会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 51. 发明申请
    • METHODS, APPARATUSES, AND COMPUTER PROGRAM PRODUCTS FOR DATA TRANSFER BETWEEN WIRELESS MEMORY TAGS
    • 方法,设备和计算机程序产品用于无线记忆标签之间的数据传输
    • WO2014207303A1
    • 2014-12-31
    • PCT/FI2014/050488
    • 2014-06-18
    • NOKIA CORPORATION
    • JANTUNEN, JoniEKBERG, Jan-ErikUUSITALO, MikkoOLLIKAINEN, Jani
    • H04W4/00G06F3/048H04M1/00G06K19/07G06K19/077H04M1/725
    • G06F13/38G06F3/04817G06F3/0486G06F3/0488G06K7/10297H04L67/06H04L67/2842H04M1/7253H04M2250/04H04W4/80
    • Methods, apparatuses, and computer program products are herein provided for transferring data between wireless memory tags (220, 240). A method may include determining that a first wireless memory tag (220) is proximate (221) to a device (200), wherein the first wireless memory tag (220) comprises data (225). The method may further include receiving user input (237) indicating a desire to transfer at least some of the data from the first wireless memory tag (220) to a second wireless memory tag (240). The method may further include causing the at least some of the data to be transferred (223) from the first wireless memory tag (220) to the device (200). The method may further include determining that the second wireless memory tag (240) is proximate (241) to the device (200). The method may further include causing the at least some of the data to be transferred (243) from the device (200) to the second wireless memory tag (240) in response to a release of the user input (237). Corresponding apparatuses and computer program products are also provided.
    • 本文提供了用于在无线存储器标签(220,240)之间传送数据的方法,装置和计算机程序产品。 方法可以包括确定第一无线存储器标签(220)接近(221)到设备(200),其中第一无线存储器标签(220)包括数据(225)。 该方法还可以包括:接收用户输入(237),其指示希望将来自第一无线存储器标签(220)的至少一些数据传送到第二无线存储器标签(240)。 所述方法还可以包括使所述至少一些数据从第一无线存储器标签(220)传送到设备(200)(223)。 该方法还可以包括确定第二无线存储器标签(240)接近(241)到设备(200)。 所述方法还可以包括:响应于所述用户输入(237)的释放,使所述数据中的至少一些数据从所述设备(200)传送到所述第二无线存储器标签(240)。 还提供了相应的设备和计算机程序产品。
    • 53. 发明申请
    • METHOD AND APPARATUS FOR SECURITY MECHANISM FOR PROXIMITY-BASED ACCESS REQUESTS
    • 用于基于接近请求的安全机制的方法和装置
    • WO2014096514A1
    • 2014-06-26
    • PCT/FI2013/051060
    • 2013-11-11
    • NOKIA CORPORATION
    • EKBERG, Jan-ErikKAAJA, Jari-Jukka HaraldUUSITALO, Mikko Aleksi
    • H04B7/08G01S3/32G06Q20/32H04B5/00
    • G06F21/606H04L63/0492H04L63/08H04L63/10H04L63/107H04L63/20H04W12/04H04W12/08
    • An approach is provided for providing security mechanism for proximity-based interactions among devices. At least one first device (e.g., a memory tag)may determine a request for interaction between the at least one first device and at least one second device(e.g., a mobile phone), wherein at least the at least one first device is associated with at least one first antenna and at least one second antenna. The at least one first device may determine a first signal received by the at least one first antenna and a second signal received by the at least one second antenna. Further,the at least one first device may determine one or more differences in one or more characteristics of the first signal and the second signal. Furthermore, the at least one first device may process and/or facilitate a processing of the one or more differences to determine whether to allow the interaction.
    • 提供了一种提供用于设备之间基于邻近的交互的安全机制的方法。 至少一个第一设备(例如,存储器标签)可以确定至少一个第一设备与至少一个第二设备(例如,移动电话)之间的交互的请求,其中至少所述至少一个第一设备被关联 具有至少一个第一天线和至少一个第二天线。 所述至少一个第一设备可以确定由所述至少一个第一天线接收的第一信号和由所述至少一个第二天线接收的第二信号。 此外,至少一个第一装置可以确定第一信号和第二信号的一个或多个特性中的一个或多个差异。 此外,至少一个第一设备可以处理和/或促进一个或多个差异的处理以确定是否允许交互。
    • 55. 发明申请
    • METHOD AND APPARATUS FOR IMPLEMENTING KEY STREAM HIERARCHY
    • 实施关键流域分层的方法与装置
    • WO2013087983A1
    • 2013-06-20
    • PCT/FI2012/051208
    • 2012-12-05
    • NOKIA CORPORATION
    • EKBERG, Jan-ErikKAAJA, Jari-Jukka Harald
    • H04L9/08H04W12/04
    • H04L9/065H04L9/0838H04L9/0877H04L2209/805
    • Various methods for implementing keystream hierarchy in a distributed memory environment are provided. One example method may comprise causing a generated keystream to be accessed on a memory device, wherein the keystream was generated in an instance in which the memory device was in radio communications range. One example method may further comprise determining a session key based on the generated keystream and a modified keystream. In some example embodiments, the modified keystream is created by the memory device based on the generated keystream and a keystream received by the memory device from a second device. One example method may further comprise causing communications data to be transmitted to the memory device or to the second device. In some example embodiments, the communications data is protected using at least a portion of the session key and is intended for the second device.
    • 提供了在分布式存储器环境中实现密钥流层次的各种方法。 一个示例性方法可以包括使得在存储器设备上访问生成的密钥流,其中在存储器设备处于无线电通信范围的情况下生成密钥流。 一个示例性方法还可以包括基于生成的密钥流和修改的密钥流来确定会话密钥。 在一些示例实施例中,修改的密钥流由存储器设备基于生成的密钥流和由存储器设备从第二设备接收的密钥流来创建。 一个示例性方法还可以包括使通信数据被发送到存储设备或第二设备。 在一些示例性实施例中,使用会话密钥的至少一部分来保护通信数据,并且用于第二设备。