会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 24. 发明授权
    • Platform and method for establishing provable identities while maintaining privacy
    • 在保持隐私的同时建立可证明身份的平台和方法
    • US07516330B2
    • 2009-04-07
    • US11289747
    • 2005-11-29
    • Carl M. EllisonJames A. Sutton
    • Carl M. EllisonJames A. Sutton
    • H04L9/00
    • H04L9/3265H04L9/3271H04L2209/42
    • In one embodiment, a method for utilizing a pseudonym to protect the identity of a platform and its user is described. The method comprises producing a pseudonym that includes a public pseudonym key. The public pseudonym key is placed in a certificate template. Hash operations are performed on the certificate template to produce a certificate hash value, which is transformed from the platform. Thereafter, a signed result is returned to the platform. The signed result is a digital signature for the transformed certificate hash value. Upon performing an inverse transformation of the signed result, a digital signature of the certificate hash value is recovered. This digital signature may be used for data integrity checks for subsequent communications using the pseudonym.
    • 在一个实施例中,描述了一种利用假名来保护平台及其用户的身份的方法。 该方法包括产生包含公共假名密钥的假名。 公共假名密钥被放置在证书模板中。 在证书模板上执行散列操作以产生从平台转换的证书哈希值。 此后,将签名结果返回到平台。 签名结果是转换的证书哈希值的数字签名。 在执行签名结果的逆变换时,恢复证书哈希值的数字签名。 该数字签名可以用于使用假名的后续通信的数据完整性检查。
    • 25. 发明授权
    • Platform and method for establishing provable identities while maintaining privacy
    • 在保持隐私的同时建立可证明身份的平台和方法
    • US06976162B1
    • 2005-12-13
    • US09605605
    • 2000-06-28
    • Carl M. EllisonJames A. Sutton
    • Carl M. EllisonJames A. Sutton
    • H04L9/32H04L9/16
    • H04L9/3265H04L9/3271H04L2209/42
    • In one embodiment, a method for utilizing a pseudonym to protect the identity of a platform and its user is described. The method comprises producing a pseudonym that includes a public pseudonym key. The public pseudonym key is placed in a certificate template. Hash operations are performed on the certificate template to produce a certificate hash value, which is transformed from the platform. Thereafter, a signed result is returned to the platform. The signed result is a digital signature for the transformed certificate hash value. Upon performing an inverse transformation of the signed result, a digital signature of the certificate hash value is recovered. This digital signature may be used for data integrity checks for subsequent communications using the pseudonym.
    • 在一个实施例中,描述了一种利用假名来保护平台及其用户的身份的方法。 该方法包括产生包含公共假名密钥的假名。 公共假名密钥被放置在证书模板中。 在证书模板上执行散列操作以产生从平台转换的证书哈希值。 此后,将签名结果返回到平台。 签名结果是转换的证书哈希值的数字签名。 在执行签名结果的逆变换时,恢复证书哈希值的数字签名。 该数字签名可以用于使用假名的后续通信的数据完整性检查。