encoded passphrase segments, and compound the decoded passphrase segments to generate the passphrase. Other embodiments are described and claimed.

    Abstract translation: 用于安全证书管理的技术包括接收与加密密钥相关的密钥库命令,将密钥存储器命令转换成加密的数据库命令的计算设备,以混淆的方式解锁由计算设备存储的加密数据库 密码,并执行加密的数据库命令。 加密数据库包括用于存储加密密钥的二进制副本的密钥表和用于存储与加密密钥相关的元数据的元数据表。 响应于执行加密的数据库命令,计算设备向密钥库命令返回响应。 可以接收密钥库命令,并且可以通过命令行界面或机器对机器接口返回响应。 计算设备可以从对应的预定文件系统位置加载多个编码的密码段,对编码的密码段进行解码,并且将解码的密码段合成以生成密码短语。 描述并要求保护其他实施例。

    PARTIAL UNROLLING FOR SOFTWARE SECURITY
    4.
    发明申请
    PARTIAL UNROLLING FOR SOFTWARE SECURITY 审中-公开
    部分解除软件安全

    公开(公告)号:WO2017208245A1

    公开(公告)日:2017-12-07

    申请号:PCT/IL2017/050614

    申请日:2017-06-01

    Inventor: LEVEQUE, Sylvain

    CPC classification number: H04L9/002 H04L9/302 H04L9/3066 H04L2209/16

    Abstract: The present invention relates to a method to intrinsically protect a computer program having a driving value (DV) dedicated to handle sensitive data, said driving value (DV) comprising a plurality of N computation units (A,B) to perform computations using sensitive data and susceptible to let sensitive data leak, each unit having V possible values, said method comprising the step (S1) of unrolling k parts of P units, with P>1 and P

    Abstract translation: 本发明涉及一种本质上保护具有专用于处理敏感数据的驱动值(DV)的计算机程序的方法,所述驱动值(DV)包括多个N个计算单元(A, B)使用敏感数据执行计算并且易于使敏感数据泄漏,每个单元具有V个可能值,所述方法包括展开P个单元的k个部分的步骤(S1),其中P> 1且P

    CALCULATING DEVICE AND METHOD
    5.
    发明申请
    CALCULATING DEVICE AND METHOD 审中-公开
    计算装置和方法

    公开(公告)号:WO2017102392A1

    公开(公告)日:2017-06-22

    申请号:PCT/EP2016/079694

    申请日:2016-12-05

    Abstract: A calculating device (100) arranged to perform calculations on elements of a ring (R), a ring addition and a ring multiplication being defined on the ring The calculating device comprises an operator module (120) comprising multiple operator units, and a calculation manager (130) arranged to perform a ring multiplication by applying a sequence of the multiple operator units, and perform a ring addition be applying a sequence of the multiple operator units, wherein the sequence for the ring multiplication is the same as the sequence for the ring addition.

    Abstract translation: 计算设备(100)被布置成对在环上定义的环(R),环加法和环乘法的元素执行计算。计算设备包括操作员模块(120),该操作员模块(120)包括: 多个运算单元以及计算管理器(130),所述计算管理器(130)被布置成通过应用所述多个运算单元的序列来执行环乘法,并且执行应用所述多个运算单元的序列的环加法,其中所述环乘法的序列是 与添加戒指的顺序相同。

    ACCESS CONTROL
    6.
    发明申请
    ACCESS CONTROL 审中-公开
    访问控制

    公开(公告)号:WO2017054985A1

    公开(公告)日:2017-04-06

    申请号:PCT/EP2016/069574

    申请日:2016-08-18

    Abstract: A computer implemented method of access control for a restricted resource of a resource provider in a network connected computer system, wherein a blockchain data structure accessible via the network stores digitally signed records validated by network connected miner software components, the method comprising: identifying an access control role definition for access to the resource, the role including a specification of access permissions; defining a cryptocurrency for indicating authorisation to access the resource, the cryptocurrency being formed of tradeable units of value associated with records in the blockchain and wherein transfer of the cryptocurrency between records in the blockchain is validated by the miners; receiving a request from an authenticated resource consumer for authorisation to access the resource; and submitting a blockchain transaction to the miner components to transfer a quantity of cryptocurrency to a consumer record in the blockchain, the transaction including an identification of the role, such that the consumer record identifies that the consumer is authorised to access the resource in accordance with the role definition.

    Abstract translation: 一种对网络连接的计算机系统中的资源提供者的受限资源进行访问控制的计算机实现的方法,其中经由网络可访问的区块链数据结构存储由网络连接的矿工软件组件验证的数字签名的记录 该方法包括:识别用于访问资源的访问控制角色定义,该角色包括访问权限的指定; 定义用于指示访问所述资源的授权的加密货币,所述加密货币由与所述区块链中的记录相关联的可交换价值单元形成,并且其中所述区块链中的记录之间的所述加密货币的转移由所述矿工确认; 接收来自经认证的资源消费者的用于授权访问资源的请求; 以及向矿工组件提交区块链交易以将一定数量的加密货币转移到区块链中的消费者记录,所述交易包括角色的标识,使得消费者记录标识消费者被授权根据 角色定义。

    PROCÉDÉ DE CHIFFREMENT, PROCÉDÉ DE CHIFFREMENT, DISPOSITIFS ET PROGRAMMES CORRESPONDANTS
    7.
    发明申请
    PROCÉDÉ DE CHIFFREMENT, PROCÉDÉ DE CHIFFREMENT, DISPOSITIFS ET PROGRAMMES CORRESPONDANTS 审中-公开
    加密方法,相应的加密方法,设备和程序

    公开(公告)号:WO2016193493A1

    公开(公告)日:2016-12-08

    申请号:PCT/EP2016/062766

    申请日:2016-06-06

    Applicant: INGENICO GROUP

    Inventor: BRIER, Eric

    Abstract: Procédé de chiffrement, procédé de chiffrement, dispositifs et programmes correspondants. L'invention se rapporte à un procédé de Procédé de chiffrement d'un code à chiffrer ( Sx ) d'un programme informatique à l'aide d'une clé de chiffrement ( Kx ) sélectionnée parmi au moins deux clés de chiffrement ( Kx, Ky, Kz ). Un tel procédé comprend: - une étape d'obtention (11) d'une grammaire descriptive ( G D ) du langage du code à chiffrer; - une étape de codage (13) du code à chiffrer ( Sx ) à l'aide de la grammaire descriptive (G D ) délivrant une chaine de caractères ( Cd C ) au sein de laquelle au moins une instruction de départ (InstrD) du code à chiffrer (Sx) est codée en une représentation ( RInstrD ) dans la chaine de caractères ( Cd C ); - une étape de chiffrement (14) de la chaine de caractères ( CdC ) à l'aide d'une clé de chiffrement ( Kx )appartenant à l'ensemble de clés de chiffrement ( Kx, Ky, Kz ), délivrant une chaine chiffrée ( Cx ). Le procédé de déchiffrement comprend les étapes inverses et fait également appel à la grammaire descriptive du code à chiffrer.

    Abstract translation: 加密方法,相应的加密方式,设备和程序。 本发明涉及使用从至少两个加密密钥(Kx,Ky,Kz)中选择的加密密钥(Kx)来加密计算机程序的加密代码(Sx)的方法。 这种方法包括: - 获取(11)要加密的代码的语言的描述语法(GD)的步骤; - 使用提供要加密的代码(Sx)的至少一个开始指令(InstrD)的字符串(Cd C)的描述语法(GD)来编码(13)要加密的代码(13)的步骤(Sx) 由字符串(Cd C)中的表示(RInstrD)编码; - 使用属于加密密钥(Kx,Ky,Kz)集合的加密密钥(Kx)来编码(14)字符串(CdC)的步骤,传递加密串(Cx)。 解密方法包括相反的步骤,并且还利用要加密的代码的描述语法。

    CRYPTOGRAPHIC SHADER IN DISPLAY HARDWARE
    8.
    发明申请
    CRYPTOGRAPHIC SHADER IN DISPLAY HARDWARE 审中-公开
    显示硬件中的密码遮罩

    公开(公告)号:WO2016122749A3

    公开(公告)日:2016-09-22

    申请号:PCT/US2015060713

    申请日:2015-11-13

    Applicant: SQUARE INC

    Inventor: DAI ZOVI DINO

    Abstract: A technique is introduced that can securely displaying decrypted images while preventing these decrypted images against an attempt to capture such. Some aspects of the technique include loading a cryptographic shader into a graphics processor unit (GPU) in the recipient's computer device separate from the CPU in the recipient's computer device. In some embodiments, the cryptographic shader that is loaded includes instructions that implement a white-box cryptographic algorithm to decrypt encrypted images. A cryptographic key is integrated within the white-box cryptographic algorithm so that the cryptographic key is protected from extraction. When the GPU receives the encrypted images, the cryptographic shader can perform decryption processes to generate decrypted images. The decrypted images are loaded by the GPU directly from the GPU into a frame buffer such that the decrypted images are to be displayed without any portion of the decrypted images passing through the CPU.

    Abstract translation: 引入了一种技术,其可以安全地显示解密图像,同时防止这些解密图像试图捕获这些解密图像。 该技术的一些方面包括将加密着色器加载到与接收者的计算机设备中的CPU分离的接收者的计算机设备中的图形处理器单元(GPU)中。 在一些实施例中,加载的密码着色器包括实现白盒密码算法以解密加密图像的指令。 密码密钥集成在白盒密码算法中,从而保护密码密钥免受提取。 当GPU接收到加密图像时,密码着色器可以执行解密过程以生成解密图像。 解密图像由GPU直接从GPU加载到帧缓冲器中,使得解密图像将被显示而解密图像的任何部分都不经过CPU。

    GEHÄRTETE WHITE BOX IMPLEMENTIERUNG 1
    10.
    发明申请
    GEHÄRTETE WHITE BOX IMPLEMENTIERUNG 1 审中-公开
    固化后白盒实现1

    公开(公告)号:WO2016074776A1

    公开(公告)日:2016-05-19

    申请号:PCT/EP2015/002223

    申请日:2015-10-30

    Abstract: Die Erfindung schafft eine Prozessor-Einrichtung mit einer darauf implementierten ausführbaren White Box maskierten Implementierung eines kryptographischen Algorithmus. Die White Box Maskierung umfasst eine affine Abbildung A, die so gestaltet ist, dass jedes Bit in den Ausgabewerten w der affinen Abbildung A von mindestens einem Bit aus den Verschleierungswerten y abhängt, wodurch erreicht wird, dass die Ausgabewerte w der affinen Abbildung A statistisch ausgeglichen sind.

    Abstract translation: 本发明提供一种处理器装置具有在其上实现的可执行白盒实施掩蔽密码算法的。 白盒掩蔽包括的仿射变换A,其被设计成使得在仿射变换A的输出值的瓦特每个比特取决于至少一个比特从灰雾值y,由此实现了输出值瓦特的仿射变换的统计学上的平衡的 是。

Patent Agency Ranking