会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 31. 发明申请
    • METHOD AND APPARATUS FOR PERSONAL INFORMATION ACCESS CONTROL
    • 用于个人信息访问控制的方法和设备
    • WO03036900A3
    • 2003-09-04
    • PCT/EP0211416
    • 2002-10-11
    • ERICSSON TELEFON AB L MHOLTMANNS SILKEGERDES MARTINSCHUBA MARKO
    • HOLTMANNS SILKEGERDES MARTINSCHUBA MARKO
    • G06F21/24H04L29/00H04L29/06
    • H04L63/0407H04L63/102
    • For control of access of personal information in accordance with a privacy policy defined for a service provider, a method is disclosed, wherein the method comprises the steps of providing service provider request data from a service provider to an end user device, the service provider request data being indicative of personal information of a user of the end user device to be accessed by the service provider, providing to the service provider first user data including at least one of personal information of the user as requested by the service provider or rejections of personal information requested by the service provider, creating privacy receipt data including the first user data and data being indicative of the service provider, and providing the privacy receipt data to the end user device.
    • 为了根据为服务提供商定义的隐私策略来控制个人信息的访问,公开了一种方法,其中该方法包括以下步骤:从服务提供商向终端用户设备提供服务提供商请求数据,服务提供商请求 数据指示要由服务提供者访问的最终用户装置的用户的个人信息,向服务提供者提供第一用户数据,第一用户数据包括服务提供者所请求的用户的个人信息或个人的拒绝中的至少一个 由服务提供商请求的信息,创建包括第一用户数据和指示服务提供商的数据的隐私接收数据,并将隐私接收数据提供给最终用户装置。
    • 32. 发明申请
    • METHOD AND DEVICE OF GENERATING A KEY FOR DEVICE-TO-DEVICE COMMUNICATION BETWEEN A FIRST USER EQUIPMENT AND A SECOND USER EQUIPMENT
    • 产生用于第一用户设备和第二用户设备之间的设备到设备通信的密钥的方法和设备
    • WO2014059657A1
    • 2014-04-24
    • PCT/CN2012/083191
    • 2012-10-19
    • NOKIA CORPORATIONLIU, YangZHANG, Da JiangHOLTMANNS, Silke
    • LIU, YangZHANG, Da JiangHOLTMANNS, Silke
    • H04W12/04
    • H04W12/04H04L9/0869H04L63/062H04L2463/061H04L2463/062H04W76/11H04W76/14H04W76/27
    • A method of generating a key for D2D communication between a first user equipment and a second user equipment in a first radio access node is disclosed. In an exemplary embodiment, the method may comprise: receiving a request for D2D key generation from the first user equipment which is served by the first radio access node; determining whether the second user equipment is served by the first radio access node; when it is determined that the second user equipment is served by the first radio access node, generating a first random number and a second random number; generating a first D2D key based on the first random number and a second D2D key based on the second random number; sending the first D2D key and the second random number to the second user equipment; and sending the second D2D key and the first random number to the first user equipment; and when it is determined that the second user equipment is not served by the first radio access node, determining a second radio access node which serves the second user equipment; generating a first random number; generating a first D2D key based on the first random number; sending the first D2D key to the second radio access node; receiving a second D2D key from the second radio access node; and sending the second D2D key and the first random number to the first user equipment.
    • 公开了一种在第一无线接入节点中的第一用户设备和第二用户设备之间生成用于D2D通信的密钥的方法。 在示例性实施例中,该方法可以包括:从由第一无线电接入节点服务的第一用户设备接收对D2D密钥生成的请求; 确定所述第二用户设备是否由所述第一无线接入节点服务; 当确定第二用户设备由第一无线接入节点服务时,生成第一随机数和第二随机数; 基于第一随机数产生第一D2D密钥和基于第二随机数的第二D2D密钥; 将第一D2D密钥和第二随机数发送给第二用户设备; 以及将所述第二D2D密钥和所述第一随机数发送给所述第一用户设备; 并且当确定所述第二用户设备不被所述第一无线接入节点服务时,确定为所述第二用户设备服务的第二无线接入节点; 产生第一个随机数; 基于第一随机数生成第一D2D密钥; 将所述第一D2D密钥发送到所述第二无线接入节点; 从所述第二无线接入节点接收第二D2D密钥; 以及将第二D2D密钥和第一随机数发送给第一用户设备。
    • 35. 发明申请
    • MULTI-SIM ENABLING APPLICATION AND USE OF EUICC IN LEGACY TERMINALS
    • 多SIM卡启用应用程序和EUICC在LEGACY终端中的使用
    • WO2013027085A1
    • 2013-02-28
    • PCT/IB2011/053682
    • 2011-08-22
    • NOKIA CORPORATIONNOKIA, INC.HOLTMANNS, SilkeLINDHOLM, Rune
    • HOLTMANNS, SilkeLINDHOLM, Rune
    • H04W8/22H04M3/42H04W8/18
    • H04W4/001H04W4/50H04W8/183H04W8/20H04W12/04
    • A methods enabling use of multiple SIM applications in UICCs is described. One method includes determining whether a physical component of a device is a secure module which supports subscription provisioning. If the physical component is a secure module which supports subscription provisioning, the physical component is instructed to operate as a legacy UICC. The physical component is operated as a legacy UICC via a virtual UICC. Another method includes downloading a first subscription related data which provides information for operating in a wireless network. The first subscription related data is stored on a memory component of a device. The device includes a UICC storing a second subscription. The method also includes operating the device as a multiple profile device using the first subscription and the second subscription. Apparatus and computer readable media are also described.
    • 描述了在UICC中使用多个SIM应用的方法。 一种方法包括确定设备的物理组件是否是支持订阅配置的安全模块。 如果物理组件是支持订阅配置的安全模块,则指示物理组件作为传统UICC运行。 物理组件通过虚拟UICC作为传统UICC运行。 另一种方法包括下载提供用于在无线网络中操作的信息的第一订阅相关数据。 第一订阅相关数据被存储在设备的存储器组件上。 该设备包括存储第二订阅的UICC。 该方法还包括使用第一订阅和第二订阅将设备操作为多个简档设备。 还描述了装置和计算机可读介质。