会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • ELECTRICAL CONNECTOR
    • 电气连接器
    • WO2013098722A1
    • 2013-07-04
    • PCT/IB2012/057470
    • 2012-12-19
    • KONINKLIJKE PHILIPS ELECTRONICS N.V.
    • DRAAIJER, Maurice Herman JohanERDMANN, BozenaVAN HARTSKAMP, Michael AlexWENDT, MatthiasALARCON-RIVERO, Manuel Eduardo
    • H01R13/66H02J13/00H04B3/00H04L29/00
    • H01R13/641G01R21/06H01R13/665
    • The invention relates to an electrical connector for connecting an electrical de- vice to an electrical conductor (3) for powering the electrical device (9) with DC voltage. The electrical connector (1) comprises an arrangement information providing unit for determining arrangement information being information about the arrangement of the electrical connector on the electrical conductor and an indicator (7) for indicating the provided arrangement information Since the arrangement information is provided and indicated, a user like an installer can easily see how the respective electrical connector is arranged on the electrical conductor, in particular, with respect to other electrical connectors. Specifically, if several electrical connectors are present, arrangement information can be provided for the several electrical connectors. This allows the user to easily obtain an overview of components of a DC power distribution system.
    • 本发明涉及一种用于将电气设备连接到用于为电气设备(9)供电的直流电压的电导体(3)的电连接器。 电连接器(1)包括布置信息提供单元,用于确定作为关于电导体上的电连接器的布置的信息的布置信息,以及用于指示所提供的布置信息的指示器(7)。由于提供并指示了布置信息, 类似于安装者的用户可以容易地看到相应的电连接器如何布置在电导体上,特别是相对于其它电连接器。 具体地,如果存在几个电连接器,则可以为几个电连接器提供配置信息。 这允许用户容易地获得直流配电系统的组件的概述。
    • 4. 发明申请
    • A METHOD FOR SECURE COMMUNICATION IN A NETWORK, A COMMUNICATION DEVICE, A NETWORK AND A COMPUTER PROGRAM THEREFOR
    • 一种网络通信安全的方法,通信设备,网络及其计算机程序
    • WO2010106496A1
    • 2010-09-23
    • PCT/IB2010/051134
    • 2010-03-16
    • KONINKLIJKE PHILIPS ELECTRONICS N.V.GARCIA MORCHON, OscarERDMANN, BozenaKURSAWE, Klaus
    • GARCIA MORCHON, OscarERDMANN, BozenaKURSAWE, Klaus
    • H04L9/08
    • H04L9/083H04L9/085H04L2209/80H04W12/04
    • A method for securing communications between a first node (N1) and a second node (N2) in a network (1) further comprising a management device (2) provided with root keying materials, the method comprising the following steps: the management device generating, based on root keying materials, a first node keying material shares comprising a number of sub-elements and the first node keying material shares being arranged for generating a first complete key, the management device selecting a subset of sub-elements of the first keying material shares, the number of sub-elements selected being less or equal than the total number of sub-elements of the first keying material shares, and the selected sub-elements forming a first node partial keying material shares or symmetric-key generation engine, the first node generating, based on the first node symmetric-key generation engine and on an identifier of the second node, a first key, used for securing communications with the second node.
    • 一种用于保护网络(1)中的第一节点(N1)和第二节点(N2)之间的通信的方法,还包括具有根密钥材料的管理设备(2),所述管理设备(2)包括以下步骤:所述管理设备生成 基于根密钥材料,第一节点密钥材料共享包括多个子元素,并且所述第一节点密钥资源共享被布置用于生成第一完整密钥,所述管理设备选择所述第一密钥的子元素的子集 选择的子元素的数量小于或等于第一密钥材料共享的子元素的总数的数量,以及形成第一节点部分密钥材料共享或对称密钥生成引擎的所选择的子元素, 所述第一节点基于所述第一节点对称密钥生成引擎和所述第二节点的标识符生成用于保护与所述第二节点的通信的第一密钥。
    • 7. 发明申请
    • METHOD FOR CONFIGURING A NETWORK
    • 配置网络的方法
    • WO2012168819A1
    • 2012-12-13
    • PCT/IB2012/052635
    • 2012-05-25
    • KONINKLIJKE PHILIPS ELECTRONICS N.V.ERDMANN, BozenaTOLHUIZEN, Ludovicus Marinus Gerardus MariaLELKENS, Armand Michel Marie
    • ERDMANN, BozenaTOLHUIZEN, Ludovicus Marinus Gerardus MariaLELKENS, Armand Michel Marie
    • H04L12/24
    • H04L41/0853H04L41/0816H04L41/12
    • The present invention relates to a method for configuring a network comprising a maintenance entity and a plurality of nodes, the method comprising at the maintenance entity, the steps of: (a) detecting a potential presence in the network of at least one limited node, said limited node being able to receive data only within time periods; (b) determining that an updated network configuration parameter value is required, said network configuration parameter being common to the at least one limited node and to the plurality nodes of the network; (c) postponing a transmission of a signal for updating the network configuration parameter value at the plurality of nodes,based on the detection of the potential presence of the at least one limited node in the network; (d) transmitting a triggering signal for triggering delivery of the updated network configuration parameter value to the limited device; (e) transmitting the signal for updating the updated network configuration parameter value at the plurality of nodes.
    • 本发明涉及一种用于配置包括维护实体和多个节点的网络的方法,所述方法包括在维护实体处的步骤:(a)检测网络中至少一个有限节点的潜在存在, 所述有限节点只能在时间段内接收数据; (b)确定需要更新的网络配置参数值,所述网络配置参数对于至少一个受限节点和网络的多个节点是共同的; (c)基于所述网络中所述至少一个有限节点的潜在存在的检测,推迟在所述多个节点处更新所述网络配置参数值的信号的传输; (d)发送触发信号,用于触发将所更新的网络配置参数值传送给受限设备; (e)在多个节点处发送用于更新更新的网络配置参数值的信号。
    • 10. 发明申请
    • METHOD OF GENERATING A CRYPTOGRAPHIC KEY, NETWORK AND COMPUTER PROGRAM THEREFOR
    • 生成关键字,网络和计算机程序的方法
    • WO2010046799A2
    • 2010-04-29
    • PCT/IB2009/054415
    • 2009-10-08
    • PHILIPS INTELLECTUAL PROPERTY & STANDARDS GMBHKONINKLIJKE PHILIPS ELECTRONICS N.V.GARCIA MORCHON, OscarERDMANN, Bozena
    • GARCIA MORCHON, OscarERDMANN, Bozena
    • H04L9/08
    • H04L9/0838H04L9/3026H04L9/3066H04L2209/805
    • The present invention relates to security systems for communication networks. More precisely, the invention relates to a method for generating a shared key between a first node (D1) and a second node (D2) for secure communication in a network (1), the first node storing a first node keying material share based on a root keying material and the method comprising the following steps: a) the first node receiving an identifier of the second node, b) the first node evaluating the first node keying material share at a second node's identifier, to generate the shared key, wherein the first node keying material share is a polynomial-based keying material over a finite field F q and step b) comprises: bl) the first node applying a Homer's rule to factorize the first node keying material under the form of a combination of monomials, b2) the first node computing the result of each monomial operation by evaluating at a predetermined point a polynomial of degree r-1 with coefficients in a sub-field of F q . The invention also relates to a network and a computer program thereof.
    • 本发明涉及通信网络的安全系统。 更准确地说,本发明涉及一种用于在第一节点(D1)和第二节点(D2)之间生成用于网络(1)中的安全通信的共享密钥的方法,所述第一节点存储基于 根密钥材料和方法,包括以下步骤:a)第一节点接收第二节点的标识符,b)第一节点在第二节点的标识符处评估第一节点密钥资源共享,以生成共享密钥,其中 第一节点密钥资源共享是在有限域Fq上的基于多项式的密钥材料,并且步骤b)包括:b1)第一节点应用荷马规则以单项式组合b2的形式对第一节点密钥资源进行因式分解 )第一节点通过在预定点处评估具有在Fq的子场中的系数的度r-1的多项式来计算每个单项式运算的结果。 本发明还涉及一种网络及其计算机程序。