会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Method for key escrow in a communication system and apparatus therefor
    • 通信系统中密钥托管的方法及其设备
    • US06823070B1
    • 2004-11-23
    • US09536520
    • 2000-03-28
    • Roger A. SmithMauricio Breternitz, Jr.
    • Roger A. SmithMauricio Breternitz, Jr.
    • H04K100
    • H04L9/0894H04L2209/04
    • Method of monitoring a secure encrypted communication, where the encryption key(s) is recovered by an escrow center having a master and multiple agents and the master receives the key encrypted using a mask scheme. Independent random masks are generated, which are then used to create dependent masks for each agent. The agents receive the mask information but no key information. The agents decide whether to allow the interception of an encrypted message. In response to the agents' decisions, the master is either enabled to recover the key or prevented from recovering the key. Encrypted key information is only available to the master. Multiple combinations of agents will provide sufficient information to the master to recover the key, avoiding the hold-out problems of the prior art. In one embodiment, multiple masters provide back-up protection when a master is unavailable.
    • 监控安全加密通信的方法,其中由具有主代理和多个代理的托管中心恢复加密密钥,并且主机接收使用掩码方案加密的密钥。 生成独立随机掩码,然后用它们为每个代理创建依赖掩码。 代理接收掩码信息,但没有密钥信息。 代理人决定是否允许拦截加密的消息。 响应于代理人的决定,主机可以启用恢复密钥或阻止恢复密钥。 加密的密钥信息仅适用于主服务器。 代理商的多个组合将向主机提供足够的信息以恢复密钥,避免现有技术的保留问题。 在一个实施例中,当主机不可用时,多个主机提供备用保护。
    • 5. 发明授权
    • Method and apparatus for hierarchical restructuring of computer code
    • 计算机代码分级重组的方法和装置
    • US06381739B1
    • 2002-04-30
    • US08647862
    • 1996-05-15
    • Mauricio Breternitz, Jr.Roger A. Smith
    • Mauricio Breternitz, Jr.Roger A. Smith
    • G06F944
    • G06F11/3612G06F8/443
    • A compiler (142) constructs (FIGS. 14-32) a Reduced Flowgraph (RFG) from computer source code (144). The RFG is used to instrument (FIG. 36) code (142). An object module is created (146) and executed (148). Resulting path frequency counts are written to a counts file (154). A compiler (158) uses the source code (144) and the generated counts to identify runtime correlations between successive path edges and Superedges. An object module (159) is generated containing reordered (156) code generated to optimize performance based on the runtime correlations. If cloning is enabled (152), high frequency path edges are cloned (154) or duplicated to minimize cross edge branching.
    • 编译器(142)从计算机源代码(144)构造(图14-32)缩减流程图(RFG)。 RFG用于仪器(图36)代码(142)。 创建对象模块(146)并执行(148)。 结果路径频率计数被写入计数文件(154)。 编译器(158)使用源代码(144)和生成的计数来识别连续的路径边缘和超区域之间的运行时间相关性。 生成包含重新排序(156)代码的对象模块(159),以根据运行时相关性来优化性能。 如果启用克隆(152),则克隆(154)或复制高频路径边缘以最小化交叉边缘分支。