会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 5. 发明授权
    • Low-overhead secure information processing for mobile gaming and other lightweight device applications
    • 用于移动游戏和其他轻量级设备应用的低开销安全信息处理
    • US07340058B2
    • 2008-03-04
    • US09844121
    • 2001-04-27
    • Bjorn Markus JakobssonDavid PointchevalAdam Lucas Young
    • Bjorn Markus JakobssonDavid PointchevalAdam Lucas Young
    • H04K1/00H04L9/32A63F9/24
    • G07F17/32A63F13/12A63F2300/204A63F2300/401A63F2300/406A63F2300/50A63F2300/532G06Q20/325G06Q20/3674H04L9/3247H04L2209/56H04L2209/805
    • Cryptography-based methods and apparatus for secure information processing are disclosed that are particularly efficient in terms of the computational resources required, and thus implementable in mobile telephones, personal digital assistants (PDAs) or other lightweight processing devices. A setup procedure is performed to permit interactions of a designated type, e.g., secure mobile gaming interactions, to be carried out between participants, e.g., one or more players and a casino. A given participant initiates a particular interaction with another participant by sending to that participant initiation information based at least in part on one or more results of the setup procedure. The other participant in turn sends response information back to the given participant, and the interaction then continues with one or more rounds each involving one or more decisions committed to by each participant. Transcripts of the interaction can be used to determine rights of the first and second participants in a publicly verifiable manner, with the rights being based upon particular results of the interaction. The invention may be configured to permit arbitrary disconnection of the lightweight devices, and provides the advantages of public verifiability, fairness and robustness. Although the invention is particularly well suited for use in secure mobile gaming applications, it is also applicable to other secure information processing applications, including contract signing and fair exchange of digital signatures.
    • 公开了用于安全信息处理的基于密码学的方法和装置,其在所需的计算资源方面特别有效,并且因此可在移动电话,个人数字助理(PDA)或其它轻量级处理装置中实现。 执行设置过程以允许在参与者(例如,一个或多个玩家和娱乐场)之间执行指定类型(例如,安全的移动游戏交互)的交互。 给定的参与者通过至少部分地基于设置过程的一个或多个结果发送给该参与者发起信息来发起与另一参与者的特定交互。 另一参与者又将响应信息发回给给定的参与者,然后交互继续进行一轮或多轮,每轮涉及每个参与者承诺的一个或多个决定。 交互记录可用于以公开可验证的方式确定第一和第二参与者的权利,权利基于交互的特定结果。 本发明可以被配置为允许轻量化设备的任意断开,并且提供公共可验证性,公平性和鲁棒性的优点。 虽然本发明特别适用于安全的移动游戏应用,但也适用于其他安全信息处理应用,包括合同签名和数字签名的公平交换。
    • 6. 发明申请
    • Cryptography for secure dynamic group communications
    • 密码学用于安全动态组通信
    • US20050157874A1
    • 2005-07-21
    • US11001251
    • 2004-11-30
    • Emmanuel BressonOlivier ChevassutDavid Pointcheval
    • Emmanuel BressonOlivier ChevassutDavid Pointcheval
    • H04K1/00H04L9/00H04L9/08
    • H04L9/0841
    • A method for generating a cryptographic key by players in a dynamic group, where: 1) a first player U1 initiates an upflow to the next player, the upflow based on a random value x1, a random value v1, and “g”, a generator of a finite cyclic group where a computational solution to a Diffie-Hellman problem is hard; 2) each player after the first Up sends an upflow Flp, comprising information based on a random value xp, a random value vp, and the previous upflow Flp−1; 3) the last player Up sends a downflow Fln to all other players in the dynamic group, where the downflow Fln comprises information based on a random value xn, a random value vn, and the previous upflow Fln−1. New players may join the dynamic group in a similar fashion. Players may be removed from the dynamic group by adjusting the downflow to the remaining players. The dynamic group may be refreshed by adjusting the downflow to establish a new cryptographic key.
    • 一种用于由动态组中的玩家产生加密密钥的方法,其中:1)第一玩家U 1向下一玩家发起向上流,基于随机值x 1的向上流 < / SUB>,随机值v 1>和“g”,其中对Diffie-Hellman问题的计算解难的有限循环群的生成器; 2)每个播放器在第一U

      P 之后发送包括基于随机值x∈P的信息的上升流P p, p< SUB>和先前的上升流F1-1< 3)最后一个播放器U

      向动态组中的所有其他播放器发送下拉菜单,其中向下流Fl N n包括基于信息 随机值x N n,随机值v N n N,以及先前的上升流F1-n-1。 新玩家可以以类似的方式加入动态组。 可以通过调整剩余玩家的下降流量来从动态组中移除玩家。 可以通过调整下降流来建立新的加密密钥来刷新动态组。

    • 7. 发明授权
    • Public key identification process using two hash functions
    • 公钥识别过程使用两个哈希函数
    • US6125445A
    • 2000-09-26
    • US76818
    • 1998-05-13
    • David ArdittiHenri GilbertJacques SternDavid Pointcheval
    • David ArdittiHenri GilbertJacques SternDavid Pointcheval
    • H04L9/32H04L9/00
    • H04L9/3236H04L9/3218
    • A process for the identification of a claimant by a verifier. The process is of the public key type, where the public exponent is equal to 3. The claimant draws at random a first exponent .alpha., calculates r=g.sup..alpha. mod n and transmits R=r.sup.3. The verifier draws at random a second exponent .beta., calculates t=g.sup..beta. mod n, calculates T=t.sup.3 mod n and h=H.sub.1 (Z), where H.sub.1 is a hash function, and calculates Z=R.sup.3 mod n. The verifier transmits to the claimant the numbers T and h. The claimant calculates Y=T.sup..alpha. mod n, verifies the result H.sub.1 (Y), calculates H=H.sub.2 (Y), where H.sub.2 is another hash function, calculates z=rS mod n, and transmits z and H. The claimant also has a secret number S equal to the modulo n cubic root of a number I deduced from its identity so that the number S verifies S.sup.3 =I mod n. The verifier verifies that H received is equal to H.sub.2 (Z) and that z.sup.3 is equal to RI mod n.
    • 验证者识别索赔人的过程。 该过程是公钥类型,其中公共指数等于3.索赔人随机抽取第一指数α,计算r = g alpha mod n并发送R = r3。 验证者随机抽取第二指数β,计算t = g beta mod n,计算T = t3 mod n和h = H1(Z),其中H1是散列函数,并计算Z = R3 mod n。 验证者向索赔人传送号码T和h。 索赔人计算Y = Tαmod n,验证结果H1(Y),计算H = H2(Y),其中H2是另一个哈希函数,计算z = rS mod n,并发送z和H.索赔人也有 秘密数S等于从其身份推断的数字的模n立方根,使得数S验证S3 = I mod n。 验证者验证H接收等于H2(Z),并且z3等于RI mod n。