Apparatus and method for estimating device availability
    1.
    发明申请
    Apparatus and method for estimating device availability 有权
    用于估计设备可用性的设备和方法

    公开(公告)号:US20050259607A1

    公开(公告)日:2005-11-24

    申请号:US10849999

    申请日:2004-05-19

    CPC classification number: H04W24/00 H04W24/06

    Abstract: A method and apparatus for estimating device availability in a pervasive peer to peer environment is presented. The method and apparatus include a linear estimation approach and a bin estimation approach, where the bin estimation approach may include enhanced bin estimation or adaptive bin estimation. A central node queries available contacted devices and builds a history of times and availability indications for the contacted device, and subsequently computes an availability probability curve based on assumptions regarding the availability indications and the time since the last received availability indication.

    Abstract translation: 提出了一种用于在普遍对等环境中估计设备可用性的方法和装置。 该方法和装置包括线性估计方法和bin估计方法,其中bin估计方法可以包括增强的bin估计或自适应bin估计。 中央节点查询可用联系的设备并构建所接触设备的时间和可用性指示的历史,并且随后基于关于可用性指示和自上次接收可用性指示以来的时间的假设来计算可用性概率曲线。

    Off-loading data re-encryption in encrypted data management systems
    2.
    发明授权
    Off-loading data re-encryption in encrypted data management systems 失效
    在加密数据管理系统中卸载数据重新加密

    公开(公告)号:US07454021B2

    公开(公告)日:2008-11-18

    申请号:US10976552

    申请日:2004-10-29

    CPC classification number: H04L9/0825 H04L9/0891 H04L2209/60

    Abstract: Described is a solution for maintaining the security of encrypted data despite a compromised private key by using a re-encryption process that does not require decryption of the encrypted data. The compromised private key is re-encrypted using a new public key as is the encrypted symmetric key which the compromised private key can decrypt. When a decrypted version of the encrypted data is requested, the private key corresponding to the new public key decrypts both the encrypted version of the compromised private key and the re-encrypted version of the symmetric key resulting in the unencrypted compromised private key and the previously encrypted version of the symmetric key, which when decrypted using the compromised private key decrypts the encrypted data. The unencrypted symmetric key can then be encrypted using the new public key any encrypted compromised private key can be deleted.

    Abstract translation: 描述了一种用于通过使用不需要解密加密数据的重新加密过程来保护加密数据的安全性的解决方案,尽管受到危及的私钥。 受损的私有密钥使用新的公钥重新加密,以及受损私钥可以解密的加密对称密钥。 当请求加密数据的解密版本时,对应于新公开密钥的私有密钥解密受损私钥的加密版本和对称密钥的重新加密版本,导致未加密的受损密钥和先前 对称密钥的加密版本,当使用受到破坏的私钥进行解密时解密加密数据。 然后可以使用新的公钥对未加密的对称密钥进行加密,任何加密的受损私钥可被删除。

    Verifying incremental updates to hierarchicaly structured information
    3.
    发明申请
    Verifying incremental updates to hierarchicaly structured information 审中-公开
    验证层次结构化信息的增量更新

    公开(公告)号:US20050273472A1

    公开(公告)日:2005-12-08

    申请号:US10861292

    申请日:2004-06-04

    CPC classification number: G06F16/282

    Abstract: Techniques for verifying whether an incremental update was correctly applied to a set of hierarchically structured information include determining an overall integrity code for the hierarchically structured information and attaching the overall integrity code to the hierarchically structured information. An incremental update according to the present techniques includes an integrity code that is combined into the overall integrity code attached to the hierarchically structured information when the incremental update is applied to the hierarchically structured information. The integrity code of the incremental update is generated such that when the overall integrity code is recomputed it will match the overall integrity code attached to the hierarchically structured information if the incremental update was correctly applied.

    Abstract translation: 用于验证增量更新是否正确应用于一组分层结构化信息的技术包括确定用于分层结构化信息的整体完整性代码,并将整体完整性代码附加到分层结构化信息。 根据本技术的增量更新包括当将增量更新应用于分层结构化信息时,将完整性代码组合成附加到分层结构化信息的整体完整性代码。 生成增量更新的完整性代码,使得当重新计算整体完整性代码时,如果正确应用了增量更新,它将匹配附加到分层结构化信息的整体完整性代码。

    Secure incremental updates to hierarchicaly structured information
    4.
    发明申请
    Secure incremental updates to hierarchicaly structured information 有权
    针对分层结构化信息安全增量更新

    公开(公告)号:US20050273471A1

    公开(公告)日:2005-12-08

    申请号:US10860977

    申请日:2004-06-04

    CPC classification number: H04L63/0428 G06F21/6218 G06F2221/2145

    Abstract: Techniques for performing an incremental update to a set of hierarchically structured information that do not expose the structure and content of the hierarchically structured information to unauthorized parties. The present techniques include encrypting the hierarchically structured information such that an arrangement of nodes and corresponding data of the hierarchically structured information is not exposed and each node includes a corresponding node identifier that is not encrypted and updating the hierarchically structured information by referring to the nodes using the node identifiers.

    Abstract translation: 用于对未分层结构化信息的结构和内容暴露于未授权方的对一组分层结构化信息执行增量更新的技术。 本技术包括对分层结构化信息进行加密,使得不暴露分层结构化信息的节点和对应数据的布置,并且每个节点包括未被加密的相应节点标识符,并通过参考节点来更新分层结构化信息 节点标识符。

    Off-loading data re-encryption in encrypted data management systems
    6.
    发明申请
    Off-loading data re-encryption in encrypted data management systems 失效
    在加密数据管理系统中卸载数据重新加密

    公开(公告)号:US20060093150A1

    公开(公告)日:2006-05-04

    申请号:US10976552

    申请日:2004-10-29

    CPC classification number: H04L9/0825 H04L9/0891 H04L2209/60

    Abstract: Described is a solution for maintaining the security of encrypted data despite a compromised private key by using a re-encryption process that does not require decryption of the encrypted data. The compromised private key is re-encrypted using a new public key as is the encrypted symmetric key which the compromised private key can decrypt. When a decrypted version of the encrypted data is requested, the private key corresponding to the new public key decrypts both the encrypted version of the compromised private key and the re-encrypted version of the symmetric key resulting in the unencrypted compromised private key and the previously encrypted version of the symmetric key, which when decrypted using the compromised private key decrypts the encrypted data. The unencrypted symmetric key can then be encrypted using the new public key any encrypted compromised private key can be deleted.

    Abstract translation: 描述了一种用于通过使用不需要解密加密数据的重新加密过程来保护加密数据的安全性的解决方案,尽管受到妥协的私钥。 受损的私有密钥使用新的公钥重新加密,以及受损私钥可以解密的加密对称密钥。 当请求加密数据的解密版本时,对应于新公共密钥的私有密钥解密受损私钥的加密版本和对称密钥的重新加密版本,导致未加密的受损密钥和先前 对称密钥的加密版本,当使用受到破坏的私钥进行解密时解密加密数据。 然后可以使用新的公钥对未加密的对称密钥进行加密,任何加密的受损私钥可被删除。

Patent Agency Ranking