会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 31. 发明申请
    • INFORMATION SECURITY BASED ON EIGENDECOMPOSITION
    • 基于信息安全的信息安全
    • US20150227747A1
    • 2015-08-13
    • US14694730
    • 2015-04-23
    • Donatello Gassi
    • Donatello Apelusion Gassi
    • G06F21/60G06F17/30
    • G06F21/602G06F16/122H04L9/0618H04L2209/20H04L2209/30
    • Described are various implementations using information security based on eigendecomposition. Eigendecomposition of the source data can result in a first part of the source data based on eigenvalues and a second part of the source data based on eigenvectors. The first part and the second part may be stored in separate file systems, may be used by collaborative applications, or may be shared using different medium. For example, an image may represent one part of the source data and may be combined with another part of the source data by a device with a camera. Collaborative applications may maintain separate parts of the source data and use eigencomposition to recover the source data during an active session.
    • 描述了使用基于特征分解的信息安全性的各种实现。 源数据的特征可以导致基于特征值的源数据的第一部分,以及基于特征向量的源数据的第二部分。 第一部分和第二部分可以存储在单独的文件系统中,可以由协作应用使用,或者可以使用不同的介质共享。 例如,图像可以表示源数据的一部分,并且可以通过具有相机的设备与源数据的另一部分组合。 协作应用程序可以维护源数据的单独部分,并使用特征组合在活动会话期间恢复源数据。
    • 34. 发明申请
    • COMPRESSING ENCRYPTED DATA WITHOUT THE ENCRYPTION KEY
    • 在加密密钥的情况下压缩加密数据
    • US20150156178A1
    • 2015-06-04
    • US14581055
    • 2014-12-23
    • International Business Machines Corporation
    • Camit HazayAshish JagmohanDemijan KlincHugo M. KrawczykTal Rabin
    • H04L29/06H04L9/08
    • H04L9/0637G06F2221/2107H04L9/0618H04L9/0819H04L9/32H04L63/0428H04L69/04H04L2209/24H04L2209/30
    • A method, system and computer program product are disclosed for compressing encrypted data, wherein the data is encrypted by using a block encryption algorithm in a chained mode of operation, and the encrypted data is comprised of a set of N encrypted blocks, C1 . . . CN. In one embodiment, the method comprises leaving block CN uncompressed, and compressing all of the blocks C1 . . . CN in a defined sequence using a Slepian-Wolf code. In an embodiment, the data is encrypted using an encryption key K, and the compressing includes compressing all of the blocks C1 . . . CN without using the encryption key. In one embodiment, the compressing includes outputting the blocks C1 . . . CN as a set of compressed blocks CmprC1 . . . CmprCN-1, and the method further comprises decrypting CN to generate a reconstructed block {tilde over (X)}n, and decrypting and decompressing the set of compressed blocks using {tilde over (X)}n.
    • 公开了一种用于压缩加密数据的方法,系统和计算机程序产品,其中通过使用链式操作模式中的块加密算法来加密数据,并且加密数据由一组N个加密块C1组成。 。 。 CN。 在一个实施例中,该方法包括将块CN未压缩,并压缩所有块C1。 。 。 CN以定义的顺序使用Slepian-Wolf代码。 在一个实施例中,使用加密密钥K对数据进行加密,并且压缩包括压缩所有块C1。 。 。 CN,而不使用加密密钥。 在一个实施例中,压缩包括输出块C1。 。 。 CN作为一组压缩块CmprC1。 。 。 CmprCN-1,并且所述方法还包括解密CN以生成重构块{(t)),并且使用{tilde over(X)} n来解密和解压缩该组压缩块。
    • 35. 发明授权
    • Authenticator, authenticatee and authentication method
    • 认证者,认证方和认证方式
    • US09049026B2
    • 2015-06-02
    • US14001577
    • 2011-09-26
    • Yuji NagaiTaku KatoHiroyuki Sakamoto
    • Yuji NagaiTaku KatoHiroyuki Sakamoto
    • H04L9/32H04N7/167
    • H04L9/32H04L9/3273H04L2209/30H04L2209/34H04L2209/60H04L2209/805
    • According to one embodiment, an authenticatee includes, a memory configured to store secret information XYmain, XYsub, and secret information XYmainE, XYsubE, a generation module configured to generate a random number A, a generation module configured to generate a random number D which is composed of at least a part of the generated random number A and a random number B which is received, a generation module configured to generate secret information XY based on the secret information XYmain, XYsub loaded from the memory, a calculating module configured to generate data C by executing a compression calculated operation with respect to at least a part of the random number D and the secret information XY, a generation module configured to generate data ν, and a bit-by-bit addition module configured to calculate an calculated result Z from the data ν and the data C.
    • 根据一个实施例,认证者包括存储器,被配置为存储秘密信息XYmain,XYsub和秘密信息XYmainE,XYsubE,被配置为生成随机数A的生成模块,生成模块,被配置为生成随机数D, 由所生成的随机数A的至少一部分和接收到的随机数B组成,生成模块,被配置为基于秘密信息XYmain生成秘密信息XY,从存储器加载的XYsub;计算模块,被配置为生成数据 通过相对于随机数D和秘密信息XY的至少一部分执行压缩计算的操作,生成模块被配置为生成数据&ngr;以及逐比特加法模块,被配置为计算计算结果 Z从数据&ngr 和数据C.
    • 36. 发明授权
    • Pattern-free encryption
    • 无模式加密
    • US09031227B2
    • 2015-05-12
    • US13380965
    • 2009-12-28
    • Yaacov BelenkyChaim D. Shen-Orr
    • Yaacov BelenkyChaim D. Shen-Orr
    • H04L29/06H04L9/06H04N21/2347
    • H04L9/0637H04L9/065H04L2209/30H04L2209/601H04N21/23476
    • A method is described for defining a reserved pattern of symbols, receiving in a crypto-module an input stream including sequential input symbols, applying a cipher to the input stream in the crypto-module so as to generate an intermediate stream including sequential output symbols corresponding respectively to the input symbols, and converting the intermediate stream to an output stream from the crypto-module by comparing successive groups of the input symbols and the corresponding output symbols to the reserved pattern and, upon finding a match to the reserved pattern in a given group, substituting the input symbols in the group into the intermediate stream in place of the corresponding output symbols. Related hardware and systems are also described.
    • 描述了一种用于定义保留符号模式的方法,在加密模块中接收包括顺序输入符号的输入流,将密码应用于密码模块中的输入流,以便生成包括相应的顺序输出符号的中间流 并且通过将输入符号和对应的输出符号的连续组进行比较,将所述中间流转换成来自所述密码模块的输出流,并且在找到与给定的所述保留模式中的所述保留模式匹配时 组,代替组中的输入符号代替相应的输出符号。 还描述了相关的硬件和系统。
    • 38. 发明申请
    • SINGLE-PASS DATA COMPRESSION AND ENCRYPTION
    • 单次数据压缩和加密
    • US20150067339A1
    • 2015-03-05
    • US14537806
    • 2014-11-10
    • Centri Technology, Inc.
    • Luis Gerardo ParisMichael Patrick Mackey
    • H04L29/06
    • H04L63/0457H04L9/0637H04L63/061H04L2209/30
    • Embodiments compress and encrypt data in a single pass to reduce inefficiencies that occur from compression and encrypting data separately. Typically, compression and encryption are implemented in separate functional units. This has a few disadvantages: 1) encryption cannot make use of compression state to further secure the message, 2) processed data is read and written twice, 3) additional space, time, and resources are consumed, and 4) it is more prone to potential cipher-attacks since the encryption stage is independent from compression. Embodiments overcome these disadvantages by structuring these operations so that both compression and encryption is executed within the same processing loop. Thus: 1) encryption is stronger due to the dependence on the compression state, 2) I/O buffers are accessed only once reducing overhead, 3) system footprint is reduced, and 4) cipher analysis is more complex since the decryption process cannot be separated from the decompression process.
    • 实施例在单次传递中压缩和加密数据,以降低压缩和分开加密数据所产生的低效率。 通常,压缩和加密在单独的功能单元中实现。 这有一些缺点:1)加密不能利用压缩状态来进一步保护消息,2)处理的数据被读取和写入两次,3)消耗额外的空间,时间和资源,4)更容易 由于加密阶段与压缩无关,因此可能发生密码攻击。 实施例通过构造这些操作来克服这些缺点,以便在相同的处理循环内执行压缩和加密。 因此:1)由于依赖于压缩状态,加密更强大,2)I / O缓冲区仅在一次减少开销时被访问,3)减少了系统占用空间,4)密码分析更复杂,因为解密过程不能 与减压过程分开。