会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • METHOD FOR GENERATING CRYPTOGRAPHIC HALF-KEYS, AND ASSOCIATED SYSTEM
    • 用于产生克氏硬度的方法和相关系统
    • WO2011015600A1
    • 2011-02-10
    • PCT/EP2010061350
    • 2010-08-04
    • THALES SADUPREZ ADRIENGOMPEL PAULPAINCHAULT PHILIPPE
    • DUPREZ ADRIENGOMPEL PAULPAINCHAULT PHILIPPE
    • H04L9/08
    • H04L9/0833H04L9/0816H04L9/0819H04L9/0838H04L9/085
    • The present invention relates to a method for generating cryptographic half-keys. The method enables the generation of n pairs (Ki 1, Ki 2), wherein 1=i=n, of cryptographic half-keys, each of said pairs enabling the reconstruction of an access key KPL specific to a secure apparatus, said method including at least the following steps: from a separate management center for said apparatus, generating (202) and recording a first series (217) of n half-keys Ki 1 on a recording medium (213); supplying (203) the apparatus with said recording medium (213) in order to generate, from said local key KPL and the n half-keys Ki 1 stored on said medium, a second series of n half-keys Ki 2 so as to form said n pairs (Ki 1, Ki 2). The invention can be used in particular for creating a plurality of access keys to a secure apparatus.
    • 本发明涉及一种生成加密半密钥的方法。 该方法能够生成密码半密钥的n对(Ki 1,Ki 2),其中1 = i = n,所述对中的每一个使得能够重建特定于安全装置的访问密钥KPL,所述方法包括 至少以下步骤:从用于所述设备的单独的管理中心,产生(202)并将n个半键Ki 1的第一系列(217)记录在记录介质(213)上; 向所述记录介质(213)提供(203)所述设备以便从所述本地密钥KPL和存储在所述介质上的n个半键Ki 1生成第二系列的n个半键Ki 2,以便形成 所述n对(Ki 1,Ki 2)。 本发明可以特别用于创建多个访问密钥到安全装置。
    • 10. 发明专利
    • AT550678T
    • 2012-04-15
    • AT08835389
    • 2008-10-02
    • THALES SA
    • HETHUIN SERGEDUPREZ ADRIEN
    • G01S3/38H04W16/28
    • A method and device for implementing a smart antenna in a network that uses a deterministic access protocol, one or more mobile stations MS and at least one base station BS, the transmitted data being included in a data frame, wherein it comprises at least the following steps: On entry into the network: the step of synchronizing a mobile station MS equipped with an FESA directional antenna on a transmission from the base station by changing beam for a duration at least equal to a frame in order to aim the directional beam toward the base station BS to obtain the best signal reception, the step of following the synchronization of the mobile station on the transmission from the base station, and implementing an aiming tracking algorithm in order to retain the best signal reception, the step of determining the parameters for defining the downlink or the uplink by decoding signaling messages contained in the message transmitted by the base station, triggering a network entry procedure. Once the mobile station MS has entered the network: the selection of the new beam being based on a mechanism with hysteresis that uses a linear filtering preceded by a hop-based rejection step or that directly uses a nonlinear filter.