会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 5. 发明授权
    • Challenge-response authentication and key exchange for a connectionless security protocol
    • US06377691B1
    • 2002-04-23
    • US08762166
    • 1996-12-09
    • Michael M. SwiftBharat Shah
    • Michael M. SwiftBharat Shah
    • H04L900
    • H04L63/04H04L63/0807H04L63/0869H04L63/12
    • The disclosed system uses a challenge-response authentication protocol for datagram-based remote procedure calls. Using a challenge-response authentication protocol has many advantages over using a conventional authentication protocol. There are two primary components responsible for communication using the challenge-response protocol: a challenge-response protocol component on the client computer (client C-R component) and a challenge-response protocol component on the server computer (server C-R component). In order to start a session using the challenge-response protocol, the client C-R component first generates a session key. The session key is used by both the client C-R component and the server C-R component for encrypting and decrypting messages. After creating the session key, the client C-R component encrypts a message containing a request for a remote procedure call and sends it to the server C-R component. In response, the server C-R component sends a challenge to the client C-R component. The challenge contains a unique identifier generated by the server C-R component. The client C-R component responds to the challenge by sending a challenge response and the session key. The challenge response is the unique identifier contained within the challenge encrypted with the password of the user of the client computer. The session key is also encrypted using this password. Upon receiving the challenge response, the server C-R component uses its copy of the client's password to create its own version of the challenge response and compares it to the version received from the client C-R component. If the two versions of the challenge response are identical, the identity of the user of the client computer has been verified. If the two versions are not identical, an attempted unauthorized access has been detected. After verification, the server C-R component extracts the session key, decrypts the message, and invokes the requested procedure of the server program. Subsequently, the server C-R component will send and receive encrypted messages from the client C-R component, thereby facilitating a remote procedure call.
    • 6. 发明授权
    • Network-initiated change of mobile phone parameters
    • 网络发起的手机参数变更
    • US6047071A
    • 2000-04-04
    • US837970
    • 1997-04-15
    • Bharat Shah
    • Bharat Shah
    • H04W8/24H04W8/26H04W12/02H04L9/00
    • H04W8/245H04W12/02H04W8/26
    • The procedure for Over-The-Air Parameter Administration (OTAPA) utilizes the over-the-air programming protocol and procedures which support the Over-The-Air Service Provisioning (OTASP) feature in accordance with established industry standards (TIA/EIA/IS-683). The mobile phone is programmed with a service option for changing the NAM parameters including an identification number for this option. The network base station sends a message to the mobile phone using the identification number and, if the mobile phone has OTAPA capability, it responds indicating support. The base station then transmits message telling the mobile station to proceed to the Traffic Channel and inquires whether the encryption mode is enabled, proceeding with the OTAPA only if the encryption mode is enabled. Once on the Traffic Channel, a Parameter Change Code (PCC) is sent. If the PCC is verified by the mobile unit, the base station proceeds to update the parameters and store the updated parameters into the phone's memory. After verification of the programmed data in accordance with OTASP processing, the process is terminated. No user intervention is required to initiate or conduct the OTAPA procedure.
    • 空中参数管理(OTAPA)的过程利用了空中编程协议和程序,支持根据既定的行业标准(TIA / EIA / IS)的空中业务配置(OTASP)功能 -683)。 手机编程有一个用于更改NAM参数的服务选项,包括此选项的标识号。 网络基站使用识别号码向移动电话发送消息,如果移动电话具有OTAPA能力,则其响应指示支持。 然后,基站发送消息,通知移动台进行业务信道,并询问加密模式是否被使能,只有在加密模式被使能的情况下才进行OTAPA。 一旦在业务信道上,发送参数更改码(PCC)。 如果PCC被移动单元验证,则基站继续更新参数并将更新的参数存储到手机的存储器中。 在根据OTASP处理验证编程数据之后,该过程终止。 不需要用户干预来启动或执行OTAPA程序。