INTERRUPT DRIVEN HARDWARE RANDOM NUMBER GENERATOR
    11.
    发明申请
    INTERRUPT DRIVEN HARDWARE RANDOM NUMBER GENERATOR 有权
    中断驱动硬件随机数发生器

    公开(公告)号:US20140280411A1

    公开(公告)日:2014-09-18

    申请号:US13798067

    申请日:2013-03-12

    CPC classification number: G06F7/58

    Abstract: A method, an apparatus, and a computer program product for generating and processing random numbers are provided. An apparatus comprises a processing system that includes a processor, a random number generator and a pair of buffers. A first buffer receives low-entropy random numbers generated by the random number generator and a second buffer provides high-entropy random numbers directly to a processing system. The processing system may directly access the second buffer in response to an instruction executed by the processing system. The processing system responds to an interrupt based on occupancy levels of the buffers by conditioning low-entropy random numbers read from the first buffer to obtain high-entropy random numbers that are then stored in the second.

    Abstract translation: 提供了一种用于产生和处理随机数的方法,装置和计算机程序产品。 一种装置包括处理系统,其包括处理器,随机数发生器和一对缓冲器。 第一缓冲器接收由随机数发生器产生的低熵随机数,第二缓冲器直接向处理系统提供高熵随机数。 处理系统可以响应于由处理系统执行的指令直接访问第二缓冲器。 处理系统通过调节从第一缓冲器读取的低熵随机数来获得高熵随机数,然后存储在第二缓冲器中,基于缓冲器的占用水平来响应中断。

    Master key encryption functions for transmitter-receiver pairing as a countermeasure to thwart key recovery attacks
    12.
    发明授权
    Master key encryption functions for transmitter-receiver pairing as a countermeasure to thwart key recovery attacks 有权
    用于发射机 - 接收机配对的主密钥加密功能作为阻止密钥恢复攻击的对策

    公开(公告)号:US09094191B2

    公开(公告)日:2015-07-28

    申请号:US13830598

    申请日:2013-03-14

    CPC classification number: H04L9/0825 H04L9/0822 H04L2209/60 H04L2209/76

    Abstract: A method operational on a receiver device for exchanging and/or generating security keys is provided. A first encrypted master key Km is received at the receiver device from a transmitter device, the first encrypted master key Km secured by a receiver public key Kpub-rx. The first encrypted master key Km may be decrypted with a receiver private key Kpri-rx to obtain the master key Km. The master key Km may be encrypted using a block cipher that applies a receiver secret key Kh to obtain a second encrypted master key.

    Abstract translation: 提供了一种在用于交换和/或生成安全密钥的接收机设备上操作的方法。 第一加密主密钥Km在接收机设备处从发射机设备接收,第一加密主密钥Km由接收方公钥Kpub-rx确保。 第一加密主密钥Km可以用接收方私钥Kpri-rx解密,以获得主密钥Km。 可以使用应用接收机秘密密钥Kh的块密码来加密主密钥Km,以获得第二加密主密钥。

    VARIABLE LISTEN DURATION AND/OR SYNCHRONIZED WAKE-UP OF ASSET TAGS
    15.
    发明申请
    VARIABLE LISTEN DURATION AND/OR SYNCHRONIZED WAKE-UP OF ASSET TAGS 审中-公开
    可变收听时间和/或同步资产唤醒

    公开(公告)号:US20150002271A1

    公开(公告)日:2015-01-01

    申请号:US14151705

    申请日:2014-01-09

    Abstract: A method of obtaining information for locating an asset includes: listening, at an asset tag, for a first listen duration for landmark messages; receiving, at the asset tag during the first listen duration, at least one landmark message from each of one or more landmark tags; selecting a synched landmark tag from the one or more landmark tags; abstaining from listening, at the asset tag, for landmark messages until approximately a subsequent transmission time of a synched landmark message corresponding to the synched landmark tag; and waking up at approximately the subsequent transmission time of the synched landmark message to listen, at the asset tag, for landmark messages for a second listen duration such that the asset tag listens for the landmark messages during the subsequent transmission time; wherein the first listen duration is longer than the second listen duration.

    Abstract translation: 获取用于定位资产的信息的方法包括:在资产标签处收听用于地标性消息的第一监听持续时间; 在第一监听期间的资产标签处接收来自一个或多个地标标签中的每一个的至少一个地标消息; 从一个或多个地标标签中选择同步的地标标签; 避免在资产标签处收听地标消息,直到与同步的地标标签相对应的同步地标消息的后续传输时间; 并且在所述同步的地标消息的后续发送时间醒来,在所述资产标签处收听用于第二监听持续时间的地标消息,使得所述资产标签在随后的发送时间期间监听所述地标消息; 其中所述第一监听持续时间长于所述第二监听持续时间。

    Interrupt driven hardware random number generator
    16.
    发明授权
    Interrupt driven hardware random number generator 有权
    中断驱动硬件随机数发生器

    公开(公告)号:US09152380B2

    公开(公告)日:2015-10-06

    申请号:US13798067

    申请日:2013-03-12

    CPC classification number: G06F7/58

    Abstract: A method, an apparatus, and a computer program product for generating and processing random numbers are provided. An apparatus comprises a processing system that includes a processor, a random number generator and a pair of buffers. A first buffer receives low-entropy random numbers generated by the random number generator and a second buffer provides high-entropy random numbers directly to a processing system. The processing system may directly access the second buffer in response to an instruction executed by the processing system. The processing system responds to an interrupt based on occupancy levels of the buffers by conditioning low-entropy random numbers read from the first buffer to obtain high-entropy random numbers that are then stored in the second.

    Abstract translation: 提供了一种用于产生和处理随机数的方法,装置和计算机程序产品。 一种装置包括处理系统,其包括处理器,随机数发生器和一对缓冲器。 第一缓冲器接收由随机数发生器产生的低熵随机数,第二缓冲器直接向处理系统提供高熵随机数。 处理系统可以响应于由处理系统执行的指令直接访问第二缓冲器。 处理系统通过调节从第一缓冲器读取的低熵随机数来获得高熵随机数,然后存储在第二缓冲器中,基于缓冲器的占用水平来响应中断。

    MASTER KEY ENCRYPTION FUNCTIONS FOR TRANSMITTER-RECEIVER PAIRING AS A COUNTERMEASURE TO THWART KEY RECOVERY ATTACKS
    18.
    发明申请
    MASTER KEY ENCRYPTION FUNCTIONS FOR TRANSMITTER-RECEIVER PAIRING AS A COUNTERMEASURE TO THWART KEY RECOVERY ATTACKS 有权
    用于发射机接收机配对的主要加密功能作为重要恢复攻击的对策

    公开(公告)号:US20140270166A1

    公开(公告)日:2014-09-18

    申请号:US13830598

    申请日:2013-03-14

    CPC classification number: H04L9/0825 H04L9/0822 H04L2209/60 H04L2209/76

    Abstract: A method operational on a receiver device for exchanging and/or generating security keys is provided. A first encrypted master key Km is received at the receiver device from a transmitter device, the first encrypted master key Km secured by a receiver public key Kpub-rx. The first encrypted master key Km may be decrypted with a receiver private key Kpri-rx to obtain the master key Km. The master key Km may be encrypted using a block cipher that applies a receiver secret key Kh to obtain a second encrypted master key.

    Abstract translation: 提供了一种在用于交换和/或生成安全密钥的接收机设备上操作的方法。 第一加密主密钥Km在接收机设备处从发射机设备接收,第一加密主密钥Km由接收方公钥Kpub-rx确保。 第一加密主密钥Km可以用接收方私钥Kpri-rx解密,以获得主密钥Km。 可以使用应用接收机秘密密钥Kh的块密码来加密主密钥Km,以获得第二加密主密钥。

    Method and device for secure phone banking
    19.
    发明申请
    Method and device for secure phone banking 审中-公开
    用于安全电话银行的方法和设备

    公开(公告)号:US20140016780A1

    公开(公告)日:2014-01-16

    申请号:US14025533

    申请日:2013-09-12

    Abstract: A small form-factor security device is provided that may be inserted in series with a telephone line to encrypt dual tone multi-frequency (DTMF) tones from a telephone to prevent unauthorized disclosure of sensitive information. A receiving device decrypts the encrypted DTMF tones to receive the original information sent by the telephone. The security device acts as a second factor in a two-factor authentication scheme with a tele-services security server that authenticates the security device.

    Abstract translation: 提供了一种小型的安全设备,其可以与电话线串联插入以从电话加密双音多频(DTMF)音,以防止未经授权的泄露敏感信息。 接收设备解密加密的DTMF音,以接收由电话发送的原始信息。 安全设备作为双重身份认证方案的第二个因素,与认证安全设备的远程服务安全服务器。

    Small public-key based digital signatures for authentication

    公开(公告)号:US20130227297A1

    公开(公告)日:2013-08-29

    申请号:US13859646

    申请日:2013-04-09

    CPC classification number: H04L9/3247 H04L9/3013 H04L2209/20

    Abstract: Embodiments disclosed allow authentication between two entities having agreed on the use of a common modulus N. The authentication includes generating a pseudorandom string value; generating a public key value based on the modulus N and the pseudorandom string value; generating a private key value corresponding to the public key value; receiving a verifier's public key value; generating a shared secret value based on the modulus N, the private key value and the verifier's public key value; calculating an authentication signature value using the shared secret value; and transmitting the authentication signature value for authentication. When the authentication signature is received, the public key value and the shared value are generated to calculate an authentication signature value. Thereafter, the authentication signature values are compared and authenticated.

Patent Agency Ranking