会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • A METHOD AND APPARATUS FOR TIME-LAPSE CRYPTOGRAPHY
    • 一种用于时间序列分析的方法和装置
    • WO2008127446A3
    • 2009-01-15
    • PCT/US2007086101
    • 2007-11-30
    • HARVARD COLLEGERABIN MICHAEL OTHORPE CHRISTOPHER A
    • RABIN MICHAEL OTHORPE CHRISTOPHER A
    • H04L9/08H04L9/30
    • H04L9/085H04L2209/42H04L2209/463
    • According to one aspect, provided is a construction and specification for an implementation of a new cryptographic primitive, "Time- Lapse Cryptography", with which a sender can encrypt a message so that it is guaranteed to be revealed at an exact moment in the future, even if this revelation turns out to be undesirable to the sender. In one embodiment, a Time-Lapse Cryptography Service is provided ("the Service") based on a network of parties. Senders encrypt their messages with this public key whose secret key is not known to anyone - not even a trusted third party -- until a predefined and specific future time T + d, at which point the secret key is constructed and published. In one example, the secret key can only be known after it is constructed. At or after that time, anyone can decrypt the cipher text using this secret key. Other embodiments describe other applications of such a service, for example, one embodiment is used in sealed bid auctions, others in insider stock sales, clinical trials, and electronic voting, among a variety of possible implementations. In one embodiment, a method for cryptographic encoding is provided, including generation of cryptographic key components by a plurality of parties, where participation of the parties is verified. A public key is constructed from a plurality of key components, and in one embodiment, only components generated by parties verified proper are used. A time is associated with the generated public key, which may set a future point at which a secret key will be created, and/or published. When a predetermined time is reached, and in some embodiments, slightly before, construction of the secret key begins. In one alternative, it may be necessary to reconstruct various components used to generate the secret key. In another, the secret key is generated from at least a portion of a plurality of the cryptographic key components.
    • 根据一个方面,提供了一种用于实现新的加密原语“时间延迟加密”的结构和规范,发送者可以通过该时间延迟加密技术对消息进行加密,从而保证在将来的确切时刻被显示 即使这个启示对发件人来说是不合需要的。 在一个实施例中,基于各方的网络提供了时间延迟加密服务(“服务”)。 发件人使用这个公钥加密他们的消息,其秘密密钥对任何人都不知道,甚至不是值得信赖的第三方 - 直到预定义和特定的未来时间T + d,此时构建和发布密钥。 在一个示例中,秘密密钥只有在构造之后才能被知道。 在此之前或之后,任何人都可以使用该秘密密钥对密文进行解密。 其他实施例描述了这种服务的其他应用,例如,在各种可能的实现中,一个实施例用于密封投标拍卖,其他内部股票销售,临床试验和电子投票。 在一个实施例中,提供了一种用于加密编码的方法,包括由多个方生成加密密钥组件,其中确认了各方的参与。 公共密钥由多个关键部件构成,在一个实施例中,仅使用由方正确生成的部件。 一个时间与所生成的公钥相关联,这可以设置将要创建和/或发布秘密密钥的未来点。 当达到预定时间时,并且在一些实施例中稍微稍后,开始秘密密钥的构造。 在一个替代方案中,可能需要重建用于生成秘密密钥的各种组件。 另一方面,秘密密钥是从多个加密密钥分量的至少一部分产生的。
    • 2. 发明申请
    • METHODS AND APPARATUS FOR PROTECTING INFORMATION
    • 保护信息的方法和装置
    • WO0072119A3
    • 2001-08-02
    • PCT/US0011821
    • 2000-05-02
    • RABIN MICHAEL OSHASHA DENNIS E
    • RABIN MICHAEL OSHASHA DENNIS E
    • G06F21/22G06F1/00G06F21/00G06F21/20
    • G06F21/10G06F2211/008G06F2221/0735G06F2221/0737G06F2221/0773G06F2221/0775G06F2221/2103G06F2221/2135G06F2221/2151
    • Methods and apparatus to enable owners and vendors of software to protect intellectual property and to charge per-use. The system produces a unique tag for every instance of software. Each user device runs a supervising program that ensures, by use of the tag, that no software instance will be used infringing on the software owner's rights. When installing or using a software instance, the supervising program verifies the associated tag and stores the tag. When installing or using untagged software, the supervising program fingerprints selected portions of the software and stores the fingerprints. A user device's supervising program periodically calls up, or is called up by a guardian center. The guardian center detects unauthorized use of software by comparison of current call-up data with records of past call-ups. The guardian center completes the call-up by enabling or disabling continued use of the monitored software instances.
    • 使软件所有者和供应商保护知识产权并对每次使用收费的方法和设备。 该系统为每个软件实例生成一个唯一的标签。 每个用户设备运行一个监督程序,通过使用标签,确保不会使用软件实例来侵犯软件所有者的权利。 在安装或使用软件实例时,监督程序将验证相关标签并存储标签。 当安装或使用未标记的软件时,监督程序指纹软件的所选部分并存储指纹。 用户设备的监督程序定期召唤或由监护人中心呼叫。 监护人中心通过比较目前的呼叫数据和过去的呼叫记录来检测未经授权的使用软件。 监护人中心通过启用或禁用继续使用受监视的软件实例来完成呼叫。
    • 4. 发明申请
    • A METHOD AND APPARATUS FOR TIME-LAPSE CRYPTOGRAPHY
    • 一种用于时间序列分析的方法和装置
    • WO2008127446A2
    • 2008-10-23
    • PCT/US2007/086101
    • 2007-11-30
    • PRESIDENT AND FELLOWS OF HARVARD COLLEGERABIN, Michael, O.THORPE, Christopher, A.
    • RABIN, Michael, O.THORPE, Christopher, A.
    • H04L9/085H04L2209/42H04L2209/463
    • According to one aspect, provided is a construction and specification for an implementation of a new cryptographic primitive, "Time- Lapse Cryptography", with which a sender can encrypt a message so that it is guaranteed to be revealed at an exact moment in the future, even if this revelation turns out to be undesirable to the sender. In one embodiment, a Time-Lapse Cryptography Service is provided ("the Service") based on a network of parties. Senders encrypt their messages with this public key whose secret key is not known to anyone - not even a trusted third party -- until a predefined and specific future time T + δ, at which point the secret key is constructed and published. In one example, the secret key can only be known after it is constructed. At or after that time, anyone can decrypt the cipher text using this secret key. Other embodiments describe other applications of such a service, for example, one embodiment is used in sealed bid auctions, others in insider stock sales, clinical trials, and electronic voting, among a variety of possible implementations. In one embodiment, a method for cryptographic encoding is provided, including generation of cryptographic key components by a plurality of parties, where participation of the parties is verified. A public key is constructed from a plurality of key components, and in one embodiment, only components generated by parties verified proper are used. A time is associated with the generated public key, which may set a future point at which a secret key will be created, and/or published. When a predetermined time is reached, and in some embodiments, slightly before, construction of the secret key begins. In one alternative, it may be necessary to reconstruct various components used to generate the secret key. In another, the secret key is generated from at least a portion of a plurality of the cryptographic key components.
    • 根据一个方面,提供了一种用于实现新的加密原语“时间延迟加密”的结构和规范,发送者可以通过该时间延迟加密技术对消息进行加密,从而保证在将来的确切时刻被显示 即使这个启示对发件人来说是不合需要的。 在一个实施例中,基于各方的网络提供了时间延迟加密服务(“服务”)。 发件人使用这个公钥加密他们的消息,其秘密密钥对任何人都不知道,甚至不是值得信赖的第三方 - 直到预定义和特定的未来时间T + d,此时构建和发布密钥。 在一个示例中,秘密密钥只有在构造之后才能被知道。 在此之前或之后,任何人都可以使用该秘密密钥对密文进行解密。 其他实施例描述了这种服务的其他应用,例如,在各种可能的实现中,一个实施例用于密封投标拍卖,其他内部股票销售,临床试验和电子投票。 在一个实施例中,提供了一种用于加密编码的方法,包括由多个方生成加密密钥组件,其中确认了各方的参与。 公共密钥由多个关键部件构成,在一个实施例中,仅使用由方正确生成的部件。 一个时间与所生成的公钥相关联,这可以设置将要创建和/或发布秘密密钥的未来点。 当达到预定时间时,并且在一些实施例中稍微稍后,秘密密钥的构造开始。 在一个替代方案中,可能需要重建用于生成秘密密钥的各种组件。 另一方面,秘密密钥是从多个加密密钥分量的至少一部分产生的。