会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明专利
    • Verifying human interaction to computer entity by way of trusted component on computing device
    • 通过计算机设备上的有害元件的方式验证人机对计算机实体的相互作用
    • JP2006005921A
    • 2006-01-05
    • JP2005161388
    • 2005-06-01
    • Microsoft Corpマイクロソフト コーポレーション
    • MEEK CHRISTOPHER AHECKERMAN DAVID EARLBENALOH JOSH DGOODMAN JOSHUA THEODOREPEINADO MARCUS
    • H04L9/32G06F1/00G06F12/06G06F21/00
    • G06F21/31
    • PROBLEM TO BE SOLVED: To describe user interaction in combination with a fact sending a send item from an application of a computing device to a recipient. SOLUTION: The computing device has an attestation unit thereon for attesting to trustworthiness. The application supports a user in constructing the send item, and predetermined indicia are monitored that can be employed to detect that the user is in fact expending effort to construct the send item. The attestation unit authenticates the application to impart trust thereto, and when the user commands the application to send, a send attestation is constructed to accompany the send item. The send attestation is based on the monitored indicia and the authentication of the application and thereby the user interaction is described. The constructed send attestation is packaged with the constructed send item and the package is sent to the recipient. COPYRIGHT: (C)2006,JPO&NCIPI
    • 要解决的问题:结合从计算设备的应用向接收者发送发送项目的事实来描述用户交互。

      解决方案:计算设备在其上具有证明可信赖性的认证单元。 应用程序支持用户构建发送项目,并且监视可用于检测用户实际上花费构建发送项目的努力的预定标记。 认证单元对应用进行认证以赋予其信任,并且当用户命令应用发送时,构建发送认证以伴随发送项目。 发送证明是基于被监视的标记和应用的认证,从而描述了用户交互。 构建的发送证明与构建的发送项目一起打包,并将包发送给收件人。 版权所有(C)2006,JPO&NCIPI

    • 4. 发明专利
    • Call sign
    • 电话号码
    • JP2006048654A
    • 2006-02-16
    • JP2005184991
    • 2005-06-24
    • Microsoft Corpマイクロソフト コーポレーション
    • HUITEMA CHRISTIAN FBENALOH JOSH DCAMERON KIM
    • G06F21/20H04L9/32
    • G06F21/46G06F21/31H04L9/3239
    • PROBLEM TO BE SOLVED: To provide a method of generating a call sign which is used for a peer-to-peer network, etc., and is short and easily memorized one security-protected by a cipher text. SOLUTION: The call sign is generated by determining a distinguished qualifier, finding a distinguished salt in which a result becomes a distinguished hash value starting from many zeros when it is hashed with a public key and a personalization information character string through encryption unidirectional function, hashing the distinguished salt with the distinguished qualifier consisting of the public key and the personalization information character string, finding the number of previous zeros from a has, taking out the number of bits from the hash and finding alphabetic character expression of bits of the number of previous zeros and the number of bits. COPYRIGHT: (C)2006,JPO&NCIPI
    • 要解决的问题:提供一种生成用于对等网络等的呼号的方法,并且被简短地容易地记住由密文进行安全保护的方法。 解决方案:通过确定一个区分的限定符来生成呼号,通过加密单向查找一个不同的盐,其中结果成为从多个零开始的多个零的公共密钥和个性化信息字符串 功能,用由公开密钥和个性化信息字符串组成的区分限定词散列不同的盐,从a中找出前一个零的数量,从散列中取出比特数并找出 前一个零数和位数。 版权所有(C)2006,JPO&NCIPI
    • 7. 发明申请
    • METHODS AND SYSTEMS OF PROTECTING DIGITAL CONTENT
    • 保护数字内容的方法和系统
    • WO0115162A2
    • 2001-03-01
    • PCT/US0022239
    • 2000-08-11
    • MICROSOFT CORP
    • BENALOH JOSH DROSEN ANDREW DYUVAL GIDEON A
    • G06F1/00G06F21/00G11B20/00H04L9/08H04L9/30
    • G06F21/10G06F2211/007G06F2221/0737G06F2221/0753G06F2221/2107G11B20/00086G11B20/0021H04L9/0825H04L2209/60H04L2209/606
    • Methods and systems are described that enable protection of digital content, such as movies and the like, by making pirated copies traceable back to a unique decryption key that was utilized to decrypt the originally encrypted content. The innovative advancements do not rely on post-distribution watermarking or fingerprinting techniques, and yet intrinsically link any unauthorized copies back to a unique cryptographic key or key collection that was used when the genuine copy was reproduced. In one embodiment, digital content is provided and comprises multiple partition sets, with each partition set comprising a first partition and at least one different version of the first partition. Each partition of each partition set is uniquely marked and encrypted with a different key. Individual unique key collections are then defined to contain, for each partition set, one key that was used to encrypt a partition from the partition set and no two key collections are identical. This means that each key collection can decrypt one unique version of the digital content. This unique version of the digital content is thus inextricably tied to the key collection that was utilized to decrypt the content. Each key collection is then encrypted with a different public key associated with one of multiple content players on which the digital content is to be played. Thus, each content player is inextricably associated with one key collection, and each key collection is inextricably associated with a unique version of the digital content. The digital content and one or more key collections can then be provided to the content players. When a content player decrypts its associated key collection and uses the key collection to decrypt the digital content, the version of the digital content that is decrypted points directly to the specific content player that was authorized to decrypt it with that key collection.
    • 描述了通过使盗版拷贝可追溯到用于解密原始加密内容的唯一解密密钥来实现数字内容(例如电影等)的保护的方法和系统。 创新的进步不依赖于后期分发水印或指纹技术,而是将任何未经授权的副本本质上链接到复制真实副本时使用的唯一加密密钥或密钥集合。 在一个实施例中,提供数字内容并且包括多个分区集合,其中每个分区集包括第一分区和第一分区的至少一个不同版本。 每个分区集的每个分区都用不同的密钥进行唯一标记和加密。 然后,将各个唯一的密钥集合定义为包含每个分区集一个用于从分区集加密分区的密钥,并且两个密钥集合是相同的。 这意味着每个密钥集合可以解密数字内容的一个唯一版本。 因此,数字内容的独特版本与用于解密内容的密钥集合密不可分。 然后,利用与要在其上播放数字内容的多个内容播放器中的一个相关联的不同的公钥来加密每个密钥集合。 因此,每个内容播放器与一个密钥集合不可分割地相关联,并且每个密钥集合与数字内容的唯一版本不可分割地相关联。 然后可以向内容播放器提供数字内容和一个或多个密钥集合。 当内容播放器解密其关联的密钥集合并使用密钥集合来解密数字内容时,被解密的数字内容的版本直接指向被该密钥集合被授权解密的特定内容播放器。