会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明申请
    • A METHOD AND APPARATUS FOR TIME-LAPSE CRYPTOGRAPHY
    • 一种用于时间序列分析的方法和装置
    • WO2008127446A3
    • 2009-01-15
    • PCT/US2007086101
    • 2007-11-30
    • HARVARD COLLEGERABIN MICHAEL OTHORPE CHRISTOPHER A
    • RABIN MICHAEL OTHORPE CHRISTOPHER A
    • H04L9/08H04L9/30
    • H04L9/085H04L2209/42H04L2209/463
    • According to one aspect, provided is a construction and specification for an implementation of a new cryptographic primitive, "Time- Lapse Cryptography", with which a sender can encrypt a message so that it is guaranteed to be revealed at an exact moment in the future, even if this revelation turns out to be undesirable to the sender. In one embodiment, a Time-Lapse Cryptography Service is provided ("the Service") based on a network of parties. Senders encrypt their messages with this public key whose secret key is not known to anyone - not even a trusted third party -- until a predefined and specific future time T + d, at which point the secret key is constructed and published. In one example, the secret key can only be known after it is constructed. At or after that time, anyone can decrypt the cipher text using this secret key. Other embodiments describe other applications of such a service, for example, one embodiment is used in sealed bid auctions, others in insider stock sales, clinical trials, and electronic voting, among a variety of possible implementations. In one embodiment, a method for cryptographic encoding is provided, including generation of cryptographic key components by a plurality of parties, where participation of the parties is verified. A public key is constructed from a plurality of key components, and in one embodiment, only components generated by parties verified proper are used. A time is associated with the generated public key, which may set a future point at which a secret key will be created, and/or published. When a predetermined time is reached, and in some embodiments, slightly before, construction of the secret key begins. In one alternative, it may be necessary to reconstruct various components used to generate the secret key. In another, the secret key is generated from at least a portion of a plurality of the cryptographic key components.
    • 根据一个方面,提供了一种用于实现新的加密原语“时间延迟加密”的结构和规范,发送者可以通过该时间延迟加密技术对消息进行加密,从而保证在将来的确切时刻被显示 即使这个启示对发件人来说是不合需要的。 在一个实施例中,基于各方的网络提供了时间延迟加密服务(“服务”)。 发件人使用这个公钥加密他们的消息,其秘密密钥对任何人都不知道,甚至不是值得信赖的第三方 - 直到预定义和特定的未来时间T + d,此时构建和发布密钥。 在一个示例中,秘密密钥只有在构造之后才能被知道。 在此之前或之后,任何人都可以使用该秘密密钥对密文进行解密。 其他实施例描述了这种服务的其他应用,例如,在各种可能的实现中,一个实施例用于密封投标拍卖,其他内部股票销售,临床试验和电子投票。 在一个实施例中,提供了一种用于加密编码的方法,包括由多个方生成加密密钥组件,其中确认了各方的参与。 公共密钥由多个关键部件构成,在一个实施例中,仅使用由方正确生成的部件。 一个时间与所生成的公钥相关联,这可以设置将要创建和/或发布秘密密钥的未来点。 当达到预定时间时,并且在一些实施例中稍微稍后,开始秘密密钥的构造。 在一个替代方案中,可能需要重建用于生成秘密密钥的各种组件。 另一方面,秘密密钥是从多个加密密钥分量的至少一部分产生的。
    • 4. 发明申请
    • METHOD AND APPARATUS FOR CLEARING CLOUD COMPUTE DEMAND
    • 清除云计算需求的方法和装置
    • WO2012027478A1
    • 2012-03-01
    • PCT/US2011/048977
    • 2011-08-24
    • MOORTHI, JayTHORPE, Christopher, A.JOSEPHSON, William
    • MOORTHI, JayTHORPE, Christopher, A.JOSEPHSON, William
    • G06F9/46
    • H04L67/10G06F9/5061G06F9/5066G06F9/5088G06F2209/503G06Q10/06G06Q30/00
    • Provided are systems and methods for simplifying cloud compute markets. A compute marketplace can be configured to determine, automatically, attributes and/or constraints associated with a job without requiring the consumer to provide them. The compute marketplace provides a clearing house for excess compute resources which can be offered privately or publically. The compute environment can be further configured to optimize job completion across multiple providers with different execution formats, and can also factor operating expense of the compute environment into the optimization. The compute marketplace can also be configured to monitor jobs and/or individual job partitions while their execution is in progress. The compute marketplace can be configured to dynamically redistribute jobs/job partitions across providers when, for example, cycle pricing changes during execution, providers fail to meet defined constraints, excess capacity becomes available, compute capacity becomes unavailable, among other options.
    • 提供了简化云计算市场的系统和方法。 可以将计算市场配置为自动确定与作业相关联的属性和/或约束,而不需要消费者提供它们。 计算市场提供了可以私下或公开提供的多余计算资源的清算所。 计算环境可以进一步配置为优化具有不同执行格式的多个提供商的作业完成,并且还可以将计算环境的操作费用考虑在优化中。 还可以将计算市场配置为在其执行过程中监视作业和/或单个作业分区。 可以将计算市场配置为在供应商之间动态重新分配作业/作业分区,例如在执行期间进行循环定价更改,提供商无法满足定义的约束,过多的容量变得可用,计算容量变得不可用等等。
    • 5. 发明申请
    • A METHOD AND APPARATUS FOR TIME-LAPSE CRYPTOGRAPHY
    • 一种用于时间序列分析的方法和装置
    • WO2008127446A2
    • 2008-10-23
    • PCT/US2007/086101
    • 2007-11-30
    • PRESIDENT AND FELLOWS OF HARVARD COLLEGERABIN, Michael, O.THORPE, Christopher, A.
    • RABIN, Michael, O.THORPE, Christopher, A.
    • H04L9/085H04L2209/42H04L2209/463
    • According to one aspect, provided is a construction and specification for an implementation of a new cryptographic primitive, "Time- Lapse Cryptography", with which a sender can encrypt a message so that it is guaranteed to be revealed at an exact moment in the future, even if this revelation turns out to be undesirable to the sender. In one embodiment, a Time-Lapse Cryptography Service is provided ("the Service") based on a network of parties. Senders encrypt their messages with this public key whose secret key is not known to anyone - not even a trusted third party -- until a predefined and specific future time T + δ, at which point the secret key is constructed and published. In one example, the secret key can only be known after it is constructed. At or after that time, anyone can decrypt the cipher text using this secret key. Other embodiments describe other applications of such a service, for example, one embodiment is used in sealed bid auctions, others in insider stock sales, clinical trials, and electronic voting, among a variety of possible implementations. In one embodiment, a method for cryptographic encoding is provided, including generation of cryptographic key components by a plurality of parties, where participation of the parties is verified. A public key is constructed from a plurality of key components, and in one embodiment, only components generated by parties verified proper are used. A time is associated with the generated public key, which may set a future point at which a secret key will be created, and/or published. When a predetermined time is reached, and in some embodiments, slightly before, construction of the secret key begins. In one alternative, it may be necessary to reconstruct various components used to generate the secret key. In another, the secret key is generated from at least a portion of a plurality of the cryptographic key components.
    • 根据一个方面,提供了一种用于实现新的加密原语“时间延迟加密”的结构和规范,发送者可以通过该时间延迟加密技术对消息进行加密,从而保证在将来的确切时刻被显示 即使这个启示对发件人来说是不合需要的。 在一个实施例中,基于各方的网络提供了时间延迟加密服务(“服务”)。 发件人使用这个公钥加密他们的消息,其秘密密钥对任何人都不知道,甚至不是值得信赖的第三方 - 直到预定义和特定的未来时间T + d,此时构建和发布密钥。 在一个示例中,秘密密钥只有在构造之后才能被知道。 在此之前或之后,任何人都可以使用该秘密密钥对密文进行解密。 其他实施例描述了这种服务的其他应用,例如,在各种可能的实现中,一个实施例用于密封投标拍卖,其他内部股票销售,临床试验和电子投票。 在一个实施例中,提供了一种用于加密编码的方法,包括由多个方生成加密密钥组件,其中确认了各方的参与。 公共密钥由多个关键部件构成,在一个实施例中,仅使用由方正确生成的部件。 一个时间与所生成的公钥相关联,这可以设置将要创建和/或发布秘密密钥的未来点。 当达到预定时间时,并且在一些实施例中稍微稍后,秘密密钥的构造开始。 在一个替代方案中,可能需要重建用于生成秘密密钥的各种组件。 另一方面,秘密密钥是从多个加密密钥分量的至少一部分产生的。