会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • SECURE RELAY NODE IN COMMUNICATION SYSTEM
    • 通信系统中的安全继电器节点
    • WO2011126744A1
    • 2011-10-13
    • PCT/US2011/029603
    • 2011-03-23
    • ALCATEL-LUCENT USA INC.BRUSILOVSKY, AlecCAKULEV, Violeta
    • BRUSILOVSKY, AlecCAKULEV, Violeta
    • H04W12/02
    • H04W12/02H04B7/15521H04L63/164H04W84/047
    • Techniques are disclosed for use in securing communications in environments such as those employing relay nodes. For example, in a communication network wherein a first computing device comprises a user node, a second computing device comprises a relay node, and a third computing device comprises a network access node, and wherein the relay node comprises: a first module for connecting the user node to the communication network; and a second module for connecting the relay node to the network access node, a method comprises the following steps. At least one packet is received at the first module of the relay node from the user node over an interface established between the user node and the relay node. At least one packet is sent from the first module of the relay node to the second module of the relay node via a secure channel established by the first module in accordance with a secure communication protocol. The at least one packet is sent from the second module of the relay node to the network access node via the secure channel and over an interface established between the relay node and the network access node.
    • 公开了用于保护诸如采用中继节点的环境中的通信的技术。 例如,在第一计算设备包括用户节点的通信网络中,第二计算设备包括中继节点,并且第三计算设备包括网络接入节点,并且其中所述中继节点包括:第一模块,用于将 用户节点到通信网络; 以及用于将中继节点连接到网络接入节点的第二模块,一种方法包括以下步骤。 在用户节点和中继节点之间建立的接口上,从用户节点在中继节点的第一模块处接收至少一个分组。 根据安全通信协议,经由由第一模块建立的安全信道,将至少一个分组从中继节点的第一模块发送到中继节点的第二模块。 所述至少一个分组经由所述安全信道以及在所述中继节点与所述网络接入节点之间建立的接口从所述中继节点的所述第二模块发送到所述网络接入节点。
    • 2. 发明申请
    • HIERARCHICAL KEY MANAGEMENT FOR SECURE COMMUNICATIONS IN MULTIMEDIA COMMUNICATION SYSTEM
    • 多媒体通信系统安全通信的分层关键管理
    • WO2011087989A1
    • 2011-07-21
    • PCT/US2011/020686
    • 2011-01-10
    • ALCATEL-LUCENT USA INC.BRUSILOVSKY, AlecCAKULEV, Violeta
    • BRUSILOVSKY, AlecCAKULEV, Violeta
    • H04L9/08H04L29/06
    • H04L9/0836H04L63/062H04L2209/60
    • In a communication system wherein a first computing device is configured to perform a key management function for first user equipment and a second computing device is configured to perform a key management function for second user equipment, wherein the first user equipment seeks to initiate communication with the second user equipment, wherein the first computing device and the second computing device do not have a pre-existing security association there between, and wherein a third computing device is configured to perform a key management function and has a pre-existing security association with the first computing device and a pre-existing security association with the second computing device, the third computing device performing a method comprising steps of: receiving a request from one of the first computing device and the second computing device; and in response to the request, facilitating establishment of a security association between the first computing device and the second computing device such that the first computing device and the second computing device can then facilitate establishment of a security association between the first user equipment and the second user equipment. The first computing device, the second computing device and the third computing device comprise at least a part of a key management hierarchy wherein the first computing device and the second computing device are on a lower level of the hierarchy and the third computing device is on a higher level of the hierarchy.
    • 在其中第一计算设备被配置为对第一用户设备执行密钥管理功能的通信系统中,并且第二计算设备被配置为对第二用户设备执行密钥管理功能,其中第一用户设备寻求发起与 第二用户设备,其中所述第一计算设备和所述第二计算设备之间不具有预先存在的安全关联,并且其中第三计算设备被配置为执行密钥管理功能并且具有与所述第一计算设备的预先存在的安全关联 第一计算设备和与第二计算设备的预先存在的安全关联,所述第三计算设备执行方法包括以下步骤:从所述第一计算设备和所述第二计算设备之一接收请求; 并且响应于该请求,促进在第一计算设备和第二计算设备之间建立安全关联,使得第一计算设备和第二计算设备可以便于在第一用户设备和第二计算设备之间建立安全关联 用户设备。 第一计算设备,第二计算设备和第三计算设备包括密钥管理层级的至少一部分,其中第一计算设备和第二计算设备位于层次结构的较低层,并且第三计算设备位于 更高层次的层次。