会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 5. 发明授权
    • Method and apparatus for correcting improper encryption and/or for reducing memory storage
    • 用于校正不正当加密和/或减少存储器存储的方法和装置
    • US06341164B1
    • 2002-01-22
    • US09120716
    • 1998-07-22
    • Lee DilkiePaul C. Van Oorschot
    • Lee DilkiePaul C. Van Oorschot
    • H04K900
    • H04L9/0825H04L9/0894H04L9/14
    • An apparatus and methods for facilitating an encryption process for use in systems employing cryptography based security, removes unnecessary data relating to encryption keys prior to storing the data after receipt of the encrypted information from a sender. Encrypted data, such as message data for multiple recipients, is analyzed to determine whether encryption related data for other recipients may be removed and/or whether a preferred encrypting process was used. In one embodiment, the apparatus and method also determines whether a non-preferred encryption process was used to encrypt encrypted data and re-encrypts the encrypted data with a different encryption process in response to detected non-preferred encryption key usage.
    • 一种用于促进在采用基于密码学的安全性的系统中使用的加密过程的装置和方法,在从发送者接收到加密的信息之后存储数据之前,去除与加密密钥有关的不必要的数据。 分析加密数据,例如多个收件人的消息数据,以确定是否可以删除其他收件人的加密相关数据和/或是否使用了优选的加密过程。 在一个实施例中,该装置和方法还确定是否使用非优选加密过程来加密加密数据,并且响应于检测到的非优选加密密钥使用,以不同的加密过程重新加密加密数据。
    • 6. 发明授权
    • Method and apparatus for centralizing processing of key and certificate
life cycle management
    • 密钥和证书生命周期管理集中处理的方法和装置
    • US6055636A
    • 2000-04-25
    • US13875
    • 1998-01-27
    • Stephen William HillierRamon Jonathan Lee DilkieGerrard Eric Rosenquist
    • Stephen William HillierRamon Jonathan Lee DilkieGerrard Eric Rosenquist
    • G06F21/31G06F12/14
    • G06F21/31G06F2211/008
    • A method and apparatus for centralizing the processing of key and certificate life-cycle management is accomplished when security activation of a communication device has been detected. Security activation may occur at log-on of the secure communication device (e.g., a personal computer equipped with a security application, or applications), at activation of a security application, or at re-authentication of a security application. Once the security activation has been detected, the secured communication device accesses a depository of security information to retrieve relevant security information. The secured communication device then interprets the relevant security information to determine when local security parameters are to be changed. When local security parameters (e.g., encryption key pair, a corresponding encryption public key certificate, a signing key pair, and/or a corresponding verification public key certificate) are to be changed, the local security parameters are updated. Having done this, the secured communication device is then receptive to receiving access requests from a plurality of software applications. The access requests are each requesting that data created by a corresponding one of the plurality of software application be secured via the security application. In response to the request, the data is secured based on either the updated local security parameters or the existing local security parameters.
    • 在检测到通信设备的安全激活时,实现了密钥和证书生命周期管理的处理集中的方法和装置。 安全激活可以在安全通信设备(例如,配备有安全应用或个人应用的个人计算机)的登录时,在激活安全应用程序时,或者在重新认证安全应用程序时发生。 一旦检测到安全激活,则安全通信设备访问安全信息存储器以检索相关的安全信息。 安全通信设备然后解释相关安全信息以确定何时改变本地安全参数。 当要改变本地安全性参数(例如,加密密钥对,对应的加密公钥证书,签名密钥对和/或相应的验证公开密钥证书)时,更新本地安全参数。 这样做之后,安全的通信设备接受来自多个软件应用的接收访问请求。 访问请求各自请求由多个软件应用程序中相应的一个应用程序创建的数据通过安全应用程序进行安全保护。 响应于该请求,基于更新的本地安全参数或现有的本地安全参数来保护数据。