会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Manipulation and restoration of authentication challenge parameters in network authentication procedures
    • 网络认证过程中的认证挑战参数的操作和恢复
    • US09537663B2
    • 2017-01-03
    • US13528802
    • 2012-06-20
    • Semyon MizikovskyIoannis BroustisVioleta Cakulev
    • Semyon MizikovskyIoannis BroustisVioleta Cakulev
    • H04L9/32H04W12/06H04L29/06
    • H04L9/3271H04L63/0853H04W12/06
    • A challenge manipulation and restoration capability is provided for use during network authentication. A mobile device (MD) and a subscriber server (SS) each have provisioned therein a binding key (B-KEY) that is associated with a subscriber identity of a network authentication module (NAM) of the MD. The SS obtains an authentication vector (AV) in response to a request from a Radio Access Network (RAN) when the MD attempts to attach to the RAN. The AV includes an original authentication challenge parameter (ACP). The SS encrypts the original ACP based on its B-KEY, and updates the AV by replacing the original ACP with the encrypted ACP. The MD receives the encrypted ACP, and decrypts the encrypted ACP based on its B-KEY to recover the original ACP. The MD provides the original ACP to the NAM for use in computing an authentication response for validation by the RAN.
    • 提供在网络认证期间使用的挑战操纵和恢复能力。 移动设备(MD)和订户服务器(SS)各自已经提供了与MD的网络认证模块(NAM)的订户身份相关联的绑定密钥(B-KEY)。 当MD尝试附加到RAN时,SS响应于来自无线电接入网络(RAN)的请求而获得认证向量(AV)。 AV包括原始认证挑战参数(ACP)。 SS根据其B-KEY加密原始ACP,并通过用加密的ACP替换原始ACP来更新AV。 MD接收加密的ACP,并根据其B-KEY对加密的ACP进行解密,以恢复原来的ACP。 MD将原始ACP提供给NAM,用于计算用于RAN的验证的认证响应。
    • 2. 发明申请
    • MANIPULATION AND RESTORATION OF AUTHENTICATION CHALLENGE PARAMETERS IN NETWORK AUTHENTICATION PROCEDURES
    • 网络认证程序中的认证挑战参数的修改和恢复
    • US20130343538A1
    • 2013-12-26
    • US13528802
    • 2012-06-20
    • Semyon MizikovskyIoannis BroustisVioleta Cakulev
    • Semyon MizikovskyIoannis BroustisVioleta Cakulev
    • H04W12/06H04K1/00
    • H04L9/3271H04L63/0853H04W12/06
    • A challenge manipulation and restoration capability is provided for use during network authentication. A mobile device (MD) and a subscriber server (SS) each have provisioned therein a binding key (B-KEY) that is associated with a subscriber identity of a network authentication module (NAM) of the MD. The SS obtains an authentication vector (AV) in response to a request from a Radio Access Network (RAN) when the MD attempts to attach to the RAN. The AV includes an original authentication challenge parameter (ACP). The SS encrypts the original ACP based on its B-KEY, and updates the AV by replacing the original ACP with the encrypted ACP. The MD receives the encrypted ACP, and decrypts the encrypted ACP based on its B-KEY to recover the original ACP. The MD provides the original ACP to the NAM for use in computing an authentication response for validation by the RAN.
    • 提供在网络认证期间使用的挑战操纵和恢复能力。 移动设备(MD)和订户服务器(SS)各自已经提供了与MD的网络认证模块(NAM)的订户身份相关联的绑定密钥(B-KEY)。 当MD尝试附加到RAN时,SS响应于来自无线电接入网络(RAN)的请求而获得认证向量(AV)。 AV包括原始认证挑战参数(ACP)。 SS根据其B-KEY加密原始ACP,并通过用加密的ACP替换原始ACP来更新AV。 MD接收加密的ACP,并根据其B-KEY对加密的ACP进行解密,以恢复原来的ACP。 MD将原始ACP提供给NAM,用于计算用于RAN的验证的认证响应。
    • 4. 发明授权
    • Secure group messaging
    • 安全群组讯息
    • US09166778B2
    • 2015-10-20
    • US13548835
    • 2012-07-13
    • Ganapathy S. SundaramIoannis BroustisVioleta Cakulev
    • Ganapathy S. SundaramIoannis BroustisVioleta Cakulev
    • H04L9/08H04L9/30
    • H04L9/08H04L9/0833H04L9/0847H04L9/3073
    • A method for securing at least one message transferred in a communication system from a first computing device to a second computing device in a peer-to-peer manner. At the first computing device, an identity based authenticated key exchange session is established with a third computing device operating as a peer authenticator. The identity based authenticated key exchange session has an identity based authenticated session key associated therewith. The first computing device obtains from the third computing device a random key component of the second computing device, wherein the random key component of the second computing device is encrypted by the third computing device using the identity based authenticated session key prior to sending the random key component of the second computing device to the first computing device. A peer-to-peer messaging key is computed at the first computing device using the random key component of the second computing device.
    • 一种用于将通信系统中传送的至少一个消息从第一计算设备以对等方式保护到第二计算设备的方法。 在第一计算设备处,基于身份的认证密钥交换会话与作为对等体认证者操作的第三计算设备建立。 基于身份的认证密钥交换会话具有与其相关联的基于身份的经认证的会话密钥。 第一计算设备从第三计算设备获得第二计算设备的随机密钥组件,其中第二计算设备的随机密钥组件在发送随机密钥之前由第三计算设备使用基于身份的认证会话密钥加密 第二计算设备的组件到第一计算设备。 使用第二计算设备的随机密钥组件在第一计算设备处计算对等消息传递密钥。
    • 6. 发明申请
    • DISCOVERING PROXIMITY DEVICES IN BROADBAND NETWORKS
    • 在宽带网络中发现接近设备
    • US20140004796A1
    • 2014-01-02
    • US13534976
    • 2012-06-27
    • Violeta CakulevIoannis BroustisSemyon B. Mizikovsky
    • Violeta CakulevIoannis BroustisSemyon B. Mizikovsky
    • H04W24/00H04B7/26
    • H04W76/14H04W8/005
    • A method of providing peer to peer discovery for a plurality of mobiles on a communications network, the plurality of mobiles including at least a first mobile and a second mobile, includes detecting, at a network element, that the first and second mobiles are in proximity with respect to one another; generating a determination result at the network element after the detecting, the determination result indicating whether the first and second mobiles are capable of establishing a direct device to device (D2D) link with one another based on signal reception qualities of the first and second mobiles; and generating a D2D capability message at the network element based on the determination result, the D2D capability message indicating that the first and second mobiles are capable of establishing a D2D link with one another.
    • 一种在通信网络上为多个移动台提供对等点发现的方法,所述多个移动站包括至少第一移动站和第二移动站,包括在网络单元处检测到第一和第二移动站处于邻近 相互之间; 在所述检测之后,在所述网元生成确定结果,所述确定结果指示所述第一移动台和所述第二移动台是否能够基于所述第一和第二移动台的信号接收质量彼此链接到设备(D2D); 以及基于所述确定结果在所述网元处生成D2D能力消息,所述D2D能力消息指示所述第一和第二移动台能够彼此建立D2D链路。
    • 8. 发明授权
    • Secure communications for computing devices utilizing proximity services
    • 使用邻近服务的计算设备的安全通信
    • US09240881B2
    • 2016-01-19
    • US13460035
    • 2012-04-30
    • Ioannis BroustisVioleta Cakulev
    • Ioannis BroustisVioleta Cakulev
    • H04L29/06H04L9/08H04W12/04H04W76/02
    • H04L9/08H04L29/06H04L63/306H04W12/04H04W76/14
    • Techniques are disclosed for establishing secure communications between computing devices utilizing proximity services in a communication system. For example, a method for providing secure communications in a communications system comprises the following steps. At least one key is sent from at least one network element of an access network to a first computing device and at least a second computing device. The first computing device and the second computing device utilize the access network to access the communication system and are authenticated by the access network prior to the key being sent. The key is useable by the first computing device and the second computing device to securely communicate with one another when in proximity of one another without communications between the first computing device and the second computing device going through the access network.
    • 公开了用于在利用通信系统中的邻近服务的计算设备之间建立安全通信的技术。 例如,在通信系统中提供安全通信的方法包括以下步骤。 至少一个密钥从接入网络的至少一个网络元件发送到第一计算设备和至少第二计算设备。 第一计算设备和第二计算设备利用接入网络来访问通信系统,并且在发送密钥之前由接入网络进行认证。 该密钥可由第一计算设备和第二计算设备在彼此接近的情况下彼此安全地彼此通信,而无需第一计算设备和通过接入网络的第二计算设备之间的通信。
    • 9. 发明授权
    • Discovering proximity devices in broadband networks
    • 发现宽带网络中的邻近设备
    • US08849203B2
    • 2014-09-30
    • US13534976
    • 2012-06-27
    • Violeta CakulevIoannis BroustisSemyon B. Mizikovsky
    • Violeta CakulevIoannis BroustisSemyon B. Mizikovsky
    • H04B7/00
    • H04W76/14H04W8/005
    • A method of providing peer to peer discovery for a plurality of mobiles on a communications network, the plurality of mobiles including at least a first mobile and a second mobile, includes detecting, at a network element, that the first and second mobiles are in proximity with respect to one another; generating a determination result at the network element after the detecting, the determination result indicating whether the first and second mobiles are capable of establishing a direct device to device (D2D) link with one another based on signal reception qualities of the first and second mobiles; and generating a D2D capability message at the network element based on the determination result, the D2D capability message indicating that the first and second mobiles are capable of establishing a D2D link with one another.
    • 一种在通信网络上为多个移动台提供对等点发现的方法,所述多个移动站包括至少第一移动站和第二移动站,包括在网络单元处检测到第一和第二移动站处于邻近 相互之间; 在所述检测之后,在所述网元生成确定结果,所述确定结果指示所述第一移动台和所述第二移动台是否能够基于所述第一和第二移动台的信号接收质量彼此链接到设备(D2D); 以及基于所述确定结果在所述网元处生成D2D能力消息,所述D2D能力消息指示所述第一和第二移动台能够彼此建立D2D链路。
    • 10. 发明申请
    • SECURE COMMUNICATIONS FOR COMPUTING DEVICES UTILIZING PROXIMITY SERVICES
    • 使用临时性服务的计算设备的安全通信
    • US20130290696A1
    • 2013-10-31
    • US13460035
    • 2012-04-30
    • Ioannis BroustisVioleta Cakulev
    • Ioannis BroustisVioleta Cakulev
    • H04L9/08H04L29/06
    • H04L9/08H04L29/06H04L63/306H04W12/04H04W76/14
    • Techniques are disclosed for establishing secure communications between computing devices utilizing proximity services in a communication system. For example, a method for providing secure communications in a communications system comprises the following steps. At least one key is sent from at least one network element of an access network to a first computing device and at least a second computing device. The first computing device and the second computing device utilize the access network to access the communication system and are authenticated by the access network prior to the key being sent. The key is useable by the first computing device and the second computing device to securely communicate with one another when in proximity of one another without communications between the first computing device and the second computing device going through the access network.
    • 公开了用于在利用通信系统中的邻近服务的计算设备之间建立安全通信的技术。 例如,在通信系统中提供安全通信的方法包括以下步骤。 至少一个密钥从接入网络的至少一个网络元件发送到第一计算设备和至少第二计算设备。 第一计算设备和第二计算设备利用接入网络来访问通信系统,并且在发送密钥之前由接入网络进行认证。 该密钥可由第一计算设备和第二计算设备在彼此接近的情况下彼此安全地彼此通信,而无需第一计算设备和通过接入网络的第二计算设备之间的通信。