会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明申请
    • SECURE ADDRESS PROXYING USING MULTI-KEY CRYPTOGRAPHICALLY GENERATED ADDRESSES
    • 使用多关键生成地址进行安全地址代理
    • WO2006119358A2
    • 2006-11-09
    • PCT/US2006/016970
    • 2006-05-02
    • NTT DOCOMO INC.GENTRY, Craig B.KEMPF, James
    • GENTRY, Craig B.KEMPF, James
    • G06F15/16
    • H04L61/2015H04L29/12H04W8/26H04W80/04
    • A method allows Internet Protocol version 6 (IPv6) nodes that use Mobile IPv6 for mobility management, or DHCP for address provisioning, to securely claim and defend their network addresses themselves or through proxies using the SEND protocol. The network node may also sign and verify a message that claims and defends a network address. The network address to be claimed and defended may be either autoconfigured or obtained from a server using the DHCPv6 protocol. If the MCGA is generated by a mobile IPv6 node as a mobile IPv6 home address, the MCGA can be securely proxied by the mobile IPv6 home agent after the mobile node has left the home link. However, if the MCGA is generated as a mobile IPv6 care-of address by a mobile IPv6 node while on a foreign subnet, the MCGA can be securely proxied by the current or new access router, before the mobile node arrives on the link and after it has left the link, respectively.
    • 一种方法允许使用移动IPv6进行移动性管理的Internet协议版本6(IPv6)节点,或者用于地址配置的DHCP可以自己安全地声称和保护自己的网络地址,或通过使用SEND协议的代理来保护自己的网络地址。 网络节点还可以签署和验证声称和捍卫网络地址的消息。 要声明和辩护的网络地址可以是自动配置的,也可以使用DHCPv6协议从服务器获取。 如果MCGA由移动IPv6节点生成为移动IPv6归属地址,则在移动节点离开主链路之后,MCGA可以由移动IPv6归属代理安全地代理。 然而,如果MCGA在外部子网上由移动IPv6节点生成为移动IPv6转交地址,则在移动节点到达链路之前,MCGA可以由当前或新的接入路由器安全地代理, 它已分别离开了链接。
    • 7. 发明申请
    • BROADCAST ENCRYPTION USING RSA
    • 使用RSA进行广播加密
    • WO2004107635A3
    • 2005-01-27
    • PCT/US2004015946
    • 2004-05-21
    • DOCOMO COMM LAB USA INCGENTRY CRAIG BRAMZAN ZULFIKAR AMIN
    • GENTRY CRAIG BRAMZAN ZULFIKAR AMIN
    • H04L9/08H04L9/30H04L9/00
    • H04H60/23H04L9/0836H04L9/302H04L2209/601
    • Methods, components and systems for implementing secure and efficient broadcast encryption schemes with configurable and practical tradeoffs among a pre-broadcast transmission bandwidth t, a key storage cost k, and a key derivation cost c, in which the schemes use subtree difference and key decomposition to generate secondary keys, use the secondary keys to encrypt the broadcast and generate ciphertexts, and use the RSA encryption scheme to implement derivability between the primary keys and the secondary keys. To decrypt the broadcast, a privileged user uses one of its primary keys to derive a secondary key, which is used to decrypt the broadcast. The product of key derivation cost c and the key storage cost k is at most (2a - log a - 2)loga n, when n is the number of users, 1 , and revoked users r
    • 用于实现安全和有效的广播加密方案的方法,组件和系统,其中广播传输带宽t,密钥存储成本k和密钥导出成本c之间具有可配置和实际的权衡,其中方案使用子树差分和密钥分解 生成辅助密钥,使用辅助密钥加密广播并生成密文,并使用RSA加密方案来实现主密钥和次密钥之间的派生。 为了对广播进行解密,特权用户使用其主键之一来导出用于解密广播的辅助密钥。 密钥导出成本c和密钥存储成本k的乘积最多为(2a-log a-2)loga n,当n为用户数时,1 <= b <= LOGn,a = 2 并撤销用户r
    • 9. 发明申请
    • SECURE ADDRESS PROXYING USING MULTI-KEY CRYPTOGRAPHICALLY GENERATED ADDRESSES
    • 使用多关键生成地址进行安全地址代理
    • WO2006119358A3
    • 2007-10-11
    • PCT/US2006016970
    • 2006-05-02
    • NTT DOCOMO INCGENTRY CRAIG BKEMPF JAMES
    • GENTRY CRAIG BKEMPF JAMES
    • H04L12/66H04L9/00H04W8/26H04W80/04
    • H04L61/2015H04L29/12H04W8/26H04W80/04
    • A method allows Internet Protocol version 6 (IPv6) nodes that use Mobile IPv6 for mobility management, or DHCP for address provisioning, to securely claim and defend their network addresses themselves or through proxies using the SEND protocol (103). The network node may also sign and verify a message that claims and defends a network address (107). The network address to be claimed and defended may be either autoconfigured or obtained from a server using the DHCPv6 protocol (104). If the MCGA is generated by mobile IPv6 node as a mobile IPv6 home address, the MCGA can be securely proxied by the mobile IPv6 home agent after the mobile node has left the home link. However, if the MCGA is generated as a mobile IPv6 care-of-address by a mobile IPv6 node while on a foreign subnet, the MCGA can be securely proxied by the current or new access router, before the mobile node arrives on the link and after it has left the link, respectively.
    • 一种方法允许使用移动IPv6进行移动性管理的Internet协议版本6(IPv6)节点,或者用于地址配置的DHCP来自己安全地声称和保护自己的网络地址,或通过代理使用SEND协议(103)。 网络节点还可以签署并验证声称和捍卫网络地址的消息(107)。 要声明和辩护的网络地址可以是使用DHCPv6协议的服务器自动配置或获取(104)。 如果MCGA由移动IPv6节点生成为移动IPv6归属地址,则在移动节点离开主链路之后,MCGA可以被移动IPv6归属代理安全地代理。 然而,如果MCGA在外部子网上由移动IPv6节点生成为移动IPv6转交地址,则在移动节点到达链路之前,MCGA可以由当前或新的接入路由器安全地代理, 分别已经离开了链接。
    • 10. 发明申请
    • GENERATION OF SET COVERINGS WITH FREE RIDERS, AND GENERATION OF ORDERED SETS OF MEETING POINTS, IN SYSTEMS WHICH INCLUDE, BUT ARE NOT LIMITED TO, SYSTEMS FOR BROADCAST ENCRYPTION AND SYSTEMS FOR CERTIFICATE REVOCATION
    • 产生无盖骑手的套装,以及订单会议点的生成,包括但不限于广播加密和系统进行证书转让的系统
    • WO2007079291A2
    • 2007-07-12
    • PCT/US2006061166
    • 2006-11-21
    • NTT DOCOMO INCGENTRY CRAIG BRAMZAN ZULFIKAR AMINWOODRUFF DAVID P
    • GENTRY CRAIG BRAMZAN ZULFIKAR AMINWOODRUFF DAVID P
    • H04L9/00
    • H04L9/0822H04L9/3265H04L9/3268H04L2209/601
    • In a broadcast encryption scheme, an optimal or near-optimal set covering CV( f,P) is computed for a set P of privileged users and at most a predefined number f of revoked users ("free riders"). The covering consists of elements of a predefined set cover CC(U) for the set of all users U. The covering is computed by finding optimal or near-optimal coverings for privileged users for CC(U) elements that are proper subsets of U. More particularly, possible assignments of free riders to the subsets are examined, and an assignment is selected to fit an optimality criterion for the total set covering. In some embodiments, only "meeting point" elements of CC(U) are fully examined. A meeting point is an element containing at least two "immediate child" elements each of which contains a revoked user. An immediate child of a "parent" element is a proper subset of the parent with no intermediate elements (no elements containing the child as a proper subset and itself being a proper subset of the parent). An ordered list MP of meeting points is computed efficiently. The list is ordered by the number of elements in a chain from the meeting point to the root. The complete-subtree method is used in some embodiments. The methods have applications besides broadcast encryption, e.g. certificate revocation.
    • 在广播加密方案中,针对特权用户的集合P以及最多已被撤销的用户(“免费乘客”)的预定数量f计算覆盖CV(f,P)的最佳或接近最佳的集合。 覆盖由用于所有用户U的集合的预定义集合封闭CC(U)的元素组成。通过为作为U的适当子集的CC(U)元素找到用于特权用户的优化或近似最佳覆盖来计算覆盖。 更具体地说,检查可用的分配给子集的自由车手,并且选择一个分配以适合总集合覆盖的最优性准则。 在一些实施例中,仅完全检查CC(U)的“会合点”元素。 会议点是包含至少两个“直接子”“元素的元素,每个元素包含撤销的用户。 “父”元素的直接子代是没有中间元素的父类的正确子集(不包含子元素作为适当子集的子元素,并且本身是母体的正确子集)。 有效地计算会议点的有序列表MP。 列表由从会合点到根的链中的元素数量排序。 在一些实施例中使用完全子树方法。 除了广播加密之外,这些方法还具有应用。 证书撤销。