会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 4. 发明授权
    • Information processing apparatus and method
    • 信息处理装置和方法
    • US07958361B2
    • 2011-06-07
    • US11458175
    • 2006-07-18
    • Junichi HayashiYuji Suga
    • Junichi HayashiYuji Suga
    • H04L9/32H04N7/167G06F17/00
    • G06F21/64H04L9/3242H04L9/3247H04L2209/68
    • An information processing method enables verification of validity of signed data using received partial signed data parts, even when all the signed data is not received. According to the information processing method, signature data including a signature value and digests of a plurality of partial signed data parts is received. Then, the signature data is verified by using the signature value and the digests of a plurality of partial signed data parts. Subsequently, the partial signed data is received according to a result of verifying the signature data. Then, the partial signed data is verified using the partial signed data and the digest of the partial signed data.
    • 信息处理方法即使在没有接收到所有签名数据的情况下,也能够使用接收到的部分签名数据部分来验证签名数据的有效性。 根据信息处理方法,接收包括签名值的签名数据和多个部分签名数据部分的摘要。 然后,通过使用多个部分签名数据部分的签名值和摘要来验证签名数据。 随后,根据验证签名数据的结果接收部分签名数据。 然后,使用部分签名数据和部分签名数据的摘要来验证部分签名数据。
    • 5. 发明授权
    • Key information processing method, device thereof, and program
    • 关键信息处理方法,装置及程序
    • US07706530B2
    • 2010-04-27
    • US11329037
    • 2006-01-11
    • Yuji SugaJunichi Hayashi
    • Yuji SugaJunichi Hayashi
    • H04L9/00
    • H04L9/0643H04L9/0836H04L2209/60
    • It is possible to safely constitute a key management method having an access structure equivalent to the hierarchical key management method with a small amount of calculations. The method includes: a setting step for setting a set (,) of the number of times a one-way hash function is executed for each of the elements of the rank i; a key generation step for generating two separate keys for the elements as the value of the number of times the one-way function has been executed corresponding to the set of the number of times which has been set for the elements of the two original keys for each of the elements; and a key delivery step for delivering the two separate keys for the elements to each of the elements. Furthermore, the method includes an initial key generation step for calculating N keys with a route node positioned at the most significant node when generating a key at each node from a parent node and performing key delivery according to the hierarchical relationship expressed in a directed graph having no cycle; and a node key generation step for generating the value of the number of predetermined times the one-way function is executed according to the execution specification for M keys (M≦N) among the N initial keys in each node, as the M node keys for the node.
    • 可以安全地构成具有与分级密钥管理方法等同于具有少量计算的访问结构的密钥管理方法。 该方法包括:设置步骤,用于设置针对秩i的每个元素执行单向散列函数的次数的集合(,); 密钥生成步骤,用于为元素生成两个单独的密钥作为执行单向功能的次数的值,对应于为两个原始密钥的元素设置的次数集合, 每个元素; 以及用于将元件的两个单独的键递送到每个元件的关键递送步骤。 此外,该方法包括:初始密钥生成步骤,用于当从父节点生成每个节点处的密钥并且根据在有向图中表示的分层关系执行密钥递送时,利用位于最重要节点处的路由节点计算N个密钥, 没有循环; 以及节点密钥生成步骤,用于根据每个节点中的N个初始密钥中的M个密钥(M&NlE; N)的执行规范,生成执行单向功能的预定次数的值,作为M个节点密钥 为节点。
    • 6. 发明申请
    • Key information processing method, device thereof, and program
    • 关键信息处理方法,装置及程序
    • US20060149762A1
    • 2006-07-06
    • US11329037
    • 2006-01-11
    • Yuji SugaJunichi Hayashi
    • Yuji SugaJunichi Hayashi
    • G06F7/00
    • H04L9/0643H04L9/0836H04L2209/60
    • It is possible to safely constitute a key management method having an access structure equivalent to the hierarchical key management method with a small amount of calculations. The method includes: a setting step for setting a set (,) of the number of times a one-way hash function is executed for each of the elements of the rank i; a key generation step for generating two separate keys for the elements as the value of the number of times the one-way function has been executed corresponding to the set of the number of times which has been set for the elements of the two original keys for each of the elements; and a key delivery step for delivering the two separate keys for the elements to each of the elements. Furthermore, the method includes an initial key generation step for calculating N keys with a route node positioned at the most significant node when generating a key at each node from a parent node and performing key delivery according to the hierarchical relationship expressed in a directed graph having no cycle; and a node key generation step for generating the value of the number of predetermined times the one-way function is executed according to the execution specification for M keys (M≦N) among the N initial keys in each node, as the M node keys for the node.
    • 可以安全地构成具有与分级密钥管理方法等同于具有少量计算的访问结构的密钥管理方法。 该方法包括:设置步骤,用于设置针对秩i的每个元素执行单向散列函数的次数的集合(,); 密钥生成步骤,用于为元素生成两个单独的密钥作为执行单向功能的次数的值,对应于为两个原始密钥的元素设置的次数集合, 每个元素; 以及用于将元件的两个单独的键递送到每个元件的关键递送步骤。 此外,该方法包括:初始密钥生成步骤,用于当从父节点生成每个节点处的密钥并且根据在有向图中表示的分层关系执行密钥递送时,利用位于最重要节点处的路由节点计算N个密钥, 没有循环; 以及节点密钥生成步骤,用于根据每个节点中的N个初始密钥中的M个密钥(M <= N)的执行规范,生成执行单向功能的预定次数的值,作为M个节点 节点的键。
    • 7. 发明申请
    • INFORMATION PROCESSING APPARATUS AND METHOD
    • 信息处理装置和方法
    • US20070022293A1
    • 2007-01-25
    • US11458175
    • 2006-07-18
    • Junichi HayashiYuji Suga
    • Junichi HayashiYuji Suga
    • H04L9/00
    • G06F21/64H04L9/3242H04L9/3247H04L2209/68
    • An information processing method enables verification of validity of signed data using received partial signed data parts, even when all the signed data is not received. According to the information processing method, signature data including a signature value and digests of a plurality of partial signed data parts is received. Then, the signature data is verified by using the signature value and the digests of a plurality of partial signed data parts. Subsequently, the partial signed data is received according to a result of verifying the signature data. Then, the partial signed data is verified using the partial signed data and the digest of the partial signed data.
    • 信息处理方法即使在没有接收到所有签名数据的情况下,也能够使用接收到的部分签名数据部分来验证签名数据的有效性。 根据信息处理方法,接收包括签名值的签名数据和多个部分签名数据部分的摘要。 然后,通过使用多个部分签名数据部分的签名值和摘要来验证签名数据。 随后,根据验证签名数据的结果接收部分签名数据。 然后,使用部分签名数据和部分签名数据的摘要来验证部分签名数据。