Abstract:
The present invention relates to a method for managing communications in a wireless communications network having a mesh or “relay-based” communication mode operating according to a relay scheme. The network includes network devices defining transmission links between them. The method includes initially detecting a mobile obstacle within the network coverage area; dynamically tracking the detected obstacle by iteratively determining a monitoring area including the detected obstacle; selecting, from the transmission links, a subset of monitoring links belonging at least partly to the monitoring area and monitoring a perturbation level of the selected monitoring links to determine movement of the mobile obstacle in the coverage area; and dynamically adapting the relay scheme of the network based on the belonging or not belonging of the transmission links between network devices to the selected subset.
Abstract:
In a method for the restriction of access from a sink device to a content stored in a storage device, a content protection protocol comprises an authentication phase and an encryption key exchange phase is implemented between the storage device and the sink device. The method comprises a prior step for the association of at least one predetermined password with said content and/or said storage device; and the following steps of: a) obtaining at least one piece of access information during the authentication phase; b) obtaining a processing function dependent on said at least one piece of access information (UCPK) and said at least one predetermined password (CPK); c) applying the processing function thus obtained during the authentication phase of the protection protocol, the application of the processing function causing the authentication phase to fail when said at least one piece of access information does not meet a predetermined condition.
Abstract:
In a method for securing the transfer of a data stream from a sender device to at least one receiver device, through a network comprising a plurality of nodes connected to one another by a plurality of links, the sender device is connected to an input node in the network and each receiver device is connected to an output node of the network. The method comprises the following steps: a) the transmission of the data stream to the receiver devices through the associated output nodes; b) the informing of the output nodes by the input node that the transmission or maintaining of transmission of the data stream, in clear (i.e. non-encrypted) form necessitates the authentication of the output nodes; c) the reception by the input node of at least one authentication request sent by at least one of said output nodes; d) the authentication by the input node of the output nodes that are destination nodes of the data streams; e) the transmission of the data stream in clear form to, at most, the authenticated output nodes and the stopping of the transmission of the data stream to the other output nodes.
Abstract:
A method is proposed for managing communications in a wireless network in which a first communication is set up or established on a plurality of carriers between a first sender device and a receiver device, the network comprising a set of at least one second sender device for which a second communication has to be established simultaneously with said first communication.Such a method comprises steps of: allocating a set comprising at least one carrier among said plurality of carriers to each second sender device; obtaining (, for each second sender device, a level of reception power of a predetermined signal sent by said second sender device on the set of carrier(s) that have been allocated to it; estimating a rate of disturbance of said first communication by one said or several said second communications as a function of the power level(s) obtained for the second sender device(s); authorizing the second sender device(s), for which the estimated rate(s) of disturbance is or are below a predefined threshold, to set up a said second communication on the plurality of carriers.
Abstract:
A method for managing allocation of paths for transmission, in packets of symbols, of at least a first data content, each content being transmitted from a source node up to a destination node in a meshed communications network comprising a plurality of nodes, each destination node receiving a plurality of copies of a same packet of symbols of the content transmitted to said destination node by a source node, each copy being received by the destination node via a distinct transmission path directly from the source node or via at least one relay node of the meshed communications network, the packets being encoded with an error correction code enabling decoding by erasure of packets symbols. Such a method comprises the following steps: selecting a set of transmission paths from the source node up to the destination node for the transmission of copies of at least one packet of the first content, for which an estimated first number of erasures of symbols of the at least one packet is smaller than a determined threshold, the first number of erasures being estimated from a piece of information on quality of transmission that is determined and associated with each of the selected transmission paths, the threshold being determined as a function of an erasure correction capability of the error correction code; allocating the selected transmission paths to the transmission of the first content from said source node up to said destination node.
Abstract:
In a method for securing the transfer of a data stream from a sender device to at least one receiver device, through a network comprising a plurality of nodes connected to one another by a plurality of links, the sender device is connected to an input node in the network and each receiver device is connected to an output node of the network. The method comprises the following steps: a) the transmission of the data stream to the receiver devices through the associated output nodes; b) the informing of the output nodes by the input node that the transmission or maintaining of transmission of the data stream, in clear (i.e. non-encrypted) form necessitates the authentication of the output nodes; c) the reception by the input node of at least one authentication request sent by at least one of said output nodes; d) the authentication by the input node of the output nodes that are destination nodes of the data streams; e) the transmission of the data stream in clear form to, at most, the authenticated output nodes and the stopping of the transmission of the data stream to the other output nodes.
Abstract:
A method for managing communications in a wireless communications network comprising a set of pairs constituted by a sender device and a receiver device, each of the devices having a determined area of communications coverage, the coverage areas of each pair having a mutual intersection area. Such a method comprises the followings steps: determining future trajectories of a disturbing mobile obstacle as a function of a set of prior positions of the disturbing mobile obstacle, a position of an obstacle being determined as a function of areas of mutual overlapping of at least two disturbed intersecting areas, a disturbed intersecting area having a given state of disturbance according to a determined criterion of quality of communications between the devices of the pairs corresponding to the disturbed intersection area; establishing a forecast diagnostic of quality of communications by examining the determined future trajectory or trajectories; managing the routing of communications as a function of the established forecast diagnostic.