发明名称 System and method for processing feedback entries received from software
摘要 A method and system for processing feedback entries received from software provided by a vendor to an end user machine. The end user machine includes the software, a feedback module, and a database. The feedback module: generates an encryption Ek0 of an identification tag FE(0) using a secret key k(0) where Ek0=E(k(0),FE(0)); generates a parameter Hn0 using a secret key n(0) where Hn0=Hash(n(0)∥Ek0); generates a parameter Hs0 using a secret key s(0) where Hs0=Hash(s(0)∥Ek0); and sends Ek0, Hn0, and Hs0 to the database.
申请公布号 US9569774(B2) 申请公布日期 2017.02.14
申请号 US201313855333 申请日期 2013.04.02
申请人 International Business Machines Corporation 发明人 Chenthamarakshan Vijil Enara
分类号 G06Q20/00;G06Q20/38;G06Q30/02;H04L9/08;G06F21/60;H04L9/12;H04L9/14;H04L9/32 主分类号 G06Q20/00
代理机构 Schmeiser, Olsen & Watts, LLP 代理人 Schmeiser, Olsen & Watts, LLP ;Pivnichny John
主权项 1. A method for processing feedback entries received from software, said software provided by a vendor device to an end user machine, said end user machine comprising a processor, the software, a feedback module, and a database, wherein a concatenation operator ∥ is defined such that A∥B denotes a concatenation of strings A and B, wherein E(K,X) defines a symmetric key encryption of a parameter X using a key K, wherein Hash(Y) defines a one way hash function of a parameter Y, and wherein said method comprises: said processor via execution of the feedback module, establishing a secret key k(0) and sending the key k(0) to the vendor device and communicating the key k(0) to a user of the software; said processor via execution of the feedback module, establishing a secret key n(0) and sending the key n(0) to the vendor device and not communicating the key n(0) to the user; said processor, via execution of the feedback module, generating a secret key s(0) and communicating the generated key s(0) to the user but not to the vendor device; said processor, via execution of the feedback module, generating an encryption Ek0 of an identification tag FE(0) using the secret key k(0) where Ek0=E(k(0),FE(0)); said processor, via execution of the feedback module, generating a parameter Hn0 using the secret key n(0) where Hn0=Hash(n(0)∥Ek0); said processor, via execution of the feedback module, generating a parameter Hs0 using the secret key s(0) where Hs0=Hash(s(0)∥Ek0); said processor, via execution of the feedback module, sending Ek0, Hn0, and Hs0 to the database; said processor, via execution of the feedback module, receiving N feedback entries, denoted as FE(1), . . . , FE(N), from the software; said processor, via execution of the feedback module, generating an encryption E(k(i),FE(i)), denoted as Eki, of feedback entry FE (i) using an encryption key k(i) and writing Eki to the database for each of i=1, . . . , N; and said processor, via execution of the feedback module, determining that synchronization is required and a network connection is available and in response, synchronizing the database with the vendor device by sending Eki to the vendor device for each of i=1, . . . , N.
地址 Armonk NY US