会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • System and method for device dependent and rate limited key generation
    • 用于设备依赖和速率限制密钥生成的系统和方法
    • US08681976B2
    • 2014-03-25
    • US13106268
    • 2011-05-12
    • Conrad SauerwaldJoseph P. BrattJoshua Phillips de CesareTimothy John MilletWeihua Mao
    • Conrad SauerwaldJoseph P. BrattJoshua Phillips de CesareTimothy John MilletWeihua Mao
    • H04L29/06
    • H04L9/0863H04L9/0866
    • Disclosed herein are systems, methods, and non-transitory computer-readable storage media for generating a device dependent cryptographic key in a rate-limited way. A system configured to practice the method first receives data associated with a user. The data associated with the user can be a password, a personal identification number (PIN), or a hash of the password. Then the system performs a first encryption operation on the user data based on a device-specific value to yield first intermediate data and performs a second encryption operation on the first intermediate data based on the device-specific value to yield second intermediate data. Then the system iteratively repeats the second encryption operation until a threshold is met, wherein each second encryption operation is performed on the second intermediate data from a previous second encryption operation. The iterations produce a final cryptographic key which the system can then output or use for a cryptographic operation.
    • 本文公开了用于以速率限制的方式生成依赖于设备的加密密钥的系统,方法和非暂时的计算机可读存储介质。 被配置为练习该方法的系统首先接收与用户相关联的数据。 与用户相关联的数据可以是密码,个人识别码(PIN)或密码的散列。 然后,系统基于设备特定值对用户数据执行第一加密操作,以产生第一中间数据,并且基于设备特定值对第一中间数据执行第二加密操作以产生第二中间数据。 然后,系统迭代地重复第二加密操作,直到满足阈值,其中从先前的第二加密操作对第二中间数据执行每个第二加密操作。 迭代产生最终的加密密钥,系统然后可以输出或用于加密操作。
    • 4. 发明申请
    • TRUST EXCEPTION MANAGEMENT
    • 信托例外管理
    • US20090228986A1
    • 2009-09-10
    • US12347691
    • 2008-12-31
    • MITCHELL D. ADLERMichael Lambertus Hubertus BrouwerConrad Sauerwald
    • MITCHELL D. ADLERMichael Lambertus Hubertus BrouwerConrad Sauerwald
    • G06F21/00
    • G06F21/10G06F21/33G06F21/57G06F2211/009
    • A machine implemented method includes storing a first data representing a prior exception to a first trust failure (e.g., expired certificate). The prior exception may be stored as part of establishing a first communication with a data processing system (e.g., a handheld device). The first communication may not be trustworthy. The method may determine, as part of establishing a second communication with the data processing system, that a second trust failure has occurred. The second trust failure (e.g., revoked certificate) indicates that the second communication may not be trustworthy. The method may determine whether the prior exception applies to the second trust failure. If the prior exception does not apply, the data processing system determines, automatically, whether to create a new exception for the second trust failure.
    • 机器实现的方法包括将表示先前异常的第一数据存储到第一信任失败(例如,过期证书)。 可以将先前的例外存储为与数据处理系统(例如,手持设备)建立第一通信的一部分。 第一个通信可能不值得信赖。 作为与数据处理系统建立第二通信的一部分,该方法可以确定发生了第二信任故障。 第二信任失败(例如撤销的证书)指示第二通信可能不可信。 该方法可以确定先前的异常是否适用于第二信任失败。 如果先前的异常不适用,则数据处理系统自动确定是否为第二个信任失败创建新的异常。
    • 7. 发明申请
    • SYSTEM AND METHOD FOR DEVICE DEPENDENT AND RATE LIMITED KEY GENERATION
    • 用于设备依赖和速率的系统和方法有限的主要生成
    • US20120288089A1
    • 2012-11-15
    • US13106268
    • 2011-05-12
    • Conrad SauerwaldJoseph P. BrattJoshua Phillips de CesareTimothy John MilletWeihua Mao
    • Conrad SauerwaldJoseph P. BrattJoshua Phillips de CesareTimothy John MilletWeihua Mao
    • H04L9/06
    • H04L9/0863H04L9/0866
    • Disclosed herein are systems, methods, and non-transitory computer-readable storage media for generating a device dependent cryptographic key in a rate-limited way. A system configured to practice the method first receives data associated with a user. The data associated with the user can be a password, a personal identification number (PIN), or a hash of the password. Then the system performs a first encryption operation on the user data based on a device-specific value to yield first intermediate data and performs a second encryption operation on the first intermediate data based on the device-specific value to yield second intermediate data. Then the system iteratively repeats the second encryption operation until a threshold is met, wherein each second encryption operation is performed on the second intermediate data from a previous second encryption operation. The iterations produce a final cryptographic key which the system can then output or use for a cryptographic operation.
    • 本文公开了用于以速率限制的方式生成依赖于设备的加密密钥的系统,方法和非暂时的计算机可读存储介质。 被配置为练习该方法的系统首先接收与用户相关联的数据。 与用户相关联的数据可以是密码,个人识别码(PIN)或密码的散列。 然后,系统基于设备特定值对用户数据执行第一加密操作,以产生第一中间数据,并且基于设备特定值对第一中间数据执行第二加密操作以产生第二中间数据。 然后,系统迭代地重复第二加密操作,直到满足阈值,其中从先前的第二加密操作对第二中间数据执行每个第二加密操作。 迭代产生最终的加密密钥,系统然后可以输出或用于加密操作。