会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明申请
    • CLOUD PROXY SECURED MOBILE PAYMENTS
    • 云保护移动支付
    • US20130226812A1
    • 2013-08-29
    • US13404023
    • 2012-02-24
    • Mads LandrokPeter Landrock
    • Mads LandrokPeter Landrock
    • G06Q20/40
    • G06Q20/32G06Q20/4016
    • A secure payment system provisions a payment transaction proxy with virtual EMV-type chipcards on secure backend servers. Users authorize the proxy in each transaction to make payments in the Cloud for them. The proxy carries out the job without exposing the cryptographic keys to risk. User, message, and/or device authentication in multifactor configurations are erected in realtime to validate each user's intent to permit the proxy to sign for a particular transaction on the user's behalf. Users are led through a series of steps by the proxy to validate their authenticity and intent, sometimes incrementally involving additional user devices and communications channels that were pre-registered. Authentication risk can be scored by the proxy, and high risk transactions that are identified are tasked by further incrementally linking in more user devices, communications channels, and user challenges to increase the number of security factors required to authenticate.
    • 安全支付系统在安全的后端服务器上配置了具有虚拟EMV型芯片卡的支付交易代理。 用户授权每个交易中的代理在云中进行付款。 代理执行该作业,而不会使加密密钥暴露于风险。 多因素配置中的用户,消息和/或设备认证实时建立,以验证每个用户的意图,以允许代理人代表用户签署特定交易。 用户通过代理进行一系列步骤,以验证其真实性和意图,有时会逐步涉及预先注册的其他用户设备和通信通道。 验证风险可以由代理进行评分,并且识别的高风险事务通过进一步递增地链接更多的用户设备,通信信道和用户挑战来增加认证所需的安全因素的数量。
    • 4. 发明授权
    • Method of distributing a public key
    • 分发公钥的方法
    • US07362869B2
    • 2008-04-22
    • US10497674
    • 2002-12-10
    • Peter Landrock
    • Peter Landrock
    • H04L9/00
    • H04L9/0863G06Q20/341G06Q20/40975G07F7/1008H04L9/0825H04L9/0897H04L9/3236H04L63/0442H04L63/062H04L63/0838H04L63/0853H04L2209/80H04L2463/081H04W12/02H04W12/04H04W12/06
    • A method of distributing the public key of an asymmetric key pair with a private key and the public key from a mobile station to a key managing computer, the method include the steps of: communicating a password (OTP) from the key managing (203) computer to the mobile station (209) of a registered user (201) by a secure channel (202) to thereby provide a shared secret; at the mobile station and at the key managing computer, generating a first code (MAC1) and a second node (MACT1), respectively, based on the same predefined generation method, which codes (MAC1; MACT1) are generated from the password (OTP); by the mobile station (209), transmitting the public key and the first code (MAC1) to the key managing computer (203); at the key managing computer (203), receiving the public key and the first code (MAC1) from the mobile station (209); checking the authenticity of the registered user (201) based on comparing the first code (MAC1) and the second code (MACT1).
    • 一种将非对称密钥对的公开密钥和公开密钥从移动台分发到密钥管理计算机的方法,包括以下步骤:从密钥管理(203)传送密码(OTP) 通过安全信道(202)向注册用户(201)的移动台(209)计算机,从而提供共享秘密; 在移动站和密钥管理计算机上,分别根据相同的预定义生成方法生成第一代码(MAC 1)和第二节点(MACT 1),所述第一代码(MAC 1; MACT 1)从 密码(OTP); 由所述移动台(209)向所述密钥管理计算机(203)发送所述公开密钥和所述第一代码(MAC 1)。 在所述密钥管理计算机(203)处,从所述移动站(209)接收所述公共密钥和所述第一代码(MAC 1); 基于比较第一代码(MAC 1)和第二代码(MACT 1)来检查注册用户(201)的真实性。
    • 5. 发明申请
    • Data certification method and apparatus
    • 数据认证方法和装置
    • US20050010758A1
    • 2005-01-13
    • US10486487
    • 2002-08-12
    • Peter LandrockJonathan Tuliani
    • Peter LandrockJonathan Tuliani
    • G06F1/00G06F21/64H04L29/06H04L9/00
    • H04L63/18G06F21/313G06F21/645G06F2221/2115H04L63/0823H04L63/126
    • An apparatus and method for signing electronic data with a digital signature in which a central server comprises a signature server (110) and a authentication server (120). The signature server (110) securely stores the private cryptographic keys of a number of users (102). The user (102) contacts the central server using a workstation (101) through a secure tunnel which is setup for the purpose. The user (102) supplies a password or other token (190), based on information previously supplied to the user by the authentication server (120) through a separate authentication channel. The authentication server provides the signature server with a derived version of the same information through a permanent see tunnel between the servers, which is compared with the one supplied by the user (102). If they match, data received from the user (102) is signed with the user's private key.
    • 一种用数字签名签名电子数据的装置和方法,其中中央服务器包括签名服务器(110)和认证服务器(120)。 签名服务器(110)安全地存储多个用户(102)的专用密钥。 使用工作站(101)的用户(102)通过安全隧道与中央服务器联系,安全隧道是为此而设立的。 用户(102)基于先前由认证服务器(120)通过单独的认证信道提供给用户的信息来提供密码或其他令牌(190)。 身份验证服务器通过服务器之间的永久查看隧道向签名服务器提供相同信息的派生版本,并将其与用户提供的服务器进行比较(102)。 如果它们匹配,则从用户(102)接收的数据用用户的私钥进行签名。
    • 6. 发明授权
    • Data certification method and system
    • 数据认证方法和系统
    • US08549308B2
    • 2013-10-01
    • US13297321
    • 2011-11-16
    • Peter LandrockJonathan Roshan Tuliani
    • Peter LandrockJonathan Roshan Tuliani
    • H04L29/06
    • H04L63/18G06F21/313G06F21/645G06F2221/2115H04L63/0823H04L63/126
    • A data certification system and method for signing electronic data with a digital signature in which a central server comprises a signature server and an authentication server. The signature server securely stores the private cryptographic keys of a number of users. The user contacts the central server using a workstation through the secure tunnel which is set up for the purpose. The user supplies a password or other token based on information previously supplied to the user by the authentication server through a separate authentication channel. The authentication server provides the signature server with a derived version of the same information through a permanent secure tunnel between the servers, which is compared with the one supplied by the user. If they match, data received from the user is signed with the user's private key.
    • 一种用于使用数字签名签署电子数据的数据认证系统和方法,其中中央服务器包括签名服务器和认证服务器。 签名服务器安全地存储多个用户的私有加密密钥。 用户通过安全隧道与工作站联系中央服务器,安全隧道是为此而设立的。 用户根据先前通过认证服务器通过单独的认证信道提供给用户的信息来提供密码或其他令牌。 认证服务器通过服务器之间的永久性安全隧道向签名服务器提供相同信息的派生版本,与用户提供的相比较。 如果它们匹配,则从用户接收的数据用用户的私钥进行签名。
    • 7. 发明授权
    • Encoded colorgram for mobile device security
    • 用于移动设备安全性的编码彩色图
    • US08224293B1
    • 2012-07-17
    • US12983186
    • 2010-12-31
    • Ronald P. KnappKerry D. BrownPeter Landrock
    • Ronald P. KnappKerry D. BrownPeter Landrock
    • H04W12/06
    • G06F21/35G06F21/36G06F21/43G06K19/06046
    • A security system includes a software application running in a user's smartphone and a separately carried visual key that the user can image at will with the smartphone's camera. An effective visual key would typically comprise digital data encoded in a series of colored cells arranged in a colorgram. Such digital data is treated as a what-you-have security factor, and is concatenated with other security factors so users can authenticate themselves to websites, internet services, and even within the smartphone device itself or its applications. In one aspect, when users authenticate themselves to a server, the server returns a short-term supply of one-time-passwords or account numbers for use in secure access and financial transactions on other systems.
    • 安全系统包括在用户智能手机中运行的软件应用程序和用户可随意使用智能手机的相机进行成像的单独携带的视觉键。 一个有效的视觉键通常包括以彩色图表排列的一系列彩色单元格中编码的数字数据。 这样的数字数据被视为您所拥有的安全因素,并且与其他安全因素连接在一起,因此用户可以对网站,互联网服务甚至智能手机设备本身或其应用程序进行身份验证。 在一个方面,当用户向服务器认证自己时,服务器返回短期供应一次性密码或帐号,以用于其他系统上的安全访问和金融交易。
    • 8. 发明授权
    • Protecting against security attack
    • 防止安全攻击
    • US08077866B2
    • 2011-12-13
    • US12104196
    • 2008-04-16
    • Peter LandrockJan Ulrik Kjaersgaard
    • Peter LandrockJan Ulrik Kjaersgaard
    • H04L9/00H04L9/32G06F12/14
    • H04L9/0841H04L9/002H04L9/3066H04L2209/08H04L2209/805
    • A communication device having a private key and configured to implement an elliptic curve security mechanism for successful operation of which it: (a) receives a first value from another device, (b) computes a second value as the scalar multiplication of the first value with its private key and (c) returns that second value for use by the other device; the mechanism being such that the first value defines a pair of coordinates representing a first point and the second value defines a pair of coordinates representing a second point and being such that the first value is valid only if it lies on an elliptic curve of predefined form; the device being configured to implement the mechanism by the steps of: receiving data as the first value; making a first evaluation as to whether the first value is a singular point with respect to the elliptic curve; computing the second value as the scalar multiplication of the first value with the private key; making a second evaluation as to whether the second value lies on the elliptic curve; and returning the second value only if the first evaluation is false and the second evaluation is true.
    • 一种具有专用密钥并被配置为实现其成功操作的椭圆曲线安全机制的通信设备,其中:(a)从另一设备接收第一值,(b)计算第二值作为第一值的标量乘法与 其私钥和(c)返回第二个值供其他设备使用; 所述机构使得所述第一值定义表示第一点的一对坐标,并且所述第二值定义表示第二点的一对坐标,并且使得所述第一值仅在其位于预定义形式的椭圆曲线上时才有效 ; 所述设备被配置为通过以下步骤来实现所述机制:接收数据作为所述第一值; 对第一个值是否是相对于椭圆曲线的奇异点进行第一个评估; 计算第二值作为第一值与私钥的标量乘法; 对第二个值是否位于椭圆曲线上进行第二次评估; 并且仅当第一评估为假并且第二评估为真时返回第二值。
    • 9. 发明申请
    • PROTECTING AGAINST SECURITY ATTACK
    • 防范安全防范
    • US20090214027A1
    • 2009-08-27
    • US12104196
    • 2008-04-16
    • Peter LandrockJan Ulrik Kjaersgaard
    • Peter LandrockJan Ulrik Kjaersgaard
    • H04L9/30
    • H04L9/0841H04L9/002H04L9/3066H04L2209/08H04L2209/805
    • A communication device having a private key and configured to implement an elliptic curve security mechanism for successful operation of which it: (a) receives a first value from another device, (b) computes a second value as the scalar multiplication of the first value with its private key and (c) returns that second value for use by the other device; the mechanism being such that the first value defines a pair of coordinates representing a first point and the second value defines a pair of coordinates representing a second point and being such that the first value is valid only if it lies on an elliptic curve of predefined form; the device being configured to implement the mechanism by the steps of: receiving data as the first value; making a first evaluation as to whether the first value is a singular point with respect to the elliptic curve; computing the second value as the scalar multiplication of the first value with the private key; making a second evaluation as to whether the second value lies on the elliptic curve; and returning the second value only if the first evaluation is false and the second evaluation is true.
    • 一种具有专用密钥并被配置为实现其成功操作的椭圆曲线安全机制的通信设备,其中:(a)从另一设备接收第一值,(b)计算第二值作为第一值的标量乘法与 其私钥和(c)返回第二个值供其他设备使用; 所述机构使得所述第一值定义表示第一点的一对坐标,并且所述第二值定义表示第二点的一对坐标,并且使得所述第一值仅在其位于预定义形式的椭圆曲线上时才有效 ; 所述设备被配置为通过以下步骤来实现所述机制:接收数据作为所述第一值; 对第一个值是否是相对于椭圆曲线的奇异点进行第一个评估; 计算第二值作为第一值与私钥的标量乘法; 对第二个值是否位于椭圆曲线上进行第二次评估; 并且仅当第一评估为假并且第二评估为真时返回第二值。
    • 10. 发明授权
    • Computationally asymmetric cryptographic systems
    • 计算非对称加密系统
    • US08358778B2
    • 2013-01-22
    • US11579843
    • 2005-02-04
    • Peter LandrockJonathan Roshan Tuliani
    • Peter LandrockJonathan Roshan Tuliani
    • G06F21/00
    • H04L9/3247H04L9/3236H04L2209/20H04L2209/56
    • This invention is generally concerned with methods, apparatus and computer program code for a computationally asymmetric hash function, in particular for use with symmetric cryptographic algorithms. We describe a method of determining a computationally asymmetric hash function value, the method including: receiving input data to be hashed; computing an asymmetric value from said input data, said asymmetric value being computable by two methods, a first method employing at least one first parameter and a second method employing at least one second parameter, computation of said asymmetric value by said second method being faster than by said first method; and determining a computationally asymmetric hash function value using said asymmetric value. We also describe methods of providing a computationally asymmetric electronic signature from a symmetric cryptographic signature.
    • 本发明通常涉及用于计算非对称散列函数的方法,装置和计算机程序代码,特别是与对称加密算法一起使用。 我们描述了一种确定计算非对称散列函数值的方法,该方法包括:接收要散列的输入数据; 从所述输入数据计算非对称值,所述非对称值可通过两种方法计算,第一种方法采用至少一种第一参数,第二种方法采用至少一种第二参数,所述第二种方法的所述非对称值的计算速度快于 通过第一种方法; 以及使用所述非对称值来确定计算上非对称的散列函数值。 我们还描述了从对称加密签名提供计算不对称电子签名的方法。