会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明授权
    • Open information based access control method
    • 基于开放信息的访问控制方法
    • US07228561B2
    • 2007-06-05
    • US10109896
    • 2002-04-01
    • Shigetoshi SameshimaKatsumi KawanoMotohisa FunabashiNobuhisa KobayashiToshihiko Nakano
    • Shigetoshi SameshimaKatsumi KawanoMotohisa FunabashiNobuhisa KobayashiToshihiko Nakano
    • G04L9/32G06F15/16G06F15/173G06F17/30
    • G05B19/0425G05B2219/24167
    • In distributed system for operating devices in association with one another, a device responsible for determining whether or not an access is permitted, and criteria for determination are hidden from accessing device or user, and flexible access control is provided among devices without need for previously defining accessible devices or user's identifiers. Communication process opens data communications which are interactions between devices to permit indefinite number of other devices to monitor data. A behavior monitoring process acquires interaction within particular device or between other devices in system for storage in behavior log table. Access control process matches the behavior log table with access control policy to determine whether or not device should be associated with target device from which process request is received, or with a target device to which a process program of the particular device attempts to access.
    • 在用于相互关联的操作设备的分布式系统中,负责确定是否允许访问的设备和确定标准被隐藏以访问设备或用户,并且在设备之间提供灵活的访问控制,而不需要先前定义 可访问设备或用户标识符。 通信过程打开数据通信,这些设备是设备之间的互动,以允许其他设备无限期地监视数据。 行为监视过程获取特定设备内或系统中其他设备之间的交互以存储在行为日志表中。 访问控制过程将行为日志表与访问控制策略相匹配,以确定设备是否应与从其接收到过程请求的目标设备相关联,或与特定设备的进程程序尝试访问的目标设备相关联。
    • 4. 发明授权
    • System and method for presenting copy protected content to a user
    • 用于向用户呈现受保护内容的系统和方法
    • US07363510B2
    • 2008-04-22
    • US10854936
    • 2004-05-26
    • Frederick S. Bobrow
    • Frederick S. Bobrow
    • G06F11/30G06F12/14G04L9/32
    • G06F21/10G06F21/78G06F2221/0797G06F2221/2153
    • A device for presenting content to a user is utilized in combination with a general purpose computer. The computer has a processor, a computer communications interface, a computer memory and an operating system. The operating system has one or more file management tools. The device has a housing, a device communications interface and a device memory. The device memory comprises a boot partition which includes boot software. The boot software is copied from the device into the computer memory and is executed from the computer memory by the processor. The device memory also comprises a secure partition inaccessible by the file management tools and having content stored thereon. The device memory also comprises content delivery software, which is copied to the computer memory, and when executed by the processor from the computer memory can access the content from the secure partition and present it to the user as sensory data.
    • 与通用计算机结合使用用于向用户呈现内容的设备。 计算机具有处理器,计算机通信接口,计算机存储器和操作系统。 操作系统有一个或多个文件管理工具。 该设备具有壳体,设备通信接口和设备存储器。 设备存储器包括引导分区,其包括引导软件。 引导软件从设备复制到计算机存储器中,并由处理器从计算机存储器执行。 设备存储器还包括由文件管理工具不可访问并具有存储在其上的内容的安全分区。 设备存储器还包括内容传送软件,其被复制到计算机存储器中,并且当来自计算机存储器的处理器执行时可以从安全分区访问内容并将其作为感觉数据呈现给用户。
    • 5. 发明授权
    • Method and system for authentication of a low-resource prover
    • 低资源证明者的认证方法和系统
    • US08412937B2
    • 2013-04-02
    • US12097404
    • 2006-11-27
    • Stefan Jean MaubachClaudine Viegas ConradoGeert Jan Schrijen
    • Stefan Jean MaubachClaudine Viegas ConradoGeert Jan Schrijen
    • G04L9/32
    • H04L9/3026H04L9/0844H04L2209/805
    • A method is presented for enabling authentication of a prover in a Radio Frequency Identification system comprising the prover and a verifier, the method comprising the steps of: the prover sending a prover identifier and a parent identifier to the verifier, the verifier sending a verifier identifier to the prover, the prover calculating a first common secret by means of a prover polynomial, where an unknown in the prover polynomial is substituted by a result calculated using a function of at least the verifier identifier, and the verifier calculating the first common secret by means of a first verifier polynomial, wherein a first unknown in the first verifier polynomial is substituted by the prover identifier and a second unknown in the first verifier polynomial is substituted by the parent identifier, the prover creating a first message by modulating a first core secret with regard to at least the first common secret, aid prover sending the first message to the verifier, and the verifier creating a first candidate for the first core secret by demodulating the first message with the first common secret, whereby the candidate for the first core secret is for use in the authentication. This allows the verifier and prover to independently create a common secret, used for modulating the core secret. Furthermore, no pre-registration of the prover with the verifier is required and calculation using polynomials requires little processing power. A corresponding system, prover and verifier are also presented.
    • 提供了一种用于在包括证明者和验证者的射频识别系统中验证证明者的方法,所述方法包括以下步骤:证明者向验证者发送证明者标识符和父标识符,验证者发送验证者标识符 证明者通过证明者多项式计算第一公共秘密,其中证明者多项式中的未知数由使用至少验证者标识符的函数计算的结果代替,并且验证者通过以下方式计算第一公共秘密: 第一验证者多项式的手段,其中,所述第一验证者多项式中的第一未知数由所述证明者标识符代替,并且所述第一验证者多项式中的第二未知被所述父标识符代替,所述证明者通过调制第一核心秘密来创建第一消息 至少第一个共同的秘密,援助证明者发送第一个消息给验证者,和veri 通过用第一公共秘密解调第一消息来创建第一核心秘密的第一候选者,由此第一核心秘密的候选者用于认证。 这允许验证者和证明者独立地创建一个共同的秘密,用于调制核心秘密。 此外,不需要具有验证者的证明者的预注册,并且使用多项式的计算需要很少的处理能力。 还提出了相应的系统,证明者和验证者。