http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CA-2285166-A1
Outgoing Links
Predicate | Object |
---|---|
assignee | http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_f481982f9992cbb527a6d31589832958 |
classificationCPCAdditional | http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04W12-06 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L2209-80 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L2209-12 |
classificationCPCInventive | http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-3271 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-002 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04W12-02 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G09C1-00 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-0869 |
classificationIPCInventive | http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F7-58 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G09C1-00 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04W12-06 |
filingDate | 1999-10-07-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
inventor | http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_ac5c24760f3a6b913f38efb04974dbc6 http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_58c3567807682105677bc1ae3ded11c0 |
publicationDate | 2000-05-09-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
publicationNumber | CA-2285166-A1 |
titleOfInvention | Secure method for generating cryptographic function outputs |
abstract | Data that indicates the use of a pseudorandom function output is used to modify at least one value used to produce the pseudorandom function output. In one embodiment, the output control signals provided to a User Identity Module (UIM) device are used as inputs to a pseudorandom function processor. As a result, the output provided by the processor differs based on whether the output from the processor is going to be stored in a key storage area or exported for use outside the UIM. This technique solves the problem of the prior art by insuring that values that are exported or presented at the output of UIM module, are different than the values that are stored within the UIM module as key values. As a result, an attacker would receive values at the output of the UIM that are different than the values stored in the key storage unit and therefore, would not be able to impersonate the mobile terminal or compromise the privacy of the terminal's communications. |
isCitedBy | http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-7990930-B2 |
priorityDate | 1998-11-09-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
type | http://data.epo.org/linked-data/def/patent/Publication |
Incoming Links
Predicate | Subject |
---|---|
isDiscussedBy | http://rdf.ncbi.nlm.nih.gov/pubchem/compound/CID10238 http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID419587554 |
Total number of triples: 24.