International regulatory compliance for ad hoc networking
    22.
    发明授权
    International regulatory compliance for ad hoc networking 有权
    针对特定网络的国际法规遵从

    公开(公告)号:US07809844B2

    公开(公告)日:2010-10-05

    申请号:US11204558

    申请日:2005-08-15

    IPC分类号: G06F15/16 H04H20/71 H04B7/00

    摘要: A method is provided to facilitate compliance with wireless communication regulations for a regulatory domain when creating or joining an ad hoc network. The method can include interacting with a driver of a wireless communication device to facilitate compliance. Another method is provided to offer an option to enable or disable prompting to verify a regulatory domain to use to create or join an ad hoc network. Another method is provided for facilitating compliance with wireless communication regulations for a plurality of regulatory domains. The method includes using a common channel as a communication channel for a wireless communication device when joining or creating an ad hoc network, wherein the common channel is common to the plurality of regulatory domains.

    摘要翻译: 提供了一种方法,以便在创建或加入自组织网络时便于符合监管域的无线通信规则。 该方法可以包括与无线通信设备的驱动器进行交互以便于遵守。 提供另一种方法来提供启用或禁用提示验证用于创建或加入自组织网络的监管域的选项。 提供了另一种方法来促进符合多个调节域的无线通信规则。 该方法包括在加入或创建自组织网络时使用公共信道作为无线通信设备的通信信道,其中公共信道对于多个调节域是共同的。

    Secure network channel
    23.
    发明授权
    Secure network channel 有权
    安全网络通道

    公开(公告)号:US07600113B2

    公开(公告)日:2009-10-06

    申请号:US10783524

    申请日:2004-02-20

    摘要: Methods and systems for establishing a secure network channel between two or more devices in a communication network are disclosed. In exemplary implementations the network may be a UPnP network. A first device passes authentication information to at least a second device to permit the second device to authenticate the first device. Optionally, the first device may request to authenticate the second device, in which authentication information associated with the second device is passed to the first device. The first device uses this information to authenticate the second device. At least one of the first and second device may store authentication information in an data store associated with the device.

    摘要翻译: 公开了用于在通信网络中的两个或多个设备之间建立安全网络信道的方法和系统。 在示例性实现中,网络可以是UPnP网络。 第一设备将认证信息传递到至少第二设备,以允许第二设备认证第一设备。 可选地,第一设备可以请求认证第二设备,其中与第二设备相关联的认证信息被传递到第一设备。 第一个设备使用此信息来认证第二个设备。 第一和第二设备中的至少一个可以将认证信息存储在与设备相关联的数据存储器中。

    Mechanism to convey discovery information in a wireless network
    24.
    发明申请
    Mechanism to convey discovery information in a wireless network 有权
    在无线网络中传送发现信息的机制

    公开(公告)号:US20070141988A1

    公开(公告)日:2007-06-21

    申请号:US11434394

    申请日:2006-05-15

    IPC分类号: H04B7/00 G06F3/12

    摘要: Discovery of services between devices is provided prior to establishing a connection between devices, including wireless-enabled devices or devices that are communicatively coupled to wireless access points or other wireless communication devices. Discovering services prior to establishing a connection may facilitate finding a desired service. The services that may be discovered may be, for example, print services, camera services, PDA services or any other suitable services. Services may be discovered using 802.11, Bluetooth, UWB or any other suitable wireless technology. An information element is used to wirelessly convey information related to a service and/or information related to service discovery.

    摘要翻译: 在建立设备之间的连接之前提供设备之间的服务发现,包括无线功能设备或通信地耦合到无线接入点或其他无线通信设备的设备。 在建立连接之前发现服务可能有助于找到所需的服务。 可能发现的服务可以是例如打印服务,照相机服务,PDA服务或任何其它合适的服务。 可以使用802.11,蓝牙,UWB或任何其他合适的无线技术来发现服务。 信息元素用于无线地传送与服务有关的信息和/或与服务发现有关的信息。

    Detachable radio module
    26.
    发明申请

    公开(公告)号:US20060068844A1

    公开(公告)日:2006-03-30

    申请号:US11266705

    申请日:2005-11-03

    IPC分类号: H04B1/38

    摘要: A radio module that detachably connects with a host device. A radio module is provided that includes an antenna as an integral part of the radio module. The antenna satisfies regulatory requirements by being an integral part of the radio module. The radio module includes an interface circuit that provides the processing required for communication over a wireless network. The functionality of the interface can be divided between the radio module and the host device. The physical interface between a host device and the radio module may depend on which functions are implemented by the radio module and which functions are implemented by the host device. In one example, the physical interface is a standard connection that permits the radio module to be detachably connected with multiple devices. The radio module also includes a flexible cable such that the radio module can be optimally positioned within the wireless network.

    Methods and systems for frustrating statistical attacks by injecting pseudo data into a data system
    28.
    发明授权
    Methods and systems for frustrating statistical attacks by injecting pseudo data into a data system 有权
    通过将伪数据注入数据系统来挫败统计攻击的方法和系统

    公开(公告)号:US07376235B2

    公开(公告)日:2008-05-20

    申请号:US10207619

    申请日:2002-07-29

    申请人: Thomas Kuehnel

    发明人: Thomas Kuehnel

    IPC分类号: H04L9/00

    摘要: Disclosed are methods and systems for frustrating statistical attacks. A sender and receiver agree upon an encryption and integrity encoding scheme. For each “real” data packet, the sender generates integrity information, puts it in the packet, and then encrypts the packet using the agreed-upon scheme. Every now and again, the sender generates a “pseudo-data” packet encoded using a scheme different from the agreed-upon scheme. When the real-data and pseudo-data packets arrive at the receiver, they are decrypted using the agreed-upon scheme, and their validity is verified using the integrity information. Verification succeeds for real-data packets, and their data are accepted as valid. Verification fails for pseudo-data packets, however, and their data are discarded. An eavesdropper cannot differentiate pseudo-data from real-data and so cannot help but use all of the packets in its analysis. This mingling of pseudo-data with real-data frustrates the eavesdropper's statistical attempt to uncover the agreed-upon encoding scheme.

    摘要翻译: 披露了挫败统计攻击的方法和系统。 发送者和接收者同意加密和完整性编码方案。 对于每个“真实”数据分组,发送方生成完整性信息,将其放入分组中,然后使用商定的方案对分组进行加密。 发送者一次又一次地生成使用与商定的方案不同的方案编码的“伪数据”包。 当实际数据和伪数据分组到达接收机时,使用商定的方案解密它们,并使用完整性信息验证其有效性。 验证对于实际数据包成功,其数据被接受为有效。 然而,伪数据包的验证失败,并且它们的数据被丢弃。 窃听者无法区分伪数据和实际数据,因此不能在分析中使用所有数据包。 伪数据与真实数据的混合阻碍了窃听者的统计尝试,以揭示商定的编码方案。

    Public key infrastructure certificate entrustment
    29.
    发明申请
    Public key infrastructure certificate entrustment 审中-公开
    公钥基础设施证书委托

    公开(公告)号:US20080005562A1

    公开(公告)日:2008-01-03

    申请号:US11301858

    申请日:2005-12-13

    IPC分类号: H04L9/00

    摘要: Establishing a chain of trust in a public key infrastructure can be costly, time consuming and requires nearly constant access to the appropriate network-based authorities. Local trust between devices is established using a combination of a personal identification number (PIN) delivered out-of-band and self-signed certificates. The client may present the PIN to an electronic device such as a projector or printer so the electronic device can trust the client. The electronic device may present a self-signed digital certificate with the electronic device UUID based on a hash of the electronic device public key from the certificate.

    摘要翻译: 在公共密钥基础架构中建立信任链可能是昂贵的,耗时的,并且需要几乎不间断地访问适当的基于网络的机构。 设备之间的本地信任使用个人识别号码(PIN)和带外签名证书的组合来建立。 客户端可以将PIN提供给诸如投影仪或打印机的电子设备,使得电子设备可以信任客户端。 电子设备可以基于来自证书的电子设备公钥的散列来向电子设备UUID呈现自签名数字证书。