会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • METHOD AND SYSTEM FOR VIRAL IDENTIFICATION OF EVACUEES
    • EVACUEES病毒鉴定方法和系统
    • WO2017106961A1
    • 2017-06-29
    • PCT/CA2016/051031
    • 2016-08-31
    • GENETEC INC.
    • RACZ, Pierre
    • G06Q10/00G07C11/00H04W4/00H04W4/14H04B5/00
    • G06Q10/00G07C11/00H04W4/023H04W4/14H04W4/80H04W4/90
    • A method and system for viral identification of evacuees are provided. The method is recursive and involves bringing an emergency warden and a midstream evacuee in close proximity with one another to enable a handheld computing device belonging to one of the two to read information from the other, enabling the handheld computing device to read the information, having the handheld computing device read the information to enable an identification of the midstream evacuee, providing the identifier of the midstream evacuee to a central mustering server, whereby the midstream evacuee is enabled to act as an emergency warden, and performing the method with the midstream evacuee acting as an emergency warden with respect to another evacuee before the central mustering server. The method provides the advantage of virally identifying evacuees within the confines of a muster point in an efficient and reliable manner.
    • 提供了一种用于撤离人员病毒鉴定的方法和系统。 该方法是递归的并且涉及使紧急监督员和中游避难者彼此靠近以使属于二者中的一个的手持计算设备从另一个手持计算设备读取信息,使手持计算设备能够读取信息,具有 手持式计算设备读取信息以能够识别中游逃居者,将中游避难者的标识符提供给中央集合服务器,由此中游避难者能够充当紧急监管员并且与中游避难者一起执行该方法 作为中央集合服务器之前的另一个撤离人员的紧急监管员。 该方法提供了以有效和可靠的方式在集合点范围内以病毒方式识别撤离人员的优势。
    • 8. 发明申请
    • SECURE LAYERED ENCRYPTION OF DATA STREAMS
    • 数据流的安全分层加密
    • WO2017083980A1
    • 2017-05-26
    • PCT/CA2016/051350
    • 2016-11-18
    • GENETEC INC.
    • RACZ, PierreRIOUX, Frédéric
    • H04L9/30G08B13/196H04L9/14
    • H04L9/14G08B13/196H04L9/0825H04L2209/60
    • Technology permitting secure storage and transmission of data stream as well as tiered access to multiple data stream according to permission. Data streams may be encrypted using symmetric encryption performed with varying symmetric keys according to a key stream of symmetric keys. Native data may be discarded for safety. Whole or partial key streams may be encrypted using the public keys of authorized entities having permission to access respective data streams or portions thereof. Only the corresponding private keys can decrypt the encrypted key streams required to decrypt the encrypted data streams. Thus rigorous access control is provided. IT personnel accessing data stream files on a server or intruders maliciously obtaining files will not be able to derive the data stream. Sensitive data streams may be stored using cloud services despite inherent risks.
    • 技术允许数据流的安全存储和传输以及根据许可分层访问多个数据流。 数据流可以使用根据对称密钥的密钥流使用不同的对称密钥执行的对称加密来加密。 为了安全起见,原生数据可能会被丢弃。 可以使用具有访问相应数据流或其部分的权限的授权实体的公钥来加密全部或部分密钥流。 只有相应的专用密钥才能解密解密加密数据流所需的加密密钥流。 因此提供了严格的访问控制。 IT人员访问服务器上的数据流文件或恶意获取文件的入侵者将无法获取数据流。 尽管存在固有风险,敏感数据流可以使用云服务进行存储。