Wireless communication device with securely added randomness and related method
    23.
    发明申请
    Wireless communication device with securely added randomness and related method 有权
    无线通信设备具有安全附加的随机性和相关方法

    公开(公告)号:US20050245231A1

    公开(公告)日:2005-11-03

    申请号:US10835276

    申请日:2004-04-30

    CPC classification number: H04L63/0428 H04L9/0662 H04L9/12 H04L2209/80

    Abstract: A wireless communication system which employs cryptographic functions requiring random data input in a mobile wireless device includes provisions for securely adding randomness to the mobile wireless device. Such added randomness can be securely provided during synchronizing sessions with a device user's base computer via secure wired and/or wireless connections. The new random data can be obtained by software and/or hardware random number generators accessible to the user's base computer and/or from accessible secure external sources (e.g., a secure website source of random data).

    Abstract translation: 采用在移动无线设备中需要随机数据输入的加密功能的无线通信系统包括用于安全地向移动无线设备添加随机性的规定。 在通过安全有线和/或无线连接与设备用户的基本计算机同步会话期间,可以安全地提供这种增加的随机性。 新的随机数据可以由用户的基本计算机可访问的软件和/或硬件随机数生成器和/或从可访问的安全外部源(例如,安全的网站的随机数据源)获得。

    System and method for securing data
    24.
    发明申请
    System and method for securing data 有权
    用于保护数据的系统和方法

    公开(公告)号:US20050244007A1

    公开(公告)日:2005-11-03

    申请号:US10984331

    申请日:2004-11-09

    Abstract: In accordance with the teachings described herein, systems and methods are provided for securing data for transmission to a wireless device. The disclosed systems and methods may include an electronic messaging system used to send and receive data over a first network and also used to forward data to a wireless device operable in a second network. The electronic messaging system may receive an electronic message encrypted with a first encryption algorithm and addressed to a message recipient in the first network, the message recipient having an associated wireless device operable in the second network. The electronic messaging system may determine that the electronic message is to be transported across the second network to the wireless device, and in response to determining that the electronic message is to be transported across the second network, encrypt the electronic message using a second encryption algorithm and transmit the encrypted message over the second network to the wireless device, with the second encryption algorithm being a stronger encryption algorithm than the first encryption algorithm.

    Abstract translation: 根据本文所描述的教导,提供了用于保护用于传输到无线设备的数据的系统和方法。 所公开的系统和方法可以包括用于通过第一网络发送和接收数据的电子消息系统,并且还用于将数据转发到在第二网络中可操作的无线设备。 电子消息传送系统可以接收利用第一加密算法加密并且寻址到第一网络中的消息接收者的电子消息,消息接收者具有可在第二网络中操作的相关联的无线设备。 电子消息系统可以确定电子消息将通过第二网络传输到无线设备,并且响应于确定电子消息要跨越第二网络传输,使用第二加密算法对电子消息进行加密 并且通过第二网络将加密的消息发送到无线设备,其中第二加密算法是比第一加密算法更强的加密算法。

    System and method for viewing message attachments
    25.
    发明申请
    System and method for viewing message attachments 有权
    用于查看消息附件的系统和方法

    公开(公告)号:US20050210289A1

    公开(公告)日:2005-09-22

    申请号:US10805932

    申请日:2004-03-22

    Abstract: Methods and systems for handling attachments on wireless mobile communication devices. An attachment provided with a secure message is received at a message server. The secure message itself was received by the server as an attachment. The secure message is processed in order to locate within the secure message the requested attachment. The located attachment is provided to a mobile device.

    Abstract translation: 用于处理无线移动通信设备上的附件的方法和系统。 在消息服务器处接收附有安全消息的附件。 安全消息本身作为附件被服务器接收。 处理安全消息以便在安全消息内定位所请求的附件。 将定位的附件提供给移动设备。

    SYSTEM AND METHOD FOR REMOTE RESET OF PASSWORD AND ENCRYPTION KEY
    26.
    发明申请
    SYSTEM AND METHOD FOR REMOTE RESET OF PASSWORD AND ENCRYPTION KEY 有权
    远程复位密码和加密密钥的系统和方法

    公开(公告)号:US20070266258A1

    公开(公告)日:2007-11-15

    申请号:US11383369

    申请日:2006-05-15

    Abstract: A method for securing data and resetting a password using a content protection key is provided, in which the content protection key itself is protected by a password. A content protection key is also protected at a data storage device with a key encryption key generated in collaboration with an additional device such as a server. The server stores a private key required to regenerate the key encryption key, but this private key is not provided from the server to the data storage device; rather, a public key derived from the private key is provided by the server. The data storage device combines the received public key and a further private key to derive the key encryption key; the further private key itself is not stored by the data storage device, but rather its matching public key is stored. The content protection key is then encrypted using a password and the derived key encryption key. If the password is lost, data from the server and from the data storage device may be combined to recreate the key encryption key.

    Abstract translation: 提供了一种使用内容保护密钥保护数据和重置密码的方法,其中内容保护密钥本身由密码保护。 在数据存储设备上还保护内容保护密钥,其中使用与诸如服务器的附加设备协作生成的密钥加密密钥。 服务器存储重新生成密钥加密密钥所需的专用密钥,但该私钥没有从服务器提供给数据存储设备; 相反,由私钥导出的公钥由服务器提供。 数据存储装置将接收到的公开密钥和另外的私钥组合以导出密钥加密密钥; 另外的私钥本身不被数据存储设备存储,而是存储其匹配的公钥。 然后使用密码和派生密钥加密密钥对内容保护密钥进行加密。 如果密码丢失,则来自服务器和数据存储设备的数据可以被组合以重新创建密钥加密密钥。

    System and method for exchanging encryption keys between a mobile device and a peripheral output device
    27.
    发明申请
    System and method for exchanging encryption keys between a mobile device and a peripheral output device 有权
    用于在移动设备和外围设备输出设备之间交换加密密钥的系统和方法

    公开(公告)号:US20070266247A1

    公开(公告)日:2007-11-15

    申请号:US11432414

    申请日:2006-05-12

    CPC classification number: H04L9/0838 H04L2209/80

    Abstract: Embodiments of a system and method for providing additional security for data being transmitted across a wireless connection that has been established using a known wireless protocol (e.g. Bluetooth) are described. An encryption key is exchanged between a computing device (e.g. a mobile device) and a wireless peripheral output device (e.g. a printer, a headset). In exemplary embodiments, the encryption key is generated at the peripheral output device. Data associated with the encryption key is output at the peripheral output device, which can be input by the user at the computing device. The encryption key is then recovered at the computing device from the input, thereby completing the key exchange. The encryption key can then be used to encrypt and decrypt data transmitted over the established wireless connection, providing additional security.

    Abstract translation: 描述了用于为已经使用已知的无线协议(例如,蓝牙)建立的无线连接传输的数据提供附加安全性的系统和方法的实施例。 在计算设备(例如,移动设备)和无线外围设备输出设备(例如,打印机,耳机)之间交换加密密钥。 在示例性实施例中,在外围输出设备处生成加密密钥。 与加密密钥相关联的数据在外围输出设备输出,可由用户在计算设备处输入。 然后从输入端在计算设备处恢复加密密钥,从而完成密钥交换。 加密密钥然后可用于加密和解密通过建立的无线连接传输的数据,提供额外的安全性。

    Adapter for contact and contactless smart cards
    28.
    发明申请
    Adapter for contact and contactless smart cards 有权
    接触式和非接触式智能卡适配器

    公开(公告)号:US20070194131A1

    公开(公告)日:2007-08-23

    申请号:US11358096

    申请日:2006-02-22

    CPC classification number: G06K19/0723 G06K19/07741

    Abstract: A portable adapter for using a contact smart card with a contactless smart card reader and a contactless smart card with a contact smart card reader. The adaptor is provided with a casing that is configured to engage a contact smart card or a contactless smart card, and is provided with an exterior portion that physically cooperates via a contact pad with a contact smart card reader. The adapter is provided with an interface passing signals between a contactless smart card and a contact smart card reader, and an interface for passing signals between a contact smart card and a contactless smart card reader.

    Abstract translation: 一种便携式适配器,用于使用具有非接触式智能卡读卡器的接触式智能卡和具有联系智能卡读卡器的非接触式智能卡。 适配器设置有壳体,其被配置为接合接触式智能卡或非接触式智能卡,并且设置有经由接触垫与接触式智能卡读取器物理协作的外部部分。 适配器具有在非接触式智能卡和联系智能卡读取器之间传递信号的接口以及用于在接触式智能卡和非接触式智能卡读卡器之间传递信号的接口。

    SYSTEM AND METHOD TO FORCE A MOBILE DEVICE INTO A SECURE STATE
    29.
    发明申请
    SYSTEM AND METHOD TO FORCE A MOBILE DEVICE INTO A SECURE STATE 有权
    将移动设备强加于安全状态的系统和方法

    公开(公告)号:US20070180540A1

    公开(公告)日:2007-08-02

    申请号:US11614561

    申请日:2006-12-21

    Abstract: Embodiments relate to systems and methods for implementation on a mobile device to force the mobile device into a secure state upon detection or determination of a triggering event. Once it is determined that a triggering event has occurred, each application operating on the mobile device is caused to immediately unreference sensitive objects and a secure garbage collection operation is performed upon the unreferenced sensitive objects to render data associated therewith unreadable. The mobile device is then caused to enter a secure state, in which the mobile device cannot be accessed without authorization. A microprocessor within the mobile device is configured to determine the existence of the triggering event according to a configuration data structure and to perform the secure garbage collection.

    Abstract translation: 实施例涉及用于在移动设备上实现的系统和方法,以在检测或确定触发事件时强制移动设备进入安全状态。 一旦确定已经发生触发事件,则导致在移动设备上操作的每个应用程序立即不敏感的对象,并且对未引用的敏感对象执行安全的垃圾回收操作,以使与其相关联的数据不可读。 然后使移动设备进入安全状态,在该状态下移动设备无法在未经授权的情况下被访问。 移动设备内的微处理器被配置为根据配置数据结构确定触发事件的存在并执行安全垃圾收集。

    System and method for authenticating streamed data
    30.
    发明申请
    System and method for authenticating streamed data 有权
    用于认证流数据的系统和方法

    公开(公告)号:US20070038855A1

    公开(公告)日:2007-02-15

    申请号:US11202081

    申请日:2005-08-12

    CPC classification number: H04L63/08 H04L63/123

    Abstract: A system and method that facilitates the authentication of streamed data received at a device, where authentication information is not distributed over the data stream. One embodiment of a method of authenticating data comprises the steps of: receiving, at the device, data in a plurality of packets transmitted by a data server; submitting a request for a server-computed authentication value to a data authentication server, wherein the data authentication server is adapted to compute the server-computed authentication value based on a subset of the data transmitted by the data server; receiving, at the device, the server-computed authentication value from the data authentication server in response to the request; computing a device-computed authentication value based on a subset of the data received at the device corresponding to the subset of the data transmitted by the data server; and determining if the subset of the data received at the device is authentic by comparing the server-computed and device-computed authentication values.

    Abstract translation: 一种便于在设备处接收到的流数据的认证的系统和方法,其中认证信息不分布在数据流上。 验证数据的方法的一个实施例包括以下步骤:在设备处接收由数据服务器发送的多个分组中的数据; 向数据认证服务器提交服务器计算的认证值的请求,其中所述数据认证服务器适于基于由所述数据服务器发送的数据的子集来计算所述服务器计算的认证值; 在所述设备处,响应于所述请求从所述数据认证服务器接收所述服务器计算的认证值; 基于在与由数据服务器发送的数据的子集相对应的在设备处接收的数据的子集来计算设备计算的认证值; 以及通过比较所述服务器计算的和设备计算的认证值来确定在所述设备处接收到的数据的子集是否是真实的。

Patent Agency Ranking