Method and system of secured direct link set-up (DLS) for wireless networks
    61.
    发明申请
    Method and system of secured direct link set-up (DLS) for wireless networks 有权
    用于无线网络的安全直接链路建立(DLS)的方法和系统

    公开(公告)号:US20100070767A1

    公开(公告)日:2010-03-18

    申请号:US12590356

    申请日:2009-11-06

    IPC分类号: H04L9/32

    摘要: Method and system of secured direct link set-up (DLS) for wireless networks. In accordance with aspects of the method, techniques are disclosed for setting up computationally secure direct links between stations in a wireless network in a manner that is computationally secure. A direct link comprising a new communication session is set up between first and second stations in a wireless local area network (WLAN) hosted by an access point (AP), the direct link comprising a new communication session. The AP generates a unique session key for the new communication session and transfers secured copies of the session key to each of the first and second stations in a manner under which only the first and second stations can obtain the session key. A security mechanism is then implemented on the unsecured direct link to secure the direct link between the first and second stations using a secure session key derived from the session key.

    摘要翻译: 用于无线网络的安全直接链路建立(DLS)的方法和系统。 根据该方法的方面,公开了用于以计算上安全的方式在无线网络中的站之间建立计算安全的直接链路的技术。 在由接入点(AP)托管的无线局域网(WLAN)中的第一和第二站之间建立包括新的通信会话的直接链路,该直接链路包括新的通信会话。 AP为新的通信会话生成唯一的会话密钥,并且以只有第一和第二站可以获得会话密钥的方式将会话密钥的安全副本传送到第一和第二站中的每一个。 然后在不安全的直接链路上实现安全机制,以使用从会话密钥导出的安全会话密钥来保护第一和第二站之间的直接链路。

    System and method for determining correct execution of software based on baseline and real time trace events
    63.
    发明授权
    System and method for determining correct execution of software based on baseline and real time trace events 有权
    基于基线和实时跟踪事件确定软件正确执行的系统和方法

    公开(公告)号:US09514028B2

    公开(公告)日:2016-12-06

    申请号:US13976049

    申请日:2012-03-29

    摘要: An embodiment provides a level of assurance regarding correct operation of software. An embodiment creates baseline and real-time measurements of software and compares the measurements to determine whether the software is operating correctly. An application provider may include “tracing elements” in target software application. While producing the application the trace elements are detected and provide trace events, which collectively provide a “baseline trace” indicating proper application execution. The provider supplies the application and the baseline trace to a user. The user operates the application in real-time to produce a “real-time trace” based on the application still having trace elements that produce trace events (which collectively form the “real-time” trace). A comparator compares the baseline and real-time traces. If the traces are within a pre-determined range of each other the user has a level of assurance the software is operating correctly. Other embodiments are included herein.

    摘要翻译: 实施例提供了关于软件正确操作的一定程度的保证。 实施例创建软件的基线和实时测量,并比较测量值以确定软件是否正常运行。 应用提供商可以在目标软件应用中包括“跟踪元素”。 在生成应用程序时,会检测到跟踪元素,并提供跟踪事件,这些跟踪事件统一提供指示正确应用程序执行的“基准轨迹”。 提供商将应用程序和基线跟踪提供给用户。 用户根据仍然具有产生跟踪事件(共同形成“实时”跟踪)的跟踪元素的应用程序实时运行应用程序以产生“实时跟踪”。 比较器比较基线和实时迹线。 如果迹线在彼此的预定范围内,则用户具有软件正确操作的保证级别。 本文还包括其它实施例。

    Collaborative image control
    64.
    发明授权
    Collaborative image control 有权
    协同图像控制

    公开(公告)号:US09282232B2

    公开(公告)日:2016-03-08

    申请号:US14306649

    申请日:2014-06-17

    摘要: Systems and methods of conducting collaborative sessions between mobile devices may provide for determining a time delay associated with a set of participating mobile devices, and determining a command execution time based at least in part on a clock of a managing device and the time delay. One or more control messages may be transmitted to the participating mobile devices, wherein the control messages include the command and the command execution time. Upon receiving a control message, each participating mobile device may determine a local execution time based at least in part on the command execution time and an offset of the clock of the managing device relative to a local clock. Execution of the command can therefore be coordinated across the set of participating mobile devices.

    摘要翻译: 在移动设备之间进行协作会话的系统和方法可以提供用于确定与一组参与移动设备相关联的时间延迟,以及至少部分地基于管理设备的时钟和时间延迟来确定命令执行时间。 一个或多个控制消息可以被发送到参与的移动设备,其中控制消息包括命令和命令执行时间。 在接收到控制消息时,每个参与的移动设备可以至少部分地基于命令执行时间和管理设备的时钟相对于本地时钟的偏移来确定本地执行时间。 因此,可以在整个参与移动设备组中协调执行该命令。

    SYSTEM AND METHOD FOR DETERMINING EXECUTION OF SOFTWARE
    65.
    发明申请
    SYSTEM AND METHOD FOR DETERMINING EXECUTION OF SOFTWARE 有权
    用于确定软件执行的系统和方法

    公开(公告)号:US20140143608A1

    公开(公告)日:2014-05-22

    申请号:US13976049

    申请日:2012-03-29

    IPC分类号: G06F11/36

    摘要: An embodiment provides a level of assurance regarding correct operation of software. An embodiment creates baseline and real-time measurements of software and compares the measurements to determine whether the software is operating correctly. An application provider may include “tracing elements” in target software application. While producing the application the trace elements are detected and provide trace events, which collectively provide a “baseline trace” indicating proper application execution. The provider supplies the application and the baseline trace to a user. The user operates the application in real-time to produce a “real-time trace” based on the application still having trace elements that produce trace events (which collectively form the “real-time” trace). A comparator compares the baseline and real-time traces. If the traces are within a pre-determined range of each other the user has a level of assurance the software is operating correctly. Other embodiments are included herein.

    摘要翻译: 实施例提供了关于软件正确操作的一定程度的保证。 实施例创建软件的基线和实时测量,并比较测量值以确定软件是否正常运行。 应用提供商可以在目标软件应用中包括“跟踪元素”。 在生成应用程序时,会检测到跟踪元素,并提供跟踪事件,这些跟踪事件统一提供指示正确应用程序执行的“基准轨迹”。 提供商将应用程序和基线跟踪提供给用户。 用户根据仍然具有产生跟踪事件(共同形成“实时”跟踪)的跟踪元素的应用程序实时运行应用程序以产生“实时跟踪”。 比较器比较基线和实时迹线。 如果迹线在彼此的预定范围内,则用户具有软件正确操作的保证级别。 本文还包括其它实施例。

    System and Method for Correct Execution of Software
    66.
    发明申请
    System and Method for Correct Execution of Software 有权
    软件正确执行的系统和方法

    公开(公告)号:US20140095936A1

    公开(公告)日:2014-04-03

    申请号:US13631317

    申请日:2012-09-28

    IPC分类号: G06F11/36

    摘要: In an embodiment of the invention an application provider may include “tracing elements” in a target software application. While working with the application the trace elements are detected and provide a “baseline trace” indicating proper application execution. The provider then supplies the application, which still includes the trace elements, and the baseline trace to a user. The user operates the application to produce a “real-time trace” based on the application still having trace elements that produce trace events. A comparator then compares the baseline and real-time traces. If the traces are within a pre-determined range of each other the user has a level of assurance the software is operating correctly. If the level of assurance is low, an embodiment may trigger a hardware interrupt or similar event to prevent further execution of software. Other embodiments are described herein.

    摘要翻译: 在本发明的实施例中,应用提供者可以在目标软件应用中包括“跟踪元素”。 在处理应用程序时,将检测到跟踪元素,并提供一个“基线跟踪”,指示正确的应用程序执行。 然后,提供商将仍然包含跟踪元素的应用程序和基准跟踪提供给用户。 用户根据仍然具有产生跟踪事件的微量元素的应用来操作应用以产生“实时跟踪”。 比较器然后比较基线和实时迹线。 如果迹线在彼此的预定范围内,则用户具有软件正确操作的保证级别。 如果保证级别低,则实施例可以触发硬件中断或类似事件以防止进一步执行软件。 本文描述了其它实施例。

    Power Management for Wireless Networks
    67.
    发明申请
    Power Management for Wireless Networks 审中-公开
    无线网络电源管理

    公开(公告)号:US20140086129A1

    公开(公告)日:2014-03-27

    申请号:US14094666

    申请日:2013-12-02

    IPC分类号: H04W52/02

    摘要: Embodiments provide techniques for device power management in wireless networks. For instance, an apparatus may include a power management module, and a transceiver module. The power management module determines a beacon interval and a wakeup interval. The transceiver module to send a transmission to one or more remote devices that includes the beacon interval and the wakeup interval. The beacon interval indicates a time interval between consecutive beacon transmissions of the apparatus, and the wakeup interval indicates a time interval between when the apparatus receives two consecutive beacons from a peer device.

    摘要翻译: 实施例提供了无线网络中设备电源管理的技术。 例如,设备可以包括电源管理模块和收发器模块。 电源管理模块确定信标间隔和唤醒间隔。 收发器模块向包括信标间隔和唤醒间隔的一个或多个远程设备发送传输。 信标间隔指示设备的连续信标传输之间的时间间隔,并且唤醒间隔指示设备从对等设备接收两个连续的信标之间的时间间隔。

    METHOD OF ANONYMOUS ENTITY AUTHENTICATION USING GROUP-BASED ANONYMOUS SIGNATURES
    68.
    发明申请
    METHOD OF ANONYMOUS ENTITY AUTHENTICATION USING GROUP-BASED ANONYMOUS SIGNATURES 有权
    使用基于组的匿名签名进行匿名实体验证的方法

    公开(公告)号:US20120284518A1

    公开(公告)日:2012-11-08

    申请号:US13100017

    申请日:2011-05-03

    IPC分类号: H04L9/32

    摘要: Methods for anonymous authentication and key exchange are presented. In one embodiment, a method includes initiating a two-way mutual authentication between a first entity and a second entity. The first entity remains anonymous to the second entity after performing the authentication. The method also includes establishing a mutually shared session key for use in secure communication between the entities, wherein the initiating and the establishing are in conjunction with direct anonymous attestation (DAA).

    摘要翻译: 提出匿名认证和密钥交换的方法。 在一个实施例中,一种方法包括在第一实体和第二实体之间发起双向相互认证。 执行验证后,第一个实体对第二个实体保持匿名。 该方法还包括建立相互共享的会话密钥,用于实体之间的安全通信,其中启动和建立结合直接匿名认证(DAA)。

    END-TO-END NETWORK SECURITY WITH TRAFFIC VISIBILITY
    70.
    发明申请
    END-TO-END NETWORK SECURITY WITH TRAFFIC VISIBILITY 审中-公开
    具有交通可见性的端到端网络安全

    公开(公告)号:US20090119510A1

    公开(公告)日:2009-05-07

    申请号:US11935783

    申请日:2007-11-06

    IPC分类号: H04L9/32

    摘要: End-to-end security between clients and a server, and traffic visibility to intermediate network devices, achieved through combined mode, single pass encryption and authentication using two keys is disclosed. In various embodiments, a combined encryption-authentication unit includes a cipher unit and an authentication unit coupled in parallel to the cipher unit, and generates an authentication tag using an authentication key in parallel with the generation of the cipher text using an encryption key, where the authentication and encryption key have different key values. In various embodiments, the cipher unit operates in AES counter mode, and the authentication unit operates in parallel, in AES-GMAC mode Using a two key, single pass combined mode algorithm preserves network performance using a limited number of HW gates, while allowing an intermediate device access to the encryption key for deciphering the data, without providing that device the ability to compromise data integrity, which is preserved between the end to end devices.

    摘要翻译: 公开了客户机与服务器之间的端到端安全性,以及通过组合模式,单程加密和使用两个密钥的认证实现的对中间网络设备的流量可见性。 在各种实施例中,组合加密认证单元包括与密码单元并行耦合的密码单元和认证单元,并且使用加密密钥与密文生成并行地使用认证密钥生成认证标签,其中 认证和加密密钥具有不同的密钥值。 在各种实施例中,密码单元以AES计数器模式运行,并且认证单元以AES-GMAC模式并行操作。使用双键单通组合模式算法使用有限数量的HW门保留网络性能,同时允许 中间设备访问用于解密数据的加密密钥,而不提供该设备损害数据完整性的能力,这在端到端设备之间保留。