会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明申请
    • IDENTITY-BASED ENCRYPTION OF DATA ITEMS FOR SECURE ACCESS THERETO
    • 基于身份的加密数据项,以便安全访问
    • US20110066863A1
    • 2011-03-17
    • US12992314
    • 2009-05-18
    • Stefan KatzenbeisserMilan Petkovic
    • Stefan KatzenbeisserMilan Petkovic
    • G06F21/24
    • G06F21/6245G06F21/6218
    • The invention uses the concept of identity-based encryption in the context of data-centric protection of electronic health records, where each data item is encrypted by using its own identifier as a public key. The corresponding decryption keys are managed by special trusted entities, which distribute the keys to authorized parties and provide logging facilities. This approach has the particular advantage that emergency access mechanisms can 5 be implemented in a secure and extremely efficient way. In contrast to previous approaches, it requires no large-scale distribution of secret decryption keys. Furthermore, the scheme allows limiting the impact of a compromised decryption key, as one key can only be used to decrypt one single document.
    • 本发明在以数据为中心的电子健康记录保护的上下文中使用基于身份的加密的概念,其中通过使用其自己的标识符作为公钥来对每个数据项进行加密。 相应的解密密钥由特殊的可信实体管理,这些实体将密钥分发给授权方并提供记录设备。 这种方法具有特别的优点,即紧急访问机制可以以安全和非常有效的方式实现。 与以前的方法相比,它不需要大规模分发密钥解密密钥。 此外,该方案允许限制受损解密密钥的影响,因为一个密钥只能用于解密单个文档。
    • 8. 发明授权
    • Identity-based encryption of data items for secure access thereto
    • 用于安全访问数据项的基于身份的加密
    • US08627103B2
    • 2014-01-07
    • US12992314
    • 2009-05-18
    • Stefan KatzenbeisserMilan Petkovic
    • Stefan KatzenbeisserMilan Petkovic
    • G06F11/30
    • G06F21/6245G06F21/6218
    • The invention uses the concept of identity-based encryption in the context of data-centric protection of electronic health records, where each data item is encrypted by using its own identifier as a public key. The corresponding decryption keys are managed by special trusted entities, which distribute the keys to authorized parties and provide logging facilities. This approach has the particular advantage that emergency access mechanisms can be implemented in a secure and extremely efficient way. In contrast to previous approaches, it requires no large-scale distribution of secret decryption keys. Furthermore, the scheme allows limiting the impact of a compromised decryption key, as one key can only be used to decrypt one single document.
    • 本发明在以数据为中心的电子健康记录保护的上下文中使用基于身份的加密的概念,其中通过使用其自己的标识符作为公钥来对每个数据项进行加密。 相应的解密密钥由特殊的可信实体管理,这些实体将密钥分发给授权方并提供记录设备。 这种方法具有特别的优点,即可以以安全和极其有效的方式实现紧急​​访问机制。 与以前的方法相比,它不需要大规模分发密钥解密密钥。 此外,该方案允许限制受损解密密钥的影响,因为一个密钥只能用于解密单个文档。