会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 51. 发明申请
    • METHOD AND APPARATUS FOR CLOSE PROXIMITY DEVICE DISCOVERY
    • 用于近距离设备发现的方法和装置
    • US20130051507A1
    • 2013-02-28
    • US13543384
    • 2012-07-06
    • Joni JantunenHannu LaineJari-Jukka Harald KaajaJukka ReunamakiIlari Teikari
    • Joni JantunenHannu LaineJari-Jukka Harald KaajaJukka ReunamakiIlari Teikari
    • H04L7/04
    • G06K7/10039G06K7/10306
    • Method, apparatus and computer program for broadcasting a synchronization signal as a timing reference for slave devices; broadcasting by an impulse radio transceiver a discovery request packet with a given timing offset with relation to the timing reference, for reception by receptive slave devices with matching timing with the given timing offset; receiving by the impulse radio transceiver a response packet from each receptive slave device with the given timing offset; and detecting a timing conflict in which the impulse radio transceiver has simultaneously received two or more response packets, and responsively transmitting by the impulse radio transceiver to the receptive slave devices a response change request packet; the response change request packet requesting one or more of the receptive slave devices to cease sending response packets in response to a following discovery request packet sent with the given timing offset.
    • 用于广播作为从设备的定时参考的同步信号的方法,装置和计算机程序; 通过脉冲无线电收发机广播具有相对于定时参考的给定定时偏移的发现请求分组,用于具有与给定定时偏移的匹配定时的接收从设备的接收; 由脉冲无线电收发机接收来自具有给定定时偏移的每个接收从设备的响应分组; 并且检测脉冲无线电收发器同时接收两个或更多个响应分组的定时冲突,以及由脉冲无线电收发机响应地向接收从设备发送响应改变请求分组; 所述响应改变请求分组响应于以给定的定时偏移发送的随后的发现请求分组,请求接收从设备中的一个或多个接收从设备停止发送响应分组。
    • 56. 发明授权
    • Method and apparatus for implementing key stream hierarchy
    • 实现密钥流层次结构的方法和装置
    • US09203609B2
    • 2015-12-01
    • US13316932
    • 2011-12-12
    • Jan-Erik EkbergJari-Jukka Harald Kaaja
    • Jan-Erik EkbergJari-Jukka Harald Kaaja
    • H04K1/00H04L9/06H04L9/08
    • H04L9/065H04L9/0838H04L9/0877H04L2209/805
    • Various methods for implementing keystream hierarchy in a distributed memory environment are provided. One example method may comprise causing a generated keystream to be accessed on a memory device, wherein the keystream was generated in an instance in which the memory device was in radio communications range. One example method may further comprise determining a session key based on the generated keystream and a modified keystream. In some example embodiments, the modified keystream is created by the memory device based on the generated keystream and a keystream received by the memory device from a second device. One example method may further comprise causing communications data to be transmitted to the memory device or to the second device. In some example embodiments, the communications data is protected using at least a portion of the session key and is intended for the second device.
    • 提供了在分布式存储器环境中实现密钥流层次的各种方法。 一个示例性方法可以包括使得在存储器设备上访问生成的密钥流,其中在存储器设备处于无线电通信范围的情况下生成密钥流。 一个示例性方法还可以包括基于生成的密钥流和修改的密钥流来确定会话密钥。 在一些示例实施例中,修改的密钥流由存储器设备基于生成的密钥流和由存储器设备从第二设备接收的密钥流来创建。 一个示例性方法还可以包括使通信数据被发送到存储设备或第二设备。 在一些示例性实施例中,使用会话密钥的至少一部分来保护通信数据,并且用于第二设备。
    • 58. 发明申请
    • METHOD AND APPARATUS FOR IMPLEMENTING KEY STREAM HIERARCHY
    • 实施关键流域分层的方法与装置
    • US20130148805A1
    • 2013-06-13
    • US13316932
    • 2011-12-12
    • Jan-Erik EkbergJari-Jukka Harald Kaaja
    • Jan-Erik EkbergJari-Jukka Harald Kaaja
    • H04K1/00
    • H04L9/065H04L9/0838H04L9/0877H04L2209/805
    • Various methods for implementing keystream hierarchy in a distributed memory environment are provided. One example method may comprise causing a generated keystream to be accessed on a memory device, wherein the keystream was generated in an instance in which the memory device was in radio communications range. One example method may further comprise determining a session key based on the generated keystream and a modified keystream. In some example embodiments, the modified keystream is created by the memory device based on the generated keystream and a keystream received by the memory device from a second device. One example method may further comprise causing communications data to be transmitted to the memory device or to the second device. In some example embodiments, the communications data is protected using at least a portion of the session key and is intended for the second device.
    • 提供了在分布式存储器环境中实现密钥流层次的各种方法。 一个示例性方法可以包括使得在存储器设备上访问生成的密钥流,其中在存储器设备处于无线电通信范围的情况下生成密钥流。 一个示例性方法还可以包括基于生成的密钥流和修改的密钥流来确定会话密钥。 在一些示例实施例中,修改的密钥流由存储器设备基于生成的密钥流和由存储器设备从第二设备接收的密钥流来创建。 一个示例性方法还可以包括使通信数据被发送到存储设备或第二设备。 在一些示例性实施例中,使用会话密钥的至少一部分来保护通信数据,并且用于第二设备。