会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 4. 发明公开
    • DEVICE AND METHOD FOR DSL MAINTENANCE
    • DSL维护的设备和方法
    • EP3249901A1
    • 2017-11-29
    • EP16305593.2
    • 2016-05-23
    • Thomson Licensing
    • LE GUYADEC, PascalCHANDRASHEKAR, JaideepNEUMANN, Christoph
    • H04M3/00H04M3/22H04M3/30
    • H04M3/007H04M3/2209H04M3/304
    • A gateway (110, 111, 11n) comprises an interface (107) to a link and a hardware processor (105) of the gateway collects (S40) link information, the link information relating to the status of the link and comprising at least one of the group: number of errored seconds, number of severely errored seconds and downstream maximum data rate; calculates (S42) statistics from the link information, the statistics comprising at least one of the group time since last failure, the standard deviation and average of the collected link information; applies (S43) a failure link model to the link information and the statistics to obtain a failure indicator score and, depending on the failure indicator score, takes (S45) a mitigating action to improve a robustness of the link. The failure link model has preferably been received from a central device (120) that has received link information from a plurality of devices.
    • 网关(110,111,11n)包括到链路的接口(107),并且网关的硬件处理器(105)收集(S40)链路信息,链路信息与链路的状态有关并且包括至少一个 组的数量:错误秒数,严重错误秒数和下行最大数据速率; 根据链路信息计算(S42)统计数据,所述统计数据包括自上次故障以来的组时间,收集的链路信息的标准差和平均值中的至少一个; (S43)将故障链路模型应用于链路信息和统计以获得故障指示器分数,并且取决于故障指示器分数取得(S45)缓解动作以改善链路的健壮性。 故障链路模型优选地从已经从多个设备接收到链路信息的中央设备(120)接收。
    • 9. 发明公开
    • DEVICES AND METHODS FOR CLIENT DEVICE AUTHENTICATION
    • 用于客户端设备认证的设备和方法
    • EP3319295A1
    • 2018-05-09
    • EP17199197.9
    • 2017-10-30
    • Thomson Licensing
    • LE SCOUARNEC, NicolasNEUMANN, ChristophHEEN, OlivierVIGOUROUX, Jean-Ronan
    • H04L29/06H04W12/04H04W12/06G06F21/31H04L9/14H04L9/32H04L9/08H04W84/12H04W88/08
    • An access point (220) receives from a client (210) a first nonce (SNonce) and a first cryptographic hash (MIC1) for the first nonce, the first cryptographic hash calculated using a first key (PTK) derived from a second key (PMK), the second key (PMK) input on the client (210) or derived from a passphrase input on the client (210), derives (S318, S320) first keys (PTKs) from each of a stored primary input and at least one stored secondary input, the stored primary input and the at least one stored secondary input each being one of a second key (PMK) and a passphrase, verifies (S322) the cryptographic hash (MIC1) using each derived first key (PTK) to find a derived first key that checks the first cryptographic hash (MIC1), generates (S324) a third key (GTK) and a second cryptographic hash (MIC2) using the derived first key that checks the first cryptographic hash (MIC1), and sends the third key (GTK) and the second cryptographic hash (MIC2) to the client (210).
    • 接入点(220)从客户端(210)接收第一随机数的第一随机数(SNonce)和第一加密散列(MIC1),使用从第二密钥导出的第一密钥(PTK)计算第一加密散列 PMK),客户端(210)上的第二密钥(PMK)输入或者从客户端(210)上的密码输入导出,从存储的主要输入中的每一个导出(S318,S320)第一密钥(PTK) 一个存储的次要输入,所存储的主要输入和至少一个存储的次要输入各自是第二密钥(PMK)和密码短语之一,使用每个导出的第一密钥(PTK)来验证(S322)密码散列(MIC1) 找到导出的第一密钥,该第一密钥检查第一密码散列(MIC1),使用导出的检查第一密码散列(MIC1)的第一密钥产生(S324)第三密钥(GTK)和第二密码散列(MIC2) 第三密钥(GTK)和第二密码散列(MIC2)提供给客户端(210)。