会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Identifying and coalescing identical objects encrypted with different keys
    • 识别和合并使用不同键加密的相同对象
    • US07574598B2
    • 2009-08-11
    • US11150801
    • 2005-06-10
    • John R. DouceurWilliam J. BoloskyMarvin M. Theimer
    • John R. DouceurWilliam J. BoloskyMarvin M. Theimer
    • H04L29/06
    • H04L9/3236H04L9/3247Y10S707/99953Y10S707/99955
    • Cryptographic protocols and methods of employing the same are described. The described protocols advantageously enable two or more identical encryptable objects that are coded for encryption with different keys to be identified as identical without access to either the unencrypted objects or the keys that are used in the encryption process. Additionally, the protocols enable two or more identical encryptable objects to be processed with different encryption keys, yet be stored in a manner so that the total required storage space is proportional to the space that is required to store a single encryptable object, plus a constant amount for each distinct encryption key. In various embodiments, the encryptable objects comprise files and the cryptographic protocols enable encrypted files to be used in connection with single instance store (SIS) systems.
    • 描述了使用它们的密码协议和方法。 所描述的协议有利地使得被编码用于具有不同密钥的加密的两个或更多个相同的可加密对象被识别为相同,而不访问加密过程中使用的未加密对象或密钥。 另外,这些协议允许使用不同的加密密钥来处理两个或多个相同的可加密对象,但是以一定的方式存储,使得所需的总存储空间与存储单个可加密对象所需的空间成正比,加上常数 每个不同加密密钥的数量。 在各种实施例中,可加密对象包括文件,并且加密协议使加密文件能够与单实例存储(SIS)系统相关联使用。
    • 3. 发明授权
    • Encryption systems and methods for identifying and coalescing identical objects encrypted with different keys
    • 用于识别和合并用不同密钥加密的相同对象的加密系统和方法
    • US06983365B1
    • 2006-01-03
    • US09565821
    • 2000-05-05
    • John R. DouceurWilliam J. BoloskyMarvin M. Theimer
    • John R. DouceurWilliam J. BoloskyMarvin M. Theimer
    • H04L9/00
    • H04L9/3236H04L9/3247Y10S707/99953Y10S707/99955
    • Cryptographic protocols and methods of employing the same are described. The described protocols advantageously enable two or more identical encryptable objects that are coded for encryption with different keys to be identified as identical without access to either the unencrypted objects or the keys that are used in the encryption process. Additionally, the protocols enable two or more identical encryptable objects to be processed with different encryption keys, yet be stored in a manner so that the total required storage space is proportional to the space that is required to store a single encryptable object, plus a constant amount for each distinct encryption key. In various embodiments, the encryptable objects comprise files and the cryptographic protocols enable encrypted files to be used in connection with single instance store (SIS) systems.
    • 描述了使用它们的密码协议和方法。 所描述的协议有利地使得被编码用于具有不同密钥的加密的两个或更多个相同的可加密对象被识别为相同,而不访问加密过程中使用的未加密对象或密钥。 另外,这些协议允许使用不同的加密密钥来处理两个或多个相同的可加密对象,但是以一定的方式存储,使得所需的总存储空间与存储单个可加密对象所需的空间成正比,加上常数 每个不同加密密钥的数量。 在各种实施例中,可加密对象包括文件,并且加密协议使加密文件能够与单实例存储(SIS)系统相关联使用。