会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明申请
    • METHOD FOR TRANSFORMING MESSAGE CONTAINING SENSITIVE INFORMATION
    • 用于转换包含敏感信息的消息的方法
    • WO99024955A1
    • 1999-05-20
    • PCT/US1998/023583
    • 1998-11-05
    • G06F1/00G06F21/00G09C1/12
    • G06F21/6209
    • A method for transforming an original message into a final message by including an untrusted service, includes the steps of identifying at least one sensitive term from the original message (103): replacing the at least one sensitive term with a standard token to create a sanitized message (105); storing the at least one sensitive term (109); transmitting the sanitized message to a provider of the untrusted service (107); performing the untrusted service on the sanitized message to create a serviced message (107); merging the serviced message with the at least one sensitive term stored in the storing step to create the final message (111).
    • 一种用于通过包括不可信服务将原始消息转换成最终消息的方法包括从原始消息(103)中识别至少一个敏感项的步骤:用标准令牌替换至少一个敏感项,以创建消毒 消息(105); 存储所述至少一个敏感项(109); 将所述消毒消息传送到所述不可信服务的提供者(107); 在所述消毒消息上执行所述不可信服务以创建服务消息(107); 将服务消息与存储在存储步骤中的至少一个敏感项合并以创建最终消息(111)。
    • 4. 发明申请
    • BALANCED CRYPTOGRAPHIC COMPUTATIONAL METHOD AND APPARATUS FOR LEAK MINIMIZATION IN SMARTCARDS AND OTHER CRYPTOSYSTEMS
    • 计算CRYPTO均衡方法,尽量减少泄漏装置,智能卡等密码系统
    • WO99067766A3
    • 2000-04-06
    • PCT/US1999/012739
    • 1999-06-03
    • H04L9/06G09C1/12
    • H04L9/0618G06F21/602G06F21/755G06F2207/7219H04L9/003H04L63/1441H04L2209/122
    • Cryptographic devices that leak information about their secrets through externally monitorable characteristics (such as electromagnetic radiation and power consumption) may be vulnerable to attack, and previously-known methods that could address such leaking are inappropriate for smartcard and many other cryptographic applications. Methods and apparatuses are disclosed for performing computations in which the representation of data, the number of system state transitions at each computational step, and the Hamming weights of all operands are independent of computation inputs, intermediate values, or results. Exemplary embodiments (figure 6) implemented using conventional hardware elements such as electronic components (611, 613) and logic gates (610, 620, 630, 640) as well as software executing on conventional microprocessors are described.
    • 本发明涉及其中存在的对他们的秘密信息盗用通过可以从外部进行监测(例如,电磁辐射和功耗)和特性的风险的加密设备 谁容易受到攻击。 本发明还涉及可以处理这种泄漏并且未被证明用于智能卡和许多不同应用的已知方法。 是本发明的主题提供了用于数据的表示执行计算的方法和设备,系统状态转换中的计算的每个状态和数量所有操作数的汉明权是独立的输入端 计算,中间值或结果。 本发明还涉及使用诸如电子组件,逻辑门等的硬件(泄漏)元件的某些实施例。 以及运行在常规(泄漏)微处理器上的软件。 智能卡和其他防篡改设备极大地提高了对涉及外部监视的加密攻击的抵抗力。
    • 5. 发明申请
    • NON-SLIDING SPRING MECHANISM FOR POSTER FRAMES
    • 非框架的非滑动弹簧机构
    • WO98041964A1
    • 1998-09-24
    • PCT/US1998/005160
    • 1998-03-17
    • A47G1/06G09F15/00G09C1/12
    • A47G1/0611G09F15/0018
    • A non-sliding spring mechanism (40) for picture and poster frame (10). A flat metal spring biasing member (40) having a pair of opposed sawtooth or irregular edges (64, 66) is positioned between a rotating cover member (18) and a stationary base member (16) in each section of the frame device. The projections on the irregular edges of the spring member are preferably pointed and embed in the metal channels of the cover and base members and dig grooves therein, preventing the cover member and the base member from sliding longitudinally relative to one another. Various configurations of toothed and pointed members can be utilized on the opposed irregular edges of the spring biasing member. Preferably, the irregular edges have one or more flat areas (76) in order to prevent the spring members for embedding too deeply in the channels in the cover and base members.
    • 一种用于图片和海报框架(10)的非滑动弹簧机构(40)。 具有一对相对的锯齿或不规则边缘(64,66)的扁平金属弹簧偏置构件(40)位于框架装置的每个部分中的旋转盖构件(18)和固定基座构件(16)之间。 优选地,弹簧构件的不规则边缘上的突出部是尖的,并且嵌入到盖子和基座构件的金属通道中,并且在其中形成挖槽,防止盖构件和基座构件相对于彼此纵向滑动。 可以在弹簧偏置构件的相对的不规则边缘上使用齿形和尖形构件的各种构造。 优选地,不规则边缘具有一个或多个平坦区域(76),以便防止弹簧构件太深地埋入盖和基底构件中的通道中。