System and method for the secure transmission of data

    公开(公告)号:US09680643B2

    公开(公告)日:2017-06-13

    申请号:US14239596

    申请日:2012-08-01

    申请人: Bernd Meyer

    发明人: Bernd Meyer

    IPC分类号: H04L29/06 H04L9/08 H04L9/32

    CPC分类号: H04L9/0866 H04L9/3278

    摘要: A system for securely transmitting data includes a control device and at least one security module. The control device is configured for producing a cryptographic key using a physically unclonable function (PUF). The at least one security module is configured for communicating with the control device at least one of confidentially and authentically using the cryptographic key. The control device has no storage for storing the cryptographic key. The control device includes at least one hardware device that is configured for providing a specific feature combination. The control device also includes a calculation unit that is configured for producing the cryptographic key using the specific feature combination and the physically unclonable function (PUF). The control device further includes a program-controlled device that is configured for executing a first computer program product, which is configured for performing the encrypted/authenticated communication with the security module via a first and second communication interfaces.

    Efficient storage of cryptographic parameters
    3.
    发明授权
    Efficient storage of cryptographic parameters 有权
    加密参数的高效存储

    公开(公告)号:US08533490B2

    公开(公告)日:2013-09-10

    申请号:US13058293

    申请日:2009-07-21

    IPC分类号: G06F21/24

    CPC分类号: G06F7/725 H04L9/3066

    摘要: Cryptographic products for mass applications, such as RFIDs or special ICs for the protection from plagiarism, always require that the price per unit costs are reduced as low as possible. This is achieved, for example, in that in such methods the required storage space is further reduced for system parameters to be permanently stored. Accordingly, in a method for coding and decoding the cryptographic system parameters of an elliptical curve, when storing the system parameters, storage cells are each completely occupied, and therefore no storage space is wasted.

    摘要翻译: 用于大规模应用的密码产品,如RFID或专用IC,以防止剽窃,总是要求每单位成本的价格尽可能低。 这是通过例如在这样的方法中实现的,所需的存储空间被进一步减少以便系统参数被永久存储。 因此,在对椭圆曲线的密码系统参数进行编码和解码的方法中,当存储系统参数时,存储单元被完全占用,因此不会浪费存储空间。

    Authentication method and communications system used for authentication

    公开(公告)号:US08458472B2

    公开(公告)日:2013-06-04

    申请号:US12311440

    申请日:2007-09-26

    IPC分类号: H04L29/06

    摘要: An authentication method authenticates between subscribers of a communications system using an asymmetric elliptic curve encryption algorithm. The method involves providing a first and at least one second subscriber having a first or second secret key known only to the respective subscriber and a public key; authenticating an inquiry transmitted by the first subscriber with respect to the validity of the first certificate contained therein and associated with the first subscriber; calculating the response of the second subscriber associated with the inquiry; randomized encryption of the calculated response and a second certificate associated with the second subscriber using the public key; decryption and authentication of the response transmitted by the second subscriber with respect to the validity of the second certificate contained therein.

    Method and System for Confidentially Providing Software Components
    5.
    发明申请
    Method and System for Confidentially Providing Software Components 有权
    自动提供软件组件的方法和系统

    公开(公告)号:US20120321089A1

    公开(公告)日:2012-12-20

    申请号:US13508712

    申请日:2010-10-14

    IPC分类号: H04L9/08

    摘要: A method and system for confidentially providing a software component which is encrypted using a secret cryptographic key of a software component manufacturer, and the key is then encrypted using a first cryptographic system key, wherein the encrypted software component and the encrypted key are transported by the software component manufacturer to a destination system device. After decrypting the transported encrypted key using a second cryptographic system key, the transported encrypted software component is decrypted using the decrypted key, wherein the decrypted software component is provided for execution on the destination system device. The method can be used to protect source codes or object codes of a developed software component from access by a third party and still allows for processing using standard tools.

    摘要翻译: 一种用于保密地提供使用软件组件制造商的秘密密码密钥加密的软件组件的方法和系统,然后使用第一密码系统密钥对密钥进行加密,其中加密的软件组件和加密密钥由 软件组件制造商到目标系统设备。 在使用第二密码系统密钥解密所传送的加密密钥之后,使用解密密钥解密所传送的加密软件组件,其中解密的软件组件被提供用于在目标系统设备上执行。 该方法可用于保护开发的软件组件的源代码或目标代码不被第三方访问,并且仍允许使用标准工具进行处理。

    Method for securely encrypting or decrypting a message
    6.
    发明授权
    Method for securely encrypting or decrypting a message 有权
    安全加密或解密消息的方法

    公开(公告)号:US08300810B2

    公开(公告)日:2012-10-30

    申请号:US12073556

    申请日:2008-03-06

    IPC分类号: H04K1/00

    摘要: A method for securely encrypting or decrypting a message or for generating or verifying a digital signature in a message, in which the message is subjected, with the aid of a processor, to a mathematical operation using a key (k) which can be represented in the form of a binary number with a sequence of bits, and computational operations are sequentially carried out on auxiliary variables for each bit. The dependence of the computational result on the values of individual bits is taken into account by reading the memory addresses from the auxiliary variables and assigning them to address variables. The difference between the addresses is calculated and, depending on the respective current bit, is added to, or subtracted from, the computer addresses. The assignment of the auxiliary variables to the address variables can thus be interchanged. As a result, the order and selection of the computational operations is controlled on the basis of bits without the program sequence having to contain jump instructions.

    摘要翻译: 一种用于在消息中安全加密或解密消息或者利用处理器来生成或验证消息中的数字签名的方法,该方法使用可以在 对于每个位,辅助变量依次执行具有位序列的二进制数的形式和计算操作。 通过从辅助变量读取存储器地址并将其分配给地址变量,计算结果对各个位的值的依赖性被考虑在内。 计算地址之间的差异,并且根据相应的当前位被添加到计算机地址或从计算机地址中减去。 因此可以将辅助变量分配给地址变量。 结果,计算操作的顺序和选择是基于比特来控制的,而没有编程序列必须包含跳转指令。

    METHOD FOR IDENTIFYING A CODE APPLIED TO A POSTAL ITEM, DEVICE FOR CARRYING OUT SAID METHOD AND METHOD FOR PROVIDING THE POSTAL ITEM WITH THE MACHINE-READABLE CODE
    9.
    发明申请
    METHOD FOR IDENTIFYING A CODE APPLIED TO A POSTAL ITEM, DEVICE FOR CARRYING OUT SAID METHOD AND METHOD FOR PROVIDING THE POSTAL ITEM WITH THE MACHINE-READABLE CODE 审中-公开
    用于识别适用于邮政编码的代码的方法,用于执行方法的设备和用机器可读代码提供邮政物品的方法

    公开(公告)号:US20110192904A1

    公开(公告)日:2011-08-11

    申请号:US12596225

    申请日:2008-03-12

    IPC分类号: G06K7/14 G06K19/06 G06K1/12

    摘要: There is provided a method for detecting a machine-readable code that has been applied onto a mailpiece. An exemplary method comprises checking in at least one area of a surface of the mailpiece whether at least two parallel lines are present in the at least one area of the surface, at least two of the parallel lines being at a distance from each other that corresponds to a module width, at least one of the lines having a width that equals the module width. The exemplary method also comprises detecting modules of a data matrix code, in at least one partial area of the surface that is adjacent to one of the lines, taking into account the detection of the at least two parallel lines, the data matrix code having modules of the module width.

    摘要翻译: 提供了一种用于检测已经应用到邮件上的机器可读代码的方法。 一种示例性方法包括在邮件的表面的至少一个区域中检查在表面的至少一个区域中是否存在至少两条平行线,至少两条平行线彼此相距一定距离 到模块宽度,至少一条线具有等于模块宽度的宽度。 所述示例性方法还包括在考虑到所述至少两条平行线的检测的情况下,在与所述线中的一条相邻的所述表面的至少一个部分区域中检测数据矩阵码的模块,所述数据矩阵码具有模块 的模块宽度。

    METHOD FOR ENCODED DATA EXCHANGE AND COMMUNICATION SYSTEM
    10.
    发明申请
    METHOD FOR ENCODED DATA EXCHANGE AND COMMUNICATION SYSTEM 审中-公开
    编码数据交换和通信系统的方法

    公开(公告)号:US20110107097A1

    公开(公告)日:2011-05-05

    申请号:US12993840

    申请日:2009-03-24

    IPC分类号: H04L9/32 H04L9/00

    摘要: In a system and method for encrypted data exchange between entities (users) of a communication system using cryptography based on elliptic curves, in response to a challenge of a first user a scalar multiplication is calculated by the second user, wherein only part of the result of the scalar multiplication is sent back as response to the first user.

    摘要翻译: 在用于使用基于椭圆曲线的加密的通信系统的实体(用户)之间进行加密数据交换的系统和方法中,响应于第一用户的挑战,第二用户计算标量乘法,其中仅一部分结果 的标量乘法作为对第一用户的响应被发回。