会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Method, system and device for enabling delegation of authority and access control methods based on delegated authority
    • 方法,系统和设备,用于授权和基于授权的访问控制方法
    • US07516321B2
    • 2009-04-07
    • US10797715
    • 2004-03-08
    • Liqun ChenStephen James CraneCheh Goh
    • Liqun ChenStephen James CraneCheh Goh
    • H04L9/00
    • H04L9/0847H04L9/3073H04L2209/127H04L2209/38
    • A trusted authority delegates authority to a device. This delegation of authority is effected by providing a yet-to-be completed chain of public/private cryptographic key pairs linked in a subversion-resistant manner. The chain terminates with a penultimate key pair formed by public/private data, and a link towards an end key pair to be formed by an encryption/decryption key pair of an Identifier-Based Encryption, IBE, scheme. The private data is securely stored in the device for access only by an authorized key-generation process that forms the link to the end key pair and is arranged to provide the IBE decryption key generated using the private data and encryption key. This key generation/provision is normally only effected if at least one condition, for example specified in the encryption key, is satisfied. Such a condition may be one tested against data provided by the trusted authority and stored in the device.
    • 受信任的权威机构将权限委托给设备。 这种权力的授权是通过提供一个尚未完成的公开/私人加密密钥对链,以颠覆性的方式连接起来。 链终止于由公共/私有数据形成的倒数第二个密钥对,以及通过基于标识符的加密(IBE)方案的加密/解密密钥对形成的终端密钥对的链接。 专用数据被安全地存储在设备中,仅由形成到终端密钥对的链接的授权密钥生成过程访问,并且被设置为提供使用专用数据和加密密钥生成的IBE解密密钥。 这种密钥生成/提供通常仅在满足例如在加密密钥中指定的至少一个条件时才有效。 这样的条件可以针对由可信管理机构提供并存储在设备中的数据进行测试。
    • 2. 发明申请
    • Method, system and device for enabling delegation of authority and access control methods based on delegated authority
    • 方法,系统和设备,用于授权和基于授权的访问控制方法
    • US20050058294A1
    • 2005-03-17
    • US10797715
    • 2004-03-08
    • Liqun ChenStephen CraneCheh Goh
    • Liqun ChenStephen CraneCheh Goh
    • H04L9/08H04L9/30H04L9/00
    • H04L9/0847H04L9/3073H04L2209/127H04L2209/38
    • A trusted authority delegates authority to a device. This delegation of authority is effected by providing a yet-to-be completed chain of public/private cryptographic key pairs linked in a subversion-resistant manner. The chain terminates with a penultimate key pair formed by public/private data, and a link towards an end key pair to be formed by an encryption/decryption key pair of an Identifier-Based Encryption, IBE, scheme. The private data is securely stored in the device for access only by an authorized key-generation process that forms the link to the end key pair and is arranged to provide the IBE decryption key generated using the private data and encryption key. This key generation/provision is normally only effected if at least one condition, for example specified in the encryption key, is satisfied. Such a condition may be one tested against data provided by the trusted authority and stored in the device.
    • 受信任的权威机构将权限委托给设备。 这种权力的授权是通过提供一个尚未完成的公开/私人加密密钥对链,以颠覆性的方式连接起来。 链终止于由公共/私有数据形成的倒数第二个密钥对,以及通过基于标识符的加密(IBE)方案的加密/解密密钥对形成的终端密钥对的链接。 专用数据被安全地存储在设备中,仅由形成到终端密钥对的链接的授权密钥生成过程访问,并且被设置为提供使用专用数据和加密密钥生成的IBE解密密钥。 这种密钥生成/提供通常仅在满足例如在加密密钥中指定的至少一个条件时才有效。 这样的条件可以针对由可信管理机构提供并存储在设备中的数据进行测试。
    • 5. 发明授权
    • Secure data provision method and apparatus and data recovery method and system
    • 安全的数据提供方法和设备及数据恢复方法和系统
    • US07650498B2
    • 2010-01-19
    • US10825596
    • 2004-04-14
    • Cheh GohLiqun Chen
    • Cheh GohLiqun Chen
    • H04L29/06G06F7/04
    • G06F21/6245G06F19/00G16H10/60
    • To control access to target data whilst relieving the data provider of policing obligations, the data provider provides the target data in encrypted form to a requesting party as part of a data set with which first and second trusted authorities are associated in a non-subvertible manner. Recovery of the target data in clear by the party requires the first trusted authority to verify that a specific individual is a professional accredited with it, the second trusted authority to verify that a particular organisation is accredited with it, the particular organisation to verify that the specific individual is engaged by it, and at least one of the particular organisation and the first trusted authority to verify that the party is the specific individual. Various ways of encrypting the target data are provided, the preferred ways being based on Identifier-Based Encryption schemas.
    • 为了控制对目标数据的访问,同时缓解数据提供者的监管义务,数据提供者将加密形式的目标数据提供给请求方,作为数据集的一部分,第一和第二信任机构以不可颠覆的方式与之相关联 。 由缔约方明确恢复目标数据要求第一个受信任的机构核实具体个人是否是经过认证的专业人员,第二个受信任的机构核实特定组织是否被认证,特定机构要验证 具体个人由其参与,以及至少一个特定组织和第一个受信任的机构来验证该方是具体个人。 提供了加密目标数据的各种方法,优选的方式是基于基于标识符的加密模式。
    • 6. 发明申请
    • Secure data provision method and apparatus and data recovery method and system
    • 安全的数据提供方法和设备及数据恢复方法和系统
    • US20050010760A1
    • 2005-01-13
    • US10825596
    • 2004-04-14
    • Cheh GohLiqun Chen
    • Cheh GohLiqun Chen
    • G06F19/00G06F21/00G06F21/62H04L9/00
    • G06F21/6245G06F19/00G16H10/60
    • To control access to target data whilst relieving the data provider of policing obligations, the data provider provides the target data in encrypted form to a requesting party as part of a data set with which first and second trusted authorities are associated in a non-subvertible manner. Recovery of the target data in clear by the party requires the first trusted authority to verify that a specific individual is a professional accredited with it, the second trusted authority to verify that a particular organisation is accredited with it, the particular organisation to verify that the specific individual is engaged by it, and at least one of the particular organisation and the first trusted authority to verify that the party is the specific individual. Various ways of encrypting the target data are provided, the preferred ways being based on Identifier-Based Encryption schemas.
    • 为了控制对目标数据的访问,同时缓解数据提供者的监管义务,数据提供者将加密形式的目标数据提供给请求方,作为数据集的一部分,第一和第二信任机构以不可颠覆的方式与之相关联 。 由缔约方明确恢复目标数据要求第一个受信任的机构核实具体个人是否是经过认证的专业人员,第二个受信任的机构核实特定组织是否被认证,特定机构要验证 具体个人由其参与,以及至少一个特定组织和第一个受信任的机构来验证该方是具体个人。 提供了加密目标数据的各种方法,优选的方式是基于基于标识符的加密模式。
    • 9. 发明授权
    • Document management system and method
    • 文件管理系统和方法
    • US08364729B2
    • 2013-01-29
    • US13050888
    • 2011-03-17
    • Helen BalinskyLiqun ChenSteven J. Simske
    • Helen BalinskyLiqun ChenSteven J. Simske
    • G06F21/00
    • G06F17/2229G06F21/6227H04L9/14H04L2209/60
    • A document management system includes a document. One or more of a plurality of map-files of the document correspond(s) with a step of a multi-step workflow associated with the document. A random nonce is generated for each of the steps of the multi-step workflow except for an initial step of the multi-step workflow. Each of the random nonces i) is incorporated as a map-file entry into a respective one of the plurality of map-files corresponding with a step of the multi-step workflow that directly precedes the step of the multi-step workflow for which the random nonce is generated and ii) is used to perform a nonce-based initiating operation a respective one of the plurality of map-files corresponding with the step of the multi-step workflow for which the random nonce is generated.
    • 文件管理系统包括文件。 文档的多个地图文件中的一个或多个对应于具有与文档相关联的多步工作流的步骤。 为多步骤工作流程的每个步骤生成随机随机数,除了多步骤工作流程的初始步骤。 随机随机i)中的每一个被并入作为地图文件条目到与多步骤工作流的步骤相对应的多个地图文件中的相应一个,其直接在多步骤工作流的步骤之前,其中 生成随机随机数,并且ii)用于执行对应于生成随机随机数的多步骤工作流的步骤的多个映射文件中的相应一个映射文件的基于事件的发起操作。