会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 18. 发明申请
    • METHOD OF GENERATING A CRYPTOGRAPHIC KEY, NETWORK AND COMPUTER PROGRAM THEREFOR
    • 生成关键字,网络和计算机程序的方法
    • US20110206201A1
    • 2011-08-25
    • US13124721
    • 2009-10-08
    • Oscar Garcia MorchonBozena Erdmann
    • Oscar Garcia MorchonBozena Erdmann
    • H04L9/00
    • H04L9/0838H04L9/3026H04L9/3066H04L2209/805
    • The present invention relates to security systems for communication networks. More precisely, the invention relates to a method for generating a shared key between a first node (D1) and a second node (D2) for secure communication in a network (1), the first node storing a first node keying material share based on a root keying material and the method comprising the following steps: a) the first node receiving an identifier of the second node, b) the first node evaluating the first node keying material share at a second node's identifier, to generate the shared key, wherein the first node keying material share is a polynomial-based keying material over a finite field Fq and step b) comprises: b1) the first node applying a Horner's rule to factorize the first node keying material under the form of a combination of monomials, b2) the first node computing the result of each monomial operation by evaluating at a predetermined point a polynomial of degree r−1 with coefficients in a sub-field of Fq. The invention also relates to a network and a computer program thereof.
    • 本发明涉及通信网络的安全系统。 更准确地说,本发明涉及一种用于在第一节点(D1)和第二节点(D2)之间生成用于网络(1)中的安全通信的共享密钥的方法,所述第一节点存储基于 根密钥材料和方法,包括以下步骤:a)第一节点接收第二节点的标识符,b)第一节点在第二节点的标识符处评估第一节点密钥资源共享,以生成共享密钥,其中 第一节点密钥资源共享是在有限域Fq上的基于多项式的密钥材料,并且步骤b)包括:b1)第一节点应用霍纳规则以单项式组合b2的形式对第一节点密钥资源进行因子分解 )第一节点通过在预定点处评估具有在Fq的子场中的系数的度r-1的多项式来计算每个单项式运算的结果。 本发明还涉及一种网络及其计算机程序。
    • 20. 发明授权
    • Methods, devices and systems for establishing end-to-end secure connections and for securely communicating data packets
    • 用于建立端到端安全连接和安全地传送数据包的方法,设备和系统
    • US09185133B2
    • 2015-11-10
    • US14234451
    • 2012-07-24
    • Sye Loong KeohOscar Garcia MorchonSandeep Shankaran KumarMartina BrachmannBozena Erdmann
    • Sye Loong KeohOscar Garcia MorchonSandeep Shankaran KumarMartina BrachmannBozena Erdmann
    • G06F12/00H04L29/06
    • H04L63/166H04L63/123
    • The invention provides methods, devices (102, 110, 124, 136) and communication systems (100) for establishing end-to-end secure connections and for securely communicating data packets. Such a communication system (100) comprises a first device (124, 136), an intermediate device (110) and a second device (102). The first device (124, 136) communications via a first network (120), which is based on a first transport protocol and a first transport security protocol with the intermediate device (110). The second device (102) communications via a second network, which is based on a second transport protocol and a second transport security protocol with the intermediate device (110). The intermediate device (110) modifies packets received via first network to packets suitable for communication via the second network, and vice versa. The first device (124, 136) is able to reconstruct a header of a received packet as if the packet was sent via the second network (108) and its transport and security protocols. Further, the first device (124) is able to verify, on basis of the reconstructed header, verification fields which are generated on basis of the second transport security protocol.
    • 本发明提供了用于建立端到端安全连接和用于安全地传送数据分组的方法,设备(102,110,124,136)和通信系统(100)。 这种通信系统(100)包括第一设备(124,136),中间设备(110)和第二设备(102)。 第一设备(124,136)经由第一网络(120)进行通信,第一网络(120)基于第一传输协议和与中间设备(110)的第一传输安全协议。 第二设备(102)经由第二网络进行通信,第二网络基于第二传输协议和与中间设备(110)的第二传输安全协议。 中间设备(110)将经由第一网络接收的分组修改为适合于经由第二网络进行通信的分组,反之亦然。 第一设备(124,136)能够重建接收到的分组的报头,好像分组是经由第二网络(108)及其传输和安全协议发送的。 此外,第一设备(124)能够基于重构的报头来验证基于第二传输安全协议生成的验证字段。