会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 11. 发明申请
    • NETWORK HAVING QUANTUM KEY DISTRIBUTION
    • 具有量子键分配的网络
    • US20100299526A1
    • 2010-11-25
    • US12863483
    • 2009-01-23
    • Simon Robert WisemanBrian Sinclair Lowans
    • Simon Robert WisemanBrian Sinclair Lowans
    • H04L9/32
    • H04L63/061H04L9/0855
    • A method of performing quantum key distribution across a network. The method involves a first node first agreeing a quantum key with a first intermediate node in the path. Next the intermediate node exchanges a quantum signal with the next node in the path—which is a targeted node. The intermediate node communicates with the first node using the previous established quantum key details of the quantum signal sent or received by the intermediate node. The first node then performs a key agreement step to agree a quantum key directly with the targeted node. Having established a quantum key with the current targeted node the method can be repeated but with the next node in the network path as the targeted node until a destination node is reached. The final quantum key agreed with the destination node can then be used for encrypting communication between those nodes across the network.
    • 一种在网络上执行量子密钥分发的方法。 该方法涉及第一节点首先使量子密钥与路径中的第一中间节点同意。 接下来,中间节点与作为目标节点的路径中的下一个节点交换量子信号。 中间节点使用先前建立的由中间节点发送或接收的量子信号的量子密钥细节与第一节点通信。 然后第一个节点执行密钥协商步骤,直接与目标节点达成一个量子密钥。 通过与当前目标节点建立量子密钥,可以重复该方法,但将网络路径中的下一个节点作为目标节点,直到到达目标节点。 与目的地节点同意的最终量子密钥然后可以用于加密跨网络的那些节点之间的通信。
    • 16. 发明申请
    • QUANTUM KEY DISTRIBUTION INVOLVING MOVEABLE KEY DEVICE
    • 涉及移动钥匙装置的量子钥匙分配
    • US20110064222A1
    • 2011-03-17
    • US12992695
    • 2009-05-15
    • Simon Robert Wiseman
    • Simon Robert Wiseman
    • H04L9/08H04L9/00
    • H04L9/0833H04L9/0827H04L9/0852H04L9/0861
    • A method of key distribution from a first entity to a second entity including the first entity communicating with a moveable key device so as to share a secret data with said moveable key device, relocating said moveable key device to a location having a quantum link with said second entity, transmitting a quantum signal from said moveable key device to said second entity on said quantum link, the quantum signal being based on said secret data; and said first entity and said second entity undertaking key agreement based on the quantum signal received by the second entity. Such a method allows the principles of quantum key distribution to be applied even in the absence of a suitable quantum communications link between the first and second entities.
    • 一种从第一实体到第二实体的密钥分配方法,包括与可移动密钥设备通信的第一实体,以便与所述可移动密钥设备共享秘密数据,将所述可移动密钥设备重定位到具有与所述可移动密钥设备的量子链路的位置 将量子信号从所述可移动密钥装置发送到所述量子链路上的所述第二实体,所述量子信号基于所述秘密数据; 并且所述第一实体和所述第二实体基于由第二实体接收的量子信号进行密钥协商。 这种方法允许即使在第一和第二实体之间没有合适的量子通信链路的情况下也应用量子密钥分配的原理。
    • 17. 发明授权
    • Computer system protection
    • 电脑系统保护
    • US07398400B2
    • 2008-07-08
    • US10466141
    • 2001-12-24
    • Simon Robert Wiseman
    • Simon Robert Wiseman
    • G06F12/14
    • G06F21/53G06F21/51G06F21/562
    • Computer system protection to protect against harmful data from an external computer network (60) (e.g. the Internet) involves supplying incoming data (62) to a software checker (64) as the data enters a computer system (not shown). The checker (64) routes any suspect data (66) to an encryptor (68) which encrypts it to render it unusable and harmless. Encrypted data passes to a computer (72) in an internal network (74) and having a desktop quarantine area or sandbox (76) for suspect data. The computer (72) runs main desktop applications (78) receiving encrypted data (70) for storage and transfer, but not for use in any meaningful way because it is encrypted. Equally well applications (78) cannot be interfered with by encrypted data (70) because encryption makes this impossible. On entry into the sandbox (76), the encrypted data (70) is decrypted to usable form it then becomes accessible by software (204) suitable for use in the sandbox (76) subject to sandbox constraints.
    • 计算机系统保护以防止来自外部计算机网络(60)(例如因特网)的有害数据涉及当数据进入计算机系统(未示出)时将输入数据(62)提供给软件检查器(64)。 检查器(64)将任何可疑数据(66)路由到加密器(68),加密器(68)使其不可用和无害化。 加密的数据传递到内部网络(74)中的计算机(72),并具有用于可疑数据的桌面隔离区域或沙箱(76)。 计算机(72)运行接收用于存储和传送的加密数据(70)的主桌面应用程序(78),但是由于它被加密而不能以任何有意义的方式使用。 同样好的应用程序(78)不能受到加密数据的干扰(70),因为加密使得这不可能。 在进入沙箱(76)时,加密数据(70)被解密成可用的形式,然后可以通过软件(204)来访问,该软件适用于经受沙盒限制的沙箱(76)。
    • 18. 发明授权
    • Quantum key distribution involving moveable key device
    • 量子键分配涉及可移动键设备
    • US08755525B2
    • 2014-06-17
    • US12992695
    • 2009-05-15
    • Simon Robert Wiseman
    • Simon Robert Wiseman
    • H04L29/06G06F21/00H04L9/08G06F15/16H04L9/32H04L29/12G06Q99/00
    • H04L9/0833H04L9/0827H04L9/0852H04L9/0861
    • A method of key distribution from a first entity to a second entity including the first entity communicating with a moveable key device so as to share a secret data with said moveable key device, relocating said moveable key device to a location having a quantum link with said second entity, transmitting a quantum signal from said moveable key device to said second entity on said quantum link, the quantum signal being based on said secret data; and said first entity and said second entity undertaking key agreement based on the quantum signal received by the second entity. Such a method allows the principles of quantum key distribution to be applied even in the absence of a suitable quantum communications link between the first and second entities.
    • 一种从第一实体到第二实体的密钥分配方法,包括与可移动密钥设备通信的第一实体,以便与所述可移动密钥设备共享秘密数据,将所述可移动密钥设备重定位到具有与所述可移动密钥设备的量子链路的位置 将量子信号从所述可移动密钥装置发送到所述量子链路上的所述第二实体,所述量子信号基于所述秘密数据; 并且所述第一实体和所述第二实体基于由第二实体接收的量子信号进行密钥协商。 这种方法允许即使在第一和第二实体之间没有合适的量子通信链路的情况下也应用量子密钥分配的原理。
    • 20. 发明授权
    • Data content checking
    • 数据内容检查
    • US09195825B2
    • 2015-11-24
    • US13503264
    • 2010-10-20
    • Simon Robert WisemanKatherine Jane Hughes
    • Simon Robert WisemanKatherine Jane Hughes
    • G06F11/30G06F21/56
    • G06F21/56
    • A data content checker arrangement for protecting communication between a sensitive computer system (102) and an external computer system (104). The arrangement includes a store (108) connected to input and output sub-systems (106) and (114) and to content checkers (110) and (112) arranged in parallel. The input and output sub-systems (106) and (114) are connected to the external computer system (104) and the sensitive computer system (102) respectively. Data received from the external computer system (104) is encrypted by the input sub-system (106) using an encryption key to which the content checkers (110) and (112) have access. The content checkers (110) and (112) can therefore decrypt, read and check the data. If the data passes a content checker's checks, the checker digitally signs and stores it, decrypted, in the store (108); if the checks are not passed, the checker discards the data. The output sub-system (114) delivers data to the sensitive computer system (102) if the data has received both content checkers' digital signatures indicating acceptability.
    • 一种用于保护敏感计算机系统(102)和外部计算机系统(104)之间的通信的数据内容检查装置。 该装置包括连接到输入和输出子系统(106)和(114)的存储器(108)以及并行布置的内容检查器(110)和(112)。 输入和输出子系统(106)和(114)分别连接到外部计算机系统(104)和敏感计算机系统(102)。 由外部计算机系统(104)接收的数据由输入子系统(106)使用内容检查器(110)和(112)可访问的加密密钥进行加密。 内容检查器(110)和(112)因此可以解密,读取和检查数据。 如果数据通过内容检查器的检查,检验器将数字签名并存储在存储器中(108); 如果不通过检查,则检查器将丢弃数据。 如果数据已经接收到表示可接受性的内容检查器的数字签名,则输出子系统(114)将数据传送到敏感计算机系统(102)。