这是我们最新精选的全球范围内以加密为主题的出版物和专利,涉及许多科学在线期刊,分类并侧重于加密、密码学、密码、AES、密码分析、Diffie-Hellman、散列函数、RSA 算法、数字签名、密码密钥、证书授权、公钥、私钥和椭圆曲线。
出版: 没有关于此特定主题的最新消息。请尝试在上面链接的出版物数据库中进行广泛的人工搜索。
Network-independent dynamic encryption
Patent published on the 2025-03-06 in WO under Ref WO2025049427 by CONC3AL INC [US] (Ilic Igor [us], Quinn Cary [us], Chase Charles [us], Nastasi Franklin [us])
Abstract: A computer-implemented method to improve the safety of digital documents and assets, including for example digital tickets, may include the steps of: generating a salt/public key by obtaining a longitude and latitude of an event attendee smart device GPS chip and obtaining a time stamp from the smart device operating system; creating a static and unique ID; creating a data carrier/glyph/code, such creating a new quick response code, in intervals using data to be rehashed comprising the unique ID[...]
Our summary: A method for enhancing digital document safety by generating unique IDs and using GPS data to create dynamic encryption codes for validation.
dynamic encryption, digital documents, GPS chip, quick response code
Patent
Method and apparatus for confirming boarding of passenger in uam environment
Patent published on the 2025-03-06 in WO under Ref WO2025048366 by KIA CORP [KR] (Jung Chang Hun [kr], Park Seung Wook [kr])
Abstract: A method and an apparatus for confirming boarding of a passenger in a UAM environment are disclosed. According to one aspect of the present disclosure, the provided method, which is performed by a fuselage system supporting a function of checking whether a user has boarded a fuselage and taken a reserved seat, comprises the steps of: receiving, from a user terminal, a first encryption token including reservation information of the user and identification proof information; receiving, from a flig[...]
Our summary: Method and apparatus for confirming boarding of passenger in UAM environment by using encryption tokens and symmetric key to verify user reservation and seat allocation.
boarding, passenger, UAM, fuselage
Patent
Secure offline transactions using trusted payer
Patent published on the 2025-03-06 in WO under Ref WO2025048687 by TELEFONAKTIEBOLAGET LM ERICSSON PUBL [SE] (Karlsson Henrik [at])
Abstract: A method for making an offline transaction between a payee and a payer, performed by a payee device in communication with a payer device, is provided. The method includes sending, by the payee device, towards the payer device, a first message including signed payee offline information. The method includes receiving, by the payee device, from the payer device, signed payer offline information that is signed with a transaction broker node private key. The method includes receiving, by the payee de[...]
Our summary: Secure offline transactions between payee and payer devices using signed offline information and verification process.
offline transactions, secure, trusted payer, method
Patent
Method and apparatus for supporting protection of control frame in wireless lan system
Patent published on the 2025-03-06 in WO under Ref WO2025048617 by LG ELECTRONICS INC [KR] (Baek Sunhee [kr], Choi Jinsoo [kr], Jang Insun [kr], Kim Geonhwan [kr], Yoon Yelin [kr], Cha Dongju [kr])
Abstract: Disclosed are a method and an apparatus for supporting protection of a control frame in a wireless LAN system. The method performed by a first STA in a wireless local area network (WLAN) system, according to an embodiment of the present disclosure, may comprise the steps of: checking key information related to protection of a control frame; on the basis of a specific encryption protocol, receiving a control frame including encrypted information from a second STA; and on the basis of the key info[...]
Our summary: Method and apparatus for protecting control frames in a wireless LAN system by checking key information, receiving encrypted control frames, and performing decryption and integrity check based on the key information.
wireless LAN, control frame, encryption protocol, decryption
Patent
Disinfectant articles with improved aesthetic performance
Patent published on the 2025-03-06 in WO under Ref WO2025048826 by KIMBERLY CLARK WORLDWIDE INC [US] (Horkman Alexander J [us], Engelbrecht Kathleen C [us], Kapadia Poonamben [us], Dickson Yolonda [us], Wolff Kelly L [us])
Abstract: Disclosed herein are antimicrobial compositions having improved antimicrobial efficacy and aesthetic performance, wherein the compositions include at least one polyquaternium polymer, an antimicrobial agent and an aesthetic enhancer. In specific embodiments, an antimicrobial composition comprises a quaternary ammonium salt comprises benzalkonium chloride, a first polyquaternium species that is polyquaternium-6, an aesthetic enhancer selected from isocetyl alcohol, hexyldecanol, lauryl lactate, d[...]
Our summary: Antimicrobial compositions with improved efficacy and aesthetic performance, including polyquaternium polymer, benzalkonium chloride, and aesthetic enhancers.
antimicrobial, polyquaternium polymer, aesthetic enhancer, benzalkonium chloride
Patent
Long-lasting disinfectant articles
Patent published on the 2025-03-06 in WO under Ref WO2025048827 by KIMBERLY CLARK WORLDWIDE INC [US] (Horkman Alexander J [us], Engelbrecht Kathleen C [us], Kapadia Poonamben [us], Ballesteros Jane [us])
Abstract: Disclosed herein are antimicrobial compositions having improved antimicrobial efficacy and aesthetic performance, wherein the compositions include at least two polyquaternium polymers and an antimicrobial agent. In specific embodiments, the antimicrobial composition comprises a quaternary ammonium salt in an amount less than 1.0 wt%, a first polyquaternium species that is polyquaternium-6, a second polyquaternium species that is polyqyaternium-22, and water.[...]
Our summary: Long-lasting disinfectant articles with improved antimicrobial efficacy and aesthetic performance, comprising polyquaternium polymers, quaternary ammonium salt, and water.
disinfectant, antimicrobial compositions, polyquaternium polymers, quaternary ammonium salt
Patent
读起来很有趣,但这些专利是真的在突破界限,还是只是在翻新旧的加密技术?让我们来讨论一下吧。
有趣的阅读,但我们是否忽略了高级加密的潜在滥用?这是一把双刃剑,不是吗?
相关文章
CMMI 评估的 SCAMPI 方法详解
风险评估中的风险收益比
最佳工程师笑话(以及设计师、创造者、营销人员……)
5 个能力成熟度模型集成 (CMMI) 级别
工业物联网(IIoT)
Innovation.world 的概念探索者™