会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Quantum repeater and system and method for creating extended entanglements
    • 量子中继器以及用于创建扩展纠缠的系统和方法
    • US09111229B2
    • 2015-08-18
    • US13378383
    • 2009-10-26
    • Keith HarrisonWilliam MunroKae Nemoto
    • Keith HarrisonWilliam MunroKae Nemoto
    • H04B10/02G06N99/00B82Y10/00H04L9/08H04L9/12
    • G06N99/002B82Y10/00H04L9/0855H04L9/12H04L2209/38
    • A method is provided of creating an end-to-end entanglement (87) between qubits in first and second end nodes (81, 82) of a chain of optically-coupled nodes whose intermediate nodes (80) are quantum repeaters. Local entanglements (85) are created on an on-going basis between qubits in neighboring pairs in the chain through interaction of the qubits with light fields transmitted between the nodes. The quantum repeaters (80) are cyclically operated with their top-level operating cycles being synchronized. Once every top-level operating cycle, each repeater (80) initiates a merging of two entanglements involving respective repeater qubits that are at least expected to be entangled with qubits in nodes disposed in opposite directions along the chain from the repeater. A quantum repeater (80) adapted for implementing this method is also provided.
    • 提供了一种在其中间节点(80)是量子中继器的光耦合节点链的第一和第二端节点(81,82)中的量子位之间产生端到端纠缠(87)的方法。 通过量子位与节点之间传输的光场的相互作用,在链中邻近对中的量子位之间在持续的基础上创建局部纠缠(85)。 量子中继器(80)在其顶级操作周期同步的情况下循环运行。 一旦每个顶级操作周期,每个中继器(80)启动涉及相关中继器量子位的两个纠缠的合并,这些纠错至少预期与沿着来自中继器的链路沿相反方向布置的节点中的量子比特纠缠。 还提供了适于实现该方法的量子中继器(80)。
    • 3. 发明申请
    • Quantum Repeater And System And Method For Creating Extended Entanglements
    • 量子中继器和系统以及创建扩展纠缠的方法
    • US20120148237A1
    • 2012-06-14
    • US13378383
    • 2009-10-26
    • Keith HarrisonWilliam MunroKae Nemoto
    • Keith HarrisonWilliam MunroKae Nemoto
    • H04B10/16H04B10/08
    • G06N99/002B82Y10/00H04L9/0855H04L9/12H04L2209/38
    • A method is provided of creating an end-to-end entanglement (87) between qubits in first and second end nodes (81, 82) of a chain of optically-coupled nodes whose intermediate nodes (80) are quantum repeaters. Local entanglements (85) are created on an on-going basis between qubits in neighbouring pairs in the chain through interaction of the qubits with light fields transmitted between the nodes. The quantum repeaters (80) are cyclically operated with their top-level operating cycles being synchronized. Once every top-level operating cycle, each repeater (80) initiates a merging of two entanglements involving respective repeater qubits that are at least expected to be entangled with qubits in nodes disposed in opposite directions along the chain from the repeater. A quantum repeater (80) adapted for implementing this method is also provided.
    • 提供了一种在其中间节点(80)是量子中继器的光耦合节点链的第一和第二端节点(81,82)中的量子位之间产生端到端纠缠(87)的方法。 通过量子位与节点之间传输的光场的相互作用,在链中邻近对中的量子位之间在持续的基础上创建局部纠缠(85)。 量子中继器(80)在其顶级操作周期同步的情况下循环运行。 一旦每个顶级操作周期,每个中继器(80)启动涉及相关中继器量子位的两个纠缠的合并,这些纠错至少预期与沿着来自中继器的链路沿相反方向布置的节点中的量子比特纠缠。 还提供了适于实现该方法的量子中继器(80)。
    • 4. 发明申请
    • Authentication Method And Apparatus Using One Time Pads
    • 使用一次性垫的认证方法和装置
    • US20110302421A1
    • 2011-12-08
    • US13202808
    • 2010-01-20
    • Keith HarrisonLiqun ChenWilliam Munro
    • Keith HarrisonLiqun ChenWilliam Munro
    • H04L9/32
    • H04L9/3271H04L9/3228
    • An authentication method is provided between entities (10A; 10B) having matching one-time pads each with multiple OTP blocks. From the standpoint of a first one (10A) of the entities, the method involves sending (20S) a challenge that it has generated (20) by subjecting a first OTP block to a randomly-selected member of a first family of hashing functions. Each member of the first hashing-function family is associated with a respective member of a second family of hashing functions. On receiving back a response, the first entity (10A) tests (26) whether the response originates from the second entity (10B) by seeking a match between the response and a reference value generated (25) by subjecting a predetermined said OTP block to the member of the second hashing-function family that is associated with the member of the first hashing-function family used to generate the challenge.
    • 在具有匹配的具有多个OTP块的一次性焊盘的实体(10A; 10B)之间提供认证方法。 从实体的第一个(10A)的观点来看,该方法涉及通过使第一OTP块经历第一散列函数族的随机选择的成员来发送(20S)已经生成的挑战(20)。 第一散列函数系列的每个成员与第二系列散列函数的相应成员相关联。 在接收到响应时,第一实体(10A)通过寻求通过使预定的所述OTP块对应于所述响应和参考值之间的匹配来生成(25)的匹配,来测试(26)响应是否源于第二实体(10B) 与第一个哈希函数族的成员相关联的第二个散列函数族的成员用于产生挑战。
    • 5. 发明申请
    • Error detection method and apparatus
    • 错误检测方法和装置
    • US20090113267A1
    • 2009-04-30
    • US12286492
    • 2008-09-30
    • Keith HarrisonWilliam Munro
    • Keith HarrisonWilliam Munro
    • G06F11/00
    • H03M13/1111H03M13/1108H03M13/37H04L9/0662H04L9/0858
    • To identify errored bits in a binary data set, an ordered plurality of modulo-2 summations of respective selections of the data-set bits are compared with a target syndrome. The selections of data-set bits are defined by the connection of sum nodes to variable nodes in a logical network of nodes and edges where each variable node is associated with a respective data-set bit and each sum node corresponds to a respective modulo-2 summation. Any sum node for which the corresponding summation of selected data-set bits is found to be inconsistent with the target syndrome is identified as errored. Predetermined patterns of errored sum nodes are then looked for to identify one or more associated errored data-set bits. The identified errored data-set bits can then be flipped to correct them
    • 为了识别二进制数据集中的错误比特,将数据集比特的各个选择的有序多个模2求和与目标综合征进行比较。 数据集比特的选择通过和节点到节点和边缘的逻辑网络中的可变节点的连接来定义,其中每个可变节点与相应的数据集比特相关联,并且每个和节点对应于相应的模2 总结。 发现与目标综合征不一致的所选数据集位的相应求和的任何和节点被识别为错误。 然后查找误差和节点的预定模式以识别一个或多个相关联的错误数据集位。 然后可以翻转所识别的错误数据集位以校正它们
    • 6. 发明申请
    • Method Of Updating Data
    • 更新数据的方法
    • US20080183999A1
    • 2008-07-31
    • US12019237
    • 2008-01-24
    • Helen BalinskyThomas RathboneLiqun ChenKeith Harrison
    • Helen BalinskyThomas RathboneLiqun ChenKeith Harrison
    • G06F12/14
    • G06F21/6209G06F21/606G06F21/77
    • A method of updating a data entry stored on a data storage unit, the data entry including data elements that are unique to the data storage unit and the data entry, the method comprising the steps of generating at the data storage unit an update request including the data entry for transmission to an authority authorised to update the data entry, extracting at the authority the unique data elements from the update request and verifying the authenticity of the data storage unit and data entry from the unique data elements, generating an updated data entry including a further data element unique to the updated data entry and derived from the updated data and transmitting the updated data entry to the data storage unit, and storing the updated data entry on the data storage unit.
    • 一种更新存储在数据存储单元上的数据条目的方法,所述数据条目包括对于数据存储单元和数据条目是唯一的数据元素,该方法包括以下步骤:在数据存储单元处生成包括 用于传输给授权更新数据条目的机构的数据条目,从授权机构提取来自更新请求的唯一数据元素,并从唯一数据元素验证数据存储单元的真实性和数据输入,生成更新的数据条目,包括 更新的数据条目唯一的另一个数据元素,并从更新的数据导出并将更新的数据条目发送到数据存储单元,并将更新的数据条目存储在数据存储单元上。
    • 8. 发明申请
    • Quantum key distribution method and apparatus
    • 量子密钥分发方法及装置
    • US20070014415A1
    • 2007-01-18
    • US11454632
    • 2006-06-16
    • Keith HarrisonWilliam MunroLiqun Chen
    • Keith HarrisonWilliam MunroLiqun Chen
    • H04K1/00H04L9/00
    • H04L9/0858G06F7/588
    • A quantum key distribution (QKD) method involves the sending of random data from a QKD transmitter to a QKD receiver over a quantum signal channel, and the QKD transmitter and receiver respectively processing the data transmitted and received over the quantum signal channel in order to seek to derive a common random data set. This processing is effected with the aid of messages exchanged between QKD transmitter and receiver over an insecure classical communication channel. The processing concludes with a check, effected by an exchange of authenticated messages over the classical communication channel, that the QKD transmitter and receiver have derived the same random data set. At least some of the other messages exchanged during processing are exchanged without authentication and integrity checking. A QKD transmitter and QKD receiver are also disclosed.
    • 量子密钥分配(QKD)方法涉及通过量子信道从QKD发射机向QKD接收机发送随机数据,并且QKD发射机和接收机分别处理通过量子信号信道发送和接收的数据,以寻找 以得出公共随机数据集。 借助于在不安全的经典通信信道上在QKD发射机和接收机之间交换的消息来实现该处理。 该处理结束于通过经典通信信道的认证消息交换实现的检验,即QKD发射机和接收机已经导出相同的随机数据集。 在处理期间交换的至少一些其他消息被交换,而不进行认证和完整性检查。 还公开了QKD发射机和QKD接收机。
    • 9. 发明申请
    • Cryptographic method and apparatus
    • 密码方法和装置
    • US20060013389A1
    • 2006-01-19
    • US11166921
    • 2005-06-23
    • Keith HarrisonLiqun Chen
    • Keith HarrisonLiqun Chen
    • H04L9/30
    • H04L9/3073H04L9/321H04L9/3247H04L2209/04
    • A cryptographic method and apparatus is provided in which an identifier-based encryption process is used to encrypt a message with an identifier string that specifies conditions to be checked by a trusted entity before providing a decrypted form of the encrypted message, or enabling its decryption. A further trusted entity is used to verify the identity of the message sender as indicated by a further identifier string, and to provide the sender with a secret key that the sender uses to generate complimentary signature components. These signature components are sent along with the encrypted message and are used, along with other data including the first identifier string and a public key of the further trusted entity, to authenticate the identity of the message sender.
    • 提供了一种加密方法和装置,其中使用基于标识符的加密过程来加密具有标识符串的消息,所述标识符字符串在提供加密消息的解密形式之前指定由受信任实体检查的条件,或使其能够进行解密。 另一受信任的实体用于验证由另外的标识符字符串指示的消息发送者的身份,并向发送者提供发送者用于生成互补签名组件的秘密密钥。 这些签名组件与加密消息一起发送,并与包括第一标识符串和另外可信实体的公开密钥的其他数据一起使用,以验证消息发送者的身份。
    • 10. 发明申请
    • Cryptographic method and apparatus
    • 密码方法和装置
    • US20050021973A1
    • 2005-01-27
    • US10831776
    • 2004-04-22
    • Liqun ChenMartin SadlerKeith Harrison
    • Liqun ChenMartin SadlerKeith Harrison
    • H04L9/08H04L9/30H04L9/32H04L9/00
    • H04L9/3242H04L9/0847H04L9/302H04L9/3073
    • First data is encrypted by a first party using an encryption key string formed using at least a hash value of the first data, this hash value being either in clear or in an encrypted form enabling its recovery in clear by a trusted party. The encrypted first data and the encryption key string are made available to a second party which forwards the encryption key string to the trusted party. The trusted party carries out at least one check on the basis of data contained in the encryption key string and, if the checks are satisfactory, provides a decryption key to the second party. Where the encryption key string comprises the hash value of the first data in encrypted form, the trusted party will typically decrypt the hash value and pass it to the second party to enable the latter to check the integrity of the first data.
    • 第一数据由第一方使用至少使用第一数据的散列值形成的加密密钥串进行加密,该散列值是清楚的或以加密的形式使得其被可信方清除。 加密的第一数据和加密密钥串可用于将加密密钥串转发给可信方的第二方。 受信任方根据包含在加密密钥串中的数据执行至少一个检查,并且如果检查令人满意,则向第二方提供解密密钥。 在加密密钥串包括加密形式的第一数据的哈希值的情况下,受信任方通常将对散列值进行解密,并将其传递给第二方,以使后者能够检查第一数据的完整性。