会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 6. 发明申请
    • A METHOD FOR OPERATING A NETWORK, A SYSTEM MANAGEMENT DEVICE, A NETWORK AND A COMPUTER PROGRAM THEREFOR
    • 一种运行网络的方法,系统管理设备,网络及其计算机程序
    • WO2010041164A3
    • 2010-08-19
    • PCT/IB2009054229
    • 2009-09-28
    • PHILIPS INTELLECTUAL PROPERTYKONINKL PHILIPS ELECTRONICS NVGARCIA MORCHON OSCARERDMANN BOZENA
    • GARCIA MORCHON OSCARERDMANN BOZENA
    • H04L9/08H04L29/06H04W12/04
    • H04W12/04H04L9/083H04L9/0841H04L9/3093H04L63/061H04L63/0823H04L2209/56H04L2209/805H04L2463/061H04W84/10
    • The present invention relates to a method for operating a network comprising communicating devices representing nodes of the network. More precisely, the invention relates to a method for operating a network (1), comprising a node (D1) and a system management device (3), the system management device comprising a root keying material being a set of alpha-secure functions having a degree of complexity of,and the node being provided with a node keying material share of degree of complexity a derived from the root keying material. The method comprises the following steps, upon receipt at the system management device of a request for an external user (4) to gain access to the node (D1): the system management device generates an external user keying material share of degree of complexity a from the root keying material and an access identifier, the system management device generates an access keying material of degree of complexity less than a, from the external user keying material share and an identifier of the node, the system management device provides the external user with the access keying material share and the access identifier, the external user derives a key from the access keying material share, and transmitting this key and the access certificate to the node, the node computes a key from the access identifier and the node keying material share, and the node compares the key transmitted by the external user and the key computed by the node, so as to authenticate the external user.
    • 本发明涉及一种用于操作网络的方法,包括:传送代表网络节点的设备。 更准确地说,本发明涉及一种用于操作网络(1)的方法,所述网络(1)包括节点(D1)和系统管理设备(3),所述系统管理设备包括根密钥材料,所述根密钥材料是一组α安全功能, 复杂度的一部分,并且节点被提供有从根密钥材料导出的复杂程度的节点密钥材料份额。 该方法包括以下步骤:在系统管理装置接收对外部用户(4)的请求以获得对节点(D1)的访问时:系统管理设备生成复杂程度的外部用户密钥材料份额a 从根密钥材料和访问标识符,系统管理设备生成复杂度小于根据外部用户密钥材料共享和节点标识符的复杂度的访问密钥材料,系统管理设备向外部用户提供 访问密钥材料共享和访问标识符,外部用户从访问密钥材料共享中导出密钥,并将该密钥和访问证书发送给节点,节点根据访问标识符和节点密钥资源共享来计算密钥 ,并且节点将外部用户发送的密钥与节点计算的密钥进行比较,以便对外部用户进行认证。
    • 7. 发明申请
    • METHOD OF GENERATING A CRYPTOGRAPHIC KEY, NETWORK AND COMPUTER PROGRAM THEREFOR
    • 生成关键字,网络和计算机程序的方法
    • WO2010046799A3
    • 2011-02-17
    • PCT/IB2009054415
    • 2009-10-08
    • PHILIPS INTELLECTUAL PROPERTYKONINKL PHILIPS ELECTRONICS NVGARCIA MORCHON OSCARERDMANN BOZENA
    • GARCIA MORCHON OSCARERDMANN BOZENA
    • H04L9/08
    • H04L9/0838H04L9/3026H04L9/3066H04L2209/805
    • The present invention relates to security systems for communication networks. More precisely, the invention relates to a method for generating a shared key between a first node (D1) and a second node (D2) for secure communication in a network (1), the first node storing a first node keying material share based on a root keying material and the method comprising the following steps: a) the first node receiving an identifier of the second node, b) the first node evaluating the first node keying material share at a second node's identifier, to generate the shared key, wherein the first node keying material share is a polynomial-based keying material over a finite field Fq and step b) comprises: bl) the first node applying a Homer's rule to factorize the first node keying material under the form of a combination of monomials, b2) the first node computing the result of each monomial operation by evaluating at a predetermined point a polynomial of degree r-1 with coefficients in a sub-field of Fq. The invention also relates to a network and a computer program thereof.
    • 本发明涉及通信网络的安全系统。 更准确地说,本发明涉及一种用于在第一节点(D1)和第二节点(D2)之间生成用于网络(1)中的安全通信的共享密钥的方法,所述第一节点存储基于 根密钥材料和方法,包括以下步骤:a)第一节点接收第二节点的标识符,b)第一节点在第二节点的标识符处评估第一节点密钥资源共享,以生成共享密钥,其中 第一节点密钥资源共享是在有限域Fq上的基于多项式的密钥材料,并且步骤b)包括:b1)第一节点应用荷马规则以单项式组合b2的形式对第一节点密钥资源进行因式分解 )第一节点通过在预定点处评估具有在Fq的子场中的系数的度r-1的多项式来计算每个单项式运算的结果。 本发明还涉及一种网络及其计算机程序。
    • 9. 发明申请
    • SIGNAL TRANSMISSION THROUGH A MEDIUM
    • 通过媒体进行信号传输
    • WO2011039708A2
    • 2011-04-07
    • PCT/IB2010054381
    • 2010-09-29
    • KONINKL PHILIPS ELECTRONICS NVGARCIA MORCHON OSCARFALCK THOMAS
    • GARCIA MORCHON OSCARFALCK THOMAS
    • A61B7/00A61B5/103A61B7/02A61B8/08
    • A61B5/103A61B5/441A61B5/4504A61B5/4869A61B8/00
    • The system, in a preferred embodiment, comprises a transmitter, receiver and processor connected to the receiver. The transmitter is arranged to transmit a signal through a medium, the signal comprising a plurality of different frequency components and transmission technologies. The receiver is arranged to receive the signal following propagation through the medium. The processor is arranged to generate, at a first time, one or more transfer functions from the received signal, each transfer function defining values for a predetermined signal parameter at different frequencies. The processor then generates, at a second time, one or more further transfer functions from the received signal and compares a transfer function with the further transfer function for the same signal parameter. An output is generated if the difference between the transfer function and the further transfer function exceeds a preset threshold.
    • 在优选实施例中,该系统包括连接到接收器的发射器,接收器和处理器。 发射器被布置成通过介质传输信号,该信号包括多个不同的频率分量和传输技术。 接收器被布置成在通过介质传播之后接收信号。 处理器被布置为在第一时间从接收的信号生成一个或多个传送函数,每个传递函数定义不同频率的预定信号参数的值。 然后处理器在第二时间从接收到的信号产生一个或多个另外的传递函数,并将传递函数与用于相同信号参数的另外的传递函数进行比较。 如果传递函数和另外的传递函数之间的差超过预设的阈值,则产生一个输出。