会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 61. 发明授权
    • Cryptosystem based on a Jacobian of a curve
    • 基于雅可比曲线的加密系统
    • US07020776B2
    • 2006-03-28
    • US09886147
    • 2001-06-20
    • Kristin E. LauterPeter L. MontgomeryRamarathnam Venkatesan
    • Kristin E. LauterPeter L. MontgomeryRamarathnam Venkatesan
    • H04L9/00
    • H04L9/302H04L9/32H04L2209/20H04L2209/30
    • A cryptosystem has a secret based on an order of a group of points on a Jacobian of a curve. In certain embodiments, the cryptosystem is used to generate a product identifier corresponding to a particular product. The product identifier is generated by initially receiving a value associated with a copy (or copies) of a product. The received value is padded using a recognizable pattern, and the padded value is converted to a number represented by a particular number of bits. The number is then converted to an element of the Jacobian of the curve, and the element is then raised to a particular power. The result of raising the element to the particular power is then compressed and output as the product identifier. Subsequently, the encryption process can be reversed and the decrypted value used to indicate validity and/or authenticity of the product identifier.
    • 密码系统具有基于曲线雅可比的一组点的顺序的秘密。 在某些实施例中,密码系统用于生成对应于特定产品的产品标识符。 产品标识符是通过初始接收与产品的副本(或副本)相关联的值来生成的。 使用可识别的图案填充接收的值,并且将填充值转换为由特定位数表示的数字。 然后将该数字转换为曲线的雅可比元素,然后将元素升高到特定的功率。 然后将元件升高到特定功率的结果被压缩并作为产品标识符输出。 随后,可以反转加密处理,并且解密的值用于指示产品标识符的有效性和/或真实性。
    • 65. 发明申请
    • Unimodular matrix-based message authentication codes (MAC)
    • 基于矩阵的消息认证码(MAC)
    • US20050210260A1
    • 2005-09-22
    • US10803108
    • 2004-03-17
    • Ramarathnam VenkatesanMatthew Cary
    • Ramarathnam VenkatesanMatthew Cary
    • G06F12/00H04L9/32
    • H04L9/0643H04L2209/125H04L2209/38
    • The present invention leverages the invertibility of determinants of unimodular matrices to provide a universal hash function means with reversible properties and high speed performance. This provides, in one instance of the present invention, length controllable hash values comprised of vector pairs that can be processed as one instruction in a SIMD (single instruction, multiple data) equipped computational processor, where the vector pair is treated as a double word. The characteristics of the present invention permit its utilization in streaming cipher applications by providing key data to seed the ciphering process. Additionally, the present invention can utilize smaller key lengths than comparable mechanisms via inter-block chaining, can be utilized to double hash values via performing independent hash processes in parallel, and can be employed in applications, such as data integrity schemes, that require its unique processing characteristics.
    • 本发明利用单模矩阵的决定因素的可逆性来提供具有可逆特性和高速性能的通用散列函数装置。 这在本发明的一个实例中提供了长度可控的散列值,其包括可以被配置为SIMD(单指令,多数据)的计算处理器中的一个指令来处理的向量对,其中向量对被视为双字 。 本发明的特征允许其通过提供关键数据来加密加密过程来利用流密码应用程序。 此外,本发明可以通过块间链接利用比可比较的机制更小的密钥长度,可以通过并行执行独立散列过程来加倍散列值,并且可以用于需要其的应用中,例如数据完整性方案 独特的加工特性。
    • 69. 发明申请
    • Robust recognizer of perceptually similar content
    • 知觉相似内容的强大识别器
    • US20050022004A1
    • 2005-01-27
    • US10893771
    • 2004-07-16
    • M. MihcakRamarathnam Venkatesan
    • M. MihcakRamarathnam Venkatesan
    • G06K9/00H04L9/00
    • G06K9/00
    • An implementation of a technology is described herein for recognizing the perceptual similarity of the content of digital goods. At least one implementation, described herein, introduces a new hashing technique. More particularly, this hashing technique produces hash values for digital goods that are proximally near each other, when the digital goods contain perceptually similar content. In other words, if the content of digital goods are perceptually similar, then their hash values are, likewise, similar. The hash values are proximally near each other. This is unlike conventional hashing techniques where the hash values of goods with perceptually similar content are far apart with high probability in some distance sense (e.g., Hamming). This abstract itself is not intended to limit the scope of this patent. The scope of the present invention is pointed out in the appending claims.
    • 本文描述了一种用于识别数字商品内容的感知相似性的技术的实现。 这里描述的至少一个实现引入了新的散列技术。 更具体地说,当数字商品包含感知上相似的内容时,这种散列技术产生近似彼此接近的数字商品的哈希值。 换句话说,如果数字商品的内容在感觉上是相似的,那么它们的散列值也是类似的。 哈希值在近处彼此靠近。 这与传统的散列技术不同,其中具有感知相似内容的商品的哈希值在某种距离方面(例如,汉明)具有很高的概率。 本摘要本身并不旨在限制本专利的范围。 在所附权利要求中指出了本发明的范围。
    • 70. 发明授权
    • Technique for detecting a watermark in a marked image
    • 在标记图像中检测水印的技术
    • US06546114B1
    • 2003-04-08
    • US09390272
    • 1999-09-07
    • Ramarathnam VenkatesanMariusz JakubowskiThathachar S. Jayram
    • Ramarathnam VenkatesanMariusz JakubowskiThathachar S. Jayram
    • G06K900
    • G06T1/005G06T2201/0052G06T2201/0065G06T2201/0083H04N1/3216H04N1/32165H04N1/3217H04N1/32187H04N2201/3236
    • Apparatus and an accompanying method, for generating a cryptographic identifier for a non-marked image and embedding that identifier within the image itself in order to generate a “watermarked” image; for subsequently detecting that watermark in a test image; and the watermarked image so formed. First, pixel values for a non-marked image are transformed, either directly or after being enhanced, into a series of transform coefficients. A set of pseudo-random perturbation values which collectively constitute the watermark is determined wherein each of these values is heuristically selected, such that all these values collectively satisfy a plurality of different mathematical constraints and each such value preferably equals a relatively small value in a predefined range. These perturbation values are then added to the transform coefficients. Resulting perturbed coefficients are then inversely transformed back to pixel values to form the watermarked image. To detect whether a test image contains the watermark and hence is a copy of the watermarked image, the pixel values for the test image are transformed to yield transform coefficients. A plurality of different mathematical tests or a majority type rule is then used, in conjunction with the perturbation values, previously used to create the watermark, and these transform coefficients to determine whether the perturbation values collectively exist in the test image, and hence whether the watermark is present or not.
    • 用于生成未标记图像的加密标识符并将该标识符嵌入在图像本身内以便生成“加水印”图像的装置和附带方法; 用于随后在测试图像中检测该水印; 并且如此形成的水印图像。 首先,将未标记图像的像素值直接地或经过增强后变换为一系列变换系数。 确定共同构成水印的一组伪随机扰动值,其中这些值中的每一个被启发式地选择,使得所有这些值共同满足多个不同的数学约束,并且每个这样的值优选地等于预定义的 范围。 然后将这些扰动值加到变换系数中。 然后将产生的扰动系数反向变换回到像素值,以形成水印图像。 为了检测测试图像是否包含水印,因此是水印图像的副本,将测试图像的像素值进行变换以产生变换系数。 然后结合先前用于创建水印的扰动值,并且这些变换系数用于确定扰动值是否共同存在于测试图像中,因此使用多个不同的数学测试或多数类型规则,并且因此是否 水印存在与否。