会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 5. 发明授权
    • Anonymous electronic voting system and anonymous electronic voting method
    • 匿名电子投票系统和匿名电子投票法
    • US07694880B2
    • 2010-04-13
    • US10587665
    • 2005-01-18
    • Kengo MoriKazue Sako
    • Kengo MoriKazue Sako
    • G06F17/60
    • G07C13/00
    • A voting server transmits a list of plaintext and encrypted voting data obtained by encrypting the plaintext to a voter terminal, and the voter terminal a selected encrypted candidate name corresponding to the plaintext elected by the voter to an encryption server. The encryption server returns encrypted voting data obtained by re-encrypting the encrypted candidate name to the voter terminal, and the voter terminal transmits the encrypted voting data received from the encryption server for voting. Decryption of the encrypted voting data is performed by an anonymous decryption system. The voter terminal certifies the voter to an authentication server, and affixes a digital signature to the encrypted voting data based on a common-key authentication base, transmitting the same to the voting server.
    • 投票服务器将通过将明文加密获得的明文和加密投票数据的列表发送给选举人终端,并且选民终端将与选民所选择的明文相对应的选择的加密候选名称发送给加密服务器。 加密服务器返回通过将加密的候选名称重新加密到选民终端获得的加密投票数据,并且选举终端发送从加密服务器接收的加密投票数据进行投票。 加密的投票数据的解密由匿名解密系统执行。 选民终端向认证服务器证明投票人,并根据共同密钥认证基础将数字签名附加到加密的投票数据,并将其发送给投票服务器。
    • 8. 发明授权
    • Anonymous participation authority management system
    • 匿名参与权限管理系统
    • US07117368B2
    • 2006-10-03
    • US09765390
    • 2001-01-22
    • Kazue Sako
    • Kazue Sako
    • H04L9/00
    • H04L9/3257G06Q20/383H04L9/302H04L9/3255H04L2209/42H04L2209/463
    • A system allowing a participant to participate anonymously in a plurality of sessions but to be detected that the same participant has participated more than once in the same session is disclosed. The participant authorizes individual data using secret information depending on session-related information. The reception subsystem determines whether received data is anonymous participation data authorized by the participant subsystem and further determines whether anonymous signatures of arbitrary two pieces of anonymous participation data are signed by an identical participant subsystem. The anonymous signature may include data generated by raising a session-dependent base to a power dependent on the secret information.
    • 公开了允许参与者在多个会话中匿名参与但被检测到的同一参与者在同一会话中多次参与的系统。 参与者根据会话相关信息授权使用秘密信息的个人数据。 接收子系统确定接收到的数据是否是参与者子系统授权的匿名参与数据,并进一步确定任意两个匿名参与数据的匿名签名是否由相同的参与子系统签名。 匿名签名可以包括通过将依赖于会话的基础提升到取决于秘密信息的幂的数据。
    • 9. 发明授权
    • System and method for electronic bidding
    • US10797867B2
    • 2020-10-06
    • US12085923
    • 2006-11-29
    • Toshiyuki IsshikiKazue Sako
    • Toshiyuki IsshikiKazue Sako
    • H04L9/08G06Q30/08H04L9/30G06Q20/38
    • In an electronic bidding system and method, it is unnecessary to disclose to bidders a list of public keys matched to bid prices, and in which price secrecy may be proved. In a function of encryption of a bidding device 300, a public key is generated using a bid price and an IBE public key, based on an ID-Based Encryption (IBE) system having a bid value as an ID. IBE public key is obtained on combining a plurality of partial public keys matched to partial secret keys generated by a plural number of partial bid opening devices based on a combination condition enabling group decryption. A preset message for bidding is then encrypted. In a function of decryption of a bid opening device 400, a number of partial bid opening devices, which is in keeping with a satisfying number of the group decryption, perform calculations for decryption for winning bid value candidates, beginning from such candidate, the allowable bid value closest to the bid closing condition. Decrypted data obtained on combining the resulting output partial bid opening data are collated to the message for bidding to decide on winning bid value.
    • 10. 发明授权
    • Mix-net system
    • 混合网络系统
    • US08223973B2
    • 2012-07-17
    • US12684192
    • 2010-01-08
    • Jun FurukawaKazue Sako
    • Jun FurukawaKazue Sako
    • H04L9/00
    • H04L9/14H04L9/0825H04L9/3066H04L9/3218H04L9/3236H04L2209/463
    • Each participant apparatus (103) encrypts a plaintext by using a secret key of secret key cryptography, encrypts the encryption key by a public key, and sends the plaintext and public key to a substitution/decryption apparatus (112). With this processing, the limitation on the length of a ciphertext to be processed can be eliminated. In this invention, a verifiable proof text using a public key by each substitution/decryption apparatus is verified by a verification apparatus (109) by using the public key. If one of a plurality of organizations to decrypt and shuffle ciphertexts has not correctly executed the operation, a third party can specify it and prove that the specified organization is unauthorized.
    • 每个参与者装置(103)通过使用秘密密钥密码术的秘密密钥加密明文,通过公钥加密加密密钥,并将明文和公钥发送到替换/解密装置(112)。 通过该处理,可以消除对要处理的密文的长度的限制。 在本发明中,由验证装置(109)通过使用公开密钥对每个替换/解密装置使用公开密钥的可验证证明文本进行验证。 如果解密和解密密文的多个组织中的一个没有正确地执行该操作,则第三方可以指定它并且证明指定的组织是未授权的。