会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Encrypting system of data
    • 加密数据系统
    • US4969190A
    • 1990-11-06
    • US336796
    • 1989-04-12
    • Kazuo TakaragiFusao NakagawaYasuhiko NagaiRyoichi Sasaki
    • Kazuo TakaragiFusao NakagawaYasuhiko NagaiRyoichi Sasaki
    • G09C1/00H04L9/06H04L9/26H04L9/28H04L9/30
    • H04L9/0637
    • A data encrypting system according to the CBC system involves a limitation in a range of a numerical value which expresses data (smaller than a predetermined integer N). The encrypting system has an encrypting apparatus including a block encrypting section for receiving data, which is expressed by an integer value X smaller than a predetermined integer value N, for executing a data conversionC=enc (X)where 0.ltoreq.C.ltoreq.N-1 using an RSA algorithm, and for outputting C; and an arithmetic operating section connected to receive data, as one input, which is expressed by an integer value M smaller than the integer value N, and the output C of the block encrypting section as the other input, for performing an arithmetic operation for both of the inputs so that a resultant arithmetic value is smaller than the integer value N, and for outputting the arithmetic value as an input of the block encrypting section. Further, a decoding apparatus has a block decoding section for receiving data which is expressed by an integer value C smaller than the integer value N, for executing an inverse conversionY=dec (C)of the encrypting for the input signal by using the RSA algorithm; and a modulo subtracting section for subtracing the input data C from the output Y of the block decoding section and for outputting a remainder M'M'=Y-C (mod N)which is derived by dividing a resultant subtracted value by the integer value N.
    • 根据CBC系统的数据加密系统涉及在表示数据(小于预定整数N)的数值范围内的限制。 加密系统具有加密装置,包括用于接收数据的块加密部分,该数据加密部分由小于预定整数值N的整数值X表示,用于执行数据转换C = enc(X),其中0 < / = N-1使用RSA算法,并输出C; 以及算术运算部,连接成作为一个输入,以小于整数值N的整数值M表示的数据和作为另一输入的块加密部的输出C,以进行两者的算术运算 的输入,使得所得到的算术值小于整数值N,并且用于输出算术值作为块加密部分的输入。 此外,解码装置具有块解码部分,用于接收由小于整数值N的整数值C表示的数据,用于通过使用RSA执行用于输入信号的加密的逆变换Y = dec(C) 算法; 以及用于从块解码部分的输出Y对输入数据C进行子跟踪的模减减部分,并且用于输出通过将合成的减法值除以整数值N而导出的余数M'M'= Y-C(mod N)。
    • 5. 发明授权
    • Information security policy evaluation system and method of controlling the same
    • 信息安全政策评估体系及其控制方法
    • US07415728B2
    • 2008-08-19
    • US10817054
    • 2004-04-02
    • Masayuki MorohashiYasuhiko NagaiRitsuko Aiba
    • Masayuki MorohashiYasuhiko NagaiRitsuko Aiba
    • G06Q40/00G06F15/18
    • H04L63/0227G06Q40/08
    • In order to provide an information security policy evaluation system in which information security policies can be efficiently and appropriately defined and operated in an organization, such as a corporation, treated threats operated on a second site are transmitted from a second information processing apparatus on the second site to a first information processing apparatus on a first site, threat information is transmitted from a third site collecting information on threats to the first information processing apparatus on the first site. The first information processing apparatus extracts treated threats which have been effective for threats having occurred actually, and untreated threats, out of the received treated threat and generates an evaluation report in which these are described. Moreover, a compensation amount of insurance against threats is changed based on the generated evaluation report.
    • 为了提供信息安全策略评估系统,其中可以在诸如公司的组织中有效且适当地定义和操作信息安全策略,在第二站点上从第二信息处理设备发送在第二站点上操作的处理的威胁 站点到第一站点上的第一信息处理设备,在第一站点上从第三站点收集关于对第一信息处理设备的威胁的信息的威胁信息。 第一信息处理设备提取对已经发生的威胁已经有效的处理的威胁以及未被处理的威胁,并且生成其中描述了这些威胁的评估报告。 此外,根据所产生的评估报告,更改对威胁的赔偿额。
    • 8. 发明申请
    • Information security policy evaluation system and method of controlling the same
    • 信息安全政策评估体系及其控制方法
    • US20050076243A1
    • 2005-04-07
    • US10817054
    • 2004-04-02
    • Masayuki MorohashiYasuhiko NagaiRitsuko Aiba
    • Masayuki MorohashiYasuhiko NagaiRitsuko Aiba
    • G06Q10/06G06Q10/00G06Q50/00H04L9/00H04L9/32H04L29/06
    • H04L63/0227G06Q40/08
    • In order to provide an information security policy evaluation system in which information security policies can be efficiently and appropriately defined and operated in an organization, such as a corporation, treated threats operated on a second site 102 are transmitted from a second information processing apparatus 112 on the second site 102 to a first information processing apparatus 111 on a first site 101, threat information is transmitted from a third site 103 collecting information on threats to the first information processing apparatus 111 on the first site 101. The first information processing apparatus 111 extracts treated threats which have been effective for threats having occurred actually, and untreated threats, out of the received treated threat and generates an evaluation report in which these are described. Moreover, a compensation amount of insurance against threats is changed based on the generated evaluation report.
    • 为了提供一种信息安全策略评估系统,其中可以在诸如公司的组织中有效地适当地定义和操作信息安全策略,在第二站点102处操作的处理的威胁从第二信息处理设备112发送到 将第二站点102发送到第一站点101上的第一信息处理设备111,从第一站点101上的第一信息处理设备111的收集关于威胁的信息的第三站点103发送威胁信息。第一信息处理设备111提取 对已经发生的威胁进行有效的威胁,以及未经处理的威胁,不受处理的威胁,并产生一个评估报告。 此外,根据所产生的评估报告,更改对威胁的赔偿额。
    • 9. 发明授权
    • Information reception processing method and computer-telephony integration system
    • 信息接收处理方法和计算机电话集成系统
    • US06636587B1
    • 2003-10-21
    • US09103816
    • 1998-06-24
    • Yasuhiko NagaiSusumu Matsui
    • Yasuhiko NagaiSusumu Matsui
    • H04M1100
    • H04M3/5307H04L51/066H04L51/36H04M3/42323H04M3/5335H04M2201/60H04M2203/4509H04M2207/20
    • When a sender sends a transmission message to a receiver by use of a communication appliance such as telephone, portable telephone, facsimile or electronic mail, the transmission massage is temporarily received by a computer-telephony integration (CTI) server. The CTI server makes reference to a user contact table to thereby specify a contact point of the receiver at present and the kind of a communication appliance capable of being used by the receiver which are registered in advance in the user contact table. Then, the CTI server sends the transmission message to the receiver after automatic media conversion in accordance with the communication appliance and reception condition which are allowed for the receiver to use. A reception condition requested by the sender may be reflected in a part of the reception condition of the receiver.
    • 当发送者通过使用诸如电话,便携式电话,传真或电子邮件的通信设备向接收者发送传输消息时,传输按摩被计算机电话集成(CTI)服务器临时接收。 CTI服务器引用用户接触表,从而指定目前接收机的接触点和能够由接收机使用的通信设备的类型,该接收机预先登录在用户接触表中。 然后,CTI服务器根据允许接收机使用的通信设备和接收条件在自动媒体转换之后将发送消息发送到接收者。 发送者请求的接收条件可以反映在接收机的接收状态的一部分中。