会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Sharing of user preferences
    • 分享用户喜好
    • US08700705B2
    • 2014-04-15
    • US12814291
    • 2010-06-11
    • George DanezisTuomas AuraShuo ChenEmre Mehmet Kiciman
    • George DanezisTuomas AuraShuo ChenEmre Mehmet Kiciman
    • G06F15/16
    • G06Q10/10G06F17/30522G06F17/30867H04L63/0421H04W4/21
    • Sharing of user preferences is described. In an embodiment a user preference associated with a user is shared with a group of users in order to improve the relevance of results they receive. A database is used to store information detailing a number of groups of users extracted from a social network graph, where the social network graph describes connections between users. On receipt of a user preference associated with a user, a group of users containing the user is selected and the user preference is then shared with everyone in the selected group. In a further embodiment, the groups of users in the database may comprise cohesive groups of users and an extended group associated with each cohesive group. When selecting a group to share preference data with, a cohesive group containing the user is first selected and then the preference data is shared with the corresponding extended group.
    • 描述用户偏好的共享。 在一个实施例中,与用户相关联的用户偏好与一组用户共享,以便提高他们接收的结果的相关性。 数据库用于存储详细从社交网络图提取的多组用户的信息,其中社交网络图描述用户之间的连接。 在接收到与用户相关联的用户偏好时,选择包含该用户的一组用户,然后与所选择的组中的每个人共享该用户偏好。 在另一实施例中,数据库中的用户组可以包括用户的内聚组和与每个内聚组相关联的扩展组。 当选择一个组以共享偏好数据时,首先选择一个包含用户的内聚组,然后将偏好数据与对应的扩展组共享。
    • 2. 发明申请
    • Sharing of User Preferences
    • 共享用户首选项
    • US20110307551A1
    • 2011-12-15
    • US12814291
    • 2010-06-11
    • George DanezisTuomas AuraShuo ChenEmre Mehmet Kiciman
    • George DanezisTuomas AuraShuo ChenEmre Mehmet Kiciman
    • G06F15/16H04L9/00
    • G06Q10/10G06F17/30522G06F17/30867H04L63/0421H04W4/21
    • Sharing of user preferences is described. In an embodiment a user preference associated with a user is shared with a group of users in order to improve the relevance of results they receive. A database is used to store information detailing a number of groups of users extracted from a social network graph, where the social network graph describes connections between users. On receipt of a user preference associated with a user, a group of users containing the user is selected and the user preference is then shared with everyone in the selected group. In a further embodiment, the groups of users in the database may comprise cohesive groups of users and an extended group associated with each cohesive group. When selecting a group to share preference data with, a cohesive group containing the user is first selected and then the preference data is shared with the corresponding extended group.
    • 描述用户偏好的共享。 在一个实施例中,与用户相关联的用户偏好与一组用户共享,以便提高他们接收的结果的相关性。 数据库用于存储详细从社交网络图提取的多组用户的信息,其中社交网络图描述用户之间的连接。 在接收到与用户相关联的用户偏好时,选择包含用户的一组用户,然后与所选择的组中的每个人共享用户偏好。 在另一实施例中,数据库中的用户组可以包括用户的内聚组和与每个内聚组相关联的扩展组。 当选择一个组以共享偏好数据时,首先选择一个包含用户的内聚组,然后将偏好数据与对应的扩展组共享。
    • 3. 发明授权
    • Authentication method
    • 认证方式
    • US06711400B1
    • 2004-03-23
    • US09418138
    • 1999-10-14
    • Tuomas Aura
    • Tuomas Aura
    • H04M166
    • H04W12/06H04L63/0869
    • In telecommunications systems, the traffic can be protected from eavesdropping and the use of a false identity can be prevented by verifying the authenticity of the terminal equipment by means of an authentication procedure. Verifying the authenticity of the terminal equipment is especially important in the mobile communications systems. In the authentication procedure, the network checks the authenticity of the identity stated by the subscriber device. Additionally, the subscriber device can check the authenticity of the network identity. In the systems in accordance with prior art, the secret information required for making the authentication must be transferred via unsecure transfer networks and given to the visited networks. The information makes it possible to make unlimited number of authentications in an unlimited time. In this case, an active eavesdropper may be able to acquire the information and make the authentication process without forming a connection to the subscriber's authentication centre. The invention presents a method in which each individual authentication process is done between the mobile station and the authentication center. This means that the reliability of the network is checked in connection with every authentication, and not enough information is transferred between the network elements to make it possible to use a false identity.
    • 在电信系统中,可以保护流量免受窃听,并且可以通过认证过程来验证终端设备的真实性来防止使用虚假身份。 验证终端设备的真实性在移动通信系统中尤其重要。 在认证过程中,网络检查用户设备所表示的身份的真实性。 另外,用户设备可以检查网络身份的真实性。 在根据现有技术的系统中,用于进行认证所需的秘密信息必须通过不安全的传输网络传送并被给予被访问的网络。 该信息可以在无限制的时间内使无限数量的身份验证。 在这种情况下,主动窃听者可能能够获取信息并进行认证过程,而不形成与用户认证中心的连接。 本发明提出了一种在移动台和认证中心之间进行各个认证处理的方法。 这意味着网络的可靠性与每次认证相关联,并且网元之间没有足够的信息传输,从而可以使用虚假身份。
    • 4. 发明授权
    • Non-cryptographic addressing
    • 非加密寻址
    • US08261062B2
    • 2012-09-04
    • US11159555
    • 2005-06-22
    • Tuomas AuraMichael Roe
    • Tuomas AuraMichael Roe
    • H04L29/06
    • H04L9/3236H04L9/3263H04L63/0823H04L63/123H04L67/10H04L69/24H04L2209/64H04L2209/805
    • To allow down-level devices to participate in a network controlled by a protocol including CGAS or ECGAs, the CGA or ECGA authentication may be made optional to allow the down-level devices to execute non-CGA or non-ECGA versions of network protocols, while at the same time allowing the use of CGA- and/or ECGA-authenticated versions of the same protocols. To identify non-cryptographic addresses (e.g., non-CGA and non-ECGA), the address bits of a non-CGA or non-ECGA such that the address cannot be or is probably not an encoding of the hash of a public key. In this manner, a receiving node may properly identify the capabilities of the sending node, perform an appropriate authentication of the message containing the non-cryptographic address, and/or prioritize processing of information contained in the message with the non-cryptographic address.
    • 为了允许下级设备参与由包括CGAS或ECGAs的协议控制的网络,CGA或ECGA认证可以是可选的,以允许下级设备执行网络协议的非CGA或非ECGA版本, 同时允许使用相同协议的CGA和/或ECGA认证版本。 为了识别非加密地址(例如,非CGA和非ECGA),非CGA或非ECGA的地址位,使得地址不能或可能不是公共密钥的散列的编码。 以这种方式,接收节点可以适当地识别发送节点的能力,对包含非加密地址的消息执行适当的认证,和/或优先处理包含在具有非加密地址的消息中的信息。
    • 5. 发明授权
    • Using time to determine a hash extension
    • 使用时间来确定散列扩展
    • US07624264B2
    • 2009-11-24
    • US11165412
    • 2005-06-22
    • Tuomas AuraMichael Roe
    • Tuomas AuraMichael Roe
    • H04L9/00G06F7/04H04L9/32
    • H04L9/3236H04L9/006H04L63/0823H04L63/123H04L67/10H04L2209/805
    • An extensible cryptographically generated network address may be generated by forming at least a portion of the network address as a portion of a first hash value. The first hash value may be formed by generating a plurality of hash values by hashing a concatenation of a public key and a modifier using a second hash function until a stop condition. The stop condition may include computing the plurality of hash values for a period of time specified by a time parameter. A second hash value may be selected from the plurality of hash values, and the modifier used to compute that hash value may be stored. A hash indicator may be generated which indicates the selected second hash value. The first hash value may be generated as a hash of a concatenation of at least the public key and the modifier. At least a portion of the node-selectable portion of the network address may include at least a portion of the first hash value.
    • 可以通过将网络地址的至少一部分形成为第一散列值的一部分来生成可扩展的加密生成的网络地址。 可以通过使用第二散列函数对公钥和修饰符的级联进行散列来生成多个散列值直到停止条件来形成第一散列值。 停止条件可以包括在由时间参数指定的时间段内计算多个散列值。 可以从多个散列值中选择第二散列值,并且可以存储用于计算该散列值的修饰符。 可以生成指示所选择的第二散列值的散列指示符。 第一散列值可以被生成为至少公钥和修饰符的级联的散列。 网络地址的节点可选择部分的至少一部分可以包括第一散列值的至少一部分。
    • 6. 发明申请
    • Non-cryptographic addressing
    • 非加密寻址
    • US20060020807A1
    • 2006-01-26
    • US11159555
    • 2005-06-22
    • Tuomas AuraMichael Roe
    • Tuomas AuraMichael Roe
    • H04L9/00
    • H04L9/3236H04L9/3263H04L63/0823H04L63/123H04L67/10H04L69/24H04L2209/64H04L2209/805
    • To allow down-level devices to participate in a network controlled by a protocol including CGAS or ECGAs, the CGA or ECGA authentication may be made optional to allow the down-level devices to execute non-CGA or non-ECGA versions of network protocols, while at the same time allowing the use of CGA- and/or ECGA-authenticated versions of he same protocols. To identify non-cryptographic addresses (e.g., non-CGA and non-ECGA), the address bits of a non-CGA or non-ECGA such that the address cannot be or is probably not an encoding of the hash of a public key. In this manner, a receiving node may properly identify the capabilities of the sending node, perform an appropriate authentication of the message containing the non-cryptographic address, and/or prioritize processing of information contained in the message with the non-cryptographic address.
    • 为了允许下级设备参与由包括CGAS或ECGAs的协议控制的网络,CGA或ECGA认证可以是可选的,以允许下级设备执行网络协议的非CGA或非ECGA版本, 同时允许使用相同协议的CGA和/或ECGA认证版本。 为了识别非加密地址(例如,非CGA和非ECGA),非CGA或非ECGA的地址位,使得地址不能或可能不是公共密钥的散列的编码。 以这种方式,接收节点可以适当地识别发送节点的能力,对包含非加密地址的消息执行适当的认证,和/或优先处理包含在具有非加密地址的消息中的信息。
    • 7. 发明申请
    • Dynamic Host Configuration Protocol
    • 动态主机配置协议
    • US20090070474A1
    • 2009-03-12
    • US11854298
    • 2007-09-12
    • Tuomas AuraMichael RoeSteven Murdoch
    • Tuomas AuraMichael RoeSteven Murdoch
    • G06F15/16
    • H04L61/2015H04L63/0823H04L63/126
    • Dynamic host configuration protocol (DHCP) is extended in order to assist with secure network location awareness. In an embodiment a DHCP client receives a signed DHCP response message from a DHCP server, the signed message comprising at least a certificate chain having a public key. In that embodiment the DHCP client validates the certificate chain and verifies the signature of the signed message. If this is successful the DHCP client accesses stored settings for use with the server. The stored settings are accessed at least using information about the public key. In some embodiments signed DHCPOFFER messages and signed DHCPACK messages are used. In another embodiment the signed DHCP message comprises a location identifier which is, for example, a domain name system (DNS) suffix of a DHCP server.
    • 动态主机配置协议(DHCP)被扩展,以协助安全的网络位置感知。 在一个实施例中,DHCP客户端从DHCP服务器接收签名的DHCP响应消息,所签署的消息至少包括具有公钥的证书链。 在该实施例中,DHCP客户端验证证书链并验证签名消息的签名。 如果此操作成功,DHCP客户端将访问存储的设置以供服务器使用。 至少使用有关公钥的信息访问存储的设置。 在一些实施例中,使用了签名的DHCPOFFER消息和签名的DHCPACK消息。 在另一个实施例中,签名的DHCP消息包括例如DHCP服务器的域名系统(DNS)后缀的位置标识符。
    • 10. 发明授权
    • Method for user identity protection
    • 用户身份保护方法
    • US06373949B1
    • 2002-04-16
    • US09418387
    • 1999-10-14
    • Tuomas Aura
    • Tuomas Aura
    • H04K144
    • H04W12/02
    • In the method in accordance with the present invention, the subscriber identifier to be sent to the transmission network is encrypted using a cipher key common to a specific group of subscribers, and a random number is attached to the identifier to be sent to the network. For example, a subscriber group may consist of the subscribers to a single given operator. The section of the identifier specifying the subscriber group is sent to the network in a non-encrypted format, in which case the network is able to direct the encrypted message to such a network element where it can be deciphered.
    • 在根据本发明的方法中,将要发送到传输网络的用户标识符使用特定订户组共同的加密密钥加密,随机数附加到要发送到网络的标识符。 例如,订户组可以由单个给定运营商的订户组成。 指定订户组的标识符的部分以非加密格式发送到网络,在这种情况下,网络能够将加密的消息引导到可以被解密的网络元件。