A computer implemented method for determining the presence of a disease in a patient
    21.
    发明公开
    A computer implemented method for determining the presence of a disease in a patient 有权
    计算机辅助设计Verfahren zur Erzeugung eines伪词,电脑配件Speichermedium und Computersystem

    公开(公告)号:EP2365458A2

    公开(公告)日:2011-09-14

    申请号:EP11157135.2

    申请日:2011-03-07

    发明人: Gotthardt, Frank

    IPC分类号: G06F21/00

    摘要: A computer-implemented method for determining the presence of a disease in a patient, the method comprising:
    - Receiving (250) first rule sets comprising rules, the rules of each first rule set being grouped into one or more second rule sets, each second rule set comprising a score value;
    - Determining(251), for each first rule set, the highest score value of its second rule sets;
    - Calculating (252) a total score value for the disease as a derivative of the determined highest score values;
    - Returning (253) a first diagnosis result, the first diagnosis result being indicative of the presence of the disease in the patient, the first diagnosis result having assigned the total score value;

    摘要翻译: 一种用于确定患者疾病存在的计算机实现的方法,所述方法包括: - 接收(250)包括规则的第一规则集,每个第一规则集的规则被分组为一个或多个第二规则集,每个第二规则集 规则集包括得分值; - 确定(251)对于每个第一规则集,其第二规则集的最高得分值; - 计算(252)该疾病的总分值作为确定的最高得分值的导数; - 返回(253)第一诊断结果,所述第一诊断结果指示所述患者中所述疾病的存在,所述第一诊断结果分配了所述总分数值;

    Method for secure e-mail exchange
    22.
    发明公开
    Method for secure e-mail exchange 审中-公开
    Methodefürden sicheren Austausch von elektronischen Nachrichten

    公开(公告)号:EP2985945A1

    公开(公告)日:2016-02-17

    申请号:EP14181172.9

    申请日:2014-08-15

    IPC分类号: H04L9/08 H04L12/58 H04L29/06

    摘要: The invention relates to a secure telecommunication method for communicating information in an e-mail between a telecommunication device of a first user and a telecommunication device of a second user. The method comprises the steps of:
    • Determining by the first user whether a public key of a first asymmetric key pair for encrypted e-mail exchange is assigned to the second user,
    • In response to determining, that no public key is assigned to the second user, creating a first dataset by encrypting the information by the telecommunication device of the first user using a symmetric key,
    • Transferring the first dataset to the second user using the e-mail, and storing the first dataset with the telecommunication device of the second user,
    • In response to receiving the first dataset by the telecommunication device of the second user, creating the first asymmetric key pair comprising the public key and a private key,
    • Providing the public key of the first asymmetric key pair to a telecommunication device of the first user,
    • Creating a second dataset by encrypting the symmetric key by a telecommunication device of the first user using the public key of the first asymmetric key pair,
    • Transferring the second dataset to the second user,
    • Decrypting the second dataset using the private key of the first asymmetric key pair by the telecommunication device of the second user, the decryption resulting in the symmetric key, and
    • Retrieving the first dataset and decrypting the first dataset using the symmetric key by the telecommunication device of the second user.

    摘要翻译: 本发明涉及一种用于在第一用户的电信设备和第二用户的电信设备之间的电子邮件中传送信息的安全电信方法。 该方法包括以下步骤:确定第一用户是否将用于加密的电子邮件交换的第一非对称密钥对的公共密钥分配给第二用户,¢响应于确定没有分配公钥 向第二用户创建第一数据集,通过使用对称密钥通过第一用户的电信设备对信息进行加密,使用电子邮件将第一数据集传送到第二用户,以及将第一数据集与电信 响应于由第二用户的电信设备接收第一数据集,创建包括公钥和私钥的第一非对称密钥对,提供第一非对称密钥的公开密钥 配对到第一用户的电信设备,¢通过使用第一用户的公共密钥通过第一用户的电信设备加密对称密钥来创建第二数据集 非对称密钥对,将第二数据集传送到第二用户,¢使用第二用户的电信设备的第一非对称密钥对的私有密钥解密第二数据集,产生对称密钥的解密,以及€ ¢使用第二用户的电信设备的对称密钥检索第一个数据集并解密第一个数据集。

    Database system, computer system, and computer-readable storage medium for decrypting a data record
    27.
    发明公开
    Database system, computer system, and computer-readable storage medium for decrypting a data record 有权
    数据库系统,计算机系统和用于解密数据记录的计算机可读存储介质

    公开(公告)号:EP2348450A3

    公开(公告)日:2013-02-27

    申请号:EP10194686.1

    申请日:2010-12-13

    IPC分类号: G06F21/00 H04L9/32 H04L9/08

    摘要: A database system (200) comprising: a memory (204) containing multiple data records (108a, 108b, 108c, 108d, 108e, 108f, 108g), wherein each of the data records has a data record asymmetric key pair (120, 122) for cryptographic encryption and decryption, wherein each data record asymmetric key pair comprises a data record public key (122) and a data record private key (120), wherein the data contained in each of the multiple data records is encrypted by the data record public key, wherein the data record private key of each data record asymmetric key pair is encrypted with the public key of another asymmetric key pair; a set of user accounts (102a, 102b, 102c, 102d, 102e), wherein each of the user accounts has a user asymmetric key pair (110c, 112) for encryption and decryption, wherein each user asymmetric key pair has a user public key (112) and a user private key (110c); wherein data (124) is added to a data record (108c) by encrypting it with the data record public key (122); wherein access to the data record is granted to a user account (102c) by encrypting the data record private key (120) with the public key of an asymmetric cryptographic key pair whose encrypted private key is accessible from the user account via a sequence of successive decryptions of encrypted private keys; and wherein the data record private key allows decryption of the data record.

    摘要翻译: 1.一种数据库系统(200),包括:包含多个数据记录(108a,108b,108c,108d,108e,108f,108g)的存储器(204),其中每个数据记录具有数据记录非对称密钥对(120,122 )用于密码加密和解密,其中每个数据记录非对称密钥对包括数据记录公钥(122)和数据记录私钥(120),其中包含在每个数据记录中的数据由数据记录 公钥,其中每个数据记录非对称密钥对的数据记录私钥用另一个非对称密钥对的公钥加密; 一组用户账户(102a,102b,102c,102d,102e),其中每个用户账户具有用于加密和解密的用户非对称密钥对(110c,112),其中每个用户非对称密钥对具有用户公钥 (112)和用户私钥(110c); 其中通过用数据记录公共密钥(122)加密数据(124)被添加到数据记录(108c); 其中通过利用非对称加密密钥对的公钥对数据记录私钥(120)进行加密,授予用户账户(102c),所述非对称加密密钥对的加密私钥可以经由一系列连续的 加密的私钥的解密; 并且其中数据记录私钥允许解密数据记录。

    A computer implemented method for generating a set of identifiers from a private key, computer implemented method and computing device
    29.
    发明公开
    A computer implemented method for generating a set of identifiers from a private key, computer implemented method and computing device 有权
    一种用于从私钥生成一组标识符的计算机实现的方法,计算机实现的方法和计算设备

    公开(公告)号:EP2348447A3

    公开(公告)日:2012-11-07

    申请号:EP10173198.2

    申请日:2010-08-18

    IPC分类号: G06F21/00 H04L9/00 H04L9/30

    摘要: The invention relates to a computer implemented method for generating a set of identifiers (118;914) from a private key (116; 818), the method comprising the steps of:
    - calculating a set of public keys, wherein the private key (116; 818) and each public key of the set of public keys form an asymmetric cryptographic key pair; and
    - outputting (208, 316, 504, 604) the identifiers comprising the public keys.

    摘要翻译: 本发明涉及用于从私钥(116; 818)生成一组标识符(118; 914)的计算机实现的方法,该方法包括以下步骤: - 计算一组公钥,其中私钥 ; 818)以及该组公钥中的每个公钥形成非对称加密密钥对; 和 - 输出(208,316,504,604)包括公钥的标识符。

    VERFAHREN ZUR ERZEUGUNG VON ASYMMETRISCHEN KRYPTOGRAFISCHEN SCHLÜSSELPAAREN
    30.
    发明公开
    VERFAHREN ZUR ERZEUGUNG VON ASYMMETRISCHEN KRYPTOGRAFISCHEN SCHLÜSSELPAAREN 有权
    用于生产对称密码密钥对

    公开(公告)号:EP2409255A1

    公开(公告)日:2012-01-25

    申请号:EP10707892.5

    申请日:2010-03-04

    IPC分类号: G06F21/00

    摘要: The invention relates to a method for creating a set of asymmetrical cryptographic key pairs, wherein the set of key pairs has a first key pair (K1) and a second key pair (K2), wherein the first key pair is formed by a first private (G1) and a first public key (O1) and the second key pair is formed by a second private (G2) and a second public key (O2), wherein a first cipher (C_G2_O1) is allocated to the first and second key pair, wherein the first cipher is formed by an encryption of the second private key (G2) with the first public key (O1), having the following steps: adding a third asymmetrical cryptographic key pair (K3) to the set of key pairs, wherein the third key pair is formed by a third private (G3) and a third public key (O3); creating a second cipher (C_G3_O1) by encrypting the third private key (G3) with the first public key (O1); storing the second cipher (212; 186), wherein the set of key pairs has a directed graph structure.