会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 9. 发明授权
    • Linked authentication protocols
    • 链接的认证协议
    • US07707412B2
    • 2010-04-27
    • US10528161
    • 2002-11-25
    • Kaisa NybergValtteri NiemiNadarajah Asokan
    • Kaisa NybergValtteri NiemiNadarajah Asokan
    • H04L9/32
    • H04L63/0869H04L63/162H04W12/06
    • A system and method for authenticating a terminal in a communication system is described. The method includes executing a terminal authentication protocol, whereby the executing the terminal authentication protocol includes authenticating an identity of a network entity by a terminal in a communication system. The method further includes executing a challenge authentication protocol, wherein the executing the challenge authentication protocol includes sharing challenge data between the terminal and the network entity, and forming at the terminal, test data by at least applying one authentication function to the challenge data using the identifier. The executing the challenge authentication protocol further includes transmitting a message including terminal authentication data from the terminal to the network entity, and determining, based on the terminal authentication data, whether to provide the terminal with access to a service.
    • 描述用于认证通信系统中的终端的系统和方法。 该方法包括执行终端认证协议,由此执行终端认证协议包括通信系统中的终端认证网络实体的身份。 该方法还包括执行挑战认证协议,其中执行挑战认证协议包括在终端和网络实体之间共享挑战数据,以及在终端上形成测试数据,至少使用一个认证功能将其应用于质询数据 标识符 执行挑战认证协议还包括从终端向网络实体发送包括终端认证数据的消息,并且基于终端认证数据确定是否向终端提供对服务的访问。
    • 10. 发明授权
    • Method for protecting electronic device, and electronic device
    • 电子设备保护方法及电子设备
    • US07630495B2
    • 2009-12-08
    • US10186222
    • 2002-06-28
    • Antti KiiveriNadarajah AsokanValtteri Niemi
    • Antti KiiveriNadarajah AsokanValtteri Niemi
    • H04K1/00
    • H04W88/02H04W12/08
    • Identity data of an operational unit and a verification key of the cryptographic method employed by the service provider are protected with a key of the cryptographic method employed by the manufacturer of the operational unit. The verification key of the cryptographic method employed by the manufacturer of the operational unit is stored in the operational unit of the electronic device. The identity data of the operational unit and the identity data of the service provider are protected with a key of the cryptographic method employed by the service provider. The identity data of the operational unit and the verification key of the service provider are verified with the verification key of the manufacturer of the operational unit. The identity data of the operational unit and the identity data of the service provider are verified with the verified verification key of the service provider. The identity data stored in the user-specific module are compared with the verified identity data. The device starts if the identity data verified by the cryptographic method correspond with the identity data stored in the user-specific module.
    • 操作单元的身份数据和由服务提供商使用的密码方法的验证密钥由操作单元的制造商采用的密码方法的密钥进行保护。 操作单元的制造商使用的密码方法的验证密钥存储在电子设备的操作单元中。 操作单元的身份数据和服务提供商的身份数据由服务提供商使用的密码方法的密钥保护。 操作单元的身份数据和服务提供商的验证密钥由操作单元的制造商的验证密钥进行验证。 操作单元的身份数据和服务提供商的身份数据用服务提供商的已验证验证密钥进行验证。 将存储在用户特定模块中的身份数据与验证的身份数据进行比较。 如果通过加密方法验证的身份数据与存储在用户特定模块中的身份数据相对应,则设备启动。