METHOD, SYSTEM AND A DATA FRAME FOR COMMUNICATION IN A WIRELESS COMMUNICATION SYSTEM
    11.
    发明申请
    METHOD, SYSTEM AND A DATA FRAME FOR COMMUNICATION IN A WIRELESS COMMUNICATION SYSTEM 有权
    方法,系统和无线通信系统中通信的数据帧

    公开(公告)号:US20090080389A1

    公开(公告)日:2009-03-26

    申请号:US11861358

    申请日:2007-09-26

    IPC分类号: H04Q7/24

    CPC分类号: H04W72/02 H04W48/16

    摘要: A means for determining a channel for communication in a wireless communication system is provided. A method includes receiving one or more sub-frames of a beacon signal on a beaconing channel until a legitimacy condition of the beacon signal is met. The beacon signal is transmitted by a beaconing device. The method further includes determining a suitability of the channel for communication in the wireless communication system based on the legitimacy condition.

    摘要翻译: 提供了一种用于确定无线通信系统中的通信信道的装置。 一种方法包括在信标信道上接收信标信号的一个或多个子帧,直到满足信标信号的合法性条件。 信标信号由信标装置发送。 该方法还包括基于合法性条件来确定无线通信系统中用于通信的信道的适用性。

    Method of preventing power analysis attacks on microelectronic assemblies
    12.
    发明授权
    Method of preventing power analysis attacks on microelectronic assemblies 有权
    防止对微电子组件进行功率分析攻击的方法

    公开(公告)号:US06298135B1

    公开(公告)日:2001-10-02

    申请号:US09302096

    申请日:1999-04-29

    IPC分类号: H04L900

    摘要: Apparatus in form of a microelectronic assembly including an integrated circuit (IC) for execution of an embedded modular exponentiation program utilizing a square-and-multiply algorithm, wherein in the modular exponentiation program a secret exponent having a plurality of bits characterizes a private key, a method of providing a digital signature to prevent the detection of the secret exponent when monitoring power variations during the IC execution, the method comprising the steps of for a first operation in the modular exponentiation, selecting at least one predetermined bit, wherein the at least one predetermined bit is a bit other than a least significant bit (LSB) and the most significant bit (MSB); using the square-and-multiply algorithm, sequentially selecting bits to the left of the at least one predetermined bit for exponentiation until the MSB is selected; subsequent to selecting the MSB, sequentially selecting bits to the right of the at least one predetermined bit for exponentiation until the LSB is selected.

    摘要翻译: 一种微电子组件的形式的装置,包括用于执行嵌入式模幂运算方法和乘法算法的集成电路(IC),其中在模幂运算程序中,具有多个位的秘密指数表征私钥, 一种在IC执行期间监视功率变化时提供数字签名以防止秘密指数的检测的方法,所述方法包括以下步骤:在模幂运算中进行第一操作,选择至少一个预定位,其中至少 一个预定位是除最低有效位(LSB)和最高有效位(MSB)以外的位; 使用所述平方和乘法算法,顺序地选择所述至少一个预定位的左侧的比特以进行求幂,直到选择所述MSB; 在选择MSB之后,顺序选择至少一个预定位的右侧的位进行求幂,直到选择LSB为止。

    System and method for secure communications in a communication system
    13.
    发明授权
    System and method for secure communications in a communication system 有权
    用于通信系统中的安全通信的系统和方法

    公开(公告)号:US08582779B2

    公开(公告)日:2013-11-12

    申请号:US12972485

    申请日:2010-12-19

    IPC分类号: H04L9/08

    CPC分类号: H04L9/0833 H04L9/321

    摘要: A system and method for secure communications in a communication system, wherein the system programs a computer to perform the method, which includes: receiving at least one authentication key, without an encryption key, from a key-management server; receiving a packet, which is encrypted, from a source device; authenticating the packet, using the at least one authentication key, without cryptographically altering the packet; and forwarding the authenticated packet to a destination device of the packet.

    摘要翻译: 一种用于通信系统中的安全通信的系统和方法,其中所述系统对计算机进行编程以执行所述方法,其包括:从密钥管理服务器接收至少一个不具有加密密钥的认证密钥; 从源设备接收加密的分组; 使用所述至少一个认证密钥来认证所述分组,而不加密地改变所述分组; 并将认证的分组转发到分组的目的地设备。

    BINDING KEYS TO SECURE MEDIA STREAMS
    14.
    发明申请
    BINDING KEYS TO SECURE MEDIA STREAMS 有权
    绑定安全媒体流

    公开(公告)号:US20120148050A1

    公开(公告)日:2012-06-14

    申请号:US12962906

    申请日:2010-12-08

    IPC分类号: H04L9/08

    摘要: A key message can include a key-encryption-key (KEK) associated with a KeyDomainID and a KeyGroupID. A session description message can describe streaming media initialization parameters containing media stream information for one or more media streams. For each media stream, the media stream information can include an IP address and a data port. The session description message can further contain a linkage for binding the KEK to a corresponding one of the media streams. The linkage can include the KeyDomainID and KeyGroupID or can include an abstract representation of the KeyDomainID and KeyGroupID. During session initialization, the key-encryption-key (KEK) can be bound to the media streams using the linkage of the session description message. Each of the media streams can be secured using a traffic key conveyed to user equipment (UE) under protection of the key-encryption-key (KEK).

    摘要翻译: 密钥消息可以包括与KeyDomainID和KeyGroupID相关联的密钥加密密钥(KEK)。 会话描述消息可以描述包含用于一个或多个媒体流的媒体流信息的流媒体初始化参数。 对于每个媒体流,媒体流信息可以包括IP地址和数据端口。 会话描述消息还可以包含用于将KEK绑定到相应的一个媒体流的链接。 该链接可以包括KeyDomainID和KeyGroupID,或者可以包括KeyDomainID和KeyGroupID的抽象表示。 在会话初始化期间,密钥加密密钥(KEK)可以使用会话描述消息的链接绑定到媒体流。 可以使用在密钥加密密钥(KEK)的保护下传送到用户设备(UE)的业务密钥来保护每个媒体流。

    Method and apparatus to facilitate alternative modes of operation for a portable communication device
    15.
    发明授权
    Method and apparatus to facilitate alternative modes of operation for a portable communication device 有权
    促进便携式通信设备的替代操作模式的方法和装置

    公开(公告)号:US07522915B2

    公开(公告)日:2009-04-21

    申请号:US11062642

    申请日:2005-02-22

    IPC分类号: H04M1/00

    CPC分类号: H04M1/72522 H04W88/06

    摘要: A communications device (300) enabled to support both external voice communications functionality (301) (or other external communications of interest and choice) and other functionality (302) has at least a first and second mode of operation (304 and 305). The first mode of operation permits essentially all functionality while the second mode of operation precludes at least much of the other functionality in favor of preserving the viability of at least some of the external communications functionality. A selector (306) can select a given mode of operation based, at least in part, on a trigger 307 comprising, for example, a user input and/or detection of a condition of concern.

    摘要翻译: 能够支持外部语音通信功能(301)(或感兴趣的其他外部通信和选择)和其他功能(302)的通信设备(300)具有至少第一和第二操作模式(304和305)。 第一操作模式基本上允许所有功能,而第二操作模式排除了至少大部分其他功能,有利于保持至少一些外部通信功能的可行性。 至少部分地,选择器306可以基于触发器307来选择给定的操作模式,该触发器307包括例如用户输入和/或检测关注的条件。

    AUTHENTICATION FOR AD HOC NETWORK SETUP
    16.
    发明申请
    AUTHENTICATION FOR AD HOC NETWORK SETUP 有权
    ADHOC网络设置认证

    公开(公告)号:US20090063852A1

    公开(公告)日:2009-03-05

    申请号:US11024281

    申请日:2004-12-28

    IPC分类号: H04L9/32

    摘要: A device (110) performs a method 200 for authentication and Ad Hoc network setup. The device (110) receives (210) a first security configuration; receives (220) a second security configuration based on location; authenticates (230) at least a second node (110) having the first security configuration and the second security configuration; and forms (240) a network with the at least a second node (110).

    摘要翻译: 设备(110)执行用于认证和Ad Hoc网络建立的方法200。 设备(110)接收(210)第一安全配置; 基于位置接收(220)第二安全配置; 认证(230)具有第一安全配置和第二安全配置的至少第二节点(110); 并且与所述至少第二节点(110)形成(240)网络。

    Method of scrambling and descrambling data in a communication system
    17.
    发明授权
    Method of scrambling and descrambling data in a communication system 有权
    在通信系统中对数据进行加扰和解扰的方法

    公开(公告)号:US07099469B2

    公开(公告)日:2006-08-29

    申请号:US09978890

    申请日:2001-10-17

    IPC分类号: H04L9/00

    摘要: A scrambling method (510) divides a set of data (200) into a first portion and a second portion. A first scrambling method is performed on the first portion of the set of data to create a scrambled first portion of the data. The second portion of the set of data is modified with the scrambled first portion of the set of data to create a modified second portion of the set of data. A second scrambling method is performed on the modified second portion of the set of data to create a scrambled second portion of the set of data. The scrambled first portion of the set of data is modified with the scrambled second portion of the set of data to create a scrambled set of data (220). A descrambling method (520) reverses the scrambling method (510) to create a descrambed set of data (200).

    摘要翻译: 加扰方法(510)将一组数据(200)划分为第一部分和第二部分。 对该组数据的第一部分执行第一加扰方法以创建数据的加扰的第一部分。 该组数据的第二部分用该组数据的加扰的第一部分进行修改以创建该组数据的经修改的第二部分。 对该组数据的修改的第二部分执行第二加扰方法,以创建该组数据的加扰的第二部分。 数据集合的加扰的第一部分用数据集合的加扰的第二部分进行修改以产生加扰的数据集(220)。 解扰方法(520)反转加扰方法(510)以创建解组的数据集(200)。

    Method and apparatus for preventing information leakage attacks on a microelectronic assembly
    18.
    发明授权
    Method and apparatus for preventing information leakage attacks on a microelectronic assembly 有权
    用于防止对微电子组件的信息泄漏攻击的方法和装置

    公开(公告)号:US06295606B1

    公开(公告)日:2001-09-25

    申请号:US09360585

    申请日:1999-07-26

    IPC分类号: G06F1214

    摘要: An apparatus and method for preventing information leakage attacks on a microelectronic assembly is described for performing a cryptographic algorithm by transforming a first function, used by the cryptographic algorithm, into a second function. The method includes receiving (1102) a masked input data having n number of bits that is masked with an input mask, wherein n is a first predetermined integer. The method also includes processing (1104) the masked input data using a second function based on a predetermined masking scheme, and producing (1106) a masked output data having m number of bits that is masked with an output mask, wherein m is a second predetermined integer.

    摘要翻译: 描述了一种用于防止对微电子组件的信息泄漏攻击的装置和方法,用于通过将由密码算法使用的第一功能变换为第二功能来执行密码算法。 该方法包括:接收(1102)具有n个比特的被掩码的输入数据,该掩码的输入数据被用输入掩码掩码,其中n是第一预定整数。 该方法还包括使用基于预定屏蔽方案的第二函数来处理(1104)屏蔽的输入数据,并且产生(1106)具有m个位数的屏蔽输出数据,该数据被输出掩码掩蔽,其中m是第二个 预定整数。