会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明申请
    • HIGHLY EFFICIENT SECRECY-PRESERVING PROOFS OF CORRECTNESS OF COMPUTATION
    • 高效率的分析保存计算的正确性
    • US20090327141A1
    • 2009-12-31
    • US12105508
    • 2008-04-18
    • Michael O. RabinRocco A. ServedioChristopher Thorpe
    • Michael O. RabinRocco A. ServedioChristopher Thorpe
    • G06Q20/00H04L9/28G06F7/58
    • H04L9/3218G06Q20/401G06Q30/0603G06Q40/04H04L9/008H04L2209/56
    • Presented are methods and systems for highly efficient proofs of correctness of computations that preserve secrecy of the input values and calculations. One embodiment includes a method for verifiably determining at least one output for a secrecy preserving computations where the method includes acts of calculating an output from submitted inputs according to an announced calculation, translating a value in the calculation into two components that are a randomized representation of that value, publishing commitments to the at least two components, revealing a portion of the randomized representation in response to a verification request, and enabling verification of the calculation of the output using the revealed portion of the randomized representation. According to one aspect of the secrecy preserving verification the numbers involved in the secrecy preserving calculation are represented by a randomly constructed representing pair. In another aspect, revealing one member of the pair allows for verification without compromising secrecy. In one embodiment, arrangement of the translation process ensures that in the verification only truly independently random numbers, or operations on them, are revealed and checked.
    • 提出的方法和系统可以高效地证明计算的正确性,保证了输入值和计算的保密性。 一个实施例包括一种用于可靠地确定至少一个输出用于保密保密计算的方法,其中该方法包括根据所宣布的计算来计算来自已提交的输入的输出的动作,将计算中的值转换为两个组分,这两个组分是随机表示 该价值,向至少两个组件发布承诺,显示响应于验证请求的随机化表示的一部分,以及使用随机化表示的显露部分来验证输出的计算。 根据秘密保存验证的一个方面,秘密保存计算中涉及的数字由随机构造的表示对表示。 在另一方面,揭示该对中的一个成员允许验证而不损害秘密。 在一个实施例中,翻译过程的布置确保在验证中仅真正独立地显示和检查随机数或其上的操作。
    • 4. 发明授权
    • Methods and apparatus for protecting information
    • US07073197B2
    • 2006-07-04
    • US10737079
    • 2003-12-16
    • Michael O. RabinDennis E. Shasha
    • Michael O. RabinDennis E. Shasha
    • G06F11/30
    • G06F21/10G06F2211/008G06F2221/0735G06F2221/0737G06F2221/0773G06F2221/0775G06F2221/2103G06F2221/2135G06F2221/2151
    • System, methods and apparatus are applicable to enable owners and vendors of software to protect their intellectual property and other rights in that software. The system also enables vendors or distributors of software to charge per-use for an instance of software. The system produces a unique, unforgeable, tag for every vendor supplied instance (copy) of specific software. Each user device is equipped with a supervising program that ensures, by use of the tag and other information, that no software instance will be used on the device in a manner infringing on the vendor, distributor, or software owner's rights. When installing or using a vendor-supplied software instance, the supervising program verifies the associated tag and stores the tag. When installing or using untagged software, the supervising program fingerprints selected portions of the software and stores the fingerprints. Software is used on a user's device through the supervising program which ensures proper use of the software. A vendor can submit a copy of infringing software to a guardian center which fingerprints appropriate portions of the infringing software. A user device's (104) supervising program periodically calls up, or can be called up, by the guardian center. During call-up, the supervising program can securely sends to the guardian center information about the use of the software instances associated with tags and fingerprints. The guardian center detects unauthorized use of software by comparison of current call-up data with records of past call-ups involving the same tags, and/or by comparing call-up supplied fingerprints with fingerprints of infringing software stored by the guardian center. The guardian center completes the call-up by enabling continued use of properly used software instances and generating appropriate punitive actions upon detection of improperly used software instances on the calling user's device. The data supplied by a supervising program during call-up is also employed by the guardian center to prepare data on usage by a user's device of vendor or distributor supplied software instances, for pay-per-use or pay-per-view billing.