会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Method and system for confidentially providing software components
    • 保密提供软件组件的方法和系统
    • US09542537B2
    • 2017-01-10
    • US13508712
    • 2010-10-14
    • Michael BraunMarkus DichtlBernd Meyer
    • Michael BraunMarkus DichtlBernd Meyer
    • G06F21/10H04L9/32
    • G06F21/10H04L9/3247H04L2209/60
    • A method and system for confidentially providing a software component which is encrypted using a secret cryptographic key of a software component manufacturer, and the key is then encrypted using a first cryptographic system key, wherein the encrypted software component and the encrypted key are transported by the software component manufacturer to a destination system device. After decrypting the transported encrypted key using a second cryptographic system key, the transported encrypted software component is decrypted using the decrypted key, wherein the decrypted software component is provided for execution on the destination system device. The method can be used to protect source codes or object codes of a developed software component from access by a third party and still allows for processing using standard tools.
    • 一种用于保密地提供使用软件组件制造商的秘密密码密钥加密的软件组件的方法和系统,然后使用第一密码系统密钥对密钥进行加密,其中加密的软件组件和加密密钥由 软件组件制造商到目标系统设备。 在使用第二密码系统密钥解密所传送的加密密钥之后,使用解密密钥解密所传送的加密软件组件,其中解密的软件组件被提供用于在目标系统设备上执行。 该方法可用于保护开发的软件组件的源代码或目标代码不被第三方访问,并且仍允许使用标准工具进行处理。
    • 2. 发明授权
    • Method and system for resolving a naming conflict
    • 解决命名冲突的方法和系统
    • US09372966B2
    • 2016-06-21
    • US13508621
    • 2010-10-06
    • Michael BraunMarkus DichtlBernd Meyer
    • Michael BraunMarkus DichtlBernd Meyer
    • G06F21/12G06F9/445
    • G06F21/125G06F9/44552
    • A method and a system for naming-conflict-free integration of software components originating from software component manufacturers (OEM), comprising software development devices from different software component manufacturers (OEM) that manufacture and encrypt software components with the respective cryptographic key, wherein when a naming conflict occurs during the integration of encrypted software components, at least one of the encrypted software components in which the naming conflict occurred is expanded by a naming conflict resolution rule to thereby allows for the resolution of naming conflicts in encrypted software components that can originate from different software component manufacturers without the source code of the software components becoming visible to third parties.
    • 一种用于命名不受软件组件制造商(OEM)的软件组件进行命名冲突的集成的方法和系统,包括来自不同软件组件制造商(OEM)的软件开发设备,该软件组件制造商(OEM)使用相应的加密密钥来制造和加密软件组件,其中何时 在加密软件组件的集成期间发生命名冲突,通过命名冲突解决规则来扩展发生命名冲突的加密软件组件中的至少一个,从而允许解决可能发起的加密软件组件中的命名冲突 来自不同软件组件制造商的软件组件的源代码对第三方变得可见。
    • 3. 发明授权
    • Method and system for the accelerated decryption of cryptographically protected user data units
    • 加密解密密码保护用户数据单元的方法和系统
    • US09571273B2
    • 2017-02-14
    • US13508707
    • 2010-10-12
    • Michael BraunMarkus DichtlBernd Meyer
    • Michael BraunMarkus DichtlBernd Meyer
    • H04L29/06H04L9/08
    • H04L9/0825
    • A method and system for accelerated decryption of a cryptographically protected user data unit, wherein a transmitter initially generates a cryptographic key that is provided with a related key identification. The transmitter then performs asymmetrical encryption of the generated cryptographic key using a public cryptographic key and encryption of at least one user data unit using the generated cryptographic key. The encrypted user data unit, the asymmetrically encrypted cryptographic key and the related key identification of the cryptographic key are transported to a receiver that decrypts the received asymmetrically encrypted key using a private key, if verification of the received related key identification of the cryptographic key indicates the cryptographic key is not present in a decrypted state in the receiver. The receiver then decrypts the received cryptographically encrypted user data unit using the cryptographic key in the receiver or with the cryptographic key decrypted using the private key.
    • 一种用于加密解密密码保护的用户数据单元的方法和系统,其中发射机最初生成具有相关密钥标识的加密密钥。 然后,发射机使用公共加密密钥对所生成的加密密钥进行不对称加密,并使用生成的加密密钥对至少一个用户数据单元进行加密。 如果加密密钥的加密用户数据单元,非对称加密的加密密钥和密钥的相关密钥标识被传送到使用专用密钥对接收到的非对称加密密钥进行解密的接收机, 加密密钥在接收机中不存在于解密状态。 然后,接收机使用接收机中的加密密钥或使用私钥解密的加密密钥来解密所接收的密码加密的用户数据单元。
    • 4. 发明申请
    • Method and System for Resolving a Naming Conflict
    • 解决命名冲突的方法和系统
    • US20120324219A1
    • 2012-12-20
    • US13508621
    • 2010-10-06
    • Michael BraunMarkus DichtlBernd Meyer
    • Michael BraunMarkus DichtlBernd Meyer
    • H04L9/00
    • G06F21/125G06F9/44552
    • A method and a system for naming-conflict-free integration of software components originating from software component manufacturers (OEM), comprising software development devices from different software component manufacturers (OEM) that manufacture and encrypt software components with the respective cryptographic key, wherein when a naming conflict occurs during the integration of encrypted software components, at least one of the encrypted software components in which the naming conflict occurred is expanded by a naming conflict resolution rule to thereby allows for the resolution of naming conflicts in encrypted software components that can originate from different software component manufacturers without the source code of the software components becoming visible to third parties.
    • 一种用于命名不受软件组件制造商(OEM)的软件组件进行命名冲突的集成的方法和系统,包括来自不同软件组件制造商(OEM)的软件开发设备,该软件组件制造商(OEM)使用相应的加密密钥来制造和加密软件组件,其中何时 在加密软件组件的集成期间发生命名冲突,通过命名冲突解决规则来扩展发生命名冲突的加密软件组件中的至少一个,从而允许解决可能发起的加密软件组件中的命名冲突 来自不同软件组件制造商的软件组件的源代码对第三方变得可见。
    • 5. 发明申请
    • Method and System for Confidentially Providing Software Components
    • 自动提供软件组件的方法和系统
    • US20120321089A1
    • 2012-12-20
    • US13508712
    • 2010-10-14
    • Michael BraunMarkus DichtlBernd Meyer
    • Michael BraunMarkus DichtlBernd Meyer
    • H04L9/08
    • G06F21/10H04L9/3247H04L2209/60
    • A method and system for confidentially providing a software component which is encrypted using a secret cryptographic key of a software component manufacturer, and the key is then encrypted using a first cryptographic system key, wherein the encrypted software component and the encrypted key are transported by the software component manufacturer to a destination system device. After decrypting the transported encrypted key using a second cryptographic system key, the transported encrypted software component is decrypted using the decrypted key, wherein the decrypted software component is provided for execution on the destination system device. The method can be used to protect source codes or object codes of a developed software component from access by a third party and still allows for processing using standard tools.
    • 一种用于保密地提供使用软件组件制造商的秘密密码密钥加密的软件组件的方法和系统,然后使用第一密码系统密钥对密钥进行加密,其中加密的软件组件和加密密钥由 软件组件制造商到目标系统设备。 在使用第二密码系统密钥解密所传送的加密密钥之后,使用解密密钥解密所传送的加密软件组件,其中解密的软件组件被提供用于在目标系统设备上执行。 该方法可用于保护开发的软件组件的源代码或目标代码不被第三方访问,并且仍允许使用标准工具进行处理。
    • 6. 发明申请
    • Method And System For The Accelerated Decryption Of Cryptographically Protected User Data Units
    • 加密解密密码保护用户数据单元的方法和系统
    • US20120321088A1
    • 2012-12-20
    • US13508707
    • 2010-10-12
    • Michael BraunMarkus DichtlBernd Meyer
    • Michael BraunMarkus DichtlBernd Meyer
    • H04L9/08
    • H04L9/0825
    • A method and system for accelerated decryption of a cryptographically protected user data unit, wherein a transmitter initially generates a cryptographic key that is provided with a related key identification. The transmitter then performs asymmetrical encryption of the generated cryptographic key using a public cryptographic key and encryption of at least one user data unit using the generated cryptographic key. The encrypted user data unit, the asymmetrically encrypted cryptographic key and the related key identification of the cryptographic key are transported to a receiver that decrypts the received asymmetrically encrypted key using a private key, if verification of the received related key identification of the cryptographic key indicates the cryptographic key is not present in a decrypted state in the receiver. The receiver then decrypts the received cryptographically encrypted user data unit using the cryptographic key in the receiver or with the cryptographic key decrypted using the private key.
    • 一种用于加密解密密码保护的用户数据单元的方法和系统,其中发射机最初生成具有相关密钥标识的加密密钥。 然后,发射机使用公共加密密钥对所生成的加密密钥进行不对称加密,并使用生成的加密密钥对至少一个用户数据单元进行加密。 如果加密密钥的加密用户数据单元,非对称加密的加密密钥和密钥的相关密钥标识被传送到使用专用密钥对接收到的非对称加密密钥进行解密的接收机, 加密密钥在接收机中不存在于解密状态。 然后,接收机使用接收机中的加密密钥或使用私钥解密的加密密钥来解密所接收的密码加密的用户数据单元。