摘要:
A communication system (100) is facilitated by an access node (102) to support communication with subscriber units (104, 106) as secondary users of a regulated spectrum portion. The access node requests permission to operate as a secondary user from an authorization server (118). The authorization server provides authorized transmission parameters based on characteristics of the access node. The access node operates according to the authorized transmission parameters and provides the parameters to eligible subscriber units.
摘要:
A method and device are useful for enabling a trust relationship using an expired public key infrastructure (PKI) certificate. The method includes determining at a relying party a maximum permissible grace period during which the PKI certificate can be conditionally granted a valid status (step 905). Next, at the relying party an uncertainty interval is determined, during which the relying party is unable to detect a revocation of the PKI certificate (step 910). A certificate grace period is then determined at the relying party from a function of the maximum permissible grace period, the uncertainty interval and at least one attribute defined in the PKI certificate (step 915). Using the PKI certificate, a trust relationship is then enabled between the relying party and a certificate holder of the PKI certificate, after determining the grace period and before an expiration of the grace period (step 920).
摘要:
A method for establishing a secure route in a wireless network as provided improves network efficiency. According to one aspect, the method includes receiving at a first node in the wireless network a route request message from a second node, where the second node and the first node have not been mutually authenticated. The route request message is then forwarded from the first node to a third node. A route reply message is then received at the first node from the third node. The first node is then mutually authenticated with the second node in response to receiving the route reply message at the first node.
摘要:
A method of providing situational awareness at an incident scene. Sensor data can be received from at least one sensor (104, 106, 108) located at the incident scene and position data can be received for at least one resource (306, 308, 310, 312). Based on the received data, at least one optimal exit route (318) at the incident scene can be calculated. The present invention also relates to a system (118) that provides situational awareness at an incident scene. The system can include a communications adapter (204) that receives sensor data from at least one sensor located at the incident scene and position data for at least one resource located at the incident scene, and a processor (202) that calculates at least one optimal exit route for the resource to exit a location at the incident scene based on the received sensor data and position data.
摘要:
A communication system (100) is facilitated by an access node (102) to support communication with subscriber units (104, 106) as secondary users of a regulated spectrum portion. The access node requests permission to operate as a secondary user from an authorization server (118). The authorization server provides authorized transmission parameters based on characteristics of the access node. The access node operates according to the authorized transmission parameters and provides the parameters to eligible subscriber units.
摘要:
Techniques are provided which can allow a host to determine whether to send a DNS request via a distributed Domain Name Service (DNS) protocol or a regular DNS protocol.
摘要:
A method for establishing a secure route in a wireless network as provided improves network efficiency. According to one aspect, the method includes receiving at a first node in the wireless network a route request message from a second node, where the second node and the first node have not been mutually authenticated. The route request message is then forwarded from the first node to a third node. A route reply message is then received at the first node from the third node. The first node is then mutually authenticated with the second node in response to receiving the route reply message at the first node.
摘要:
A method for transmitting a packet from a transmitting node to a destination node in a communication network can enable improved network efficiency. The method includes receiving and storing identification information concerning at least one foreign node that is directly reachable in the communication network (block 505). It is then determined, using the identification information, whether the destination node is directly reachable in the communication network (block 510). Based on whether the destination node is directly reachable in the communication network, it is then determined whether to transmit the packet to the destination node using a tunneling protocol or without using a tunneling protocol (block 515). The packet is then transmitted from the transmitting node to the destination node (block 520).
摘要:
An ad hoc network includes a first node, a second node, and a third node. The first node and second node share a first shared secret key, and the first node and third node share a second shared secret key. The second node and third node share a temporal key. The first node generates a unique key, encrypts the unique key with a first shared secret key to generate a first encrypted unique key and transmits the first encrypted unique key to the second node. The first node encrypts the unique key with a second shared secret key to generate a second encrypted unique key and transmits the second encrypted unique key to the third node. To establish the temporal key, the second node decrypts the first encrypted unique key and the third node decrypts the second encrypted unique key thereby each generating the unique key.
摘要:
A method and system for mutually authenticating a first node and a second node operating in a wireless communication network enables mutual authentication when the first node and the second node are unable to directly authenticate each other. The method includes identifying, at the first node, a third node that can authenticate both the first node and the second node (step 215). Authentication data for authenticating the first node with the third node is then transmitted from the first node to the third node (step 220). Keying material that is received from the third node is then processed at the first node (step 225). A shared secret mutual authentication protocol is then processed, whereby the first node and the second node are mutually authenticated by proving that they each have authenticated with the third node and each have the keying material (step 230).