会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • METHOD FOR CODED DATA TRANSMISSION AND APPARATUS FOR DECODING CODED DATA
    • 用于编码数据传输的方法和用于解码编码数据的装置
    • WO2010020264A1
    • 2010-02-25
    • PCT/EP2008/006832
    • 2008-08-20
    • NEC EUROPE LTD.BOHLI, Jens, MatthiasHESSLER, AlbanUGUS, OsmanWESTHOFF, Dirk
    • BOHLI, Jens, MatthiasHESSLER, AlbanUGUS, OsmanWESTHOFF, Dirk
    • H04L1/00H04L29/06
    • H04L1/005H04L1/0057H04L63/123
    • A method for coded data transmission from a sender to at least one receiver, wherein the transmission data is divided into single source packets p i , the method comprising the steps of generating encoded packets from said source packets p i by applying rateless erasure codes, transmitting said encoded packets to said at least one receiver, and decoding said encoded packets in order to obtain said source packets p i by applying a decoding process with on-the-fly decodability functionality, wherein already decoded source packets p i are employed by the decoding process for decoding remaining encoded packets, the method being characterized in that an integrity check is performed on source packets p i obtained in the decoding process before accepting said source packets p i for being employed by the decoding process for further decoding. Furthermore, an apparatus for decoding coded data is disclosed.
    • 一种用于从发送器到至少一个接收器的编码数据传输的方法,其中所述传输数据被划分为单个源分组pi,所述方法包括以下步骤:通过应用无可读擦除代码从所述源分组pi生成编码分组, 分组到所述至少一个接收机,并且解码所述编码分组,以便通过应用具有即时可解码功能的解码处理来获得所述源分组pi,其中已经解码的源分组pi被解码过程用于解码剩余 所述方法的特征在于,在接受所述源分组pi之前,在解码过程中获得的源分组pi执行完整性检查,以被解码处理用于进一步解码。 此外,公开了一种用于解码编码数据的装置。
    • 3. 发明申请
    • METHOD FOR ELECTING AGGREGATOR NODES IN A NETWORK
    • 在网络中选择聚集节点的方法
    • WO2008041052A1
    • 2008-04-10
    • PCT/IB2006/003898
    • 2006-10-06
    • NEC EUROPE LTD.WESTHOFF, DirkARMKNECHT, Frederik
    • WESTHOFF, DirkARMKNECHT, Frederik
    • H04L29/06H04L9/08H04L29/08G05B19/418
    • H04L63/065H04L9/008H04L9/083H04L9/0838H04L67/12H04L2209/16H04L2209/805H04W24/00H04W40/02H04W84/18
    • A method for electing aggregator nodes in a network, wherein the network (1) comprises a plurality of sensor nodes (S i ) to measure data, and wherein at least one of the sensor nodes (S i ) functions as aggregator node (A) to aggregate sensored data obtained by at least a subset of the sensor nodes (Sj), and wherein the network further comprises at least one sink node (2) to collect data aggregated by the aggregator nodes (A), the method comprising: establishing pairwise secret keys (k i ) between a current aggregator node (A t ) and each sensor node (S i ) of the subset of sensor nodes from which the current aggregator node (A t ) obtains sensored data; at each of the sensor nodes (S i ) of said subset, choosing a random number (r i ) and encrypting the random number (r i ) using the established key (k i ); providing a communication chain between the sensor nodes (S,) of said subset and summing the encrypted random numbers (r i ) of all sensor nodes (S i ) of said subset; and determining a new aggregator node (A t+1 ) on the basis of the resulting sum according to a predefined calculation scheme.
    • 一种用于选择网络中的聚合器节点的方法,其中所述网络(1)包括用于测量数据的多个传感器节点(S),并且其中所述传感器节点中的至少一个(S >)使用建立的密钥(k ); 在所述子集的传感器节点(S i)之间提供通信链,并且对所述子集的所有传感器节点(S SUB)的加密随机数(r i i i i)求和。 ; 以及根据预定义的计算方案,根据得到的和来确定新的聚合器节点(A t t + 1 N)。
    • 6. 发明申请
    • A PROCESS FOR ESTABLISHING A SECRET KEY
    • 建立秘密钥匙的过程
    • WO2007144090A1
    • 2007-12-21
    • PCT/EP2007/004974
    • 2007-06-05
    • NEC EUROPE LTD.ARMKNECHT, FrederikWESTHOFF, Dirk
    • ARMKNECHT, FrederikWESTHOFF, Dirk
    • H04L9/08G06K7/00
    • H04L9/0841H04L9/0891H04L2209/805
    • A method for establishing a secret key for a data transmission between communication partners in a network, in particular in a personal area network (PAN), or in a body area network (BAN), wherein one or several inefficient communication partners (B) in comparison to a strong, preferably central communication partner (A) of the network, have reduced power resources, is characterized through the following steps: the strong communication partner (A) transmits a plurality of data pairs, each comprising a possible key (K j ) and an identification (ID i ), to the weak communication partner (B) in a concealed manner, the weak communication partner (B) randomly selects a data pair from the plurality of data pairs, reveals the concealment of the data pair and sends the respective identification (ID j ) back to the strong communication partner (A), the strong communication partner (A) reconstructs the associated key (K j ) from the received identification (ID j ), said key (K j ) then being used as a secret key for the data transmission between the strong and the weak communication partner.
    • 一种用于建立用于网络中的通信伙伴之间的数据传输的秘密密钥的方法,特别是在个人区域网络(PAN)或身体区域网络(BAN)中,其中一个或多个低效的通信伙伴(B)在 与一个较强的,优选的中心通信伙伴(A)进行比较,具有降低的功率资源,其特征在于以下步骤:强通信伙伴(A)发送多个数据对,每个数据对包括可能的密钥(K < 以及隐藏的方式向弱通信伙伴(B)发送识别(ID&lt; i&lt; i&gt;),弱通信对方(B)从 多个数据对,揭示了数据对的隐藏,并将相应的标识(ID&lt; SUB&gt;)返回到强通信伙伴(A),强通信伙伴(A)重建相关联的密钥 从接收到的标识(ID 然后,所述密钥(K SUB)被用作用于强弱通信伙伴之间的数据传输的秘密密钥。