会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 61. 发明授权
    • Symmetrical clock distribution in multi-stage high speed data conversion circuits
    • 多级高速数据转换电路中的对称时钟分布
    • US08750338B2
    • 2014-06-10
    • US13556863
    • 2012-07-24
    • Guangming YinBo ZhangMohammad NejadJun Cao
    • Guangming YinBo ZhangMohammad NejadJun Cao
    • H04J3/02
    • H04J3/0685H04J3/04H04J3/0629H04L7/0008
    • Provided is a high speed bit stream data conversion circuit that includes input ports to receive first bit streams at a first bit rate. Data conversion circuits receive the first bit streams and produce second bit stream(s), wherein the number and bit rate of the first and second bit stream(s) differ. Symmetrical pathways transport the first bit streams from the input ports to the data conversion circuits, wherein their transmission time(s) are substantially equal. A clock distribution circuit receives and symmetrically distributes a clock signal to data conversion circuits. A central trunk coupled to the clock port and located between a first pair of circuit pathways with paired branches that extend from the trunk and that couple to the data conversion circuits make up the clock distribution circuit. The distributed data clock signal latches data in data conversion circuits from the first to the second bit stream(s).
    • 提供了一种高速比特流数据转换电路,其包括以第一比特率接收第一比特流的输入端口。 数据转换电路接收第一比特流并产生第二比特流,其中第一和第二比特流的数量和比特率不同。 对称路径将来自输入端口的第一比特流传输到数据转换电路,其中它们的传输时间基本相等。 时钟分配电路接收并对称地将时钟信号分配给数据转换电路。 耦合到时钟端口并且位于具有从主干延伸的配对分支的第一对电路路径之间的中央中继线,并且耦合到数据转换电路构成时钟分配电路。 分布式数据时钟信号将数据从第一到第二位流锁存在数据转换电路中。
    • 63. 发明申请
    • SWITCH ROUTE EXPLORING METHOD, SYSTEM AND DEVICE
    • 开关路径探测方法,系统和设备
    • US20140007231A1
    • 2014-01-02
    • US13702785
    • 2011-01-14
    • Qin LiJun CaoManxia TieZhenhai Huang
    • Qin LiJun CaoManxia TieZhenhai Huang
    • H04L29/06
    • H04L63/1475H04L45/26
    • A switch route exploring method, system and device are provided in the present invention. The method comprises that: a transmitting source node NSource constructs a switch route exploring request packet and transmits it to a destination node NDestination; the switch route exploring request packet comprises information of switch route from the transmitting source node NSource to the destination node NDestination, wherein the information is known by the transmitting source node NSource; and the destination node NDestination constructs a switch route exploring response packet and transmits it to the transmitting source node NSource.
    • 在本发明中提供了一种开关路径探索方法,系统和装置。 该方法包括:发送源节点NSource构建探索请求分组的交换路由,并将其发送到目的节点NDestination; 所述交换路由探索请求分组包括从所述发送源节点NSource到所述目的节点NDestination的切换路由的信息,其中,所述信息由所述发送源节点NSource知道; 并且目的地节点NDestination构建探索响应分组的交换机路由,并将其发送到发送源节点NSource。
    • 66. 发明申请
    • TERMINAL DEVICE CAPABLE OF LINK LAYER ENCRYPTION AND DECRYPTION AND DATA PROCESSING METHOD THEREOF
    • 能够连接层加密和解码的终端设备及其数据处理方法
    • US20130283045A1
    • 2013-10-24
    • US13995641
    • 2011-06-17
    • Qin LiJun CaoManxia Tie
    • Qin LiJun CaoManxia Tie
    • H04L29/06H04L9/08
    • H04L63/0428H04L9/08H04L63/162
    • There are a terminal device capable of link layer encryption and decryption and a data process method thereof, and the terminal device includes a link layer processing module including a control module, a data frame encryption module, a data frame decryption module, a key management module, an algorithm module, a transmission port and a reception port; and the control module is connected with the transmission port through the data frame encryption module, the reception port is connected with the control module through the data frame decryption module, the control module is connected with the key management module, the data frame encryption module is connected with the data frame decryption module through the key management module, and the data frame encryption module is connected with the data frame decryption module through the algorithm module.
    • 存在能够进行链路层加密和解密的终端设备及其数据处理方法,并且终端设备包括链路层处理模块,该链路层处理模块包括控制模块,数据帧加密模块,数据帧解密模块,密钥管理模块 算法模块,传输端口和接收端口; 控制模块通过数据帧加密模块与传输端口连接,接收端口通过数据帧解密模块与控制模块连接,控制模块与密钥管理模块连接,数据帧加密模块为 通过密钥管理模块与数据帧解密模块相连,数据帧加密模块通过算法模块与数据帧解密模块连接。
    • 67. 发明申请
    • METHOD AND SYSTEM FOR NETWORK ACCESS CONTROL
    • 网络访问控制的方法和系统
    • US20130205374A1
    • 2013-08-08
    • US13879136
    • 2011-03-15
    • Zhiqiang DuManxia TieZhenhai HuangJun Cao
    • Zhiqiang DuManxia TieZhenhai HuangJun Cao
    • H04L29/06
    • H04L63/08
    • A method and a system for network access control are provided, which are based on cipher code mechanism. After a visitor has raised an access request, an access controller in the destination network processes the access request and initiates an authentication request on the visitor identity to an authentication server through the visitor. The access controller in the destination network accomplishes the authentication on the visitor identity according to the public authentication result of the authentication server transferred by the visitor, and performs according to the authorization policy the authorization management on the successfully authenticated visitor. The present invention solves the problem of incapableness of performing the access control when the access controller can not directly use the authentication service provided by the authentication server. The present invention can sufficiently satisfy the real application requirements of access control on visitor.
    • 提供了一种基于密码机制的网络访问控制方法和系统。 在访问者提出访问请求之后,目的地网络中的访问控制器处理访问请求,并通过访问者向认证服务器发起对访问者身份的认证请求。 目的地网络中的接入控制器根据访问者转发的认证服务器的公共认证结果对访客身份进行认证,并根据认证策略对成功认证的访问者进行授权管理。 本发明解决了当访问控制器不能直接使用认证服务器提供的认证服务时执行访问控制的不适用性的问题。 本发明可以充分满足访客访问控制的实际应用需求。
    • 68. 发明授权
    • Peer-to-peer access control method of triple unit structure
    • 三单元结构的对等访问控制方法
    • US08495712B2
    • 2013-07-23
    • US12519955
    • 2007-06-25
    • Xiaolong LaiJun CaoManxia TieBianling Zhang
    • Xiaolong LaiJun CaoManxia TieBianling Zhang
    • H04L29/00
    • H04L63/0869
    • This invention relates to a peer-to-peer access control method of a triple-unit structure for safely implementing bidirectional authentication between the terminal and the network. According to the method, on the basis of the access control method of the existing double-unit triple-entity structure, the authenticator function is implemented in the access controller, and the authentication protocol function is implemented in the terminal and the access controller, so that the terminal, the access controller and the server all participate in the authentication, and the trust relationship is established between the terminal and the access controller directly, which renders security very reliable. The invention not only solves the technical problems of the access control method of the existing double-unit double-entity structure that the access flexibility is limited and the extension of the number of the access controllers is inconvenient, but also solves the technical problems of the existing access control method of the double-unit triple-entity structure that the process for establishing the trust relationship is complicated and the security of the network may be influenced, thus achieving advantages of high security performance, no requirement of changing existing network structures and relative independency of the authentication protocol.
    • 本发明涉及用于在终端和网络之间安全地实现双向认证的三单元结构的对等接入控制方法。 根据该方法,在现有的双单元三实体结构的访问控制方法的基础上,在接入控制器中实现认证方的功能,在终端和接入控制器中实现认证协议功能, 终端,接入控制器和服务器都参与认证,直接在终端和接入控制器之间建立信任关系,使安全性非常可靠。 本发明不仅解决了现有的双单元双实体结构的访问控制方法的技术问题,即访问灵活性有限,访问控制器数量的扩展不方便,而且解决了 建立信任关系的过程复杂,网络安全性可能受影响的双单元三实体结构的现有访问控制方法,从而实现高安全性能的优势,无需改变现有网络结构和相对性 认证协议的独立性。
    • 70. 发明授权
    • Entity bi-directional identificator method and system based on trustable third party
    • 基于可信第三方的实体双向识别方法和系统
    • US08356179B2
    • 2013-01-15
    • US12739678
    • 2008-10-23
    • Manxia TieJun CaoXiaolong LaiLiaojun PangZhenhai Huang
    • Manxia TieJun CaoXiaolong LaiLiaojun PangZhenhai Huang
    • G06F7/04G06F15/16G06F17/30H04L29/06H04L9/32
    • H04L63/0869H04L9/3213H04L9/3273H04L63/0823H04L63/126
    • An entity bi-directional identification method and system based on a trustable third party thereof are provided. The system comprises a first entity, which is for sending a first message to a second entity, sending a third message to a third entity after receiving a second message sent by the second entity, verifying the fourth message after receiving a fourth message sent by the third entity, sending a fifth message to the second entity after the verification is finished; the second entity, which is for receiving the first message sent by the first entity, sending the second message to the first entity, verifying the fifth message after receiving the fifth message sent by the first entity; the third entity, which is for receiving the third message sent by the first entity, checking if the first entity and the second entity are legal, implementing the pretreatment according to the checking result, sending the first entity the fourth message after the treatment is finished.
    • 提供了一种基于可信任第三方的实体双向识别方法和系统。 该系统包括用于向第二实体发送第一消息的第一实体,在接收到由第二实体发送的第二消息之后向第三实体发送第三消息,在接收到由第二实体发送的第四消息之后验证第四消息 第三实体,在验证完成之后向第二实体发送第五消息; 所述第二实体用于接收由所述第一实体发送的所述第一消息,向所述第一实体发送所述第二消息,在接收到由所述第一实体发送的所述第五消息之后验证所述第五消息; 用于接收第一实体发送的第三消息的第三实体,检查第一实体和第二实体是否合法,根据检查结果实现预处理,在处理完成之后发送第一实体第四消息 。