会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 21. 发明授权
    • Policy routing-based lawful interception in communication system with end-to-end encryption
    • 基于策略路由的通信系统中的合法拦截采用端到端加密
    • US09544334B2
    • 2017-01-10
    • US13212788
    • 2011-08-18
    • John Frederick HeckGanapathy S. SundaramDouglas William Varney
    • John Frederick HeckGanapathy S. SundaramDouglas William Varney
    • H04L12/28H04L29/06
    • H04L63/306H04L63/0272H04L63/0464H04L63/061H04L65/1016
    • A method for intercepting encrypted communications exchanged between first and second computing devices in a communication network, wherein interception is performed by a third computing device in the computing network. The third computing device obtains one or more packets having a packet address associated with one of the first and second computing devices in response to at least one interception routing policy being implemented in at least one element in the communication network, such that the obtained packets may be decrypted to obtain data contained therein. The third computing device preserves the packet address of the obtained packets and forwards the obtained packets toward a packet-destination one of the first and second computing devices such that the packet-destination one of the first and second computing devices is unable to detect from the one or more packets that the one or more packets were intercepted by the third computing device.
    • 一种用于拦截在通信网络中在第一和第二计算设备之间交换的加密通信的方法,其中由计算网络中的第三计算设备执行拦截。 响应于在通信网络中的至少一个元件中实施的至少一个拦截路由策略,第三计算设备获得具有与第一和第二计算设备之一相关联的分组地址的一个或多个分组,使得获得的分组可以 被解密以获得其中包含的数据。 第三计算设备保留所获得的分组的分组地址,并将所获得的分组转发到第一和第二计算设备中的分组目的地之一,使得第一和第二计算设备中的分组目的地的一个不能从 所述一个或多个分组被所述第三计算设备拦截的一个或多个分组。
    • 22. 发明授权
    • Secure group messaging
    • 安全群组讯息
    • US09166778B2
    • 2015-10-20
    • US13548835
    • 2012-07-13
    • Ganapathy S. SundaramIoannis BroustisVioleta Cakulev
    • Ganapathy S. SundaramIoannis BroustisVioleta Cakulev
    • H04L9/08H04L9/30
    • H04L9/08H04L9/0833H04L9/0847H04L9/3073
    • A method for securing at least one message transferred in a communication system from a first computing device to a second computing device in a peer-to-peer manner. At the first computing device, an identity based authenticated key exchange session is established with a third computing device operating as a peer authenticator. The identity based authenticated key exchange session has an identity based authenticated session key associated therewith. The first computing device obtains from the third computing device a random key component of the second computing device, wherein the random key component of the second computing device is encrypted by the third computing device using the identity based authenticated session key prior to sending the random key component of the second computing device to the first computing device. A peer-to-peer messaging key is computed at the first computing device using the random key component of the second computing device.
    • 一种用于将通信系统中传送的至少一个消息从第一计算设备以对等方式保护到第二计算设备的方法。 在第一计算设备处,基于身份的认证密钥交换会话与作为对等体认证者操作的第三计算设备建立。 基于身份的认证密钥交换会话具有与其相关联的基于身份的经认证的会话密钥。 第一计算设备从第三计算设备获得第二计算设备的随机密钥组件,其中第二计算设备的随机密钥组件在发送随机密钥之前由第三计算设备使用基于身份的认证会话密钥加密 第二计算设备的组件到第一计算设备。 使用第二计算设备的随机密钥组件在第一计算设备处计算对等消息传递密钥。
    • 23. 发明授权
    • Secure key management in conferencing system
    • 会议系统中的安全密钥管理
    • US09049024B2
    • 2015-06-02
    • US13596823
    • 2012-08-28
    • Ganapathy S. SundaramVioleta Cakulev
    • Ganapathy S. SundaramVioleta Cakulev
    • H04M3/42H04L9/30H04L9/08H04L29/06
    • H04L9/3073H04L9/0825H04L9/0833H04L9/0847H04L63/306H04L2209/80
    • A method for managing a conference between two or more parties comprises an identity based authenticated key exchange between a conference management element and each of the two or more parties seeking to participate in the conference. Messages exchanged between the conference management element and the two or more parties are encrypted based on respective identities of recipients of the messages. The method comprises the conference management element receiving from each party a random group key component. The random group key component is computed by each party based on a random number used by the party during the key authentication operation and random key components computed by a subset of others of the two or more parties seeking to participate in the conference. The conference management element sends to each party the random group key components computed by the parties such that each party can compute the same group key.
    • 一种用于在两个或多个方之间管理会议的方法包括会议管理元件与寻求参加会议的两个或多个方中的每个之间的基于身份的认证密钥交换。 在会议管理单元与两个或多个会话之间交换的消息基于消息的接收者的相应身份被加密。 该方法包括从各方接收随机组密钥分量的会议管理单元。 随机组密钥分量由各方根据在密钥认证操作期间由该方使用的随机数和由寻求参与会议的两个或多个方的其他人的子集计算的随机密钥分量来计算。 会议管理单元向各方发送由各方计算的随机组密钥分量,使得各方可以计算相同的组密钥。
    • 26. 发明申请
    • NETWORK-ASSISTED PEER-TO-PEER SECURE COMMUNICATION ESTABLISHMENT
    • 网络协调对等安全通信机构
    • US20130110920A1
    • 2013-05-02
    • US13283133
    • 2011-10-27
    • Ioannis BroustisGanapathy S. Sundaram
    • Ioannis BroustisGanapathy S. Sundaram
    • G06F15/16
    • H04L67/104H04L63/04
    • Techniques are disclosed for establishing network-assisted secure communications in a peer-to-peer environment. For example, a method for secure communications comprises the following steps. A first computing device provides connectivity information associated therewith to a network server. The first computing device receives connectivity information respectively associated with one or more other computing devices from the network server. The first computing device, independent of the network server, establishes a security association with at least one of the one or more other computing devices. The first computing device, independent of the network server, participates in a secure peer-to-peer session with the at least one other computing device.
    • 公开了用于在对等环境中建立网络辅助安全通信的技术。 例如,用于安全通信的方法包括以下步骤。 第一计算设备向网络服务器提供与之相关联的连接信息。 第一计算设备从网络服务器接收分别与一个或多个其他计算设备相关联的连接信息。 独立于网络服务器的第一计算设备与一个或多个其他计算设备中的至少一个建立安全关联。 独立于网络服务器的第一计算设备参与与至少一个其他计算设备的安全对等会话。
    • 27. 发明申请
    • SECURE KEY MANAGEMENT IN CONFERENCING SYSTEM
    • 会议系统中的安全关键管理
    • US20120322416A1
    • 2012-12-20
    • US13596823
    • 2012-08-28
    • Ganapathy S. SundaramVioleta Cakulev
    • Ganapathy S. SundaramVioleta Cakulev
    • H04W12/06
    • H04L9/3073H04L9/0825H04L9/0833H04L9/0847H04L63/306H04L2209/80
    • A method for managing a conference between two or more parties comprises an identity based authenticated key exchange between a conference management element and each of the two or more parties seeking to participate in the conference. Messages exchanged between the conference management element and the two or more parties are encrypted based on respective identities of recipients of the messages. The method comprises the conference management element receiving from each party a random group key component. The random group key component is computed by each party based on a random number used by the party during the key authentication operation and random key components computed by a subset of others of the two or more parties seeking to participate in the conference. The conference management element sends to each party the random group key components computed by the parties such that each party can compute the same group key.
    • 一种用于在两个或多个方之间管理会议的方法包括会议管理元件与寻求参加会议的两个或多个方中的每个之间的基于身份的认证密钥交换。 在会议管理单元与两个或多个会话之间交换的消息基于消息的接收者的相应身份被加密。 该方法包括从各方接收随机组密钥分量的会议管理单元。 随机组密钥分量由各方根据在密钥认证操作期间由该方使用的随机数和由寻求参与会议的两个或多个方的其他人的子集计算的随机密钥分量来计算。 会议管理单元向各方发送由各方计算的随机组密钥分量,使得各方可以计算相同的组密钥。
    • 28. 发明申请
    • POLICY ROUTING-BASED LAWFUL INTERCEPTION IN COMMUNICATION SYSTEM WITH END-TO-END ENCRYPTION
    • 具有端到端加密的通信系统中基于策略路由的法律障碍
    • US20120287922A1
    • 2012-11-15
    • US13212788
    • 2011-08-18
    • John Frederick HeckGanapathy S. SundaramDouglas William Varney
    • John Frederick HeckGanapathy S. SundaramDouglas William Varney
    • H04L12/28
    • H04L63/306H04L63/0272H04L63/0464H04L63/061H04L65/1016
    • Techniques are disclosed for lawfully intercepting information in communication environments with end-to-end encryption. For example, a method for intercepting encrypted communications exchanged between a first computing device and a second computing device in a communication network, wherein the interception is performed by a third computing device in the communication network, comprises the following steps. The third computing device obtains one or more packets having a packet address associated with one of the first computing device and the second computing device. The one or more packets are obtained by the third computing device, in response to at least one interception routing policy being implemented in at least one element in the communication network, such that the one or more obtained packets may be decrypted so as to obtain data contained therein. The third computing device preserves the packet address of the one or more obtained packets. The third computing device forwards the one or more packets toward a packet-destination one of the first computing device and the second computing device such that the packet-destination one of the first computing device and the second computing device is unable to detect from the one or more packets that the one or more packets were intercepted by the third computing device.
    • 披露了在端到端加密的通信环境中合法拦截信息的技术。 例如,一种用于拦截在通信网络中的第一计算设备和第二计算设备之间交换的加密通信的方法,其中所述通信网络中的第三计算设备执行所述拦截,包括以下步骤。 第三计算设备获得具有与第一计算设备和第二计算设备之一相关联的分组地址的一个或多个分组。 响应于在通信网络中的至少一个元件中实施的至少一个拦截路由策略,由第三计算设备获得一个或多个分组,使得一个或多个获得的分组可以被解密以便获得数据 其中包含。 第三计算设备保留一个或多个获得的分组的分组地址。 第三计算设备将一个或多个分组转发到第一计算设备和第二计算设备中的分组目的地之一,使得第一计算设备和第二计算设备中的分组目的地一个不能从一个 或更多的分组,所述一个或多个分组被第三计算设备拦截。