会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 41. 发明申请
    • METHOD AND APPARATUS FOR IDENTITY REUSE FOR COMMUNICATIONS DEVICES
    • 用于通信设备的身份重用的方法和装置
    • US20110191835A1
    • 2011-08-04
    • US12883374
    • 2010-09-16
    • Philip Michael HawkesAnand Palanigounder
    • Philip Michael HawkesAnand Palanigounder
    • H04L9/32
    • H04W12/08
    • An apparatus and method for identity reuse operable in a communications system, the method comprising selecting an identity value for a device; registering the device onto a network with the selected identity value; determining if the registration of the device is successful; and establishing a communication session for the device and deregistering the selected identity value upon termination of the communication session if the registration is successful, or determining whether to try a different identity value if the registration is not successful. In one aspect, the apparatus and method further comprising waiting a predetermined time period before either re-registering with the selected identity value or registering with the different identity value.
    • 一种用于在通信系统中可操作的身份重用的装置和方法,所述方法包括:选择设备的标识值; 将所述设备注册到具有所选标识值的网络上; 确定设备的注册是否成功; 以及如果所述注册成功则建立所述设备的通信会话并终止所述通信会话,或者如果所述注册不成功,则确定是否尝试不同的身份值。 在一个方面,所述装置和方法还包括在用所选择的身份值重新注册之前等待预定时间段,或者用不同的身份值注册。
    • 44. 发明申请
    • APPARATUS AND METHOD FOR EVALUATING A CIPHER STRUCTURE'S RESISTANCE TO CRYPTANALYSIS
    • 评估水泥结构抗CRYPTANALYSIS的电阻和方法
    • US20100098242A1
    • 2010-04-22
    • US12253767
    • 2008-10-17
    • Lu XiaoPhilip Michael HawkesGregory Gordon Rose
    • Lu XiaoPhilip Michael HawkesGregory Gordon Rose
    • H04L9/28
    • H04L9/002H04L9/0631
    • Disclosed is a method for evaluating resistance to cryptanalysis of a cipher structure having a diffusion element including a linear transformation placed between differently-sized confusion elements at an input and an output of the diffusion element. A generalized minimum number of non-zero symbols at the diffusion element's input and output is determined. The diffusion element's input is divided into subset inputs, each having a size corresponding to the size of each confusion element at the diffusion element input. For each subset input, a subset number of non-zero symbols at the subset input and the diffusion element output is determined. Each subset number is summed to generate a summed subset number. The summed subset number is subtracted from the generalized minimum number to generate a worst-case number. An upper bound of a maximum differential characteristic probability is calculated and used to evaluate the cipher structure.
    • 公开了一种用于评估具有扩散元件的密码分析电阻的方法,该扩散元件包括放置在扩散元件的输入端和输出端的不同大小的混淆元件之间的线性变换。 确定扩散元件输入和输出处的非零符号的通用最小数量。 扩散元件的输入被分成子集输入,每个子集具有与扩散元素输入处的每个混淆元素的大小相对应的大小。 对于每个子集输入,确定子集输入处的非零符号的子集数量和扩散元素输出。 将每个子集数相加以生成一个总和子集。 从广义最小数字中减去总和子集数,以生成最坏情况数。 计算最大微分特征概率的上限,并用于评估密码结构。
    • 45. 发明申请
    • RESYNCHRONIZATION FOR PUSH MESSAGE SECURITY USING SECRET KEYS
    • 使用秘密钥匙推送消息安全的重新定义
    • US20090319792A1
    • 2009-12-24
    • US12135987
    • 2008-06-09
    • Philip Michael HawkesAndreas K. WachterMichael Paddon
    • Philip Michael HawkesAndreas K. WachterMichael Paddon
    • H04L9/32
    • H04L63/068H04L9/0894H04L9/12H04L9/3271H04L63/12H04L2209/80
    • A method for a server to initiate resynchronization with an access terminal, when synchronization has been lost, that cannot be exploited by attackers is provided. The server may provide the access terminal with a secret key that is only known to the access terminal and the server. The access terminal may store the secret key in a secure storage device to prevent the secret key from being hacked. If the server determines that synchronization has been lost, the server may send a resynchronization message to the access terminal with the secret key attached. The access terminal retrieves the stored secret key from the secure memory device and compares it to the secret key attached to the resynchronization message. If there is a match, the access terminal may initiate a secure communication link with the server to reestablish synchronization.
    • 提供了一种用于当同步已经丢失时服务器发起与接入终端的重新同步的方法,其不能被攻击者利用。 服务器可以向接入终端提供只有接入终端和服务器已知的秘密密钥。 接入终端可以将秘密密钥存储在安全存储设备中,以防止秘密密钥被黑客入侵。 如果服务器确定同步已经丢失,则服务器可能会在附加密钥的情况下向接入终端发送重新同步消息。 接入终端从安全存储设备检索存储的秘密密钥,并将其与附加到重新同步消息的秘密密钥进行比较。 如果存在匹配,则接入终端可以发起与服务器的安全通信链路以重新建立同步。