会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 108. 发明授权
    • Passive system for recovering cryptography keys
    • 用于恢复加密密钥的被动系统
    • US08675863B2
    • 2014-03-18
    • US12645123
    • 2009-12-22
    • Robert J. Anderson
    • Robert J. Anderson
    • H04L9/00H04L29/06
    • H04L63/30H04W12/02H04W12/04
    • Modern cellular wireless communications providers strive to keep their network and subscribers secure through various means. The identity of the subscriber may be obfuscated through the use of a temporary identifier for most network transactions including signaling events, voice calls, SMS messages and data sessions. A subscriber's unique identity may only be transmitted over the air in an encrypted form. Similarly, the content of voice calls, SMS messages and data sessions may also be encrypted when transmitted over the air and even when transferred over internal network interfaces. However, the use of encryption presents significant challenges for law enforcement communities when court ordered lawful intercept is required to monitor and locate subscribers utilizing the wireless networks for illegal and/or terrorist purposes. A technique to aid in the determination of a subscriber's unique wireless identity and the decryption of encrypted signals would be very useful for lawful intercept. In this document we describe an architecture and technique to aid in the decryption of encrypted wireless signals for lawful intercept by determining the current encryption key. It may also be used to decrypt encrypted signals on internal interfaces of the wireless and wireline networks.
    • 现代蜂窝无线通信提供商努力通过各种方式保持网络和用户的安全。 可以通过对大多数网络事务使用临时标识符来混淆订户的身份,包括信令事件,语音呼叫,SMS消息和数据会话。 用户的唯一身份只能以加密形式通过空中传输。 类似地,即使在通过内部网络接口传输时,语音呼叫,SMS消息和数据会话的内容也可以通过空中传输进行加密。 然而,当法院命令合法拦截需要监视和定位利用无线网络进行非法和/或恐怖活动的用户时,加密使用对执法团体来说是一个重大的挑战。 一种帮助确定用户唯一无线身份和加密信号解密的技术对于合法拦截将是非常有用的。 在本文中,我们描述了一种通过确定当前加密密钥来帮助解密加密无线信号以进行合法拦截的架构和技术。 它也可以用于解密无线和有线网络的内部接口上的加密信号。
    • 109. 发明授权
    • Unauthorized location detection and countermeasures
    • 未经授权的位置检测和对策
    • US08627484B2
    • 2014-01-07
    • US12976908
    • 2010-12-22
    • Frederic A. BeckleyRobert J. AndersonMatthew L. Ward
    • Frederic A. BeckleyRobert J. AndersonMatthew L. Ward
    • G06F21/00
    • H04W12/02H04W4/02H04W4/50H04W12/08H04W12/12
    • A location sentry system is provided for use within a mobile device. The sentry system can be configured to detect unauthorized attempts to locate mobile devices by monitoring messages passed between the mobile device and the wireless network and/or messages passed between components of the mobile device, and determining that one or more of the messages is/are indicative of an attempt to locate the mobile device. In response to a determination that an unauthorized attempt has been detected, the location sentry can be configured to take one or more actions. For example, the location sentry system could prevent location information from being sent back to the wireless network and/or the location sentry system could cause incorrect information to be sent to the wireless network.
    • 位置哨兵系统被提供用于在移动设备内使用。 哨兵系统可被配置为通过监视在移动设备和无线网络之间传递的消息和/或在移动设备的组件之间传递的消息来检测未经授权的尝试来定位移动设备,并且确定一个或多个消息是 指示尝试定位移动设备。 响应于已经检测到未经授权的尝试的确定,位置哨兵可被配置为采取一个或多个动作。 例如,位置哨兵系统可以防止位置信息被发送回无线网络和/或位置哨兵系统可能导致不正确的信息被发送到无线网络。