会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 8. 发明申请
    • LAWFUL INTERCEPTION OF ENCRYPTED COMMUNICATIONS
    • 严格界定加密通信
    • WO2013117243A1
    • 2013-08-15
    • PCT/EP2012/057788
    • 2012-04-27
    • TELEFONAKTIEBOLAGET L M ERICSSON (PUBL)NÄSLUND, MatsIOVIENO, MaurizioNORRMAN, Karl
    • NÄSLUND, MatsIOVIENO, MaurizioNORRMAN, Karl
    • H04L29/06
    • H04L63/0807H04L9/3213H04L63/0428H04L63/062H04L63/306
    • A method and apparatus for providing access to an encrypted communication between a sending node and a receiving node to a Law Enforcement Agency (LEA). A Key Management Server (KMS) function stores cryptographic information used to encrypt the communication at a database. The cryptographic information is associated with an identifier used to identify the encrypted communication between the sending node and the receiving node. The KMS receives a request for Lawful Interception, the request including an identity of a Lawful Interception target. The KMS uses the target identity to determine the identifier, and retrieves the cryptographic information associated with the identifier from the database. The cryptographic information can be used to decrypt the encrypted communication. The KMS then sends either information derived from the cryptographic information or a decrypted communication towards the LEA. This allows the LEA to obtain a decrypted version of the communication.
    • 一种用于向执法机构(LEA)提供对发送节点和接收节点之间的加密通信的访问的方法和装置。 密钥管理服务器(KMS)功能存储用于加密数据库中的通信的加密信息。 加密信息与用于识别发送节点和接收节点之间的加密通信的标识符相关联。 KMS收到合法侦听请求,该请求包括合法拦截目标的身份。 KMS使用目标身份确定标识符,并从数据库检索与标识符相关联的加密信息。 加密信息可用于解密加密通信。 然后,KMS将从加密信息或解密的通信导出的信息发送给LEA。 这允许LEA获得通信的解密版本。
    • 10. 发明申请
    • TRUST DISCOVERY IN A COMMUNICATIONS NETWORK
    • 通信网络中的信任发现
    • WO2011099904A1
    • 2011-08-18
    • PCT/SE2010/050167
    • 2010-02-12
    • TELEFONAKTIEBOLAGET L M ERICSSON (PUBL)HADDAD, WassimBLOM, RolfNÄSLUND, Mats
    • HADDAD, WassimBLOM, RolfNÄSLUND, Mats
    • H04L29/06H04W12/06
    • H04W12/06H04L63/08H04L63/0823
    • A method and apparatus to establish trust between two nodes in a communications network. A first node receives from a network node authentication data unique to the first node, which can be used to derive a compact representation of verification data for the first node. The first node also receives a certified compact representation of verification data of all nodes in the network. The first node derives trust information from the authentication data for the node, and sends to a second node a message that includes the trust information and part of the authentication data. The second node has its own copy of the certified compact representation of verification data of all nodes in the network, and verifies the authenticity of the message from the first node using the compact representation of verification data of all nodes in the network and the received trust information and authentication data.
    • 一种在通信网络中的两个节点之间建立信任的方法和装置。 第一节点从网络节点接收对第一节点唯一的认证数据,其可以用于导出用于第一节点的验证数据的紧凑表示。 第一个节点还接收到网络中所有节点的验证数据的认证紧凑表示。 第一节点从节点的认证数据中导出信任信息,并向第二节点发送包含信任信息和认证数据的一部分的消息。 第二节点具有网络中所有节点的验证数据的经认证的紧凑表示的副本,并使用网络中所有节点的验证数据的紧密表示和接收到的信任来验证来自第一节点的消息的真实性 信息和认证数据。