会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Method and system for the accelerated decryption of cryptographically protected user data units
    • 加密解密密码保护用户数据单元的方法和系统
    • US09571273B2
    • 2017-02-14
    • US13508707
    • 2010-10-12
    • Michael BraunMarkus DichtlBernd Meyer
    • Michael BraunMarkus DichtlBernd Meyer
    • H04L29/06H04L9/08
    • H04L9/0825
    • A method and system for accelerated decryption of a cryptographically protected user data unit, wherein a transmitter initially generates a cryptographic key that is provided with a related key identification. The transmitter then performs asymmetrical encryption of the generated cryptographic key using a public cryptographic key and encryption of at least one user data unit using the generated cryptographic key. The encrypted user data unit, the asymmetrically encrypted cryptographic key and the related key identification of the cryptographic key are transported to a receiver that decrypts the received asymmetrically encrypted key using a private key, if verification of the received related key identification of the cryptographic key indicates the cryptographic key is not present in a decrypted state in the receiver. The receiver then decrypts the received cryptographically encrypted user data unit using the cryptographic key in the receiver or with the cryptographic key decrypted using the private key.
    • 一种用于加密解密密码保护的用户数据单元的方法和系统,其中发射机最初生成具有相关密钥标识的加密密钥。 然后,发射机使用公共加密密钥对所生成的加密密钥进行不对称加密,并使用生成的加密密钥对至少一个用户数据单元进行加密。 如果加密密钥的加密用户数据单元,非对称加密的加密密钥和密钥的相关密钥标识被传送到使用专用密钥对接收到的非对称加密密钥进行解密的接收机, 加密密钥在接收机中不存在于解密状态。 然后,接收机使用接收机中的加密密钥或使用私钥解密的加密密钥来解密所接收的密码加密的用户数据单元。
    • 2. 发明申请
    • Method and System for Resolving a Naming Conflict
    • 解决命名冲突的方法和系统
    • US20120324219A1
    • 2012-12-20
    • US13508621
    • 2010-10-06
    • Michael BraunMarkus DichtlBernd Meyer
    • Michael BraunMarkus DichtlBernd Meyer
    • H04L9/00
    • G06F21/125G06F9/44552
    • A method and a system for naming-conflict-free integration of software components originating from software component manufacturers (OEM), comprising software development devices from different software component manufacturers (OEM) that manufacture and encrypt software components with the respective cryptographic key, wherein when a naming conflict occurs during the integration of encrypted software components, at least one of the encrypted software components in which the naming conflict occurred is expanded by a naming conflict resolution rule to thereby allows for the resolution of naming conflicts in encrypted software components that can originate from different software component manufacturers without the source code of the software components becoming visible to third parties.
    • 一种用于命名不受软件组件制造商(OEM)的软件组件进行命名冲突的集成的方法和系统,包括来自不同软件组件制造商(OEM)的软件开发设备,该软件组件制造商(OEM)使用相应的加密密钥来制造和加密软件组件,其中何时 在加密软件组件的集成期间发生命名冲突,通过命名冲突解决规则来扩展发生命名冲突的加密软件组件中的至少一个,从而允许解决可能发起的加密软件组件中的命名冲突 来自不同软件组件制造商的软件组件的源代码对第三方变得可见。
    • 3. 发明授权
    • Method and system for confidentially providing software components
    • 保密提供软件组件的方法和系统
    • US09542537B2
    • 2017-01-10
    • US13508712
    • 2010-10-14
    • Michael BraunMarkus DichtlBernd Meyer
    • Michael BraunMarkus DichtlBernd Meyer
    • G06F21/10H04L9/32
    • G06F21/10H04L9/3247H04L2209/60
    • A method and system for confidentially providing a software component which is encrypted using a secret cryptographic key of a software component manufacturer, and the key is then encrypted using a first cryptographic system key, wherein the encrypted software component and the encrypted key are transported by the software component manufacturer to a destination system device. After decrypting the transported encrypted key using a second cryptographic system key, the transported encrypted software component is decrypted using the decrypted key, wherein the decrypted software component is provided for execution on the destination system device. The method can be used to protect source codes or object codes of a developed software component from access by a third party and still allows for processing using standard tools.
    • 一种用于保密地提供使用软件组件制造商的秘密密码密钥加密的软件组件的方法和系统,然后使用第一密码系统密钥对密钥进行加密,其中加密的软件组件和加密密钥由 软件组件制造商到目标系统设备。 在使用第二密码系统密钥解密所传送的加密密钥之后,使用解密密钥解密所传送的加密软件组件,其中解密的软件组件被提供用于在目标系统设备上执行。 该方法可用于保护开发的软件组件的源代码或目标代码不被第三方访问,并且仍允许使用标准工具进行处理。
    • 4. 发明授权
    • Method and system for resolving a naming conflict
    • 解决命名冲突的方法和系统
    • US09372966B2
    • 2016-06-21
    • US13508621
    • 2010-10-06
    • Michael BraunMarkus DichtlBernd Meyer
    • Michael BraunMarkus DichtlBernd Meyer
    • G06F21/12G06F9/445
    • G06F21/125G06F9/44552
    • A method and a system for naming-conflict-free integration of software components originating from software component manufacturers (OEM), comprising software development devices from different software component manufacturers (OEM) that manufacture and encrypt software components with the respective cryptographic key, wherein when a naming conflict occurs during the integration of encrypted software components, at least one of the encrypted software components in which the naming conflict occurred is expanded by a naming conflict resolution rule to thereby allows for the resolution of naming conflicts in encrypted software components that can originate from different software component manufacturers without the source code of the software components becoming visible to third parties.
    • 一种用于命名不受软件组件制造商(OEM)的软件组件进行命名冲突的集成的方法和系统,包括来自不同软件组件制造商(OEM)的软件开发设备,该软件组件制造商(OEM)使用相应的加密密钥来制造和加密软件组件,其中何时 在加密软件组件的集成期间发生命名冲突,通过命名冲突解决规则来扩展发生命名冲突的加密软件组件中的至少一个,从而允许解决可能发起的加密软件组件中的命名冲突 来自不同软件组件制造商的软件组件的源代码对第三方变得可见。
    • 5. 发明申请
    • Method And System For The Accelerated Decryption Of Cryptographically Protected User Data Units
    • 加密解密密码保护用户数据单元的方法和系统
    • US20120321088A1
    • 2012-12-20
    • US13508707
    • 2010-10-12
    • Michael BraunMarkus DichtlBernd Meyer
    • Michael BraunMarkus DichtlBernd Meyer
    • H04L9/08
    • H04L9/0825
    • A method and system for accelerated decryption of a cryptographically protected user data unit, wherein a transmitter initially generates a cryptographic key that is provided with a related key identification. The transmitter then performs asymmetrical encryption of the generated cryptographic key using a public cryptographic key and encryption of at least one user data unit using the generated cryptographic key. The encrypted user data unit, the asymmetrically encrypted cryptographic key and the related key identification of the cryptographic key are transported to a receiver that decrypts the received asymmetrically encrypted key using a private key, if verification of the received related key identification of the cryptographic key indicates the cryptographic key is not present in a decrypted state in the receiver. The receiver then decrypts the received cryptographically encrypted user data unit using the cryptographic key in the receiver or with the cryptographic key decrypted using the private key.
    • 一种用于加密解密密码保护的用户数据单元的方法和系统,其中发射机最初生成具有相关密钥标识的加密密钥。 然后,发射机使用公共加密密钥对所生成的加密密钥进行不对称加密,并使用生成的加密密钥对至少一个用户数据单元进行加密。 如果加密密钥的加密用户数据单元,非对称加密的加密密钥和密钥的相关密钥标识被传送到使用专用密钥对接收到的非对称加密密钥进行解密的接收机, 加密密钥在接收机中不存在于解密状态。 然后,接收机使用接收机中的加密密钥或使用私钥解密的加密密钥来解密所接收的密码加密的用户数据单元。
    • 6. 发明申请
    • Method and System for Confidentially Providing Software Components
    • 自动提供软件组件的方法和系统
    • US20120321089A1
    • 2012-12-20
    • US13508712
    • 2010-10-14
    • Michael BraunMarkus DichtlBernd Meyer
    • Michael BraunMarkus DichtlBernd Meyer
    • H04L9/08
    • G06F21/10H04L9/3247H04L2209/60
    • A method and system for confidentially providing a software component which is encrypted using a secret cryptographic key of a software component manufacturer, and the key is then encrypted using a first cryptographic system key, wherein the encrypted software component and the encrypted key are transported by the software component manufacturer to a destination system device. After decrypting the transported encrypted key using a second cryptographic system key, the transported encrypted software component is decrypted using the decrypted key, wherein the decrypted software component is provided for execution on the destination system device. The method can be used to protect source codes or object codes of a developed software component from access by a third party and still allows for processing using standard tools.
    • 一种用于保密地提供使用软件组件制造商的秘密密码密钥加密的软件组件的方法和系统,然后使用第一密码系统密钥对密钥进行加密,其中加密的软件组件和加密密钥由 软件组件制造商到目标系统设备。 在使用第二密码系统密钥解密所传送的加密密钥之后,使用解密密钥解密所传送的加密软件组件,其中解密的软件组件被提供用于在目标系统设备上执行。 该方法可用于保护开发的软件组件的源代码或目标代码不被第三方访问,并且仍允许使用标准工具进行处理。
    • 8. 发明授权
    • Apparatus and method for generating a random bit sequence
    • 用于产生随机比特序列的装置和方法
    • US08410857B2
    • 2013-04-02
    • US13119765
    • 2009-07-30
    • Markus DichtlBernd Meyer
    • Markus DichtlBernd Meyer
    • H03K3/03H03B29/00G06F7/58
    • G06F7/588H03K3/84H04L9/0861
    • An apparatus for generating a random bit sequence has a ring oscillator which includes inverting digital devices and on which an oscillator signal can be tapped. An intermediate storage element monitors and stores fluctuating levels of the oscillator signal. At least two controllable switch devices for simultaneously exciting at least two harmonic wave edges of the ring oscillator are provided in a signal path of the ring oscillator. The phasing of the two harmonic wave edges and a potential convergence thereof are subject to statistical fluctuations, which are used as a basis for the random bit generation. A corresponding random number generator can be used in particular as an FPGA for security applications, such as cryptographic methods. The apparatus has substantially digital components, which are easy to produce in a standardized manner. A dedicated regulating circuit is not necessary. The apparatus is also robust toward exterior influences.
    • 用于产生随机比特序列的装置具有环形振荡器,其包括倒相数字装置,并且可以在其上敲击振荡器信号。 中间存储元件监视和存储振荡器信号的波动电平。 在环形振荡器的信号路径中设置有用于同时激励环形振荡器的至少两个谐波边缘的至少两个可控开关装置。 两个谐波边缘的相位和其潜在的收敛受到统计波动的影响,这些波形被用作随机比特生成的基础。 相应的随机数发生器可以特别用作安全应用的FPGA,例如加密方法。 该装置具有基本上数字的部件,其易于以标准化的方式产生。 专用的调节电路不是必需的。 该装置对于外部影响也是坚固的。