首页> 外国专利> PUBLICATION of digital content in a certain space, such as an organization, in accordance with the digital rights management (DRM)

PUBLICATION of digital content in a certain space, such as an organization, in accordance with the digital rights management (DRM)

机译:根据数字版权管理(DRM)在特定空间(例如组织)中发布数字内容

摘要

1.the way of the licensor, the requesting party digital license to allow the requesting party u043eu0441u0443u0449u0435u0441u0442u0432u043bu00a0u0442u044c reproduction of the u0446u0438u0444u0440u043eu0432 wow u0441u043eu0434u0435u0440u0436u0430u043du0438u00a0 and licensor has access to the catalogue or list of u0434u043bu00a0 u0441u0435u0431u00a0 requesting parties, and the list contains the identifier u0437u0430u043fu0440u0430u0448u0438u0432u0430u044eu0449u0435 third party identifier for each group.of which u00a0u0432u043bu00a0u0435u0442u0441u00a0 u0434u0430u043du043du0430u00a0 u0437u0430u043fu0440u0430u0448u0438u0432u0430u044eu0449u0430u00a0 party u0437u0430u043au043bu044eu0447u0430u044eu0449u0438u0439u0441u00a0 is received from the requesting party, the request including an identifier u0441u0435u0431u00a0, u0438u0434u0435u043du0442u0438u0444 u0438u0446u0438u0440u0443u044eu0449u0438u0439 supply side, and the right u0441u0432u00a0u0437u0430u043du043du044bu0435 contents and data of human u043fu0435u0440u0435u0447u0438u0441u043bu00a0u044eu0442 at least one identifier and u0441u0432u00a0u0437u0430u043du043du044bu0435 with him right and, the requesting party u043du0430u0445u043eu0434u00a0u0442 identifier in a directoryu043du0430u0445u043eu0434u00a0u0442 catalogue for the requesting party to the identifier in the identifier of each group, of which u00a0u0432u043bu00a0u0435u0442u0441u00a0 u0437u0430u043fu0440u0430u0448u0438u0432u0430u044eu0449u0430u00a0 side, sr the requesting party u0430u0432u043du0438u0432u0430u044eu0442 each identifier and the identifier of each with each identifier contained in the data of human, wh to detect the coincidence of both, and issue the applicant a license rightsu0441u0432u00a0u0437u0430u043du043du044bu043cu0438 with u0441u043eu0432u043fu0430u0432u0448u0438u043c identifier.;2. method for 1, which receives the request from the requesting parties, including u0441u0435u0431u00a0 digital certificate with the identifier, identifying the requesting parties do.;3. method for 1, which receive the request from the requesting parties, including u0441u0435u0431u00a0 data with digital signature based on them.;4. method for article 3, in which an additional u043fu0440u043eu0432u0435u0440u00a0u044eu0442 digital signature.;5. method for p.1, in which each of the identifier of the requesting party and u0434u043bu00a0 found each recovered gid compare this identifier with each eden u0442u0438u0444u0438u043au0430u0442u043eu0440u043eu043c listed in those rights, and note whether u00a0u0432u043bu00a0u0435u0442u0441u00a0 u0441u0440u0430u0432u043du0438u0432u0430u0435u043cu044bu0439 identifier matching the identifier to obtain at least two u0441u043eu0432u043f u0430u0434u0430u044eu0449u0438u0445 identifier, choose one of the matching symbols.and issue the license requesting party with rights u0441u0432u00a0u0437u0430u043du043du044bu043cu0438 congruent with the selected identifier.;6. way to p.5, which choose a u043fu0440u0435u0434u043eu0441u0442u0430u0432u043bu00a0u044eu0449u0438u0439 identifier, the largest volume of the requesting party.;7. way to p.5, where each identifier in the data rights is the direction, priority, and choose a identifier with the a high index of priority.;8.u0441u0447u0438u0442u044bu0432u0430u0435u043cu044bu0439 computer host, a u0445u0440u0430u043du00a0u0449u0438u0435u0441u00a0 it u0438u0441u043fu043eu043bu043du00a0u0435u043cu044bu0435 computer team u0434u043bu00a0 u0432u044bu043fu043eu043bu043du0435u043du0438u00a0 way of the licensor, the requesting party qi u0444u0440u043eu0432u043eu0439 license to allow the requesting party u043eu0441u0443u0449u0435u0441u0442u0432u043bu00a0u0442u044c reproduction of the digital u0441u043eu0434u0435u0440u0436u0430u043du0438u00a0 and licensor has access to. u0430u043bu043eu0433u0443, or u0441u0435u0431u00a0 list u0434u043bu00a0 requesting partycontaining the identifier of the requesting party and the identifier of each group, of which u00a0u0432u043bu00a0u0435u0442u0441u00a0 u0434u0430u043du043du0430u00a0 u0437u0430u043fu0440u0430u0448u0438u0432u0430u044eu0449u0430u00a0 side, with a u0437u0430u043au043bu044eu0447u0430u0435u0442u0441u00a0 in what are the requesting party, the request including u0441u0435u0431u00a0 identifier identifies the requesting party and the rights u0441u0432u00a0u0437u0430u043du043du044bu0435 with content m, and the data of human u043fu0435u0440u0435u0447u0438u0441u043bu00a0u044eu0442 at leastan identifier and u0441u0432u00a0u0437u0430u043du043du044bu0435 with him right u043du0430u0445u043eu0434u00a0u0442 identifier requesting directory in the directory for the found identifier u0437u0430u043fu0440u0430u0448u0438u0432u0430u044eu0449u0435 u043du0430u0445u043eu0434u00a0u0442 third parties in the directory identifier of each group, of which u00a0u0432u043bu00a0u0435u0442u0441u00a0 u0437u0430u043fu0440u0430u0448u0438u0432u0430u044eu0449u0430u00a0 side, compare each of the found identifier requesting with hand and each the group id with each identifierthe data listed in the human to find a match, and issue the applicant a license with the rights u0441u0432u00a0u0437u0430u043du043du044bu043cu0438 with u0441u043eu0432u043fu0430u0432u0448u0438u043c identifier.;9. a carrier for the p.8, which method includes receiving from a requesting party u0441u0435u0431u00a0 request, including u0441u0435u0431u00a0 digital certificate with the identifier, u0438u0434u0435u043du0442u0438u0444u0438u0446u0438 u0440u0443u044eu0449u0438u043c requesting party.;10. a carrier for the p.8, which method includes u0441u0435u0431u00a0 receive request from the requesting party which u0441u0435u0431u00a0 data with digital signature based on them.;11. the host on p.10, which means further includes u0441u0435u0431u00a0 verification of the digital signature.;12. a carrier for p.8, in which the method includes u0441u0435u0431u00a0 u0434u043bu00a0 each identifier of the requesting party and found each gid comparison found that eden u0442u0438u0444u0438u043au0430u0442u043eu0440u0430 every identifier specified in the data, and a mark, u00a0u0432u043bu00a0u0435u0442u0441u00a0 lee u0441u0440u0430u0432u043du0438u0432u0430u0435u043cu044bu0439 identifier matching the identifier to obtain for me u043du044cu0448u0435u0439 least two matching identifierchoose one of the matching identifiers, and the licence applicant with the rights u0441u0432u00a0u0437u0430u043du043du044bu043cu0438 congruent with the selected identifier.;13. the host on p.12, which method includes u0441u0435u0431u00a0 choice their identifier, u043fu0440u0435u0434u043eu0441u0442u0430u0432u043bu00a0u044eu0449u0435u0433u043e most of the rights of the requesting party.;14. the host on p.12, where each identifier in the data rights is relevant indicators to choose a priority identifier, a sa the organization is high priority.;15.the way of the licensor, the requesting party digital license to allow the requesting party u043eu0441u0443u0449u0435u0441u0442u0432u043bu00a0u0442u044c reproduction of the u0446u0438u0444u0440u043eu0432 wow u0441u043eu0434u0435u0440u0436u0430u043du0438u00a0 and u0437u0430u043fu0440u0430u0448u0438u0432u0430u044eu0449u0430u00a0 side u00a0u0432u043bu00a0u0435u0442u0441u00a0 group member u0437u0430u043au043bu044eu0447u0430u044eu0449u0438u0439u0441u00a0 is received from the requesting party, the request including u0441u0435u0431u00a0 u0438u0434u0435u043du0442u0438u0444 u0438u043au0430u0442u043eu0440 identifying unit, and the data of human, u0441u0432u00a0u0437u0430u043du043du044bu0435 to contentwith the data of human u043fu0435u0440u0435u0447u0438u0441u043bu00a0u044eu0442 at least one identifier and u0441u0432u00a0u0437u0430u043du043du044bu0435 him right, compares the identifier of the request with each identifier the data listed in the human to find a match, and issue the applicant a license with the rights u0441u0432u00a0u0437u0430u043du043du044bu043cu0438 with u0441u043eu0432u043fu0430u0432u0448u0438u043c identifier group, stories m u0432u044bu0434u0430u043du043du0430u00a0 u043bu0438u0446u0435u043du0437u0438u00a0 contains key u0441u043eu0434u0435u0440u0436u0430u043du0438u00a0, relevant contentthe encrypted public key group, so u0437u0430u043fu0440u0430u0448u0438u0432u0430u044eu0449u0430u00a0 side can obtain the key u0441u043eu0434u0435u0440u0436u0430u043du0438u00a0 personal key group corresponding to her public key.;16. method for p.15, which receive the request from the requesting parties, including u0441u0435u0431u00a0 digital certificate with the identifier, identifying the requesting parties do.;17. method for p.15, which receive the request from the requesting parties, including u0441u0435u0431u00a0 data with digital signature based on them.;18. way to p.17, which further u043fu0440u043eu0432u0435u0440u00a0u044eu0442 digital signature.;19. method for p.15 in which the licensor has access to the directory, which in u0441u0435u0431u00a0 list u0434u043bu00a0 group containing the group id and the id of each member of the group that u00a0 supply side, with a further method contains the steps: receiving from a requesting party, its identifier, u043du0430u0445u043eu0434u00a0u0442 list u0434u043bu00a0 this group. u0430u043bu043eu0433u0435 based on gid, and u043fu0440u043eu0432u0435u0440u00a0u044eu0442,contains the list of u0434u043bu00a0 group in the id of the requesting party.;20.u0441u0447u0438u0442u044bu0432u0430u0435u043cu044bu0439 computer host, a u0445u0440u0430u043du00a0u0449u0438u0435u0441u00a0 it u0438u0441u043fu043eu043bu043du00a0u0435u043cu044bu0435 computer team u0434u043bu00a0 u0432u044bu043fu043eu043bu043du0435u043du0438u00a0 way of the licensor, the requesting party qi u0444u0440u043eu0432u043eu0439 license to allow the requesting party u043eu0441u0443u0449u0435u0441u0442u0432u043bu00a0u0442u044c reproduction of the digital u0441u043eu0434u0435u0440u0436u0430u043du0438u00a0 and u0437u0430u043fu0440u0430u0448u0438u0432u0430u044eu0449u0430u00a0 side u00a0u0432u043bu00a0u0435 u0442u0441u00a0 group member in this way u0437u0430u043au043bu044eu0447u0430u0435u0442u0441u00a0 iswhat they get from the requesting party request containing the identifier that identifies the group and data of human, u0441u0432u00a0u0437u0430u043du043du044bu0435 contents and data of human u043fu0435u0440u0435u0447 u0438u0441u043bu00a0u044eu0442 at least one identifier and u0441u0432u00a0u0437u0430u043du043du044bu0435 him right, compares the identifier of the request with each identifier listed in the data p "to find a match.and give the applicant a license with the rights u0441u0432u00a0u0437u0430u043du043du044bu043cu0438 with u0441u043eu0432u043fu0430u0432u0448u0438u043c identifier groups, with the u0432u044bu0434u0430u043du043du0430u00a0 u043bu0438u0446u0435u043du0437u0438u00a0 contains key u0441u043eu0434u0435u0440u0436u0430u043du0438u00a0, relevant the next content key encrypted open group, so u0437u0430u043fu0440u0430u0448u0438u0432u0430u044eu0449u0430u00a0 side can obtain the key u0441u043eu0434u0435u0440u0436u0430u043du0438u00a0 personal key group, concerned about u0442u043au0440u044bu0442u043eu043cu0443 key.;21. the host on p.20, which receive the request from the requesting party, including u0441u0435u0431u00a0 digital certificate with the identifier, identifying the group.;22. the host on p.20, which receive the request from the requesting party, including u0441u0435u0431u00a0 data with digital signature based on them.;23. a carrier for p.22, which further u043fu0440u043eu0432u0435u0440u00a0u044eu0442 digital signature.;24. a carrier for p.20, in which the licensor has access to the directory, which in u0441u0435u0431u00a0 list u0434u043bu00a0 group containing the group id and the id of each member of the group that u00a0 supply side, the method further includes receiving from a requesting party, its identifier, a list of u0434u043bu00a0 this group in kata log file based on the identifier of the group, and verificationcontains the list of u0434u043bu00a0 group in the id of the requesting party.;25.the way of the licensor, the requesting party digital license to allow the requesting party u043eu0441u0443u0449u0435u0441u0442u0432u043bu00a0u0442u044c reproduction of the u0446u0438u0444u0440u043eu0432 wow u0441u043eu0434u0435u0440u0436u0430u043du0438u00a0 and u0437u0430u043fu0440u0430u0448u0438u0432u0430u044eu0449u0430u00a0 side u00a0u0432u043bu00a0u0435u0442u0441u00a0 group member, the licensor has access to the directory that contains the list of u0434u043bu00a0 group, including u0441u0435u0431u00a0 u0438u0434u0435u043du0442u0438u0444u0438 u043au0430u0442u043eu0440 each member of the group, u0432u043au043bu044eu0447u0430u00a0 requesting party u0437u0430u043au043bu044eu0447u0430u044eu0449u0438u0439u0441u00a0 iswhat they get from the requesting party, the request including u0441u0435u0431u00a0 identifier identifies the group identifier that identifies the u0437u0430u043fu0440u0430u0448u0438u0432u0430 u044eu0449u0443u044e side, and data of human, u0441u0432u00a0u0437u0430u043du043du044bu0435 contents and data of human u043fu0435u0440u0435u0447u0438u0441u043bu00a0u044eu0442 at least one identifier and u0441u0432u00a0u0437u0430u043du043du044bu0435 him right, compare u0438u0434u0435u043du0442u0438 u0444u0438u043au0430u0442u043eu0440 group of the query with each identifierthe rights listed in the database to find a match, u043du0430u0445u043eu0434u00a0u0442 list u0434u043bu00a0 this group in the directory on the basis of gid, u043fu0440u043eu0432u0435u0440u00a0u044eu0442 found with in u043fu0438u0441u043au0435, u0441u043eu0434u0435u0440u0436u0438u0442u0441u00a0 the identifier of the requesting party, the requesting party, and issue the license rights u0441u0432u00a0u0437u0430u043du043du044bu043cu0438 with u0441u043eu0432u043fu0430u0432u0448u0438u043c identifier group with the u0432u044bu0434u0430u043du043du0430u00a0 u043bu0438u0446u0435u043du0437u0438u00a0 contains key u0441u043eu0434u0435u0440u0436u0430u043du0438u00a0,the content key encrypted in the requesting party, so u0437u0430u043fu0440u0430u0448u0438u0432u0430u044eu0449u0430u00a0 side can obtain the key u0441u043eu0434u0435u0440u0436u0430u043du0438u00a0 with private key the requesting party, with its public key.;26. way on p.25, which receive the request from the requesting parties, including u0441u0435u0431u00a0 digital certificate with the identifier, identifying the group.;27. way on p.25, which receive the request from the requesting parties, including u0441u0435u0431u00a0 digital certificate with the identifier, identifying the requesting parties do.;28. way on p.27, which further receives a public key of the digital certificate of the requesting party.;29. way on p.25, which receive the request from the requesting parties, including u0441u0435u0431u00a0 data with digital signature based on them.;30. method for p.29, which further u043fu0440u043eu0432u0435u0440u00a0u044eu0442 digital signature.;31. way on p.25, which further receives a public key of the requesting party digital certificate containing the identifier of requested covering part.;32.u0441u0447u0438u0442u044bu0432u0430u0435u043cu044bu0439 computer host, a u0445u0440u0430u043du00a0u0449u0438u0435u0441u00a0 it u0438u0441u043fu043eu043bu043du00a0u0435u043cu044bu0435 computer team u0434u043bu00a0 u0432u044bu043fu043eu043bu043du0435u043du0438u00a0 way of the licensor, the requesting party qi u0444u0440u043eu0432u043eu0439 license to allow the requesting party u043eu0441u0443u0449u0435u0441u0442u0432u043bu00a0u0442u044c reproduction of the digital u0441u043eu0434u0435u0440u0436u0430u043du0438u00a0 and u0437u0430u043fu0440u0430u0448u0438u0432u0430u044eu0449u0430u00a0 side u00a0u0432u043bu00a0u0435 u0442u0441u00a0 group member, the licensor has access to the directory that contains the list of u0434u043bu00a0 groupu0441u0435u0431u00a0 identifier with each member of the group, u0432u043au043bu044eu0447u0430u00a0 requesting party, in this way u0437u0430u043au043bu044eu0447u0430u0435u0442u0441u00a0 is received from the requesting party check ros, including u0441u0435u0431u00a0 identifier identifying the group identifier that identifies the requesting party and the rights u0441u0432u00a0u0437u0430u043du043du044bu0435 with u0434u0435u0440u0436u0430u043du0438u0435u043c; the data of human u043fu0435u0440u0435u0447u0438u0441u043bu00a0u044eu0442 at leastan identifier and u0441u0432u00a0u0437u0430u043du043du044bu0435 him right, compares the identifier of the request with each identifier of the data, to detect the u0441u043eu0432u043fu0430u0434 by the group, u043du0430u0445u043eu0434u00a0u0442 list u0434u043bu00a0 catalogue based on gid, u043fu0440u043eu0432u0435u0440u00a0u044eu0442 in u0441u043eu0434u0435u0440u0436u0438u0442u0441u00a0 found list, the identifier u0437u0430u043fu0440u0430u0448u0438u0432u0430u044eu0449 her hand, and issue the applicant a license rightsu0441u0432u00a0u0437u0430u043du043du044bu043cu0438 with u0441u043eu0432u043fu0430u0432u0448u0438u043c identifier groups, with the u0432u044bu0434u0430u043du043du0430u00a0 u043bu0438u0446u0435u043du0437u0438u00a0 contains key u0441u043eu0434u0435u0440u0436u0430u043du0438u00a0 corresponding public key for the encrypted content. u043fu0440u0430u0448u0438u0432u0430u044eu0449u0435u0439 part, so that u0437u0430u043fu0440u0430u0448u0438u0432u0430u044eu0449u0430u00a0 side can obtain the key u0441u043eu0434u0435u0440u0436u0430u043du0438u00a0 personal key of the requesting party, with its public key.;33. a carrier for the p.32, which method includes receiving from a requesting party u0441u0435u0431u00a0 request, including u0441u0435u0431u00a0 digital certificate with the identifier, u0438u0434u0435u043du0442u0438u0444u0438u0446u0438 u0440u0443u044eu0449u0438u043c group.;34. a carrier for the p.32, which method includes receiving from a requesting party u0441u0435u0431u00a0 request, including u0441u0435u0431u00a0 digital certificate with the identifier, u0438u0434u0435u043du0442u0438u0444u0438u0446u0438 u0440u0443u044eu0449u0438u043c requesting party.;35. a carrier for p.34, which means further includes u0441u0435u0431u00a0 receiving the requesting party of public key digital certificate.;36. a carrier for the p.32, which method includes receiving from a requesting party u0441u0435u0431u00a0 request including data with digital signature based on them.;37. the host on p.36, which method includes u0441u0435u0431u00a0 verification of the digital signature.;38. a carrier for the p.32, which means further includes u0441u0435u0431u00a0 receiving a public key digital certificate of the requesting party, u0441u043eu0434u0435u0440u0436 u0430u0449u0435u0433u043e identifier of the requesting party.
机译:1.许可方的方式,请求方数字许可证允许请求方 u043e u0441 u0443 u0449 u0435 u0441 u0442 u0432 u043b u00a0 u0442 u044c复制 u0446 u0438 u0444 u0440 u043e u0432哇 u0441 u043e u0434 u0435 u0440 u0436 u0430 u043d u0438 u00a0,并且许可方可以访问 u0434 u043b u00a0 u0441 u0435 u0431的目录或列表 u00a0请求方,并且该列表包含标识符 u0437 u0430 u043f u0440 u0430 u0448 u0438 u0432 u0430 u044e u0449 u0435每个组的第三方标识符。其中 u00a0 u0432 u043b u00a0 u0435 u0442 u0441 u00a0 u0434 u0430 u043d u043d u043d u0430 u00a0 u0437 u0430 u043f u0440 u0430 u0448 u0438 u0432 u042 u0430 u044e u0449 u0430 u04449从请求方收到u0437 u0430 u043a u043b u044e u0447 u0430 u044e u0449 u0438 u0439 u0441 u00a0,该请求包括标识符 u0441 u0435 u0431 u0431 u00a0, u0438 u0434 u0435 u043d u0442 u0438 u0444 u0438 u0446 u0438 u0440 u0443 u044e u0449 u供应方0438 u0439,右侧 u0441 u0432 u00a0 u0437 u0430 u043d u043d u043d u044b u0435内容和数据 u043f u0435 u0440 u0435 u0447 u0438 u0441 u043b u0040b u044e u0442至少一个标识符和 u0441 u0432 u00a0 u0437 u0430 u043d u043d u043d u044b u0435和他的请求者 u043d u0430 u0445 u04345 u043e u043e u0434 u00a0 u0442标识符在目录 u043d u0430 u0445 u043e u0434 u00a0 u0442目录中,作为每个组的标识符中的标识符的请求方,其中 u00a0 u0432 u043b u00a0 u0435 u0442 u0441 u00a0 u0437 u0430 u043f u0440 u0430 u0448 u0438 u0432 u0430 u044e u0449 u0430 u00a0端,请求方 u0430 u0432 u043d u0438 u0432 u0430 u044e u0442每个标识符以及每个人的标识符,每个人的标识符都包含在人员数据中​​,以便检测两者的一致性,并向申请人颁发许可权与 u0441 u043e u0432 u043f u0430 u0432 u0448 u0438 u043c标识符。; 2。 1的方​​法,该方法接收来自请求方的请求,包括带有标识符的数字证书,以标识请求方。3。 1的方​​法,该方法接收来自请求方的请求,包括基于它们的具有数字签名的数据。第3条所述的方法,其中具有附加的 u043f u0440 u043e u0432 u0435 u0440 u00a0 u044e u0442数字签名。5。 p.1的方法,其中请求方的标识符和 u0434 u043b u00a0找到了每个已恢复的gid,然后将此标识符与每个eden u0442 u0438 u0444 u0438 u043a u0430 u0442 u043e u0440 u043e u043c在这些权利中列出,并注意 u00a0 u0432 u043b u00a0 u0435 u0442 u0441 u00a0 u0441 u0440 u0430 u0432 u043d u043d u0438 u0432 u0430 u0435 u043c u044b u0439标识符与标识符匹配,以获得至少两个 u0441 u043e u0432 u043f u0430 u0434 u0430 u044e u0449 u0438 u0445标识符,选择匹配的符号之一,并向许可证请求方颁发权限 u0441 u0432 u00a0 u0437 u0430 u043d u043d u044b u043c u0438与所选标识符一致; 6。到第5页的方法,选择一个 u043f u0440 u0435 u0434 u043e u0441 u0442 u0430 u0432 u043b u00a0 u044e u0449 u0438 u0439标识符,即请求方的最大数量。 7。转到第5页,其中数据权限中的每个标识符是方向,优先级,并选择具有较高优先级索引的标识符。; 8. u0441 u0447 u0438 u0442 u044b u0432 u0430 u0435 u043c u044b u0439计算机主机,一个 u0445 u0440 u0430 u043d u00a0 u0449 u0438 u0435 u0441 u00a0它 u0438 u0441 u043f u043e u043e u043b u043b u043d u00a0 u0435 u0435 u043 u044b u0435计算机团队 u0434 u043b u00a0 u0432 u044b u043f u043e u043b u043d u0435 u043d u0438 u00a0许可方的方式,请求方qi u0444 u0440 u043e u0432 u043 u0439许可,允许请求方 u043e u0441 u0443 u0449 u0435 u0441 u0442 u0432 u043b u00a0 u0442 u044c复制数字 u0441 u043e u0434 u0435 u0440 u0436 u0430 u043d u0438 u00a0,并且许可方有权访问。 u0430 u043b u043e u0433 u0443或 u0441 u0435 u0431 u00a0列表 u0434 u043b u00a0包含请求方的标识符和每个组的标识符,其中 u00a0 u0432 u043b u00a0 u0435 u0442 u0441 u00a0 u0434 u0430 u043d u043d u043d u0430 u00a0 u0437 u0430 u043f u0440 u0430 u0448 u0438 u0432 u0430 u044e u0449 u0430在请求方中包含 u0437 u0430 u043a u043b u044e u0447 u0430 u0435 u0442 u0441 u00a0的请求,其中包含 u0441 u0435 u0431 u00a0标识符的请求标识了请求方和权利 u0441 u0432 u00a0 u0437 u0430 u043d u043d u044b u0435,内容为m,以及人类 u043f u0435 u0440 u0435 u0447 u0438 u0441 u043b u00a0 u044e u0442的数据至少包含标识符和 u0441 u0432 u00a0 u0437 u0430 u0430 u043d u043d u044b u0435与他在一起 u043d u0430 u0445 u043e u0434 u00a0 u0442目录中的标识符请求目录,用于找到的标识符 u0437 u0430 u043f u0440 u0430 u0448 u0438 u0432 u0432 u0430 u044e u0449 u0435 u043d u0430 u0445 u043e u0434 u00a0 u0442每个组的目录标识符中的第三方,其中 u00a0 u0432 u043b u00a0 u0435 u0442 u0441 u00a0 u0437 u0430 u043f u0440 u0430 u0448 u0438 u0432 u0430 u044e u0449 u0430 u00a0端,将找到的每个识别的请求与手进行比较,并将每个组ID与每个识别符进行比较,以找出人类中列出的匹配项,然后发出申请人具有权利 u0441 u0432 u00a0 u0437 u0430 u043d u043d u043b u043c u0438的许可证,且标识符为 u0441 u043e u0432 u0432 u043f u0430 u0432 u0432 u0448 u0438 u043c标识符。 。 p.8的载体,该方法包括从请求方 u0441 u0435 u0431 u00a0请求中接收,其中包括 u0441 u0435 u0431 u00a0数字标识符,标识符为 u0438 u0434 u0435 u043d u0442 u0438 u0444 u0438 u0446 u0438 u0440 u0443 u044e u0449 u0438 u043c请求方; 10。 p.8的载体,该方法包括: u0441 u0435 u0431 u00a0接收来自请求方的请求,该请求基于该请求具有数字签名的数据; 11。第10页的主机,这意味着还包括对数字签名的验证。 12. u0441 u0435 u0431 u00a0验证。 p.8的载体,其中方法包括 u0441 u0435 u0431 u00a0 u0434 u043b u00a0请求方的每个标识符,并发现每个gid比较发现eden u0442 u0438 u0444 u0438 u043a u0430 u0442 u043e u0440 u0430数据中指定的每个标识符,以及标记 u00a0 u0432 u043b u00a0 u0435 u0442 u0441 u00a0 lee u0441 u0440 u0430 u04330 u0432 u043d u0438 u0432 u0430 u0435 u043c u044b u0439标识符与该标识符匹配,以便为我获取 u043d u044c u0448 u0435 u0439至少两个匹配的标识符,然后选择一个匹配的标识符,并获得具有权利的 u0441 与所选标识符一致的u0432 u00a0 u0437 u0430 u043d u043d u044b u043c u0438 ;; 13。第12页的主机,该方法包括 u0441 u0435 u0431 u00a0选择其标识符 u043f u0440 u0435 u0434 u043e u0441 u0442 u0430 u0432 u043b u00a0 u044e u0449 u0435 u0433 u043e请求方的大部分权利。; 14。第12页的主机,其中数据权限中的每个标识符都是选择优先级标识符的相关指标,这对组织来说是高优先级的; 15.许可方的方式,请求方数字许可允许请求方 u043e u0441 u0443 u0449 u0435 u0441 u0442 u0432 u043b u00a0 u0442 u044c复制 u0446 u0438 u0444 u0440 u043e u0432哇 u0441 u043e u0434 u0435 04 u0436 u0430 u043d u0438 u00a0和 u0437 u0430 u043f u0440 u0430 u0448 u0438 u0432 u0430 u044e u0449 u0430 u00a0侧 u00a0 u0432 u043b u00a0 u2a u0441 u00a0组成员 u0437 u0430 u043a u043b u044e u0447 u0430 u044e u0449 u0438 u0439 u0441 u00a0,该请求包括 u0441 u0435 u0431 u00a0 u0438 u0434 u0435 u043d u0442 u0438 u0444 u0438 u043a u0430 u0442 u043e u0440识别单位以及人的数据 u0441 u0432 u00a0 u0437 u0430 u043d u043d u044b u0435满足人类 u043f u0435 u0440 u0435 u0447 的数据u0438 u0441 u043b u00a0 u044e u0442至少一个标识符和 u0441 u0432 u00a0 u0437 u0430 u043d u043d u044d u044b u0435正确,将请求的标识符与列出的数据中的每个标识符进行比较人员找到匹配项,然后向申请人颁发具有 u0441 u0432 u00a0 u0437 u0430 u043d u043d u044b u043c u0438和 u0441 u043e u0432 u043f u0430 u0432 u0448 u0438 u043c标识符组,故事m u0432 u044b u0434 u0430 u043d u043d u043d u0430 u00a0 u043b u0438 u0446 u0435 u043d u0437 u0438 u00a0包含密钥 u0441 u043e u0434 u0435 u0440 u0436 u0430 u043d u0438 u00a0,相关内容是加密的公共密钥组,因此, u0437 u0430 u043f u0440 u0430 u0448 u0438 u0432 u0430 u044e u0449 u0430 u00a0侧可以获得与她的公共密钥相对应的个人密钥组的密钥 u0441 u043e u0434 u0435 u0440 u0436 u0430 u043d u0438 u00a0。第15页的方法,该方法从请求方接收请求,其中包括带有标识符的数字证书,以标识请求方。17。第15页的方法,该方法接收来自请求方的请求,包括带有基于数字签名的 u0441 u0435 u0431 u00a0数据; 18。转到第17页,进一步 u043f u0440 u043e u0432 u0435 u0440 u00a0 u044e u0442数字签名。; 19。第15页的方法,其中许可方可以访问目录,在 u0441 u0435 u0431 u00a0列表中,其中 u0434 u043b u00a0组包含组ID和 u00a0提供方的组中每个成员的ID,还有另一种方法包含以下步骤:从请求中接收一方,其标识符 u043d u0430 u0445 u043e u0434 u00a0 u0442列出该组。 u0430 u043b u043e u0433 u0435(基于gid)和 u043f u0440 u043e u043e u0432 u0435 u0440 u00a0 u044e u0442,包含 u0434 u043b u00a0组的列表20。 u0441 u0447 u0438 u0442 u044b u0432 u0430 u0435 u043c u044b u0439计算机主机,一个 u0445 u0440 u0430 u043d u00a0 u0449 u0438 u0435 u0441 u00a0它 u0438 u0441 u043f u043e u043b u043d u00a0 u0435 u043c u044b u0435计算机小组 u0434 u043b u00a0 u0432 u044b u043f u043e u043b u043d u0435 u043d u0438 u00a0的许可方方式,请求方qi u0444 u0440 u043e u0432 u043e u043e u0439许可允许请求方 u043e u0441 u0443 u0449 u0435 u0441 u0441 u0442 u0432 u043b u00a0 u0442 u044c复制数字 u0441 u043e u0434 u0435 u0440 u0436 u0430 u043d u0438 u00a0和 u0437 u0430 u043f u0440 u0430 u0448 u0438 u0432 u0430 u044e u0449 u0430 u00a0侧 u00a0 u0432 u043b u00a0 u0435 u0442 u0441 u00a0这样的组成员 u0437 u0430 u043a u043b u044e u0447 u0430 u0435 u0442 u04e 41 u00a0是从请求方请求中得到的,其中包含识别人的组和数据的标识符, u0441 u0432 u00a0 u0437 u0430 u043d u043d u044b u0435人的内容和数据 u043f u0435 u0440 u0435 u0447 u0438 u0441 u043b u00a0 u044e u0442至少一个标识符和 u0441 u0432 u00a0 u0437 u0430 u043d u043d u044d u044b u0435正确,然后比较请求的标识符并在数据p中列出每个标识符以找到匹配项。并授予申请人许可,其许可权为 u0441 u0432 u00a0 u0437 u0430 u043d u043d u044b u043c u0438和 u0441 u043e u0432 u043f u0430 u0432 u0448 u0438 u043c标识符组,具有 u0432 u044b u0434 u0430 u043d u043d u04d u0430 u00a0 u043b u0438 u0446 u0435 u043d u0437 u0438 u00包含密钥 u0441 u043e u0434 u0435 u0440 u0436 u0430 u043d u0438 u00a0,与下一个内容密钥加密的打开组相关,因此 u0437 u0430 u043f u0440 u0430 u0448 u0438 u0432 u0430 u044e u0449 u0430 u00a0一侧可以获得ke y u0441 u043e u0434 u0435 u0440 u0436 u0430 u043d u0438 u00a0个人密钥组,关注 u0442 u043a u0440 u044b u0442 u043e u043c u043c u0443密钥。; 21。 p.20的主机,它接收到来自请求方的请求,其中包括带有标识符的 u0441 u0435 u0431 u00a0数字证书,用于标识该组。 p.20的主机,它接收到来自请求方的请求,其中包括带有数字签名的 u0441 u0435 u0431 u00a0数据; 23。 p.22的载体,还带有 u043f u0440 u043e u0432 u0435 u0440 u00a0 u044e u0442数字签名。; 24。第20页的载体,许可人可以访问其中的目录,该目录在 u0441 u0435 u0431 u00a0列表 u0434 u043b u00a0组中,其中包含组ID和该组中每个成员的ID。在提供方,该方法还包括从请求方接收其标识符,基于该组的标识符在kata日志文件中的该组列表的清单,并验证包含该表的清单。 25.许可方的方式,即请求方数字许可证允许请求方 u043e u0441 u0443 u0449 u0435 u0441 u0442 u0432 u043b u00a0 u0446 u0438 u0444 u0440 u043e u0432的u0442 u044c复制哇 u0441 u043e u0434 u0435 u0440 u0436 u0430 u043d u0438 u00a0和 u0437 u0430 u043f u0440 04 u0448 u0438 u0432 u0430 u044e u0449 u0430 u00a0侧 u00a0 u0432 u043b u00a0 u0435 u0442 u0441 u00a0组成员,许可方可以访问包含列表o的目录f u0434 u043b u00a0组,包括 u0441 u0435 u0431 u00a0 u0438 u0434 u0435 u043d u0442 u0438 u0444 u0438 u043a u0430 u0442 u0434 u043e u0440 u0432 u043a u043b u044e u0447 u0430 u00a0请求方 u0437 u0430 u043a u043b u044e u0447 u0430 u044e u0449 u0438 u0439 u0439 u0441 u00a0是从请求方那里得到的,包含 u0441 u0435 u0431 u00a0标识符的请求标识了用于标识 u0437 u0430 u043f u0440 u0430 u0448 u0438 u0432 u0430 u044e u0449 u0443 u044e端的组标识符以及人, u0441 u0432 u00a0 u0437 u0430 u043d u043d u044b u0435内容和数据 u043f u0435 u0440 u0435 u0447 u0438 u0441 u0431 u043b u00a0 u044e u0442至少标识符和 u0441 u0432 u00a0 u0437 u0430 u043d u043d u044b u0435他正确,然后比较 u0438 u0434 u0435 u043d u043d u0442 u0438 u0444 u0438 u043a u0430 u0442 u043e u0440具有每个标识符的查询组数据库中列出的权限以找到匹配项, u043d u0430 u0445 u043e u0434 u00a0 u0442根据gid在目录中列出该组 u0434 u043b u00a0 u043f u0440 u043e u0432 u0432 u0435 u0440 u00a0 u044e 在 u043f u0438 u0441 u043a u0435中找到的u0442, u0441 u043e u0434 u0434 u0435 u0440 u0436 u0438 u0442 u0441 u00a0的名称是请求方的标识符,请求方并颁发许可证权限 u0441 u0432 u00a0 u0437 u0430 u043d u043d u044b u043c u0438和 u0441 u043e u0432 u043f u0430 u0432 u0448 u0438 u043c标识符组具有 u0432 u043b u043c u0430 u043d u043d u0430 u00a0 u043b u0438 u0446 u0435 u043d u0437 u0438 u00a0包含键 u0441 u043e u0434 u0435 u0440 u0436 u0430 u043d u0438 u00a0内容密钥在请求方中进行了加密,因此 u0437 u0430 u043f u0440 u0430 u0448 u0438 u0432 u0430 u044e u0449 u0430 u00a0一方可以获得密钥 u0441 u043e u043e u0434 u0435 u0440 u0436 u0430 u043d u0438 u00a0使用请求方的私钥及其公钥; 26。第25页的方法,它接收到来自请求方的请求,包括带有标识符的数字证书 u0441 u0435 u0431 u00a0标识该组。第25页的方法,接收来自请求方的请求,包括带有标识符的数字证书,以标识请求方。28。第27页的方法,进一步接收请求方数字证书的公钥。; 29。第25页的方法,它接收到来自请求方的请求,包括 u0441 u0435 u0431 u00a0具有基于它们的数字签名的数据。第29页的方法,进一步 u043f u0440 u043e u0432 u0435 u0440 u00a0 u044e u0442数字签名。; 31。第25页的方法,进一步接收包含被请求覆盖部分标识符的请求方数字证书的公共密钥。; 32. u0441 u0447 u0438 u0442 u044b u0432 u0430 u0435 u043c u044b u0439计算机主机,一个 u0445 u0440 u0430 u043d u00a0 u0449 u0438 u0435 u0441 u0014 u00b0 u0438 u0441 u043f u043e u043b u043d u00a0 u0435 u043c u044b u0435计算机组 u0434 u043b u00a0 u0432 u044b u043f u043e u043b u043d u0435 u043d u0438 u00a0许可人的方式,请求方qi u0444 u0440 u0440 u043e u0432 u043e u0439许可请求方 u043e u0441 u0443 u0449 u0435 u0441 u0442 u0432 u043b u00a0 u0442 u044c复制数字 u0441 u043e u0434 u0435 u0440 u0436 u0430 u043d u0438 u00a0和 u0437 u0430 u043f u0440 u0430 u0448 u0438 u0432 u0430 u044e u0449 u0430 u00a0侧 u00a0 u0432 u043b u00a0 u0435 u0442 u0441 u00a0ens成员,有权访问包含 u0434 u043b u00a0组 u0441 u0435 u04列表的目录31 u00a0标识符,每个组成员 u0432 u043a u043b u044e u0447 u0430 u00a0请求方,通过这种方式, u0437 u0430 u043a u043b u044e u0447 u04447 u0430 u0435 u0442 从请求方检查ros接收到u0441 u00a0,包括 u0441 u0435 u0431 u00a0标识符(标识用于标识请求方的组标识符)和权限 u0441 u0432 u00a0 u0437 u0430 u043d u043d u044b u0435与 u0434 u0435 u0440 u0436 u0430 u043d u0438 u0435 u043c;人类 u043f u0435 u0440 u0435 u0447 u0438 u0441 u043b u00a0 u044e u0442的数据中至少有一个标识符和 u0441 u0432 u00a0 u0437 u0430 u0430 u043d u043d u043d u044b u0435 ,将请求的标识符与数据的每个标识符进行比较,以按组 u043d u0430 u0445 u043e u0434 u00a0 u0442列表检测 u0441 u043e u0432 u043f u0430 u0434基于gid的 u043b u00a0目录,在 u0441 u043e u0434 u0435 u0440 u0436 u0438 u0442 u0441 u00a0找到了清单 u043f u0440 u043e u0432 u0435 u0440 u00a0 u044e u0442 ,其标识符为 u0437 u0430 u043f u0440 u0430 u0448 u0438 u0432 u0430 u044e u0449她的手,并向申请人颁发许可证权利 u0441 u0432 u00a0 u0437 u04437 u0430 u043d u043d u044b u043c u0438和 u0441 u043e u0432 u043f u0430 u0432 u0448 u0438 u043c标识符组,以及 u0432 u044b u0434 u0430 u043d u043d u043d u0430 u00a0 u043b u0438 u0446 u0435 u043d u0437 u0438 u00a0包含键 u0441 u043e u0434 u0435 u0440 u0436 u0430 u043d u0438 u00a0对应加密内容的公共密钥。 u043f u0440 u0430 u0448 u0438 u0432 u0430 u044e u0449 u0435 u0439部分,这样 u0437 u0430 u043f u0440 u0430 u0448 u0438 u0432 u0430 u044e u0449 u0430 u00a0一方可以使用其公共密钥获得请求方的个人密钥 u0441 u043e u0434 u0435 u0440 u0436 u0430 u043d u0438 u00a0。 p.32的载体,该方法包括从请求方 u0441 u0435 u0431 u00a0请求中接收,其中包括 u0441 u0435 u0431 u00a0数字证书,其标识符为 u0438 u0434 u0435 u043d u0442 u0438 u0444 u0438 u0446 u0438 u0440 u0443 u044e u0449 u0438 u043c组。; 34。 p.32的载体,该方法包括从请求方接收 u0441 u0435 u0431 u00a0请求,包括带有标识符的 u0441 u0435 u0431 u00a0数字证书, u0438 u0434 u0435 u043d u0442 u0438 u0444 u0438 u0446 u0438 u0440 u0443 u0443 u044e u0449 u0438 u043c 。; 35。 p.34的载体,这意味着还包括 u0441 u0435 u0431 u00a0接收公开密钥数字证书的请求方; 36。 p.32的载体,该方法包括从请求方接收包括基于其的带有数字签名的数据的请求。37。第36页的主机,该方法包括 u0441 u0435 u0431 u00a0数字签名验证。 p.32的载体,这意味着进一步包括 u0441 u0435 u0431 u00a0接收请求方的公钥数字证书, u0441 u043e u0434 u0435 u0440 u0436 u0430 u0449 u0435 u0433 u043e请求方的标识符。

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号