会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 7. 发明申请
    • Method for securely encrypting or decrypting a message
    • 安全加密或解密消息的方法
    • US20080205639A1
    • 2008-08-28
    • US12073556
    • 2008-03-06
    • Michael BraunAnton KarglBernd Meyer
    • Michael BraunAnton KarglBernd Meyer
    • H04L9/30H04L9/32G06F7/72
    • G06F7/723G06F7/725G06F2207/7261H04L9/003H04L9/302H04L9/3066H04L9/3247H04L2209/08
    • A method for securely encrypting or decrypting a message or for generating or verifying a digital signature in a message, in which the message is subjected, with the aid of a processor, to a mathematical operation using a key (k) which can be represented in the form of a binary number with a sequence of bits, and computational operations are sequentially carried out on auxiliary variables for each bit. The dependence of the computational result on the values of individual bits is taken into account by reading the memory addresses from the auxiliary variables and assigning them to address variables. The difference between the addresses is calculated and, depending on the respective current bit, is added to, or subtracted from, the computer addresses. The assignment of the auxiliary variables to the address variables can thus be interchanged. As a result, the order and selection of the computational operations is controlled on the basis of bits without the program sequence having to contain jump instructions.
    • 一种用于在消息中安全加密或解密消息或者利用处理器来生成或验证消息中的数字签名的方法,该方法使用可以在 对于每个位,辅助变量依次执行具有位序列的二进制数的形式和计算操作。 通过从辅助变量读取存储器地址并将其分配给地址变量,计算结果对各个位的值的依赖性被考虑在内。 计算地址之间的差异,并且根据相应的当前位被添加到计算机地址或从计算机地址中减去。 因此可以将辅助变量分配给地址变量。 结果,计算操作的顺序和选择是基于比特来控制的,而没有编程序列必须包含跳转指令。
    • 8. 发明申请
    • Authentication method and communications system used for authentication
    • 验证方法和通信系统用于认证
    • US20090235073A1
    • 2009-09-17
    • US12311440
    • 2007-09-26
    • Michael BraunErwin HessAnton KarglBernd Meyer
    • Michael BraunErwin HessAnton KarglBernd Meyer
    • H04L9/32H04L9/30
    • H04L9/3273H04L9/3013H04L9/3263H04L2209/805
    • An authentication method authenticates between subscribers of a communications system using an asymmetric elliptic curve encryption algorithm. The method involves providing a first and at least one second subscriber having a first or second secret key known only to the respective subscriber and a public key; authenticating an inquiry transmitted by the first subscriber with respect to the validity of the first certificate contained therein and associated with the first subscriber; calculating the response of the second subscriber associated with the inquiry; randomized encryption of the calculated response and a second certificate associated with the second subscriber using the public key; decryption and authentication of the response transmitted by the second subscriber with respect to the validity of the second certificate contained therein.
    • 认证方法使用非对称椭圆曲线加密算法在通信系统的用户之间进行认证。 该方法涉及提供第一和至少一个第二用户,其具有仅对相应用户知道的第一或第二秘密密钥和公开密钥; 认证由第一用户发送的关于其中包含并与第一用户相关联的第一证书的有效性的查询; 计算与查询相关联的第二用户的响应; 使用公钥对计算出的响应进行随机加密和与第二用户相关联的第二证书; 对第二用户发送的响应的解密和认证相对于其中包含的第二证书的有效性。
    • 10. 发明授权
    • Method for securely encrypting or decrypting a message
    • 安全加密或解密消息的方法
    • US08300810B2
    • 2012-10-30
    • US12073556
    • 2008-03-06
    • Michael BraunAnton KarglBernd Meyer
    • Michael BraunAnton KarglBernd Meyer
    • H04K1/00
    • G06F7/723G06F7/725G06F2207/7261H04L9/003H04L9/302H04L9/3066H04L9/3247H04L2209/08
    • A method for securely encrypting or decrypting a message or for generating or verifying a digital signature in a message, in which the message is subjected, with the aid of a processor, to a mathematical operation using a key (k) which can be represented in the form of a binary number with a sequence of bits, and computational operations are sequentially carried out on auxiliary variables for each bit. The dependence of the computational result on the values of individual bits is taken into account by reading the memory addresses from the auxiliary variables and assigning them to address variables. The difference between the addresses is calculated and, depending on the respective current bit, is added to, or subtracted from, the computer addresses. The assignment of the auxiliary variables to the address variables can thus be interchanged. As a result, the order and selection of the computational operations is controlled on the basis of bits without the program sequence having to contain jump instructions.
    • 一种用于在消息中安全加密或解密消息或者利用处理器来生成或验证消息中的数字签名的方法,该方法使用可以在 对于每个位,辅助变量依次执行具有位序列的二进制数的形式和计算操作。 通过从辅助变量读取存储器地址并将其分配给地址变量,计算结果对各个位的值的依赖性被考虑在内。 计算地址之间的差异,并且根据相应的当前位被添加到计算机地址或从计算机地址中减去。 因此可以将辅助变量分配给地址变量。 结果,计算操作的顺序和选择是基于比特来控制的,而没有编程序列必须包含跳转指令。