Compact and efficient communication security through combining anti-replay with encryption

    公开(公告)号:US09674204B2

    公开(公告)日:2017-06-06

    申请号:US14963915

    申请日:2015-12-09

    CPC classification number: H04L63/123 H04L9/30 H04L63/0435 H04L63/1466

    Abstract: A method of providing anti-replay protection, authentication, and encryption with minimal data overhead is provided. A sender uses an arbitrary-length pseudorandom permutation to encrypt messages that include plaintext and successively increasing sequence numbers, to produce ciphertext messages. The sender transmits the ciphertext messages. A receiver receives the ciphertext messages and, for each received ciphertext message, performs the following operations. The receiver decrypts the given ciphertext message to recover plaintext and a candidate sequence number from the message. The receiver determines if the candidate sequence number is in any one of multiple non-contiguous acceptable sequence number windows having respective sequence number ranges that are based on at least one of a highest sequence number previously accepted and a last sequence number that was previously rejected, as established based on processing of previously received ciphertext messages.

    Redirect to inspection proxy using single-sign-on bootstrapping
    133.
    发明授权
    Redirect to inspection proxy using single-sign-on bootstrapping 有权
    使用单点登录重新引导到检查代理

    公开(公告)号:US09294462B2

    公开(公告)日:2016-03-22

    申请号:US14155865

    申请日:2014-01-15

    CPC classification number: H04L63/0815 H04L63/04 H04L63/08 H04L63/0884

    Abstract: An authentication request is generated when a user of a client device attempts to initiate a user session with an application managed by a service provider. An authentication response is generated based on credentials received from the user. The authentication response includes an assertion on behalf of the user. A delivery resource locator for the assertion is rewritten to a resource locator of a proxy in order to redirect the assertion to the proxy. The authentication response is sent to the client device together with the resource locator of the proxy in order to cause the client device to send the assertion to the proxy that decodes the re-written resource locator and sends the assertion to the service provider.

    Abstract translation: 当客户机设备的用户尝试发起与由服务提供商管理的应用的用户会话时,生成认证请求。 基于从用户接收的凭证生成认证响应。 认证响应包括代表用户的断言。 用于断言的传送资源定位符被重写到代理的资源定位符,以便将断言重定向到代理。 认证响应与代理的资源定位器一起被发送到客户机设备,以便使客户端设备将该断言发送到对重写的资源定位符进行解码的代理,并将该断言发送给服务提供商。

    NETWORK SECURITY USING ENCRYPTED SUBFIELDS
    134.
    发明申请
    NETWORK SECURITY USING ENCRYPTED SUBFIELDS 有权
    使用加密子文件的网络安全

    公开(公告)号:US20140359277A1

    公开(公告)日:2014-12-04

    申请号:US13909735

    申请日:2013-06-04

    Inventor: David McGrew

    CPC classification number: H04L63/0245

    Abstract: In one embodiment, a method includes receiving from a secure device, an encrypted rule at a first network device, receiving at the first network device, a packet containing at least one encrypted subfield from a second network device, the subfield encrypted based on a key received at the second network device from the secure device, and determining if the encrypted subfield matches the encrypted rule. An apparatus and logic are also disclosed herein.

    Abstract translation: 在一个实施例中,一种方法包括从安全设备接收第一网络设备的加密规则,在第一网络设备处接收包含来自第二网络设备的至少一个加密子场的分组,基于密钥加密的子域 在所述第二网络设备处从所述安全设备接收,以及确定所述加密的子字段是否匹配所述加密的规则。 本文还公开了一种装置和逻辑。

    Binding an ASIC to a trust anchor
    139.
    发明授权

    公开(公告)号:US11784807B2

    公开(公告)日:2023-10-10

    申请号:US17335194

    申请日:2021-06-01

    Abstract: According to certain embodiments, a method comprises receiving an encrypted value from a trust anchor. The encrypted value is received by a hardware component, and the encrypted value is associated with a posture assessment in which the trust anchor determines whether the hardware component is authorized to run on a product. The method further comprises obtaining a random value (K) based on decrypting the encrypted value. The decrypting uses a long-term key associated with the hardware component. The method further comprises communicating an encrypted response to the trust anchor. The encrypted response is encrypted using the random value (K). The encrypted response enables the trust anchor to determine whether the hardware component is authorized to run on the product.

Patent Agency Ranking