会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • IMPROVED PROXIMITY DETECTION METHOD
    • 改进的邻近检测方法
    • WO2007043015A3
    • 2007-09-07
    • PCT/IB2006053732
    • 2006-10-11
    • KONINKL PHILIPS ELECTRONICS NVEPSTEIN MICHAELVAUCLAIR MARCNIKOV VENTZISLAV
    • EPSTEIN MICHAELVAUCLAIR MARCNIKOV VENTZISLAV
    • G06F21/44H04L29/06
    • H04L63/0869G06F21/445G06F2221/2111H04L63/0428H04L63/0492H04L63/08H04L2463/101
    • The invention relates to a method of determining a distance between a first device (200) and a second device (220). In a precomputing phase, both devices (200, 220) compute for a query at a protected query Ma1 and for a response bt a protected response Mb1. In an interactive phase, the first device (200) sends the protected query Ma1 to the second device (220). The second device (220) compares the received protected query Ma1 against the computed protected query Ma1 and sends the protected response Mb1 to the first device (200). The first device (200), compares the received protected response mbt against the computed protected response mbj. The distance is determined based on a measurement of time elapsed between sending the protected query Ma1 to the second device (220) and receiving the protected response Mb1 from the second device (220).
    • 本发明涉及确定第一设备(200)和第二设备(220)之间的距离的方法。 在预计算阶段中,两个设备(200,220)针对受保护的查询Ma1处的查询以及针对保护响应Mb1处的响应来计算。 在交互阶段中,第一设备(200)将受保护的查询Ma1发送给第二设备(220)。 第二设备(220)将接收到的受保护查询Ma1与计算出的受保护查询Ma1进行比较,并将受保护响应Mb1发送给第一设备(200)。 第一设备(200)将接收到的保护响应mbt与计算出的保护响应mbj进行比较。 该距离基于发送受保护查询Ma1到第二设备(220)和从第二设备(220)接收受保护响应Mb1之间所经过的时间的测量来确定。
    • 2. 发明申请
    • ESTABLISHING A SECURE AUTHENTICATED CHANNEL
    • 建立一个安全的认证通道
    • WO2008004174A3
    • 2008-03-06
    • PCT/IB2007052565
    • 2007-07-02
    • KONINKL PHILIPS ELECTRONICS NVNIKOV VENTZISLAV
    • NIKOV VENTZISLAV
    • H04L12/22H04L9/32
    • H04L63/0428H04L63/0869H04L63/16H04L63/162H04L63/168
    • A communication system has at least two communication devices (10,20) each accommodating an application (12,22). Establishing a secure authenticated channel between applications is achieved by first executing a link layer protocol (81) for establishing, on a link layer, an unauthenticated secure channel between the communication devices by exchanging link layer protocol messages. Subsequently an authentication protocol (82) is executed for establishing, on an application layer, authentication between the applications. The authentication protocol includes transferring an authentication message from a first application, processing the authentication message into a secure authentication message, transferring the secure authentication message to the second communication device via the unauthenticated secure channel, verifying the secure authentication message, and transferring the secure authentication message to the second application.
    • 通信系统具有至少两个通信设备(10,20),每个通信设备(10,20)各自容纳应用(12,22)。 通过首先执行链路层协议(81),通过交换链路层协议消息,在链路层上建立通信设备之间的未经认证的安全通道,从而实现在应用之间建立安全的认证通道。 随后执行认证协议(82),用于在应用层上建立应用之间的认证。 认证协议包括从第一应用传输认证消息,将认证消息处理成安全认证消息,经由未认证安全通道将安全认证消息传输到第二通信设备,验证安全认证消息,并且传输安全认证 消息给第二个应用程序。