摘要:
A method and device are useful for enabling a trust relationship using an unexpired public key infrastructure (PKI) certificate, where a current status of the PKI certificate is unavailable. The method includes determining at a relying party that a certificate status update for the PKI certificate is unavailable (step 905). Next, in response to the certificate status update being unavailable, a tolerable certificate status age (TCSA) for the PKI certificate is determined at the relying party based on one or more attributes associated with a certificate holder of the PKI certificate (step 910). Using the PKI certificate, a trust relationship is enabled between the relying party and the certificate holder after determining the TCSA and before an expiration of the TCSA (step 915).
摘要:
A method and device are useful for enabling a trust relationship using an expired public key infrastructure (PKI) certificate. The method includes determining at a relying party a maximum permissible grace period during which the PKI certificate can be conditionally granted a valid status (step 905). Next, at the relying party an uncertainty interval is determined, during which the relying party is unable to detect a revocation of the PKI certificate (step 910). A certificate grace period is then determined at the relying party from a function of the maximum permissible grace period, the uncertainty interval and at least one attribute defined in the PKI certificate (step 915). Using the PKI certificate, a trust relationship is then enabled between the relying party and a certificate holder of the PKI certificate, after determining the grace period and before an expiration of the grace period (step 920).
摘要:
A method for deploying a trust bridge in an ad hoc wireless network can provide interoperability for multi-organizational authentication. The method includes processing at a delegate certification authority (DCA) node device authorizations received from of a plurality of certification authorities (CAs) of different organizations, where the authorizations authorize the DCA node device to serve as a DCA representing the CAs (step 1105). The DCA node device then processes context information received from the ad hoc wireless network (step 1110). Next, the DCA node device determines, based on the context information, that a second node device should be enabled as a new trust bridge (step 1115). The DCA node device then performs a trust bridge deployment to enable the second node device to serve as the new trust bridge (step 1120).
摘要:
A method for deploying a trust bridge in an ad hoc wireless network can provide interoperability for multi-organizational authentication. The method includes processing at a delegate certification authority (DCA) node device authorizations received from of a plurality of certification authorities (CAs) of different organizations, where the authorizations authorize the DCA node device to serve as a DCA representing the CAs (step 1105). The DCA node device then processes context information received from the ad hoc wireless network (step 1110). Next, the DCA node device determines, based on the context information, that a second node device should be enabled as a new trust bridge (step 1115). The DCA node device then performs a trust bridge deployment to enable the second node device to serve as the new trust bridge (step 1120).
摘要:
A method and device are useful for enabling a trust relationship using an unexpired public key infrastructure (PKI) certificate, where a current status of the PKI certificate is unavailable. The method includes determining at a relying party that a certificate status update for the PKI certificate is unavailable (step 905). Next, in response to the certificate status update being unavailable, a tolerable certificate status age (TCSA) for the PKI certificate is determined at the relying party based on one or more attributes associated with a certificate holder of the PKI certificate (step 910). Using the PKI certificate, a trust relationship is enabled between the relying party and the certificate holder after determining the TCSA and before an expiration of the TCSA (step 915).
摘要:
A method and device are useful for enabling a trust relationship using an expired public key infrastructure (PKI) certificate. The method includes determining at a relying party a maximum permissible grace period during which the PKI certificate can be conditionally granted a valid status (step 905). Next, at the relying party an uncertainty interval is determined, during which the relying party is unable to detect a revocation of the PKI certificate (step 910). A certificate grace period is then determined at the relying party from a function of the maximum permissible grace period, the uncertainty interval and at least one attribute defined in the PKI certificate (step 915). Using the PKI certificate, a trust relationship is then enabled between the relying party and a certificate holder of the PKI certificate, after determining the grace period and before an expiration of the grace period (step 920).
摘要:
A method and system enable robust and scalable propagation of trust between a first organization and a second organization, both operating in an ad hoc wireless communication network. The method includes establishing at a first member node of the first organization pair-wise trust with a first member node of the second organization using a predetermined inter-organizational trust establishment device (step 505). Next, the first member node of the first organization generates a credential for the second organization using the pair-wise trust (step 510). The credential is then distributed from the first member node of the first organization to a second member node of the first organization (step 515). The second member node of the first organization then establishes pair-wise trust with a second member node of the second organization using the credential received from the first member node of the first organization (step 520).
摘要:
A device (10) and method (20) for integrating data traffic, such as isochronous (ISO) data packets and best-effort (BE) data packets, into a data transmission time frame. The method (20) includes defining a BE transmission interval (BETI) within the data transmission time frame, assigning all or a portion of the BE data packet in the BETI, or fragmenting the BE data packet if the BE data packet is larger than the BETI. The method dynamically fragments the BE data packet into a first fragment, equal in size to the BETI, that is assigned to the BETI, and a second fragment, which is queued. The method assigns BE data packets and fragments in this manner until they have been assigned to the BETI. The device (10) includes a scheduler for assigning BE data packet in the BETI and a fragmenter for fragmenting the BE data packet when larger than the BETI.
摘要:
In certain embodiments, a method for managing operational parameters of a cognitive radio device to minimize non-compliance with a regulatory policy involves sensing a change in an operational condition that will affect compliance with a current operational policy; estimating a time at which the current operational policy will become invalid; selecting a method for determining how to update the current operational policy; and updating the current operational policy of the cognitive radio device. Other embodiments may incorporate more, fewer or other elements.
摘要:
In an embodiment, an adaptively-augmentable wireless network (100, FIG. 1) may include at least one mobile device (110-115) and at least one relay device (104-109). During network setup, a mobile device associated with a first host user may determine (505, FIG. 5) that no relay device signal is receivable by the mobile device which has an adequate signal quality. When an undeployed relay device is not available to the first host user, he mobile device may transmit (508) a deployment request message (700, FIG. 7). Another mobile device associated with a second host user may receive (902, FIG. 9) the deployment request message, and may determine (908) whether to initiate deployment of an undeployed relay device associated with the second host user. When the other mobile device decides to initiate deployment, it may transmit (912) a responsive deployment announcement message (800, FIG. 8). Accordingly, collaborative relay device deployment is achievable.