会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • SECURE SERVICE MANAGEMENT IN A COMMUNICATION NETWORK
    • 通信网络中的安全服务管理
    • US20150010152A1
    • 2015-01-08
    • US13937182
    • 2013-07-08
    • Alcatel-Lucent Canada Inc.
    • Denis A. ProulxCarl Rajsic
    • H04L9/28
    • H04L9/0833H04L41/5054H04L45/02H04L63/0272H04L63/0428H04L63/065
    • In one embodiment, a tunnel to be affected by configuration of a service in a network is identified and key information for the identified tunnel is obtained from a corresponding router. The tunnel is assigned to a key group based on the key information, and provisioning information associated with the tunnel on the router is updated based on the assigned key group in conjunction with configuration of the service. The updating of the provisioning information may comprise altering the key information on the router to include a key associated with the assigned key group. Also, one or more keys not associated with the assigned key group may be deleted from the router and from a management entity of the network.
    • 在一个实施例中,识别由网络中的服务的配置影响的隧道,并且从相应的路由器获得用于所识别的隧道的密钥信息。 基于密钥信息将隧道分配给密钥组,并且基于分配的密钥组和服务的配置来更新与路由器上的隧道相关联的供应信息。 配置信息的更新可以包括改变路由器上的密钥信息以包括与分配的密钥组相关联的密钥。 此外,可以从路由器和网络的管理实体中删除与分配的密钥组不相关联的一个或多个密钥。
    • 3. 发明申请
    • POLICY BASED CRYPTOGRAPHIC KEY DISTRIBUTION FOR NETWORK GROUP ENCRYPTION
    • 网络组加密的基于策略的CRYPTOGRAPHIC关键分配
    • US20160344711A1
    • 2016-11-24
    • US14717681
    • 2015-05-20
    • ALCATEL-LUCENT CANADA, INC.
    • Mohammad Reza RokuiRajesh Kumar PaidaCarl Rajsic
    • H04L29/06
    • H04L63/061H04L9/0833H04L9/0891H04L63/062H04L63/065H04L63/0853
    • Various embodiments include a method for managing a group of devices in communication with each other and sharing a set of keys. The method may include opening a secure channel with each of two devices from the group; providing the set of keys to the two devices from the group, wherein the set of keys include an encryption and an authentication key; indicating to the two devices to begin using the set of keys; and performing an audit process including verifying that nodes within a key group have the same copy of encryption and authentication keys. Embodiments of the method may include synchronization, active/standby redundancy and the ability to manage the network when some nodes perform the data encryption and some node do not, do, or when both encrypted and non-encrypted tunnels and services can work together.
    • 各种实施例包括用于管理彼此通信并共享一组密钥的一组设备的方法。 该方法可以包括从组中的两个设备中的每一个打开安全通道; 向组中的两个设备提供该组密钥,其中该组密钥包括加密和认证密钥; 指示两台设备开始使用该组密钥; 并且执行审核过程,包括验证密钥组中的节点具有相同的加密和认证密钥副本。 该方法的实施例可以包括同步,主动/备用冗余以及当一些节点执行数据加密时管理网络的能力,并且某些节点没有,或者当加密和非加密隧道和服务都可以一起工作时。