会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 6. 发明申请
    • CONSTRAINED CRYPTOGRAPHIC KEYS
    • 受约束的密码键
    • WO2008054375A2
    • 2008-05-08
    • PCT/US2006/038110
    • 2006-09-29
    • QUALCOMM INCORPORATEDGANTMAN, AlexanderYALCINKAYA, TolgaROSE, Gregory GordonXIAO, Lu
    • GANTMAN, AlexanderYALCINKAYA, TolgaROSE, Gregory GordonXIAO, Lu
    • H04L9/08H04L9/32
    • H04L9/0872H04L9/088H04L9/321H04L63/083H04L2209/76
    • A constrained proxy key is used to secure communications between two devices via an intermediary device. A first proxy key is generated at a host device (key generator device) based on a shared secret key, one or more constraints on the first proxy key, and a key derivation function. At least the shared secret key and key derivation function are known to the host device and a client device (authentication device). The first proxy key is sent to a proxy device to use in authenticating communications with the client device. An authenticated message is generated by the proxy device using the first proxy key and sent to the client device. The client device locally generates a second proxy key using the key derivation function, one or more constraints, and the shared secrete key for authenticating the proxy device. The proxy device is authenticated if the client device successfully accesses the authenticated message from the proxy device using the second proxy key.
    • 约束代理密钥用于通过中间设备保护两个设备之间的通信。 第一代理密钥基于共享密钥,第一代理密钥上的一个或多个约束以及密钥导出函数在主机设备(密钥生成器设备)处生成。 至少共享密钥和密钥导出功能对于主机设备和客户端设备(认证设备)是已知的。 第一代理密钥被发送到代理设备以用于认证与客户端设备的通信。 由代理设备使用第一代理密钥生成认证消息并将其发送到客户端设备。 客户端设备使用密钥导出函数,一个或多个约束以及用于认证代理设备的共享秘密密钥在本地生成第二代理密钥。 如果客户端设备使用第二代理密钥成功地从代理设备访问认证消息,则代理设备被认证。
    • 9. 发明申请
    • METHOD AND APPARATUS FOR VERIFYING DATA PACKET INTEGRITY IN A STREAMING DATA CHANNEL
    • 用于在流数据通道中验证数据分组完整性的方法和装置
    • WO2009152100A3
    • 2010-05-20
    • PCT/US2009046631
    • 2009-06-08
    • QUALCOMM INCROSE GREGORY GORDONJULIAN DAVID JONATHANXIAO LU
    • ROSE GREGORY GORDONJULIAN DAVID JONATHANXIAO LU
    • H04L29/06
    • H04L63/123H04L1/02H04L1/20
    • Disclosed is a method for verifying data packet integrity in a streaming-data channel. In the method, data packets are received from the streaming-data channel. Each data packet includes a data payload and a corresponding message integrity code. The received data packets are processed in a first processing mode, wherein the received data packets are forwarded to an application module before checking the integrity of the data packets using the respective message integrity codes. An integrity-check-failure measurement is generated for monitoring an integrity-check-failure rate in the first processing mode. If the integrity-check-failure measurement exceeds an integrity-check threshold, then the method transitions to a second processing mode. A received data packet is forwarded to the application module in the second processing mode only after passing the integrity check.
    • 公开了一种用于验证流数据信道中的数据分组完整性的方法。 在该方法中,从流数据信道接收数据分组。 每个数据分组包括数据有效载荷和对应的消息完整性代码。 接收到的数据分组以第一处理模式进行处理,其中在使用各自的消息完整性代码检查数据分组的完整性之前,所接收的数据分组被转发到应用模块。 产生完整性检查失败测量,用于在第一处理模式中监视完整性检查失败率。 如果完整性检查失败测量超过完整性检查阈值,则该方法转换到第二处理模式。 只有在通过完整性检查之后,接收到的数据包将以第二处理模式转发给应用模块。