会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 4. 发明申请
    • Method and system using one-time pad data to evidence the possession of a particular attribute
    • 使用一次性垫数据的方法和系统证明拥有特定属性
    • US20070101410A1
    • 2007-05-03
    • US11523868
    • 2006-09-19
    • Keith HarrisonWilliam MunroMartin Sadler
    • Keith HarrisonWilliam MunroMartin Sadler
    • H04L9/32
    • H04L9/0656H04L9/0852H04L9/3226H04L2209/127H04L2209/56H04L2209/80
    • A method and system are provided for evidencing to a first entity, such as a visa-checking authority, that a second entity, such as a traveller, possesses a particular attribute, such as right of entry to a specific country. The method involves a preliminary phase of verifying that the second entity has the attribute of interest; associating that attribute with a first one-time pad held by the first entity; and arranging for the second entity to possess a second one-time pad that is at least a subset of the first one-time pad. Thereafter, when the second entity wishes to prove to the first entity that it has the attribute of interest, it passes evidence data derived from the second one-time pad to the first entity. The first entity can then check for the presence, in the first one-time pad, of data matching, or usable to produce, the evidence data.
    • 提供了一种方法和系统,用于向第一实体(例如签证机构)证明第二实体(例如旅行者)具有特定属性,诸如进入特定国家的权利。 该方法涉及验证第二实体具有感兴趣属性的初步阶段; 将该属性与由第一实体持有的第一个一次性贴图相关联; 以及安排所述第二实体拥有至少是所述第一一次性焊盘的子集的第二一次性焊盘。 此后,当第二实体希望向第一实体证明其具有感兴趣的属性时,它将从第二一次性衬垫导出的证据数据传递给第一实体。 然后,第一实体可以检查在第一次一次性垫中存在数据匹配或可用于产生证据数据的存在。
    • 7. 发明申请
    • Cryptographic method and apparatus
    • 密码方法和装置
    • US20050021973A1
    • 2005-01-27
    • US10831776
    • 2004-04-22
    • Liqun ChenMartin SadlerKeith Harrison
    • Liqun ChenMartin SadlerKeith Harrison
    • H04L9/08H04L9/30H04L9/32H04L9/00
    • H04L9/3242H04L9/0847H04L9/302H04L9/3073
    • First data is encrypted by a first party using an encryption key string formed using at least a hash value of the first data, this hash value being either in clear or in an encrypted form enabling its recovery in clear by a trusted party. The encrypted first data and the encryption key string are made available to a second party which forwards the encryption key string to the trusted party. The trusted party carries out at least one check on the basis of data contained in the encryption key string and, if the checks are satisfactory, provides a decryption key to the second party. Where the encryption key string comprises the hash value of the first data in encrypted form, the trusted party will typically decrypt the hash value and pass it to the second party to enable the latter to check the integrity of the first data.
    • 第一数据由第一方使用至少使用第一数据的散列值形成的加密密钥串进行加密,该散列值是清楚的或以加密的形式使得其被可信方清除。 加密的第一数据和加密密钥串可用于将加密密钥串转发给可信方的第二方。 受信任方根据包含在加密密钥串中的数据执行至少一个检查,并且如果检查令人满意,则向第二方提供解密密钥。 在加密密钥串包括加密形式的第一数据的哈希值的情况下,受信任方通常将对散列值进行解密,并将其传递给第二方,以使后者能够检查第一数据的完整性。
    • 8. 发明申请
    • Privacy management of personal data
    • 个人资料的隐私管理
    • US20050039031A1
    • 2005-02-17
    • US10767868
    • 2004-01-28
    • Marco MontKeith HarrisonMartin SadlerSiani Pearson
    • Marco MontKeith HarrisonMartin SadlerSiani Pearson
    • H04L9/30H04L29/06H04L9/32
    • H04L63/0435H04L9/083H04L9/3073H04L63/062H04L2209/56H04L2209/68H04L2209/76
    • When sending personal data to a recipient, the data owner encrypts the data using both a public data item provided by a trusted party and an encryption key string formed using at least policy data indicative of conditions to be satisfied before access is given to the personal data. The encryption key string is typically also provided to the recipient along with the encrypted personal data. To decrypt the personal data, the recipient sends the encryption key string to the trusted party with a request for the decryption key. The trusted party determines the required decryption key using the encryption key string and private data used in deriving its public data, and provides it to the requesting recipient. However, the decryption key is either not determined or not made available until the trusted party is satisfied that the associated policy conditions have been met by the recipient.
    • 当向收件人发送个人数据时,数据所有者使用由受信任方提供的公共数据项和至少指示在将个人数据访问之前要满足的条件的策略数据形成的加密密钥串来加密数据 。 加密密钥字符串通常也与加密的个人数据一起提供给接收者。 为了解密个人数据,接收方通过请求解密密钥将加密密钥字符串发送给信任方。 可信方使用加密密钥串和用于导出其公共数据的私有数据来确定所需的解密密钥,并将其提供给请求的接收者。 然而,解密密钥在被信任方满足接收者已经满足相关联的策略条件之前,未被确定或不被提供。
    • 9. 发明申请
    • Cryptographic method and apparatus
    • 密码方法和装置
    • US20050005121A1
    • 2005-01-06
    • US10831549
    • 2004-04-22
    • Liqun ChenMartin SadlerKeith Harrison
    • Liqun ChenMartin SadlerKeith Harrison
    • H04L9/08H04L9/30H04L9/00
    • H04L9/3073H04L9/083H04L9/0847
    • First data to be sent by a first party to a second party is encrypted using an encryption key string formed using at least a hash value generated using second data and a secret, shared with a trusted party, that serves as identification of the first party. The second data comprises, for example, one or more conditions that serve as identifiers of the second party, and a hash-value element generated by hashing the first data. The encrypted first data and the encryption key string is made available to the second party which forwards the encryption key string to the trusted party with a request for the corresponding decryption key. The trusted party carries out at least one check on the basis of data contained in the encryption key string and, if this at least one check is satisfactory, provides a decryption key to the second party.
    • 要由第一方发送给第二方的第一数据使用至少使用第二数据生成的散列值形成的加密密钥串进行加密,以及用作第一方的标识的信任方共享的秘密。 第二数据包括例如用作第二方的标识符的一个或多个条件以及通过对第一数据进行散列而产生的散列值元素。 加密的第一数据和加密密钥串对第二方可用,该第二方通过对相应的解密密钥的请求将加密密钥串转发到信任方。 可信方基于加密密钥串中包含的数据执行至少一个检查,并且如果该至少一个检查令人满意,则向第二方提供解密密钥。