会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明授权
    • Secure on-demand supply method and system and traffic type acquisition method
    • 安全的按需供应方式和系统和流量类型获取方法
    • US09356967B2
    • 2016-05-31
    • US14235926
    • 2012-05-30
    • Jianyong ChenXiaohua ChenZhaoji Lin
    • Jianyong ChenXiaohua ChenZhaoji Lin
    • H04L29/06H04L12/851
    • H04L63/20H04L47/2408H04L63/0227H04L63/0428H04L63/105H04L63/205
    • A secure on-demand supply method is disclosed. The method includes: a configuration parameter of a security function module is determined according to a security level set for requested traffic by a user, and/or an application scenario of a user terminal, and/or a traffic type; the security function module is configured by using the configuration parameter; and security protection is carried out on traffic data of the user. A traffic type acquisition method for protecting security of a specific user and/or traffic is disclosed. The method includes: a traffic identifier of data is acquired by using a traffic type classification function of a Quality of Service (QoS) function module, to protect the security of the specific user and/or traffic. The disclosure can provide various traffic security assurances according to security requirements of different users for different traffics.
    • 公开了一种安全的按需供应方法。 该方法包括:根据用户为所请求的流量设置的安全级别和/或用户终端的应用场景和/或流量类型来确定安全功能模块的配置参数; 安全功能模块通过配置参数进行配置; 并对用户的业务数据进行安全保护。 公开了一种用于保护特定用户和/或业务的安全性的流量类型获取方法。 该方法包括:通过使用服务质量(QoS)功能模块的业务类型分类功能获取数据的业务标识符,以保护特定用户和/或业务的安全性。 本公开可以根据不同用户对不同业务的安全要求提供各种业务安全保证。
    • 4. 发明申请
    • Secure on-demand supply method and system and traffic type acquisition method
    • 安全的按需供应方式和系统和流量类型获取方法
    • US20140196113A1
    • 2014-07-10
    • US14235926
    • 2012-05-30
    • Jianyong ChenXiaohua ChenZhaoji Lin
    • Jianyong ChenXiaohua ChenZhaoji Lin
    • H04L29/06
    • H04L63/20H04L47/2408H04L63/0227H04L63/0428H04L63/105H04L63/205
    • A secure on-demand supply method is disclosed. The method includes: a configuration parameter of a security function module is determined according to a security level set for requested traffic by a user, and/or an application scenario of a user terminal, and/or a traffic type; the security function module is configured by using the configuration parameter; and security protection is carried out on traffic data of the user. A traffic type acquisition method for protecting security of a specific user and/or traffic is disclosed. The method includes: a traffic identifier of data is acquired by using a traffic type classification function of a Quality of Service (QoS) function module, to protect the security of the specific user and/or traffic. A secure on-demand supply system and a traffic type acquisition method are disclosed. The disclosure can provide various traffic security assurances according to security requirements of different users for different traffics. The system of the disclosure satisfies security requirements of various users and various traffics, provides personalized security assurances for the users, and enhances user experience.
    • 公开了一种安全的按需供应方法。 该方法包括:根据用户为所请求的流量设置的安全级别和/或用户终端的应用场景和/或流量类型来确定安全功能模块的配置参数; 安全功能模块通过配置参数进行配置; 并对用户的业务数据进行安全保护。 公开了一种用于保护特定用户和/或业务的安全性的流量类型获取方法。 该方法包括:通过使用服务质量(QoS)功能模块的业务类型分类功能获取数据的业务标识符,以保护特定用户和/或业务的安全性。 公开了安全的点播供应系统和流量类型获取方法。 本公开可以根据不同用户对不同业务的安全要求提供各种业务安全保证。 本公开的系统满足各种用户和各种业务的安全需求,为用户提供个性化的安全保证,增强用户体验。
    • 9. 发明申请
    • Digital signature method based on braid groups conjugacy and verify method thereof
    • 基于编织组共轭的数字签名方法及其验证方法
    • US20070104322A1
    • 2007-05-10
    • US10579801
    • 2004-11-12
    • Yong DingJianyong ChenZhiwei Peng
    • Yong DingJianyong ChenZhiwei Peng
    • H04L9/28
    • H04L9/3073H04L9/302H04L9/3249H04L2209/68
    • The present invention discloses a digital signature scheme based on braid group conjugacy problem and a verifying method thereof, wherein the signatory S selects three braids xεLBm(l), x′εBn(l), aεBn(l), and considers braid pair (x′,x) as a public key of S, braid a as a private key of S; Signatory S uses hash function h for a message M needing signature to get y=h(M)εBn(l); generating a braid bεRBn−1−m(l) randomly, then signing the message M with the own private key a and the braid b generated randomly to obtain Sign(M)=a−1byb−1a; a signature verifying party V obtains the public key of S, calculating the message M by employing a system parameter hash function h, obtaining the y=h(M); judging whether sign(M) and y are conjugate or not, if not, sign(M) is an illegal signature, the verification fails; if yes, sign(M) is a legal signature of message M; the present invention avoids the problem of k-CSP in SCSS signature scheme of prior art, and improves the security of signature algorithm and reduces the number of braids involved and the number for conjugacy decision without reducing security, thereby improving the operation efficiency of signature.
    • 本发明公开了一种基于编织群共轭问题的数字签名方案及其验证方法,其中签名者S选择三个辫子bra B m SUB SUB SUB SUB SUB SUB SUB SUB SUB SUB (l),aepsilonB(1),并将辫子对(x',x)视为S的公钥,辫子a作为S的私钥; 签名者S使用哈希函数h来获得需要签名的消息M,以获得y = h(M)epsilonB(1); 随机生成辫子bepsilonRB n-1-m(l),然后用自己的私钥a签署消息M,随机生成辫子b以获得Sign(M)= a& 1 BYB -1; 签名验证方V获得S的公开密钥,通过采用系统参数散列函数h来计算消息M,获得y = h(M); 判断符号(M)和y是否是共轭的,如果不是,则(M)是非法签名,验证失败; 如果是,则(M)是消息M的合法签名; 本发明避免了现有技术的SCSS签名方案中的k-CSP问题,提高了签名算法的安全性,减少了涉及的辫子数量和共轭决定的数量,而不降低安全性,从而提高了签名的操作效率。