会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 51. 发明申请
    • KEY DISTRIBUTING METHOD, PUBLIC KEY OF KEY DISTRIBUTION CENTRE ONLINE UPDATING METHOD AND DEVICE
    • 关键分配方法,公钥关键分销中心在线更新方法和设备
    • US20110103589A1
    • 2011-05-05
    • US12994690
    • 2009-05-26
    • Manxia TieJun CaoXiaolong LaiZhenhai Huang
    • Manxia TieJun CaoXiaolong LaiZhenhai Huang
    • H04L9/08
    • H04L9/083H04L9/0825H04L9/0891
    • A key distributing method, a public key of key distribution centre online updating method, a key distribution centre, a communication entity and a key management system. The system includes: communication entities, a carrying device, a key distribution centre and a database, wherein the carrying device carries or transports the information during the key distributing course and the public key online updating course, the database stores whether each communication entity registered secret service; the database connects with the key distribution centre, the key distribution centre connects with the carrying device, and the carrying device connects with each communication entity. Using the cipher technology of public key, a key distribution system is provided based on principle of three-element peer authentication (TePA). The system safely distributes the communication key to each pair entities to enable keys have PFS attribute, reduces the key management complexity of the system, and realizes online updating of the public key of the trusted third party i.e. key distribution centre.
    • 密钥分发方式,密钥分发中心在线更新方法公钥,密钥分发中心,通信实体和密钥管理系统。 该系统包括:通信实体,携带设备,密钥分发中心和数据库,其中携带设备在密钥分发过程和公钥在线更新过程期间携带或传送信息,数据库存储每个通信实体是否注册了秘密 服务; 数据库与密钥分发中心连接,密钥分发中心与承载设备连接,承载设备与各通信实体连接。 利用公钥密码技术,基于三元对等认证(TePA)的原理,提供了一种密钥分发系统。 系统将通信密钥安全地分配给每对实体,使密钥具有PFS属性,降低系统的密钥管理复杂度,实现可信第三方即密钥分发中心的公开密钥的在线更新。
    • 52. 发明申请
    • BIDIRECTIONAL ENTITY AUTHENTICATION METHOD BASED ON THE CREDIBLE THIRD PARTY
    • 基于可信第三方的双向实体认证方法
    • US20110004767A1
    • 2011-01-06
    • US12920931
    • 2009-03-04
    • Manxia TieJun CaoXiaolong LaiZhenhai Huang
    • Manxia TieJun CaoXiaolong LaiZhenhai Huang
    • H04L9/32
    • H04L63/0807H04L63/0823H04L63/0869H04L63/0884
    • A bidirectional entity authentication method based on the credible third party includes the steps that: entity A receives message 1 sent from entity B including the authentication parameters of said entity B, and sends message 2 to the credible third party TP, said message 2 including the authentication parameters of entity B and the authentication parameters of entity A; entity A receives message 3 sent from said credible third party TP, said message 3 including the checking result after checking that whether said entity A and entity B are legal based on said message 2 by said credible third party TP; entity A gets the authentication result of entity B after authenticating said message 3, and sends message 4 to said entity B to make entity B authenticating based on said message 4 and getting the authentication result of entity A. The invention simplifies the operation condition of the protocol, reduces the computing capability requirement of the authentication entity, and satisfies the high security requirement of the network device lack of resource.
    • 基于可信第三方的双向实体认证方法包括以下步骤:实体A接收从实体B发送的包括所述实体B的认证参数的消息1,并向可信第三方TP发送消息2,所述消息2包括 实体B的认证参数和实体A的认证参数; 实体A从所述可信第三方TP接收到从所述可信第三方TP发送的消息3,所述消息3在根据所述可信第三方TP的所述消息2检查所述实体A和实体B是否合法之后包括检查结果; 实体A在认证所述消息3之后获得实体B的认证结果,并向所述实体B发送消息4,以使实体B基于所述消息4进行认证,并获得实体A的认证结果。本发明简化了实体B的操作条件 协议,降低了认证实体的计算能力要求,满足了网络设备缺乏资源的高安全性要求。
    • 54. 发明授权
    • Switch route exploring method, system and device
    • 切换路线探索方法,系统和设备
    • US09137259B2
    • 2015-09-15
    • US13702785
    • 2011-01-14
    • Qin LiJun CaoManxia TieZhenhai Huang
    • Qin LiJun CaoManxia TieZhenhai Huang
    • H04L29/06H04L12/721
    • H04L63/1475H04L45/26
    • A switch route exploring method, system and device are provided in the present invention. The method comprises that: a transmitting source node NSource constructs a switch route exploring request packet and transmits it to a destination node NDestination; the switch route exploring request packet comprises information of switch route from the transmitting source node NSource to the destination node NDestination, wherein the information is known by the transmitting source node NSource; and the destination node NDestination constructs a switch route exploring response packet and transmits it to the transmitting source node NSource.
    • 在本发明中提供了一种开关路径探索方法,系统和装置。 该方法包括:发送源节点NSource构建探索请求分组的交换路由,并将其发送到目的节点NDestination; 所述交换路由探索请求分组包括从所述发送源节点NSource到所述目的节点NDestination的切换路由的信息,其中,所述信息由所述发送源节点NSource知道; 并且目的地节点NDestination构建探索响应分组的交换机路由,并将其发送到发送源节点NSource。
    • 55. 发明授权
    • Multicast key negotiation method suitable for group calling system and a system thereof
    • 组播密钥协商方法适用于群组呼叫系统及其系统
    • US08787574B2
    • 2014-07-22
    • US13637375
    • 2010-05-12
    • Yanan HuJun CaoManxia TieZhenhai Huang
    • Yanan HuJun CaoManxia TieZhenhai Huang
    • H04K1/00H04L9/00H04L9/32
    • H04W12/04H04L12/189H04L63/065H04W12/10
    • The present invention discloses a multicast key negotiation method suitable for group calling system and a system thereof. The method includes that: a user terminal (UT) negotiates about a unicast key with a base station (BS), derives an information encryption key and an integrity verifying key according to the unicast key, and registers a service group identifier that the UT belongs to at the BS; the BS notifies the UT the multicast key of the service group that the UT needs to apply, constructs a multicast key notification packet, and sends it to the UT; after receiving the multicast key notification packet sent by the BS, the UT obtains the multicast key of the service group that the UT needs to apply by decrypting a service group key application list, constructs a multicast key confirmation packet, and sends it to the BS; the BS confirms that the multicast key of the UT service group is built successfully according to the multicast key confirmation packet sent by the UT.
    • 本发明公开了适用于群呼系统的组播密钥协商方法及其系统。 该方法包括:用户终端(UT)与基站(BS)协商关于单播密钥,根据单播密钥导出信息加密密钥和完整性验证密钥,并注册UT所属的服务组标识符 到BS; BS向UT通知UT需要应用的业务组的组播密钥,构建组播密钥通知报文,并将其发送给UT; UT收到BS发送的组播密钥通知报文后,通过解密业务组密钥应用列表获取UT需要应用的业务组的组播密钥,构成组播密钥确认报文,并发送给BS ; 根据UT发送的组播密钥确认包,BS确认UT服务组的组播密钥成功建立。
    • 56. 发明授权
    • Method for protecting the first message of security protocol
    • 保护安全协议第一条消息的方法
    • US08572378B2
    • 2013-10-29
    • US13140632
    • 2009-12-07
    • Xiaolong LaiJun CaoYuelei XiaoManxia TieZhenhai HuangBianling ZhangYanan Hu
    • Xiaolong LaiJun CaoYuelei XiaoManxia TieZhenhai HuangBianling ZhangYanan Hu
    • H04L29/06
    • H04W12/10H04L9/0838H04L9/3242H04L9/3273H04L63/123H04L2209/80
    • The present invention provides a method for protecting the first message of a security protocol and the method includes the following steps: 1) initialization step; 2) the initiating side sends the first message; 3) the responding side receives the first message. The method for protecting the first message of the security protocol provided by the present invention can implement that: 1) Pre-Shared Master Key (PSMK), which is shared by the initiating side and responding side, and the security parameter in the first message are bound by using computation function of Message Integrality Code (MIC) or Message Authentication Code (MAC), and thus the fabrication attack of the first message in the security protocol is avoided effectively; 2) during computing the MIC or MAC of the first message, only PSMK and the security parameter of the first message are selected to be computed, and thus the computation load of the initiating side and the responding side is effectively reduced and the computation resource is saved.
    • 本发明提供一种保护安全协议的第一消息的方法,该方法包括以下步骤:1)初始化步骤; 2)发起方发送第一个消息; 3)响应端接收第一条消息。 用于保护本发明提供的安全协议的第一消息的方法可以实现:1)由起始侧和响应侧共享的预共享主密钥(PSMK)和第一消息中的安全参数 通过使用消息完整性代码(MIC)或消息认证码(MAC)的计算功能来限制,从而有效地避免了安全协议中的第一消息的制造攻击; 2)在计算第一个消息的MIC或MAC期间,仅选择PSMK和第一个消息的安全参数进行计算,从而有效减少发起方和响应方的计算负载,计算资源为 保存
    • 58. 发明授权
    • Access method suitable for wireless personal area network
    • 接入方式适用于无线个域网
    • US08533781B2
    • 2013-09-10
    • US13058099
    • 2009-07-28
    • Manxia TieJun CaoYuelei XiaoZhenhai HuangXiaolong Lai
    • Manxia TieJun CaoYuelei XiaoZhenhai HuangXiaolong Lai
    • G06F7/04
    • H04W12/06H04W48/10
    • The embodiments of the invention disclose an access method suitable for wireless personal area network (WPAN). After the coordinator broadcasts the beacon frame, according to the beacon frame, the equipment identifies the authentication demand and the authentication mode required by the coordinator to the equipment. If the coordinator has no authentication demand to the equipment, the equipment and the coordinator carry out the association processes directly; otherwise, based on a selected authentication mode and the corresponding authentication mechanism negotiation information, the equipment sends the authentication access request to the coordinator; then based on the authentication mode selected by the equipment, the coordinator carries out the processes of authentication and session key negotiation with the equipment; finally, the coordinator sends the authentication access response to the equipment, when the authentication state in the authentication access response is success, the equipment carries out the association processes with the coordinator. The processes of authentication and the session key negotiation can be based on primitive control, and also can be based on port control. If the equipment is associated with the coordinator successfully, the coordinator distributes a network address to the equipment, and therefore the equipment can communicate with the coordinator normally. The invention solves the technical problems of lower security and lower efficiency in the existing WPAN access methods.
    • 本发明的实施例公开了适用于无线个人区域网(WPAN)的接入方法。 在协调器广播信标帧之后,根据信标帧,设备识别协调器对设备所需的认证需求和认证方式。 如果协调人对设备没有认证需求,则设备和协调人直接进行关联过程; 否则,根据所选择的认证方式和相应的认证机制协商信息,设备向协调器发送认证访问请求; 然后根据设备选择的认证方式,协调器与设备进行认证和会话密钥协商过程; 最后,协调器向设备发送认证接入响应,当认证接入响应的认证状态成功时,设备与协调器进行关联过程。 认证和会话密钥协商的过程可以基于原语控制,也可以基于端口控制。 如果设备与协调器成功关联,则协调器将网络地址分配给设备,因此设备可以正常与协调器进行通信。 本发明解决了现有WPAN接入方式安全性较低,效率较低的技术问题。
    • 59. 发明授权
    • Bidirectional entity authentication method based on the credible third party
    • 基于可信第三方的双向实体认证方法
    • US08510565B2
    • 2013-08-13
    • US12920931
    • 2009-03-04
    • Manxia TieJun CaoXiaolong LaiZhenhai Huang
    • Manxia TieJun CaoXiaolong LaiZhenhai Huang
    • H04L9/32
    • H04L63/0807H04L63/0823H04L63/0869H04L63/0884
    • A bidirectional entity authentication method based on the credible third party includes the steps that: entity A receives message 1 sent from entity B including the authentication parameters of said entity B, and sends message 2 to the credible third party TP, said message 2 including the authentication parameters of entity B and the authentication parameters of entity A; entity A receives message 3 sent from said credible third party TP, said message 3 including the checking result after checking that whether said entity A and entity B are legal based on said message 2 by said credible third party TP; entity A gets the authentication result of entity B after authenticating said message 3, and sends message 4 to said entity B to make entity B authenticating based on said message 4 and getting the authentication result of entity A. The invention simplifies the operation condition of the protocol, reduces the computing capability requirement of the authentication entity, and satisfies the high security requirement of the network device lack of resource.
    • 基于可信第三方的双向实体认证方法包括以下步骤:实体A接收从实体B发送的包括所述实体B的认证参数的消息1,并向可信第三方TP发送消息2,所述消息2包括 实体B的认证参数和实体A的认证参数; 实体A从所述可信第三方TP接收到从所述可信第三方TP发送的消息3,所述消息3在根据所述可信第三方TP的所述消息2检查所述实体A和实体B是否合法之后包括检查结果; 实体A在认证所述消息3之后获得实体B的认证结果,并向所述实体B发送消息4,以使实体B基于所述消息4进行认证,并获得实体A的认证结果。本发明简化了实体B的操作条件 协议,降低了认证实体的计算能力要求,满足了网络设备缺乏资源的高安全性要求。
    • 60. 发明申请
    • ENTITY AUTHENTICATION METHOD WITH INTRODUCTION OF ONLINE THIRD PARTY
    • 实体验证方法与引言第三方
    • US20120167190A1
    • 2012-06-28
    • US13392915
    • 2009-12-29
    • Manxia TieJun CaoXiaolong LaiZhenhai Huang
    • Manxia TieJun CaoXiaolong LaiZhenhai Huang
    • G06F21/00
    • H04L63/08H04L9/3213H04L9/3247H04L9/3263H04L9/3271H04L9/3297
    • An entity authentication method by introducing an online third party includes the following steps: 1) an entity B sends a message 1 to an entity A; 2) the entity A sends a message 2 to a trusted third party TP after receiving the message 1; 3) the trusted third party TP checks the validity of the entity A after receiving the message 2; 4) the trusted third party TP returns a message 3 to the entity A after checking the validity of the entity A; 5) the entity A sends a message 4 to the entity B after receiving the message 3; 6) and the entity B performs validation after receiving the message 4. The online retrieval and authentication mechanism of the public key simplifies the operating condition of a protocol, and realizes validity identification of the network for the user through the authentication of the entity B to the entity A.
    • 通过引入在线第三方的实体认证方法包括以下步骤:1)实体B向实体A发送消息1; 2)实体A在接收到消息1之后向可信第三方TP发送消息2; 3)受信任的第三方TP在接收到消息2后检查实体A的有效性; 4)可信第三方TP在检查实体A的有效性之后向实体A返回消息3; 5)实体A在接收到消息3之后向实体B发送消息4; 6),实体B在接收到消息4后进行验证。公钥的在线检索和认证机制简化了协议的工作状态,通过对实体B的认证实现了用户对网络的有效性识别 实体A.