会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • System and method for secure storage, transfer and retrieval of content addressable information
    • 用于安全存储,传输和检索内容可寻址信息的系统和方法
    • US08261066B2
    • 2012-09-04
    • US11094026
    • 2005-03-30
    • Paul R. CarpentierJan F. Van RielTom Teugels
    • Paul R. CarpentierJan F. Van RielTom Teugels
    • H04L29/06
    • H04L29/00G06F17/3061G06F21/00G06F21/60G06F21/64H04L9/0861H04L9/0894H04L9/3236Y10S707/99931Y10S707/99953
    • An algorithm (such as the MD5 hash function) is applied to a file to produce an intrinsic unique identifier (IUI) for the file (or message digest). The file is encrypted using its IUI as the key for the encryption algorithm. An algorithm is then applied to the encrypted file to produce an IUI for the encrypted file. The encrypted file is safely stored or transferred within a network and is uniquely identifiable by its IUI. The encrypted file is decrypted using the IUI of the plaintext file as the key. The IUI serves as both a key to decrypt the file and also as verification that the integrity of the plaintext file has not been compromised. IUIs for any number of such encrypted files may be assembled into a descriptor file that includes meta data for each file, the IUI of the plaintext file and the IUI of the encrypted file. An algorithm is applied to the descriptor file to produce an IUI for the descriptor file. The plaintext descriptor file is then encrypted using the descriptor file IUI as a key for the encryption algorithm. An algorithm is applied to the encrypted descriptor file to produce an IUI for the encrypted descriptor file. The IUI of the encrypted descriptor file is a location-independent identifier to locate the encrypted descriptor file. A flattened descriptor file includes the IUIs of encrypted data files and the IUI of the encrypted descriptor file. An algorithm is applied to the flattened descriptor file to produce its own IUI.
    • 一个算法(如MD5哈希函数)被应用于文件以产生文件(或消息摘要)的固有唯一标识符(IUI)。 该文件使用其IUI作为加密算法的密钥进行加密。 然后将一个算法应用于加密文件,以生成加密文件的IUI。 加密的文件在网络中安全地存储或传输,并由其IUI唯一标识。 使用明文文件的IUI作为密钥解密加密文件。 IUI既可用于解密文件,也可用作验证明文文件的完整性尚未被泄露。 可以将任何数量的这种加密文件的IUI组装成包括每个文件的元数据,明文文件的IUI和加密文件的IUI的描述符文件。 一个算法应用于描述符文件以产生描述符文件的IUI。 然后使用描述符文件IUI作为加密算法的密钥来加密明文描述符文件。 将一种算法应用于加密的描述符文件,以生成加密描述符文件的IUI。 加密描述符文件的IUI是一个位置无关的标识符来定位加密的描述符文件。 扁平化描述符文件包括加密数据文件的IUI和加密描述符文件的IUI。 一个算法应用于展平描述符文件以产生自己的IUI。
    • 6. 发明授权
    • Access to content addressable data over a network
    • 通过网络访问内容可寻址数据
    • US07487551B2
    • 2009-02-03
    • US11296674
    • 2005-12-07
    • Paul CarpentierJan F. Van RielTom Teugels
    • Paul CarpentierJan F. Van RielTom Teugels
    • G06F21/00
    • G06F17/30097G06F11/1451G06F11/1453G06F11/1464G06Q50/22H04L12/1854H04L63/0428H04L63/065H04L63/12H04L67/104H04L67/1068H04L67/108H04L67/28H04L67/2833H04L67/2842
    • Access to content addressable data on a network is facilitated using digital information storing devices or data repositories (“silos”) that monitor broadcast data requests over the network. A number of silos automatically monitor both data requests and data itself that are broadcast over a network. The silos selectively store data. Each silo responds to data requests broadcast over the network with data the silo has previously intercepted. A content addressable file scheme is used to enable the data repositories to reliably identify data being requested. When a data request is received, each silo evaluates whether it has all or a portion of the data being requested and responds to requests when it has the data. Requests for data are implemented by broadcasting a cryptographic hash data identifier of the data file needed. The data identifier is used by a silo to determine which data to receive and store.
    • 使用通过网络监视广播数据请求的数字信息存储设备或数据存储库(“孤岛”)来促进访问网络上的内容可寻址数据。 许多孤岛自动监视通过网络广播的数据请求和数据本身。 仓库有选择地存储数据。 每个筒仓响应数据请求,通过网络传播数据,该数据先前已被拦截。 内容可寻址文件方案用于使数据存储库可靠地识别正在请求的数据。 当接收到数据请求时,每个silo评估它是否具有所请求的全部或一部分数据,并且在具有数据时响应请求。 通过广播所需数据文件的加密哈希数据标识符来实现数据请求。 数据标识符由筒仓使用以确定要接收和存储的数据。
    • 8. 发明申请
    • Content addressable information encapsulation, representation, and transfer
    • 内容可寻址信息封装,表示和传输
    • US20050187902A1
    • 2005-08-25
    • US11105951
    • 2005-04-14
    • Paul CarpentierJan Van RielTom Teugels
    • Paul CarpentierJan Van RielTom Teugels
    • G06F7/00G06F17/00G06F17/30H04L9/00H04L12/18H04L29/06
    • H04L67/108G06F11/1451G06F11/1453G06F11/1464G06F16/137G06Q50/22H04L12/1854H04L63/0428H04L63/065H04L63/12H04L67/104H04L67/1068H04L67/28H04L67/2833H04L67/2842
    • Representing a number of assets on an originating computer begins with selecting the assets to be represented. Cryptographic hash asset identifiers are generated; each of the asset identifiers is computed using the contents of a particular asset. The asset identifier is a content-based or content-addressable asset name for the asset and is location independent. An asset list is generated that includes the asset identifiers computed from the assets. A cryptographic hash asset list identifier is generated that is computed from the asset list. The asset list identifier is stored for later retrieval. The assets selected are also stored for safekeeping either locally or on a computer network. In the event of loss of the files from the originating computer, the asset list identifier is retrieved. Using the asset list identifier, the original asset list is found and retrieved from its safe location. The asset identifiers from the retrieved asset list are used to find and retrieve the individual assets from their backup locations. The assets are verified by recomputing the cryptographic hash asset identifier for each asset retrieved and comparing it to the asset identifier from the asset list. The MD5 algorithm is used for the cryptographic hash function. Assets are retrieved using a multicast protocol. A series of importer programs searches for assets to retrieve in progressively more remote locations. Assets are retrieved whole or in segments.
    • 代表始发计算机上的一些资产开始于选择要表征的资产。 生成加密散列资产标识符; 使用特定资产的内容计算每个资产标识符。 资产标识符是资产的基于内容或内容可寻址的资产名称,与位置无关。 生成包含从资产计算的资产标识符的资产列表。 生成从资产列表计算的加密哈希资产列表标识符。 存储资产列表标识符以供以后检索。 所选择的资产也存储在本地或计算机网络上进行保管。 在从始发计算机丢失文件的情况下,检索资产列表标识符。 使用资产列表标识符,从其安全位置找到并检索原始资产列表。 来自检索资产列表的资产标识符用于从其备份位置查找和检索单个资产。 通过重新计算所检索的每个资产的加密哈希资产标识符并将其与资产列表中的资产标识符进行比较来验证资产。 MD5算法用于密码散列函数。 使用多播协议检索资产。 一系列进口商计划搜索资产,以便在逐渐偏远的地区进行检索。 资产全部或分段检索。
    • 9. 发明申请
    • System and method for secure storage, transfer and retrieval of content addressable information
    • 用于安全存储,传输和检索内容可寻址信息的系统和方法
    • US20050172124A1
    • 2005-08-04
    • US11094026
    • 2005-03-30
    • Paul CarpentierJan Van RielTom Teugels
    • Paul CarpentierJan Van RielTom Teugels
    • G06F12/14G06F1/00G06F12/00G06F17/30G06F21/24H04L9/06H04L9/32H04L9/00
    • H04L29/00G06F17/3061G06F21/00G06F21/60G06F21/64H04L9/0861H04L9/0894H04L9/3236Y10S707/99931Y10S707/99953
    • An algorithm (such as the MD5 hash function) is applied to a file to produce an intrinsic unique identifier (IUI) for the file (or message digest). The file is encrypted using its IUI as the key for the encryption algorithm. An algorithm is then applied to the encrypted file to produce an IUI for the encrypted file. The encrypted file is safely stored or transferred within a network and is uniquely identifiable by its IUI. The encrypted file is decrypted using the IUI of the plaintext file as the key. The IUI serves as both a key to decrypt the file and also as verification that the integrity of the plaintext file has not been compromised. IUIs for any number of such encrypted files may be assembled into a descriptor file that includes meta data for each file, the IUI of the plaintext file and the IUI of the encrypted file. An algorithm is applied to the descriptor file to produce an IUI for the descriptor file. The plaintext descriptor file is then encrypted using the descriptor file IUI as a key for the encryption algorithm. An algorithm is applied to the encrypted descriptor file to produce an IUI for the encrypted descriptor file. The IUI of the encrypted descriptor file is a location-independent identifier to locate the encrypted descriptor file. A flattened descriptor file includes the IUIs of encrypted data files and the IUI of the encrypted descriptor file. An algorithm is applied to the flattened descriptor file to produce its own IUI.
    • 一个算法(如MD5哈希函数)被应用于文件以产生文件(或消息摘要)的固有唯一标识符(IUI)。 该文件使用其IUI作为加密算法的密钥进行加密。 然后将一个算法应用于加密文件,以生成加密文件的IUI。 加密的文件在网络中安全地存储或传输,并由其IUI唯一标识。 使用明文文件的IUI作为密钥解密加密文件。 IUI既可用于解密文件,也可用作验证明文文件的完整性尚未被泄露。 可以将任何数量的这种加密文件的IUI组装成包括每个文件的元数据,明文文件的IUI和加密文件的IUI的描述符文件。 一个算法应用于描述符文件以产生描述符文件的IUI。 然后使用描述符文件IUI作为加密算法的密钥来加密明文描述符文件。 将一种算法应用于加密的描述符文件,以生成加密描述符文件的IUI。 加密描述符文件的IUI是一个位置无关的标识符来定位加密的描述符文件。 扁平化描述符文件包括加密数据文件的IUI和加密描述符文件的IUI。 一个算法应用于展平描述符文件以产生自己的IUI。