会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 32. 发明申请
    • SAVING AND RETRIEVING DATA BASED ON PUBLIC KEY ENCRYPTION
    • 根据公共密钥加密节省和检索数据
    • US20110119502A1
    • 2011-05-19
    • US13015403
    • 2011-01-27
    • Paul EnglandMarcus Peinado
    • Paul EnglandMarcus Peinado
    • G06F21/22
    • G06F21/6218
    • In accordance with certain aspects, bound key operations on ciphertext and/or data are implemented. A bound key operation can receive both data to be signed and a bound key blob that is bound to one or more processors, recover a private key from the bound key blob, and generate a digital signature over the data using the private key. A bound key operation can alternatively receive both ciphertext and a bound key or bound key structure bound to one or more processors, recover or reconstruct a private key based on the bound key or bound key structure, and use the private key to generate plaintext corresponding to the ciphertext.
    • 根据某些方面,实现对密文和/或数据的绑定关键操作。 绑定密钥操作可以接收要签名的数据和绑定到一个或多个处理器的绑定密钥blob,从绑定密钥blob中恢复私钥,并使用私钥在数据上生成数字签名。 绑定密钥操作可以替代地接收密文和绑定到一个或多个处理器的绑定密钥或绑定密钥结构,基于绑定密钥或绑定密钥结构恢复或重建私钥,并且使用私钥来生成对应于 密文。
    • 34. 发明授权
    • Transferring application secrets in a trusted operating system environment
    • 在受信任的操作系统环境中传送应用程序秘密
    • US07577839B2
    • 2009-08-18
    • US11068006
    • 2005-02-28
    • Paul EnglandMarcus PeinadoDaniel R. SimonJosh D. Benaloh
    • Paul EnglandMarcus PeinadoDaniel R. SimonJosh D. Benaloh
    • H04L9/00
    • G06F21/57G06F21/606
    • Transferring application secrets in a trusted operating system environment involves receiving a request to transfer application data from a source computing device to a destination computing device. A check is made as to whether the application data can be transferred to the destination computing device, and if so, whether the application data can be transferred under control of the user or a third party. If these checks succeed, a check is also made as to whether the destination computing device is a trustworthy device running known trustworthy software. Input is also received from the appropriate one of the user or third party to control transferring of the application data to the destination computing device. Furthermore, application data is stored on the source computing device in a manner that facilitates determining whether the application data can be transferred, and that facilitates transferring the application data if it can be transferred.
    • 在受信任的操作系统环境中传送应用程序秘密涉及接收将应用数据从源计算设备传送到目的地计算设备的请求。 检查应用数据是否可以传送到目的地计算设备,如果是,可以在用户或第三方的控制下传送应用数据。 如果这些检查成功,还要检查目的地计算设备是否是运行已知可靠软件的值得信赖的设备。 还从适当的用户或第三方接收输入以控制将应用数据传送到目的地计算设备。 此外,应用数据以便于确定是否可以传送应用数据的方式存储在源计算设备上,并且如果可以传送应用数据便于传送应用数据。
    • 38. 发明申请
    • RELEASING DECRYPTED DIGITAL CONTENT TO AN AUTHENTICATED PATH
    • 释放数字内容到认证路径
    • US20080021839A1
    • 2008-01-24
    • US11866041
    • 2007-10-02
    • Marcus PeinadoPaul EnglandFrank Yerrace
    • Marcus PeinadoPaul EnglandFrank Yerrace
    • H04L9/00
    • G06F21/10G06F2221/2107
    • Digital content is released to a rendering application for forwarding by such rendering application to an ultimate destination by way of a path therebetween. The path is defined by at least one module, and the digital content is initially in an encrypted form. An authentication of at least a portion of the path is performed to determine whether each defining module thereof is to be trusted to appropriately handle the digital content passing therethrough. The encrypted digital content is decrypted if in fact each such defining module is to be trusted, and the decrypted digital content is forwarded to the rendering application for further forwarding to the ultimate destination by way of the authenticated path.
    • 数字内容被释放到呈现应用程序,用于通过这些渲染应用程序之间的路径转发到最终目的地。 该路径由至少一个模块定义,数字内容最初是加密形式。 执行路径的至少一部分的认证,以确定其每个定义模块是否被信任以适当地处理通过其中的数字内容。 如果实际上每个这样的定义模块都被信任,则加密的数字内容被解密,并且解密的数字内容被转发到呈现应用程序,以便通过认证路径进一步转发到最终目的地。