Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

315 results about "Access structure" patented technology

Access structures are used in the study of security system where multiple parties need to work together to obtain a resource. Groups of parties that are granted access are called qualified. In set theoretic terms they are referred to as qualified sets. In turn, the set of all such qualified sets is called the access structure of the system. Less formally it is a description of who needs to cooperate with whom in order to access the resource. In its original use in cryptography, the resource was a secret shared among the participants. Only subgroups of participants contained in the access structure, are able to join their shares to recompute the secret. More generally, the resource can also be a task that a group of people can complete together, such as creating a digital signature, or decrypting an encrypted message.

System and method for an online catalog system having integrated search and browse capability

InactiveUS20060095345A1Extend or refine their search or browsing activityCommerceSpecial data processing applicationsLevel of detailSQL
A system and related techniques generate and maintain a unified product index, to perform searching and browsing in an online product, service, content or information catalog. A user investigating, for example, a set of retail offerings of digital cameras may for instance browse through a Web site layout or taxonomy to locate products of interest, such as cameras having resolution in the range of 3-4 megapixels or in the price range of $200-300. Alternatively, the user may input search terms in a search dialogue box to locate those or other features. Unlike conventional e-commerce platforms in which search may be performed against structured databases while browsing may access unstructured HTML or other descriptive material, according to the invention navigation and searching may be integrated and both access a structured index derived from product descriptions as well as traditional SQL or other structured data. A user may thus transparently move between browsing the Web site and searching the Web site, refining their search or browsing activity in a seamless fashion. The HTML or other unstructured data may in one regard be processed by an index engine to identify product attributes such as type (electronics), size, price, weight or other specifications as well as attribute values, which may be sorted or stored in a separate table. A set of results generated by conducting an initial search may thus be continued or refine by further browsing down to a particular product or other level of detail. Conversely a user who has browsed to a given level of detail, such as digital camcorders priced less than $700, may initiate a search through products at that level of the hierarchy without resetting search terms or position in the taxonomy. Greater ease of use, more efficient location of products or services and less dead-end pathways are thus achieved.
Owner:MICROSOFT TECH LICENSING LLC

Key encryption method based on file attribution

InactiveCN102624522AEfficient encryptionReduce multiplication (exclusiveSecuring communicationPlaintextAccess structure
The invention discloses a key encryption method based on file attribution. The key encryption method comprises the following steps of: receiving a user file, generating an attribution aggregate, an access structure tree, a main key and a public key according to the user file, randomly generating symmetric keys, encrypting the user file by using the symmetric keys and a symmetric encryption algorithm to obtain data cipher text, encrypting the symmetric keys by utilizing the public key and the access structure tree to generate a key cipher text, generating a private key associated with the attribution aggregate by utilizing the main key and the attribution aggregate, transmitting the key cipher text and the data cipher text to a server to store, obtaining the key cipher text and the data cipher text from the server by a user, decrypting the key cipher text by using the private key by the user to judge whether the attribution aggregate associated with the private key meets the access structure tree or not, and if meeting the access structure tree, decrypting the symmetric key and decrypting the data cipher text by utilizing the symmetric key through the user to obtain plaintext data. According to the key encryption method based on the file attribution, disclosed by the invention, data is encrypted by the symmetric encryption algorithm, the safety of the symmetric key is protected based on attribution encryption, and the high-efficiency safe access of encrypted data is realized.
Owner:HUAZHONG UNIV OF SCI & TECH

Ciphertext access control method based on CP-ABE (Ciphertext-Policy Attribute-Based Encryption)

The invention discloses a ciphertext access control method based on CP-ABE (Ciphertext-Policy Attribute-Based Encryption), which belongs to the field of information security. The method comprises the following steps: preparation and maintenance work which comprises initialization of CP-ABE (Ciphertext-Policy Attribute-Based Encryption), user registration and auditing, generation of an asymmetric key pair for signature and encryption by the system and the user, generation of a CP-ABE attribute key SK for the user and key and attribute certificate management is carried out; 2, and file sharing requires a file provider, an extensible access control markup language (XACML) access control system and a sharing user to work cooperatively. The attribute certificate in a PMI system is used as an expression document for a CP-ABE attribute set and the access structure, the XACML expresses the CP-ABE policy, and security of the attribute set and the access control structure description is ensured. A hierarchical structure with an inheritance relationship is introduced, features such as distribution, authorization and calculability are supported, the attribute authorization ability needs to comply with constraints, and the method is applicable to a distributed and open network application environment.
Owner:INST OF APPLIED MATHEMATICS HEBEI ACADEMY OF SCI

Methods and apparatus for transesophageal microaccess surgery

The current invention describes methods of transesophageal access to the neck and thorax to perform surgical interventions on structures outside the esophagus in both the cervical and the thoracic cavity. It describes a liner device made of a complete or partial tubular structure, or a flat plate, the liner having means to facilitate creation of a side opening, which may include a valve. The liner with its side opening form a port structure inside the esophageal lumen. The port structure allows elongated surgical devices to pass through a perforation across the full thickness of the esophageal wall to outside location, in a controlled way. The elongated surgical devices can be diagnostic scopes, therapeutic scopes, manual elongated surgical devices, robotic arms or the like. After being deployed outside the esophagus, the surgical devices can access structures outside the esophagus, in the neck and thorax in 360 degrees of freedom around the esophageal circumference. These structures can be bony, cartilaginous, spinal, vascular, soft tissue, deep tissues, lymph nodal, cardiac, pulmonary, tracheal, nervous, muscular or diaphragmatic, skin and subcutaneous tissues of the neck, skin and subcutaneous tissues of the anterior chest wall, skin and subcutaneous tissues of the skin of the back, and skin and layers of the breast.
Owner:MICROACCESS

Multi-mechanism encryption method used in lattices for supporting strategy hiding

The invention discloses a multi-mechanism encryption method used in lattices for supporting strategy hiding. The multi-mechanism encryption method comprises steps that S1, during system initialization, a public parameter and a system main private key are generated; S2, a user applies for a cipher key for own attribute, and an attribute mechanism is used to generate a private key according to the public parameter, the system main private key, and the attribute set of the user; S3, an access structure is converted into a corresponding access tree to realize complete hiding of an access strategy;S4, a data owner is used to generate the ciphertext data according to the public parameter, a plain text, and the converted access tree, and the ciphertext data is uploaded to a cloud server for storage; S5, the user transmits an access request to the cloud server to acquire the ciphertext data stored in the cloud server; S6, the user uses the private key acquired from the attribute mechanism todecrypt the ciphertext data acquired from the cloud server, and the plaintext of the data owner is acquired, and related subsequent operations are carried out. The multi-mechanism encryption method isadvantageous in that the efficiency of the system is improved, and quantum attacks are prevented, and user privacy is effectively improved.
Owner:SHANGHAI MARITIME UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products