http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CA-2285166-A1

Outgoing Links

Predicate Object
assignee http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_f481982f9992cbb527a6d31589832958
classificationCPCAdditional http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04W12-06
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L2209-80
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L2209-12
classificationCPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-3271
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-002
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04W12-02
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G09C1-00
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-0869
classificationIPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F7-58
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G09C1-00
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04W12-06
filingDate 1999-10-07-04:00^^<http://www.w3.org/2001/XMLSchema#date>
inventor http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_ac5c24760f3a6b913f38efb04974dbc6
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_58c3567807682105677bc1ae3ded11c0
publicationDate 2000-05-09-04:00^^<http://www.w3.org/2001/XMLSchema#date>
publicationNumber CA-2285166-A1
titleOfInvention Secure method for generating cryptographic function outputs
abstract Data that indicates the use of a pseudorandom function output is used to modify at least one value used to produce the pseudorandom function output. In one embodiment, the output control signals provided to a User Identity Module (UIM) device are used as inputs to a pseudorandom function processor. As a result, the output provided by the processor differs based on whether the output from the processor is going to be stored in a key storage area or exported for use outside the UIM. This technique solves the problem of the prior art by insuring that values that are exported or presented at the output of UIM module, are different than the values that are stored within the UIM module as key values. As a result, an attacker would receive values at the output of the UIM that are different than the values stored in the key storage unit and therefore, would not be able to impersonate the mobile terminal or compromise the privacy of the terminal's communications.
isCitedBy http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-7990930-B2
priorityDate 1998-11-09-04:00^^<http://www.w3.org/2001/XMLSchema#date>
type http://data.epo.org/linked-data/def/patent/Publication

Incoming Links

Predicate Subject
isDiscussedBy http://rdf.ncbi.nlm.nih.gov/pubchem/compound/CID10238
http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID419587554

Total number of triples: 24.