会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • 가시검증 가능한 키 교환 장치, 신뢰된 인증 기관을 이용한가시검증 가능한 키 교환 시스템, 그 방법 및 기록매체
    • 加入我们联系我们广告招贤纳士加入我们加入我们可以问题上关于我们登录或注册后才能继续浏览我们的站点提供反馈服务条款和条件隐私政策및및및록록록매
    • KR100874471B1
    • 2008-12-18
    • KR1020070017124
    • 2007-02-20
    • 고려대학교 산학협력단
    • 김범한홍종욱백정하이동훈임종인
    • H04L9/32H04L9/30H04L9/12
    • A visibly verifiable key exchange apparatus, a visibly verifiable key exchange system using a reliable authentication agent, and a method and recording medium thereof are provided to secure the anonymity of a user ID by using a picture of the user as the user ID. A visibly verifiable key exchange method includes the steps of: transmitting an encrypted picture of a user to a terminal of the other user(310), and receiving the encrypted picture of the other user from the terminal of the other user(320); and if the user and the other user check the picture of a counterpart(330), applying a session key which is generated by using the pictures of the user and the other user to the communication between the terminal of the user and the terminal of the other user(340). The communication applying step includes the steps of: displaying the picture of the counterpart on the terminal of the user and the terminal of the other user; and if a check button is pushed, deciding that the user and the other user check the picture of the counterpart.
    • 提供了一种可视验证密钥交换装置,一种使用可靠验证代理的可视验证密钥交换系统及其方法和记录介质,以通过使用用户的图片作为用户ID来保证用户ID的匿名性。 一种明显可验证的密钥交换方法,包括以下步骤:将用户的加密图片发送到另一用户的终端(310),并从另一用户的终端接收另一用户的加密图片(320); 并且如果用户和另一用户检查了对方的图片(330),则将通过使用用户和另一用户的图片生成的会话密钥应用于用户的终端与该用户的终端之间的通信 其他用户(340)。 通信应用步骤包括以下步骤:在用户的终端和其他用户的终端上显示对方的图片; 并且如果按下检查按钮,则确定用户和另一用户检查对方的图片。
    • 3. 发明公开
    • 가시검증 가능한 키 교환 장치, 신뢰된 인증 기관을 이용한가시검증 가능한 키 교환 시스템, 그 방법 및 기록매체
    • 用于人为可验证的认证密码协议的设备,使用密钥生成中心的人为可验证的认证密钥协议的方法和记录介质
    • KR1020080077500A
    • 2008-08-25
    • KR1020070017124
    • 2007-02-20
    • 고려대학교 산학협력단
    • 김범한홍종욱백정하이동훈임종인
    • H04L9/32H04L9/30H04L9/12
    • H04L9/0838H04L9/0819H04L9/0869H04L9/12H04L9/14H04L9/3073H04L9/321
    • A visibly verifiable key exchange apparatus, a visibly verifiable key exchange system using a reliable authentication agent, and a method and recording medium thereof are provided to secure the anonymity of a user ID by using a picture of the user as the user ID. A visibly verifiable key exchange method includes the steps of: transmitting an encrypted picture of a user to a terminal of the other user(310), and receiving the encrypted picture of the other user from the terminal of the other user(320); and if the user and the other user check the picture of a counterpart(330), applying a session key which is generated by using the pictures of the user and the other user to the communication between the terminal of the user and the terminal of the other user(340). The communication applying step includes the steps of: displaying the picture of the counterpart on the terminal of the user and the terminal of the other user; and if a check button is pushed, deciding that the user and the other user check the picture of the counterpart.
    • 提供可视验证的密钥交换装置,使用可靠认证代理的可视验证的密钥交换系统及其方法和记录介质,以通过使用用户的图片作为用户ID来确保用户ID的匿名性。 可视验证的密钥交换方法包括以下步骤:将用户的加密图片发送到另一用户的终端(310),并从另一用户的终端接收另一用户的加密图片(320); 并且如果用户和其他用户检查对方(330)的图片,则将通过使用用户和其他用户的图片生成的会话密钥应用于用户的终端与用户的终端之间的通信 其他用户(340)。 通信应用步骤包括以下步骤:在用户的终端和另一用户的终端上显示对方的图片; 并且如果按下检查按钮,则确定用户和其他用户检查对方的图片。
    • 4. 发明公开
    • 암호화된 데이터베이스 검색 방법 및 그 시스템
    • 搜索加密数据库的方法及其系统
    • KR1020080035295A
    • 2008-04-23
    • KR1020060101805
    • 2006-10-19
    • 고려대학교 산학협력단
    • 박현아홍종욱이유정이동훈임종인
    • G06F17/30G06F17/00G06F15/00
    • G06F17/30011G06F17/10G06F17/30477G06F17/30595G06F21/31H04L9/32
    • A method for searching information from an encrypted database and a system thereof are provided to perform systematic information management and efficient information search via hierarchical database access rights as well as to prevent information from being illegally used or abused. A method for searching information from an encrypted database comprises the following several steps. If an authenticated user inputs a document and a representative keyword for the document, a client encrypts the inputted document via a document encryption key, encrypts the inputted representative keyword via a search key, generates an index, and transmits the encrypted document and index to a server(210). The client determines whether a user authenticated in an arbitrary client inputs a keyword for a document to be searched(220). If so, the client generates a trapdoor by using the inputted keyword and the search key of the user, and sends a query to a server(225). The server searches for the encrypted document by using the trapdoor and the index and transmits the searched document to the client(230).
    • 提供了一种从加密数据库及其系统中搜索信息的方法,用于通过分层数据库访问权限执行系统信息管理和高效信息搜索,并防止信息被非法使用或滥用。 用于从加密数据库搜索信息的方法包括以下几个步骤。 如果经认证的用户输入文档的文档和代表关键字,则客户端通过文档加密密钥加密所输入的文档,经由搜索关键字对输入的代表关键字进行加密,生成索引,并将加密的文档和索引发送到 服务器(210)。 客户端确定在任意客户端中认证的用户是否输入要搜索的文档的关键字(220)。 如果是,则客户端通过使用输入的关键词和用户的搜索关键字生成一个陷门,并向服务器发送查询(225)。 服务器通过使用陷门和索引来搜索加密文档,并将搜索的文档发送给客户端(230)。