METODO PARA VALIDACION CRIPTOGRAFICA DE CLAVE PUBLICA DE CURVA ELIPTICA.

    公开(公告)号:MX2008013557A

    公开(公告)日:2008-11-04

    申请号:MX2008013557

    申请日:2007-03-30

    Applicant: MOTOROLA INC

    Abstract: La comunicación y validación de transferencia de información desde un transmisor hacia un receptor se logra al generar una cifra (400) a partir de un mensaje m (410) utilizando los parámetros de una curva elíptica, un punto generador P (406) en la curva elíptica y una clave pública Q (416) del receptor. La cifra incluye un primer elemento que es el producto kP de un número aleatorio k (404) con el punto generador P y un segundo elemento que es el producto de m y la coordenada x del producto kQ. El mensaje m se genera a partir de dos representaciones matemáticamente independientes de la información y, opcionalmente, un número aleatorio. La cifra se comunica al receptor y se decodifica para recuperar un mensaje m´ (502). Una ficha de validación (500) es generada por el receptor y se le pasa al transmisor, el cual valida la comunicación de la información al receptor si el producto mkQ es igual a la ficha de validación.

    METHOD FOR ELLIPTIC CURVE PUBLIC KEY CRYPTOGRAPHIC VALIDATION
    5.
    发明申请
    METHOD FOR ELLIPTIC CURVE PUBLIC KEY CRYPTOGRAPHIC VALIDATION 审中-公开
    用于ELLIPTIC CURVE公钥关键CRYPTOAPHIC验证的方法

    公开(公告)号:WO2007127576A2

    公开(公告)日:2007-11-08

    申请号:PCT/US2007065588

    申请日:2007-03-30

    CPC classification number: H04L9/3066 H04L9/0838 H04L2209/805

    Abstract: Communication and validation of information transfer from a transmitter to a receiver is achieved by generating a cipher (400) from a message m (410) using parameters of an elliptic curve, a generator point P (406) on the elliptic curve and a public key Q (416) of the receiver. The cipher includes a first element that is the product kP of a random number k (404) with the generator point P and a second element that is the product of m and the x-coordinate of the product kQ. The message m is generated from two mathematically independent representations of the information and, optionally, a random number. The cipher is communicated to the receiver and decoded to recover a message m' (502). A validation token (500) is generated by the receiver and passed to the transmitter, which validates communication of the information to the receiver if the product mkQ is equal to the validation token.

    Abstract translation: 通过使用椭圆曲线的参数,椭圆曲线上的生成点P(406)和公共密钥(410)从消息m(410)生成密码(400)来实现从发射机到接收机的信息传送的通信和验证 Q(416)。 密码包括第一元素,其是具有生成点P的随机数k(404)的乘积kP,以及作为乘积的乘积的第二元素和乘积k的x坐标。 消息m是从信息的两个数学上独立的表示和可选的随机数生成的。 将密码传送到接收器并解码以恢复消息m'(502)。 验证令牌(500)由接收器生成并传递到发射机,如果产品mkQ等于验证令牌,则验证令牌(500)将验证信息与接收者的通信。

    ENCRYPTION AND VERIFICATION USING PARTIAL PUBLIC KEY
    6.
    发明申请
    ENCRYPTION AND VERIFICATION USING PARTIAL PUBLIC KEY 审中-公开
    使用部分公钥的加密和验证

    公开(公告)号:WO2007103612B1

    公开(公告)日:2008-10-16

    申请号:PCT/US2007061895

    申请日:2007-02-09

    CPC classification number: H04L9/3066 H04L9/3247

    Abstract: A method and device for using a partial public key in a cryptosystem. The cryptosystem may be based on a group, such as an elliptic curve over a finite field. The device includes a first memory for storing system parameters of the cryptosystem and a second memory for storing a portion of a public key of the cryptosystem. The device receives the complete public key, or the remainder of the public key, via communication with another device. The received portion of the public key is used to form a validated public key. A processor of the device uses the validated public key for encrypting messages and/or verifying signatures. The size of the second memory is reduced since only part of the public key is stored.

    Abstract translation: 一种在密码系统中使用部分公钥的方法和装置。 密码系统可以基于诸如在有限域上的椭圆曲线的组。 该设备包括用于存储密码系统的系统参数的第一存储器和用于存储密码系统的公开密钥的一部分的第二存储器。 设备通过与另一设备的通信来接收完整的公钥或公钥的其余部分。 公钥的接收部分用于形成经过验证的公共密钥。 设备的处理器使用经过验证的公钥来加密消息和/或验证签名。 因为只存储了公钥的一部分,所以减少了第二存储器的大小。

    METHOD FOR ZERO-KNOWLEDGE AUTHENTICATION OF A PROVER BY A VERIFIER PROVIDING A USER-SELECTABLE CONFIDENCE LEVEL AND ASSOCIATED APPLICATION DEVICES
    7.
    发明申请
    METHOD FOR ZERO-KNOWLEDGE AUTHENTICATION OF A PROVER BY A VERIFIER PROVIDING A USER-SELECTABLE CONFIDENCE LEVEL AND ASSOCIATED APPLICATION DEVICES 审中-公开
    通过提供用户可选信心等级的验证器和相关应用设备对验证者进行零知识验证的方法

    公开(公告)号:WO2006093583A2

    公开(公告)日:2006-09-08

    申请号:PCT/US2006002014

    申请日:2006-01-18

    CPC classification number: H04L9/3221

    Abstract: Authentication is performed to a confidence level (CL) desired by a verifier (220). A prover (210) picks and sends certain same size, square matrices to the verifier (220). A random request bit is sent (234) from the verifier (220) to the prover (210) after the receipt of a certain square matrix. Depending on the request bit, calculations are made (244, 264) by the verifier (220) to determine if the matrices sent from the prover are verifiable. The prover (210) is iteratively authenticated by the verifier (220). Iterations are continued until (320) a count of the iterations (IL) reaches a number sufficient to achieve the desired confidence level (CL). After a delay, more iterations can achieve a higher confidence level by building on previous result of authentication without having to begin at zero. During this delay, the verifier (220) can perform tasks in reliance on the result of authentication.

    Abstract translation: 认证被执行到验证者期望的置信度(CL)(220)。 证明者(210)挑选并发送某些相同大小的矩阵到验证者(220)。 在接收到某个正方形矩阵之后,从验证器(220)向证明者(210)发送(234)随机请求位。 根据请求位,验证者(220)进行计算(244,264)以确定从证明者发送的矩阵是否可验证。 证明者(210)由验证者(220)迭代地认证。 继续迭代直到(320)迭代计数(IL)达到足以实现期望置信度(CL)的数量。 延迟之后,更多的迭代可以通过构建先前的认证结果而不必从零开始来实现更高的置信度。 在该延迟期间,验证者(220)可以依靠认证结果来执行任务。

    METHOD AND SYSTEM FOR MANAGING SECURE ACCESS TO DATA IN A NETWORK
    8.
    发明申请
    METHOD AND SYSTEM FOR MANAGING SECURE ACCESS TO DATA IN A NETWORK 审中-公开
    用于管理网络中数据安全访问的方法和系统

    公开(公告)号:WO2007067839B1

    公开(公告)日:2008-07-10

    申请号:PCT/US2006060937

    申请日:2006-11-15

    Abstract: Methods and system for managing secure access to data by a user in a network are disclosed. The method includes receiving (402, 404) a key and a biometric sample of the user transmitted by a user device (104) at a server (102). The method also includes decrypting (406) an encrypted biometric profile (212) corresponding to the user by using the key, to yield an unencrypted biometric profile. The method further includes authenticating (408) the user by using the biometric sample of the user and the unencrypted biometric profile corresponding to the user. The method further includes discarding (410) the key, the biometric sample of the user, and the unencrypted biometric profile corresponding to the user after authentication.

    Abstract translation: 公开了一种用于管理网络中用户对数据的安全访问的方法和系统。 该方法包括在服务器(102)处接收(402,404)由用户设备(104)发送的用户的密钥和生物特征样本。 该方法还包括通过使用密钥解密(406)对应于用户的加密的生物特征(212),产生未加密的生物特征。 该方法还包括通过使用用户的生物特征样本和对应于用户的未加密生物特征来对用户进行认证(408)。 该方法还包括在认证之后丢弃(410)密钥,用户的生物特征样本和对应于用户的未加密的生物特征。

Patent Agency Ranking