会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明申请
    • Secret Encryption with Public or Delegated Comparison
    • 秘密加密与公开或委派比较
    • US20110145566A1
    • 2011-06-16
    • US12637811
    • 2009-12-15
    • Nir NiceYacov Yacobi
    • Nir NiceYacov Yacobi
    • H04L9/00
    • H04L9/002H04L9/3066H04L2209/08
    • Described is a technology comprising a system in which two distrusting parties can submit sets of encrypted keywords using two independent secret keys to a third party who can decide, using only public keys, if the underlying cleartext message of a cryptogram produced by one distrusting party matches that of a cryptogram produced by the other. The third party (e.g., a server) uses generator information corresponding to a generator of an elliptic curve group to determine whether the sets of encrypted keywords match each other. Various ways to provide the generator information based upon the generator are described. Also described is the use of one-ray randomization and two-way randomization as part of the system to protect against dictionary attacks.
    • 描述了一种技术,其包括一种系统,其中两个不信任方可以使用两个独立的秘密密钥向第三方提交一组加密的关键字,该第三方可以仅使用公钥来决定如果由一个不信任方产生的密码的底层明文消息匹配 另一个密码产生的密码。 第三方(例如,服务器)使用与椭圆曲线组的生成器相对应的生成器信息来确定加密关键字的集合是否彼此匹配。 描述了基于发电机提供发电机信息的各种方式。 还描述了使用单线随机化和双向随机化作为系统的一部分来防止字典攻击。
    • 3. 发明授权
    • Secret encryption with public or delegated comparison
    • 秘密加密与公开或委托比较
    • US08433064B2
    • 2013-04-30
    • US12637811
    • 2009-12-15
    • Nir NiceYacov Yacobi
    • Nir NiceYacov Yacobi
    • H04L29/06
    • H04L9/002H04L9/3066H04L2209/08
    • Described is a technology comprising a system in which two distrusting parties can submit sets of encrypted keywords using two independent secret keys to a third party who can decide, using only public keys, if the underlying cleartext message of a cryptogram produced by one distrusting party matches that of a cryptogram produced by the other. The third party (e.g., a server) uses generator information corresponding to a generator of an elliptic curve group to determine whether the sets of encrypted keywords match each other. Various ways to provide the generator information based upon the generator are described. Also described is the use of one-ray randomization and two-way randomization as part of the system to protect against dictionary attacks.
    • 描述了一种技术,其包括一种系统,其中两个不信任方可以使用两个独立的秘密密钥向第三方提交一组加密的关键字,该第三方可以仅使用公钥来决定如果由一个不信任方产生的密码的底层明文消息匹配 另一个密码产生的密码。 第三方(例如,服务器)使用与椭圆曲线组的生成器相对应的生成器信息来确定加密关键字的集合是否彼此匹配。 描述了基于发电机提供发电机信息的各种方式。 还描述了使用单线随机化和双向随机化作为系统的一部分来防止字典攻击。
    • 6. 发明授权
    • Collusion-resistant watermarking and fingerprinting
    • 防欺骗水印和指纹识别
    • US07681039B2
    • 2010-03-16
    • US10975514
    • 2004-10-28
    • Yacov YacobiHenrique MalvarDarko Kirovski
    • Yacov YacobiHenrique MalvarDarko Kirovski
    • H04L9/32
    • G06T1/005G06T2201/0063G06T2201/0065H04N1/32144H04N2201/3205H04N2201/3233H04N2201/3236
    • An implementation of a technology is described herein that facilitates rights enforcement of digital goods using watermarks. More particularly, it is a fingerprinting technology for protecting digital goods by detecting collusion as a malicious attack and identifying the participating colluders. If a digital pirate breaks one client and enables this client to avoid watermark detection, all content (both marked/protected an unmarked/free) can be played as unmarked only on that particular client. However, to enable other clients to play content as unmarked, the digital pirate needs to collude the extracted detection keys from many clients in order to create content that can evade watermark detection on all clients. The described implementation significantly improves collusion resistance through a fingerprinting mechanism that can identify the members of a malicious coalition even when their numbers are several orders of magnitude greater than what conventional collusion-protection schemes can accomplish. However, in this scenario each member of the malicious coalition leaves a fingerprint in every digital good from which the estimated watermark is subtracted. Thus, like a burglar without gloves, the digital pirate leaves her fingerprints only when she commits a crime. This abstract itself is not intended to limit the scope of this patent. The scope of the present invention is pointed out in the appending claims.
    • 这里描述了一种使用水印来促进数字商品的权利实施的技术的实现。 更具体地说,它是通过检测串通作为恶意攻击并识别参与的共谋者来保护数字商品的指纹技术。 如果数字盗版打破了一个客户端,并且使得该客户端能够避免水印检测,则所有内容(无标记/免费标记/保护)只能在该特定客户端上被标记为无标记。 然而,为了使其他客户端能够以无标记的方式播放内容,数字盗版者需要从许多客户端中抽出提取的检测密钥,以创建可以避免所有客户端上的水印检测的内容。 所描述的实现通过指纹机制显着地提高了共谋阻力,其可以识别恶意联盟的成员,即使它们的数量比常规串谋保护方案可以实现的数量级大几个数量级。 然而,在这种情况下,恶意联盟的每个成员在每个数字商品中留下指纹,从中减去估计的水印。 因此,像没有手套的防盗器一样,数字盗版者只有在犯罪时才会留下指纹。 本摘要本身并不旨在限制本专利的范围。 在所附权利要求中指出了本发明的范围。
    • 9. 发明授权
    • System and method for flexible micropayment of low value electronic assets
    • 低价值电子资产灵活支付的系统和方法
    • US07020638B1
    • 2006-03-28
    • US09451254
    • 1999-11-29
    • Yacov YacobiPaul England
    • Yacov YacobiPaul England
    • G06F17/60
    • G06Q20/29G06Q20/06G06Q20/10G06Q20/108G06Q20/3678G06Q20/3821
    • An electronic asset system mints a stick of electronic assets that can be spent by the user with multiple vendors. Assets sticks are issued anonymously or non-anonymously in a way without requiring dedication to a particular vendor, hence allowing the user to spend one or more assets from the stick with different vendors. The auditor randomly audit samples of the spent assets to detect whether the assets have been fraudulently used. The electronic asset system employs tamper-resistant electronic wallets constructed as dedicated hardware devices, or as devices with secure-processor architecture. The electronic asset system also facilitates handling of electronic coupons in a manner that enforces compliance between the user and the vendor. The user and vendor each maintain a stick of corresponding coupons with pointers to the most recent and oldest coupons available for expenditure. When a coupon is used or granted, the user and vendor both update the appropriate pointer to their respective sticks and then exchange signed data describing placement of the pointer to verify a correspondence between the referenced coupons.
    • 电子资产系统创建了可以由用户花费多个供应商的电子资产。 资产支票以匿名方式或非匿名方式发行,而不需要向特定供应商提供专用权,因此允许用户从不同的供应商处购买一个或多个资产。 审计人员随机审查已用资产的样本,以检测资产是否被欺诈性使用。 电子资产系统采用构建为专用硬件设备的抗篡改电子钱包,或采用具有安全处理器架构的设备。 电子资产系统还可以以强制用户和供应商之间的合规性的方式处理电子优惠券。 用户和供应商每个都保持一根相应的优惠券,指向最近和最旧的可用于支出的优惠券。 当使用或授予优惠券时,用户和供应商都将适当的指针更新到它们各自的棒,然后交换签署的数据描述指针的放置以验证所引用的优惠券之间的对应关系。