会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 4. 发明授权
    • Dynamic encoding algorithms and inline message decryption
    • 动态编码算法和内联消息解密
    • US07096355B1
    • 2006-08-22
    • US09923847
    • 2001-08-06
    • Maclen MarvitKeith David RosemaJeffrey UboisDavid MarvitDean BrettleYair ZadikStuart Goodnick
    • Maclen MarvitKeith David RosemaJeffrey UboisDavid MarvitDean BrettleYair ZadikStuart Goodnick
    • G06F17/30H04K1/00H04L9/00H04L9/14
    • H04L63/0428H04L9/083H04L9/0894H04L63/062H04L63/102
    • In general, data exchanged between users is protected using any of various encoding approaches. An example of encoding is encryption, but any kind of encoding may be used. The data used to encrypt the data exchanged between the users, referred to as a “key”, is maintained only in a key repository. Users must obtain a key from the key repository to either encode or decode, encrypt or decrypt data, after which the user's copy of the key is destroyed or otherwise rendered inoperable. A key management policy is employed to control access to the keys maintained by the key repository. Encoding algorithms may be dynamically changed over time. Users may negotiate different algorithms to be used with specific users or messages. Thus, different algorithms may be used between different sets of users depending upon what the member users of those sets negotiate among themselves. The frequency at which algorithms are changed may also be separately negotiated between users. The frequency may vary depending, for example, upon the perceived risk of intrusion by unauthorized third parties, the content of the messages being transmitted, or both. According to an inline message decryption approach, an encoded message is provided to a user in a form that enables the user's client to process the encoded message using conventional client tools and obtain the cleartext message. This eliminates the need for a user's client to be aware of the particular encoding algorithm used to encode the message. Various embodiments of the inline message decryption approach include: a) in-situ decryption; b) remote decryption; and c) data uploading. An approach is also provided for exchanging data between nodes in a network using sets of associated URLs.
    • 通常,使用各种编码方法中的任何一种来保护用户之间交换的数据。 编码的示例是加密,但是可以使用任何类型的编码。 用于加密用户之间交换的数据的数据(称为“密钥”)仅在密钥库中维护。 用户必须从密钥存储库获取密钥以对数据进行编码或解码,加密或解密,之后用户的密钥拷贝被销毁或以其他方式使其无法操作。 采用密钥管理策略来控制对密钥存储库维护的密钥的访问。 编码算法可能随时间动态地改变。 用户可以协商不同的算法以与特定用户或消息一起使用。 因此,不同的用户组之间可能会使用不同的算法,这取决于这些用户的成员用户在它们之间进行协商。 算法改变的频率也可以在用户之间单独协商。 频率可以例如根据感知到的未经授权的第三方入侵的风险,正在发送的消息的内容或两者而变化。 根据内联消息解密方法,以使得用户的客户端能够使用常规客户端工具处理编码消息并获得明文消息的形式向用户提供编码消息。 这消除了用户客户端需要知道用于编码消息的特定编码算法的需要。 内联消息解密方法的各种实施例包括:a)原位解密; b)远程解密; 和c)数据上传。 还提供了一种用于在网络中的节点之间使用相关联的URL集合来交换数据的方法。
    • 5. 发明授权
    • Controlling and tracking access to disseminated information
    • 控制和跟踪传播信息的访问
    • US07246378B1
    • 2007-07-17
    • US10655680
    • 2003-09-04
    • Maclen MarvitKeith David RosemaJeffrey UboisDavid Marvit
    • Maclen MarvitKeith David RosemaJeffrey UboisDavid Marvit
    • H04L9/00
    • H04L63/0428H04L9/083H04L9/0891H04L9/3247H04L51/34H04L63/0464H04L63/062H04L63/102H04L2209/60H04L2209/80
    • A method for controlling and tracking access to disseminated information involves encrypting data using a key that is maintained in a key repository. A user requests a message ID and key from the key repository. The key repository issues a message ID and key to the user. The user generates an encrypted message using the key. The encrypted message is then distributed with the message ID to one or more recipients. To read the encrypted message, a particular recipient obtains the key for the message from the key repository by providing the message ID to the key repository. The particular recipient then decrypts the message using the key provided by the key repository. Messages are deleted, in the sense of becoming unusable, by deleting the corresponding key from the key repository. A log is provided to track key repository activity including the issuance of keys and key requests from message recipients. A policy manager is employed to control which recipients are granted keys to read messages and which messages are deleted.
    • 用于控制和跟踪对传播信息的访问的方法涉及使用在密钥库中维护的密钥加密数据。 用户从密钥库中请求消息ID和密钥。 密钥存储库向用户发出消息ID和密钥。 用户使用密钥生成加密消息。 然后将加密的消息与消息ID一起分发给一个或多个接收者。 为了读取加密的消息,特定的接收者通过向密钥库提供消息ID来从密钥存储库获得消息的密钥。 然后特定的接收者使用密钥存储库提供的密钥对消息进行解密。 通过从密钥存储库中删除相应的密钥,消息被删除,在无法使用的意义上。 提供日志以跟踪密钥存储库活动,包括发送邮件收件人的密钥和密钥请求。 采用策略管理器来控制哪些接收者被授予密钥以读取消息以及哪些消息被删除。
    • 6. 发明授权
    • Controlling and tracking access to disseminated information
    • 控制和跟踪传播信息的访问
    • US06625734B1
    • 2003-09-23
    • US09300085
    • 1999-04-26
    • Maclen MarvitKeith David RosemaJeffrey UboisDavid Marvit
    • Maclen MarvitKeith David RosemaJeffrey UboisDavid Marvit
    • H04L900
    • H04L63/0428H04L9/083H04L9/0891H04L9/3247H04L51/34H04L63/0464H04L63/062H04L63/102H04L2209/60H04L2209/80
    • A method for controlling and tracking access to disseminated information involves encrypting data using a key that is maintained in a key repository. A user requests a message ID and key from the key repository. The key repository issues a message ID and key to the user. The user generates an encrypted message using the key. The encrypted message is then distributed with the message ID to one or more recipients. To read the encrypted message, a particular recipient obtains the key for the message from the key repository by providing the message ID to the key repository. The particular recipient then decrypts the message using the key provided by the key repository. Messages are deleted, in the sense of becoming unusable, by deleting the corresponding key from the key repository. A log is provided to track key repository activity including the issuance of keys and key requests from message recipients. A policy manager is employed to control which recipients are granted keys to read messages and which messages are deleted.
    • 用于控制和跟踪对传播信息的访问的方法涉及使用在密钥库中维护的密钥加密数据。 用户从密钥库中请求消息ID和密钥。 密钥存储库向用户发出消息ID和密钥。 用户使用密钥生成加密消息。 然后将加密的消息与消息ID一起分发给一个或多个接收者。 为了读取加密的消息,特定的接收者通过向密钥库提供消息ID来从密钥存储库获得消息的密钥。 然后特定的接收者使用密钥存储库提供的密钥对消息进行解密。 通过从密钥存储库中删除相应的密钥,消息被删除,在无法使用的意义上。 提供日志以跟踪密钥存储库活动,包括发送邮件收件人的密钥和密钥请求。 采用策略管理器来控制哪些接收者被授予密钥以读取消息以及哪些消息被删除。