会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • Verification of identity based signatures
    • 验证基于身份的签名
    • US20070028114A1
    • 2007-02-01
    • US11528630
    • 2006-09-28
    • Noel McCullaghMichael ScottNell Costigan
    • Noel McCullaghMichael ScottNell Costigan
    • H04L9/00
    • H04L9/3247H04L9/3073
    • A database management system (1) comprises up to fifty or more workstations (2), each for a user. The environment may, for example, be a hospital and the system manages medical records in a secure manner. Each user has a private key issued by a KGC (5). A database controller (3) updates a secure database (3) with data and associated signatures generated by the user workstations (2). Thus every record of the secure database (3) has a signature to provide full traceability and non-repudiation of data edits/updates. It -is important for the system (1) that the signatures are verified on a regular basis, say every hour. Such a task would be extremely processor-intensive if the database (3) is large. However this is performed by a verification processor (4) of the system (1) in a much shorter time than heretofore, t1+n(&Dgr;), where t1 is the time for one verification, n is the number of signatures, and &Dgr; is a time value which is a very small proportion of t1 (less than 1%).
    • 数据库管理系统(1)包括多达五十个或更多个工作站(2),每个工作站用于用户。 环境可以是例如医院,并且系统以安全的方式管理医疗记录。 每个用户都有一个由KGC发行的私钥(5)。 数据库控制器(3)用由用户工作站(2)生成的数据和相关联的签名来更新安全数据库(3)。 因此,安全数据库(3)的每个记录都具有签名,以提供数据编辑/更新的完全可追溯性和不可否认性。 它对于系统来说非常重要(1)每个小时都要定期验证签名。 如果数据库(3)很大,这样的任务将是极其处理器密集的。 然而,这是由系统(1)的验证处理器(4)在比迄今为止更短的时间内进行的,其中t 1> 1(n + 1) 是一次验证的时间,n是签名的数量,而Delta是t <1的非常小的比例(小于1%)的时间值。
    • 2. 发明授权
    • Verification of identity based signatures
    • 验证基于身份的签名
    • US08285996B2
    • 2012-10-09
    • US11528630
    • 2006-09-28
    • Noel McCullaghMichael ScottNeil Costigan
    • Noel McCullaghMichael ScottNeil Costigan
    • H04L29/06
    • H04L9/3247H04L9/3073
    • A database management system (1) comprises up to fifty or more workstations (2), each for a user. The environment may, for example, be a hospital and the system manages medical records in a secure manner. Each user has a private key issued by a KGC (5). A database controller (3) updates a secure database (3) with data and associated signatures generated by the user workstations (2). Thus every record of the secure database (3) has a signature to provide full traceability and non-repudiation of data edits/updates. It is important for the system (1) that the signatures are verified on a regular basis, say every hour. Such a task would be extremely processor-intensive if the database (3) is large. However this is performed by a verification processor (4) of the system (1) in a much shorter time than heretofore, t1+n(&Dgr;), where t1 is the time for one verification, n is the number of signatures, and &Dgr; is a time value which is a very small proportion of t1 (less than 1%).
    • 数据库管理系统(1)包括多达五十个或更多个工作站(2),每个工作站用于用户。 环境可以是例如医院,并且系统以安全的方式管理医疗记录。 每个用户都有一个由KGC发行的私钥(5)。 数据库控制器(3)用由用户工作站(2)生成的数据和相关联的签名来更新安全数据库(3)。 因此,安全数据库(3)的每个记录都具有签名,以提供数据编辑/更新的完全可追溯性和不可否认性。 对于系统(1)来说,重要的是定期验证签名,每小时说一次。 如果数据库(3)很大,这样的任务将是极其处理器密集的。 然而,这由系统(1)的验证处理器(4)在比之前短得多的时间t1 + n(&Dgr)中执行,其中t1是一次验证的时间,n是签名的数量,以及 &Dgr 是t1的非常小的比例(小于1%)的时间值。
    • 3. 发明授权
    • Identity based encryption
    • 基于身份的加密
    • US07860247B2
    • 2010-12-28
    • US11667555
    • 2005-11-14
    • Noel McCullaghMichael ScottNeil Costigan
    • Noel McCullaghMichael ScottNeil Costigan
    • H04L9/00H04L9/08H04L9/30H04L29/06H04L9/32H04K1/00G06F12/14
    • H04L9/3073
    • A method of performing IBE cryptography comprising the steps of a key generation server transmitting a master public key to a processor, the processor generating or retrieving a fresh master public key derived from the master public key transmitted by the key generation centre, and the processor using the fresh master public key to generate a public key for transmitting a message to a recipient device having a corresponding private key. The processor may store the fresh master public key in a read only memory for repeated use or it may dynamically generate it. To dynamically generate the fresh master public key the processor multiplies the original master public key by a curve co-factor. The processor may be incorporated into a hand-held card, and it may transfer information to a linked second processor for performing some of the calculations.
    • 一种执行IBE密码学的方法,包括以下步骤:向处理器发送主公钥的密钥生成服务器,所述处理器生成或检索由所述密钥生成中心发送的主公钥所导出的新的主公开密钥,所述处理器使用 新的主公共密钥,用于生成用于向具有相应私钥的接收方设备发送消息的公钥。 处理器可以将新鲜的主公钥存储在只读存储器中以供重复使用,或者可以动态生成它。 为了动态生成新的主公共密钥,处理器将原始主公共密钥乘以曲线辅因子。 处理器可以并入到手持卡中,并且它可以将信息传送到链接的第二处理器,以执行一些计算。
    • 8. 发明申请
    • Lawn mower
    • 割草机
    • US20070101692A1
    • 2007-05-10
    • US11270409
    • 2005-11-09
    • Dale BarlowMichael ScottRandy Hall
    • Dale BarlowMichael ScottRandy Hall
    • A01D34/00
    • A01D43/063
    • A lawn mower includes a cutting device placed underneath a mower deck housing that surrounds the cutting device. The lawn mower further comprises a grass outlet in the mower deck housing. The outlet is leading cut grass via a discharge chute to a bag where the grass is collected. The end of the discharge chute is provided with a door that closes the discharge chute when the bag is removed from the lawn mower. The door is rotatable around an axis parallel to the axial direction of the discharge chute and automatically rotated to not cover the end of the discharge chute when the bag is secured to the lawn mower.
    • 割草机包括一个切割装置,该切割装置放置在围绕切割装置的割草机甲板壳体的下面。 割草机还包括在割草机甲板外壳中的草地出口。 出口是通过排料槽将草切割成草地收集的袋子。 卸料槽的末端设有门,当袋子从割草机上取出时,门关闭排料槽。 该门可绕平行于排料槽的轴向的轴线旋转,并且当袋子固定到割草机上时,该门可自动转动而不覆盖卸料槽的端部。