会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 12. 发明授权
    • Scheme for information dispersal and reconstruction
    • 信息散布和重建计划
    • US5485474A
    • 1996-01-16
    • US702110
    • 1991-05-15
    • Michael O. Rabin
    • Michael O. Rabin
    • G06F11/00G06F11/08G06F11/10G11B20/18G11C29/00H03M13/00
    • H04L9/304G06F11/004G06F11/08G06F11/1008G06F11/1076G11B20/1833G11C29/88H04L2209/125H04L2209/26
    • Method and apparatus applicable to a variety of data storage, data communication, and parallel computing applications, efficiently improving information availability and load balancing. Information to be transmitted in a data signal or stored is represented as N elements of a field or computational structure, and dispersed among a set of n pieces that are to be transmitted or stored in a manner yielding no fewer than m pieces used in subsequent reconstruction.For dispersal, n vectors a.sub.i each having m elements are used and the n pieces are assembled from elements obtained as products of these vectors with m element groups taken from the N elements representing the information. For reconstruction from m available pieces, m m-element vectors .alpha..sub.i are derived from the vectors a.sub.i, and the N elements representing the information are obtained as products of these vectors with m-element groups taken from the pieces.The vector products may be implemented using an appropriate processor, including a vector processor, systolic array, or parallel processor.For fault-tolerant storage in a partitioned or distributed system, information is dispersed into n pieces so that any m suffice for reconstruction, and the pieces are stored in different parts of the medium.For fault-tolerant and congestion-free transmission of packets in a network or a parallel computer, each packet is dispersed into n pieces so that any m pieces suffice for reconstruction and the pieces are routed to the packet's destination along independent paths or at different times.
    • 适用于各种数据存储,数据通信和并行计算应用的方法和装置,有效提高信息可用性和负载平衡。 以数据信号或存储的信息发送的信息被表示为场或计算结构的N个元素,并分散在将以后续重构中使用的不少于m个片段的方式发送或存储的一组n个片段中 。 对于分散,使用具有m个元素的n个向量ai,并且n个片段从作为这些向量的乘积获得的元素组装,其中m个元素组取自表示信息的N个元素。 对于m个可用片段的重建,从向量ai导出m个元素向量αi,并且获得表示信息的N个元素作为这些向量的乘积,其中m个元素组取自该片段。 矢量产品可以使用适当的处理器来实现,包括矢量处理器,心脏收缩阵列或并行处理器。 对于分区或分布式系统中的容错存储,将信息分散成n个部分,以便任意一个m足以进行重构,并将这些部分存储在介质的不同部分。 对于在网络或并行计算机中的容错和无拥塞的传输,每个分组被分散成n个部分,使得任何m个部分足以进行重建,并且片段沿着独立的路径或不同的时间路由到分组的目的地 。
    • 14. 发明授权
    • Method and apparatus for time-lapse cryptography
    • 延时加密技术的方法和装置
    • US08526621B2
    • 2013-09-03
    • US12517088
    • 2007-11-30
    • Michael O. RabinChristopher A. Thorpe
    • Michael O. RabinChristopher A. Thorpe
    • H04L9/08
    • H04L9/085H04L2209/42H04L2209/463
    • In one embodiment, a Time-Lapse Cryptography Service is provided based on a network of parties. Senders encrypt their messages with this public key whose secret key is not known to anyone—not even a trusted third party—until a predefined and specific future time T+.delta., at which point the secret key is constructed and published. In one example, the secret key can only be known after it is constructed. At or after that time, anyone can decrypt the cipher text using this secret key. In one embodiment, a method for cryptographic encoding is provided, including generation of cryptographic key components by a plurality of parties, where participation of the parties is verified. A public key is constructed from a plurality of key components.
    • 在一个实施例中,基于各方网络来提供时间延迟加密服务。 发件人使用这个公钥加密他们的消息,其秘密密钥对任何人都不知道,甚至不是值得信赖的第三方 - 直到预定义和具体的未来时间T + .delta。此时,密钥被构建和发布。 在一个示例中,秘密密钥只有在构造之后才能被知道。 在此之前或之后,任何人都可以使用该秘密密钥对密文进行解密。 在一个实施例中,提供了一种用于加密编码的方法,包括由多个方生成加密密钥组件,其中确认了各方的参与。 公共密钥由多个关键部件构成。
    • 17. 发明申请
    • METHOD AND APPARATUS FOR TIME-LAPSE CRYPTOGRAPHY
    • 时间序列的方法和装置
    • US20100185863A1
    • 2010-07-22
    • US12517088
    • 2007-11-30
    • Michael O. RabinChristopher A. Thorpe
    • Michael O. RabinChristopher A. Thorpe
    • H04L9/08H04L9/32H04L9/14
    • H04L9/085H04L2209/42H04L2209/463
    • According to one aspect, provided is a construction and specification for an implementation of a new cryptographic primitive, “Time-Lapse Cryptography”, with which a sender can encrypt a message so that it is guaranteed to be revealed at an exact moment in the future, even if this revelation turns out to be undesirable to the sender. In one embodiment, a Time-Lapse Cryptography Service is provided (“the Service”) based on a network of parties. Senders encrypt their messages with this public key whose secret key is not known to anyone—not even a trusted third party—until a predefined and specific future time T+δ, at which point the secret key is constructed and published. In one example, the secret key can only be known after it is constructed. At or after that time, anyone can decrypt the cipher text using this secret key. Other embodiments describe other applications of such a service, for example, one embodiment is used in sealed bid auctions, others in insider stock sales, clinical trials, and electronic voting, among a variety of possible implementations. In one embodiment, a method for cryptographic encoding is provided, including generation of cryptographic key components by a plurality of parties, where participation of the parties is verified. A public key is constructed from a plurality of key components,
    • 根据一个方面,提供了一种用于实现新的密码原语“时间延迟密码术”的结构和规范,发送者可以通过这种加密原语对消息进行加密,从而保证在将来的确切时刻被揭示 即使这个启示对发件人来说是不合需要的。 在一个实施例中,基于各方的网络提供了时间延迟加密服务(“服务”)。 发件人使用这个公钥加密他们的消息,其秘密密钥对任何人都不知道,甚至不是可信第三方,直到预定义和特定的未来时间T +δ,此时构建和发布密钥。 在一个示例中,秘密密钥只有在构造之后才能被知道。 在此之前或之后,任何人都可以使用该秘密密钥对密文进行解密。 其他实施例描述了这种服务的其他应用,例如,在各种可能的实现中,一个实施例用于密封投标拍卖,其他内部股票销售,临床试验和电子投票。 在一个实施例中,提供了一种用于加密编码的方法,包括由多个方生成加密密钥组件,其中确认了各方的参与。 公钥由多个关键部件构成,
    • 18. 发明授权
    • Methods and apparatus for protecting information
    • US07131144B2
    • 2006-10-31
    • US10737077
    • 2003-12-16
    • Michael O. RabinDennis E. Shasha
    • Michael O. RabinDennis E. Shasha
    • G06F9/00
    • G06F21/10G06F2211/008G06F2221/0735G06F2221/0737G06F2221/0773G06F2221/0775G06F2221/2103G06F2221/2135G06F2221/2151
    • System, methods and apparatus are applicable to enable owners and vendors of software to protect their intellectual property and other rights in that software. The system also enables vendors or distributors of software to charge per-use for an instance of software. The system produces a unique, unforgeable, tag for every vendor supplied instance (copy) of specific software. Each user device is equipped with a supervising program that ensures, by use of the tag and other information, that no software instance will be used on the device in a manner infringing on the vendor, distributor, or software owner's rights. When installing or using a vendor-supplied software instance, the supervising program verifies the associated tag and stores the tag. When installing or using untagged software, the supervising program fingerprints selected portions of the software and stores the fingerprints. Software is used on a user's device through the supervising program which ensures proper use of the software. A vendor can submit a copy of infringing software to a guardian center which fingerprints appropriate portions of the infringing software. A user device's (104) supervising program periodically calls up, or can be called up, by the guardian center. During call-up, the supervising program can securely sends to the guardian center information about the use of the software instances associated with tags and fingerprints. The guardian center detects unauthorized use of software by comparison of current call-up data with records of past call-ups involving the same tags, and/or by comparing call-up supplied fingerprints with fingerprints of infringing software stored by the guardian center. The guardian center completes the call-up by enabling continued use of properly used software instances and generating appropriate punitive actions upon detection of improperly used software instances on the calling user's device. The data supplied by a supervising program during call-up is also employed by the guardian center to prepare data on usage by a user's device of vendor or distributor supplied software instances, for pay-per-use or pay-per-view billing.