会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 32. 发明授权
    • Network system using a threshold secret sharing method
    • 网络系统采用阈值秘密共享方式
    • US06477254B1
    • 2002-11-05
    • US09246845
    • 1999-02-09
    • Seiji MiyazakiKazuo Takaragi
    • Seiji MiyazakiKazuo Takaragi
    • H04L908
    • H04L9/085H04L9/3066
    • In a data encryption/decryption method including an encryption step and a decryption step. In the encryption step, there are prepared n pairs of secret keys and public keys in a public-key cryptographic scheme, where n is a positive integer. A new key is generated in accordance with at least one of the public keys. Data is encrypted in a common-key cryptographic scheme by use of the new key. There is prepared a (k,n) threshold logic (k is an integer equal to or less than n) having terms associated with the new key and the n public keys. A calculation of the threshold logic is conducted by use of the new key and the n public keys, and encrypted data and a result of the calculation of the threshold logic are stored. In the decryption step, the new key is restored from k secret keys selected from the n secret keys and the stored result of the threshold logic calculation in accordance with a threshold reverse logic corresponding to the threshold logic and stored data is decrypted by the restored key in the common-key cryptographic scheme.
    • 在包括加密步骤和解密步骤的数据加密/解密方法中。 在加密步骤中,在公钥加密方案中准备了n对密钥和公钥,其中n是正整数。 根据至少一个公共密钥生成新的密钥。 数据通过使用新密钥以公共密钥加密方案进行加密。 准备具有与新密钥和n个公钥相关联的术语的(k,n)阈值逻辑(k是等于或小于n的整数)。 通过使用新密钥和n个公钥进行阈值逻辑的计算,并且存储加密数据和阈值逻辑的计算结果。 在解密步骤中,根据与阈值逻辑相对应的阈值反向逻辑,从n个秘密密钥中选出的k个秘密密钥和阈值逻辑计算的存储结果中恢复新密钥,并且存储的数据被恢复的密钥解密 在共密密码方案中。
    • 33. 发明授权
    • IC card equipped with elliptical curve encryption processing facility
    • IC卡配有椭圆曲线加密处理设备
    • US06466668B1
    • 2002-10-15
    • US09236590
    • 1999-01-26
    • Seiji MiyazakiKazuo Takaragi
    • Seiji MiyazakiKazuo Takaragi
    • H04L930
    • G06F7/725G06F7/728
    • In an IC card incorporating residual multiplier hardware for implementing a high-speed algorithm for a residual multiplication arithmetic, a method and a device capable of executing public key encryption processing such as an elliptic curve encryption processing at a high speed. Residual arithmetic succeeding to generation of a random number and residual arithmetic in a signature generating processing can be executed by using a residual multiplier. Further, in order to use effectively the residual multiplier for arithmetic operation on an elliptic curve, the point on the elliptic curve is transformed from a two-dimensional affine coordinate system to a three-dimensional coordinate system. Additionally, multiplicative inverse arithmetic for realizing reverse transformation from the three-dimensional coordinate system to the two-dimensional affine coordinate system as well as for determining a signature s can be executed only with the residual multiplication arithmetic. By making use of the residual multiplier in this manner, the processing speed can be increased. Computation complexity can be reduced by storing previously those parameters which are used frequently and constant multiplies of a base point of the elliptic curve in the form of tables, which also contributes to increasing of processing speed.
    • 在包含用于实现用于残余乘法运算的高速算法的残余乘法器硬件的IC卡中,能够以高速执行诸如椭圆曲线加密处理之类的公钥加密处理的方法和装置。 可以通过使用剩余乘数来执行在签名生成处理中继续生成随机数和残差算术的剩余算术。 此外,为了有效地使用用于椭圆曲线上的算术运算的剩余乘数,将椭圆曲线上的点从二维仿射坐标系变换为三维坐标系。 另外,用于实现从三维坐标系到二维仿射坐标系的反向变换以及用于确定签名s的乘法逆运算只能用剩余乘法运算来执行。 通过以这种方式利用剩余乘数,可以提高处理速度。 可以通过先前存储经常使用的那些参数和椭圆曲线的基点的恒定倍数以表的形式来减少计算复杂度,这也有助于提高处理速度。
    • 35. 发明授权
    • Cryptographic communication system
    • 加密通信系统
    • US5966448A
    • 1999-10-12
    • US703097
    • 1996-08-26
    • Hikari NambaKazuo TakaragiSatoshi Miyazaki
    • Hikari NambaKazuo TakaragiSatoshi Miyazaki
    • H04L9/14G06F21/00G09C1/00H04L9/00H04L29/06H04L9/16
    • H04L63/0464G06F21/606H04L9/14H04L69/08
    • According to a cryptographic communication system which can safely perform cipher conversion processing when cryptographic communication is performed between terminals using different cipher types, when a terminal 10A-1 connected to a LAN-A using a cryptographic algorithm C1 transmits data to a terminal 10B-1 connected to a LAN-B using a cryptographic algorithm C2, the terminal 10A-1 generates two meaningless data items from the data to be transmitted, decrypts the two generated data items according to the cryptographic algorithm C1, and then transmits the decrypted data to two cryptographic protocol conversion servers and for dividing the data into two data items. Each of the cryptographic protocol conversion servers decrypts each transmitted data item, the re-encrypts the decrypted data according to the cryptographic algorithm C2, and then transmits the data to the terminal 10B-1. The terminal 10B-1 restores original transmission data on the basis of the two data items transmitted from the respective cryptographic protocol conversion servers.
    • 根据在使用不同的密码类型的终端之间执行密码通信时可以安全地执行密码转换处理的密码通信系统,当使用密码算法C1连接到LAN-A的终端10A-1向终端10B-1发送数据时 使用加密算法C2连接到LAN-B,终端10A-1从要发送的数据生成两个无意义的数据项,根据密码算法C1对两个生成的数据项进行解密,然后将解密的数据发送到两个 加密协议转换服务器,并将数据分成两个数据项。 每个密码协议转换服务器对每个发送的数据项进行解密,根据加密算法C2重新加密解密的数据,然后将数据发送到终端10B-1。 终端10B-1基于从各个密码协议转换服务器发送的两个数据项恢复原始传输数据。
    • 39. 发明授权
    • Identification code management method and management system
    • 识别码管理方法和管理系统
    • US07178026B2
    • 2007-02-13
    • US11178510
    • 2005-07-12
    • Chikashi OkamotoKazuo TakaragiYasuko Fukuzawa
    • Chikashi OkamotoKazuo TakaragiYasuko Fukuzawa
    • H04L9/00
    • G06K17/00G06Q10/087
    • An identification code management method and management system includes that the issue and distribution of an ID code having a message authentication code are managed thereby to efficiently and reliably manage a material object using the ID code. An electronic circuit chip with an ID code having a message authentication code stored in a read-only area is used as an identification tag. The information at an ID code order receiving terminal and an identification tag production factory terminal are consolidated and collectively managed at an ID code management terminal. Thereby, the ID code management terminal is inquired of highly confidential information or requested to process the information as required so that an ID code utilization terminal is not required to store the same information.
    • 识别代码管理方法和管理系统包括管理具有消息验证码的ID代码的发行和分发,从而有效且可靠地使用ID代码来管理物料对象。 使用具有存储在只读区域中的具有消息认证码的ID码的电子电路芯片作为识别标签。 在ID码管理终端中,将ID码订单接收终端和识别标签生成工厂终端的信息合并统一管理。 由此,向ID码管理终端询问高度机密信息,或者根据需要请求处理该信息,使ID码利用终端不需要存储相同的信息。