摘要:
Disclosed is a method of establishing a secured peer-to-peer communication between two communications devices, each communications device having stored a respective set of previously established security associations with other communications devices. The method comprises determining whether the two communications devices have a common security association in their respective sets of established security associations; if the devices have determined a common security association, protecting the communications link between the two communications device based on the determined common security association; otherwise establishing a new security association between the two communications devices, and protecting the communications link based on the new security association; and extending the sets of previously established security associations of the two communications devices to the corresponding other exchanging corresponding key data.
摘要:
In a communication system, an authentication ciphering offset (ACO) is generated as a function of one or more parameters, wherein at least one of the one or more parameters is derived from earlier-computed values of the ACO. This enables each device to avoid generating an ACO value that is out of synchronization with a counterpart ACO value generated in another communication device.
摘要:
The present invention includes a method and device for calculating an encryption key, K′c, for use in the initialization of an encryption algorithm. The present invention discloses a method for calculating the encryption key, K′c(x), by obtaining a ciphering key, Kc(x), determining a maximum ciphering key length, L, based on the requirements of the two devices wishing to communicate, and determining a maximum usable encryption key length, Lmax. The ciphering key, Kc(x), is then manipulated through an addition function or an exclusively-or function with a polynomial g1(x). The result is multiplied with a polynomial g2(x), which spreads the starting points of said encryption key, K′c(x). The encryption key is thus determined according to K′c(x)=g2(L)(x)[Kc(x) mod g1(L)(x)]. The method of calculating the encryption key, K′c, ensures that a maximum ciphering key length is not exceeded. In addition, the method provides new possible starting points each time a new encryption key, K′c, is generated.
摘要翻译:本发明包括用于计算加密密钥的方法和装置,用于加密算法的初始化。 本发明公开了一种通过获得加密密钥K C(x)来计算加密密钥K'C(x)的方法,确定最大加密密钥 长度L,基于希望通信的两个设备的要求,以及确定最大可用加密密钥长度L最大值。 然后,通过加法函数或具有多项式g 1(x)的排他或函数来操纵加密密钥K(x)。 结果乘以扩展所述加密密钥K'C(x)的起始点的多项式g <2>(x)。 因此,根据K'(x)= g 2(L)(x)[K C(C))确定加密密钥 (x)mod g <1>(L)(x)]。 计算加密密钥的方法K'确保不超过最大加密密钥长度。 另外,每当生成新的加密密钥K' SUB>时,该方法提供新的可能的起始点。
摘要:
A method for maintaining synchronization between a transmitter and a receiver is disclosed. The method offsets time drift which causes a degradation in the quality of communication between a transmitter and a receiver. The method comprises using a first sampling time to obtain a first sequence of hard decision symbols for decoding contents of a portion of a received packet, switching to a second sampling time upon degradation in a reliability of the symbols, and using the second sampling time to obtain a second sequence of hard decision symbols for decoding contents of a remaining portion of the received packet.
摘要:
A method and apparatus for improving bit error performance within a hard decision radio interface processing environment is provided, whereby a sampling unit collects a number of samples per channel symbol of an input signal to generate a number of sampling streams, and a correlator computes a correlation value of each of the number of sampling streams with a predetermined bit sequence. The correlation values are fed into a threshold comparator which utilizes a variable threshold value to generate threshold comparator values or trigger output values. By examining a set of trigger output values, a phase decision unit determines the optimum sampling timing or sampling phase.
摘要:
A telecommunications system and method for performing error detection on received data packets and error correction on only those data packets that were received in error without the need for retransmission of the data packets or parity checking bits. At the transmitter, the complete data packet is divided into a number of data units (DUs). The DUs are encoded for both error detection and error correction. Both the error correction and error detection parity check bits are separately combined into one or more blocks. Thereafter, the DUs and the block(s) containing the combined parity check bits are transmitted to the receiver. If the receiver determines that a received DU does not contain any errors, the error correction parity check bits for that DU are generated and their effect on the combined error correction parity check bits removed. Thereafter, the remaining error correction parity check bits, which now only contains information about the DUs actually in error, are used to correct the erroneous DUs.
摘要:
To facilitate the demounting of a chain (3) from a chainsaw, the saw has a lever arm preferably in the form of hinged cover (11) arranged to displace the sprocket (15) towards the guide bar (2) the other upon opening of the cover (11). Upon closing the cover (11), the sprocket (15) is displaced in the opposite direction to pre-tension the chain (3). The sprocket (15, 115) may be driven over a gear transmission (27, 127), which when the chain (3, 103) is running at ordinary cutting speed uses resulting forces to automatically tension the chain (3, 103) by displacing the sprocket (15, 115) away from the guide bar (2, 102). A ratchet mechanism (34) may be provided to maintain the chain tension upon reduction of the chain speed by preventing the sprocket (15) from moving toward the guide bar (2).Alternatively, a mechanism for automatically tensioning the chain (3, 238) of a chainsaw includes a driving inner sprocket (76, 201), and an outer ring member (77, 204) surrounding the inner sprocket (76, 201). A spring (64, 87, 228) may be provided for assisting the ratchet mechanism or as a substitute therefore.
摘要:
A dynamic carrier selection method and system permit units operating on a first carrier to change to a second carrier when performance of the first carrier becomes unacceptable. Carrier quality measurements are taken in which carrier quality is a function of interference and multi-path fading and carrier-signal strength. The carriers are ranked according to measured quality in a carrier candidate list. The carrier candidate list is used to permit units to determine which carrier they should switch to when the carrier there currently operating on is determined to have unacceptable performance. Carrier measurements are retaken in response to a carrier change by unit or a predetermined time period having elapsed.
摘要:
A dynamic carrier selection method and system permit units operating on a first carrier to change to a second carrier when performance of the first carrier becomes unacceptable. Carrier quality measurements are taken in which carrier quality is a function of interference and multi-path fading and carrier-signal strength. The carriers are ranked according to measured quality in a carrier candidate list. The carrier candidate list is used to permit units to determine which carrier they should switch to when the carrier there currently operating on is determined to have unacceptable performance. Carrier measurements are retaken in response to a carrier change by unit or a predetermined time period having elapsed.
摘要:
A load carrier for coupling to a vehicle. The load carrier includes a loading frame and a supporting arch that extends substantially upwardly from and transversely to the loading frame. The supporting arch is divisible into first and second arch parts, each of which arch parts is pivotally coupled to the loading frame such that, when divided, each of the first and second arch parts is configured to be pivoted down to a storage position lying substantially level with the loading frame. The arch parts are configured to be interlocked to each other into an in-use position, in which the first and said second arch parts substantially alone form the supporting arch.