会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Method and apparatus to perform secure registration of femto access points
    • 执行毫微微接入点安全注册的方法和装置
    • US08886164B2
    • 2014-11-11
    • US12625047
    • 2009-11-24
    • Anand PalanigounderArungundram C. MahendranLakshminath R. Dondeti
    • Anand PalanigounderArungundram C. MahendranLakshminath R. Dondeti
    • H04M1/68H04W12/06H04W84/04H04L29/06
    • H04W12/06H04L63/0823H04L65/1073H04W84/045
    • Methods, apparatus, and systems to perform secure registration of a femto access point for trusted access to an operator-controlled network element. Method steps include establishing a security association for at least one said femto access point, making a request using the security association to an operator-controlled network element, which requests a secure registration credential from an authorizing component. The operator-controlled network element constructs a secure registration credential and sends the secure registration credential to the requesting femto access point, thus authorizing trusted access by the requesting femto access point to access operator-controlled network elements. Embodiments include establishing a security association via an IPsec security association received from a security gateway which is within an operator-controlled domain and using an operator-controlled database of IPsec inner addresses. In some embodiments the femto access point conducts message exchanges using one or more IMS protocols and components, including call session control function elements, which elements in turn may authorize a femto access point within the IMS domain, may or access non-IMS network elements for authorization.
    • 用于执行毫微微接入点的安全注册的方法,装置和系统,用于对操作者控制的网络元件的可信访问。 方法步骤包括为至少一个所述毫微微接入点建立安全关联,使用安全关联向来自授权组件请求安全注册凭证的操作员控制的网络元件进行请求。 运营商控制的网络元件构造安全注册凭证,并将安全注册凭证发送到请求的毫微微接入点,从而授权请求的毫微微接入点的可信访问访问运营商控制的网络元件。 实施例包括通过从操作者控制的域内的安全网关接收的IPsec安全关联来建立安全关联,并且使用操作者控制的IPsec内部地址的数据库。 在一些实施例中,毫微微接入点使用一个或多个IMS协议和组件进行消息交换,所述IMS协议和组件包括呼叫会话控制功能元件,哪些元件又可以授权IMS域内的毫微微接入点,或可以访问非IMS网络元件 授权
    • 2. 发明申请
    • METHOD AND APPARATUS TO PERFORM SECURE REGISTRATION OF FEMTO ACCESS POINTS
    • 执行有限接入点安全注册的方法和装置
    • US20100130171A1
    • 2010-05-27
    • US12625047
    • 2009-11-24
    • Anand PalanigounderArungundram C. MahendranLakshminath R. Dondeti
    • Anand PalanigounderArungundram C. MahendranLakshminath R. Dondeti
    • H04W12/00
    • H04W12/06H04L63/0823H04L65/1073H04W84/045
    • Methods, apparatus, and systems to perform secure registration of a femto access point for trusted access to an operator-controlled network element. Method steps include establishing a security association for at least one said femto access point, making a request using the security association to an operator-controlled network element, which requests a secure registration credential from an authorizing component. The operator-controlled network element constructs a secure registration credential and sends the secure registration credential to the requesting femto access point, thus authorizing trusted access by the requesting femto access point to access operator-controlled network elements. Embodiments include establishing a security association via an IPsec security association received from a security gateway which is within an operator-controlled domain and using an operator-controlled database of IPsec inner addresses. In some embodiments the femto access point conducts message exchanges using one or more IMS protocols and components, including call session control function elements, which elements in turn may authorize a femto access point within the IMS domain, may or access non-IMS network elements for authorization.
    • 用于执行毫微微接入点的安全注册的方法,装置和系统,用于对操作者控制的网络元件的可信访问。 方法步骤包括为至少一个所述毫微微接入点建立安全关联,使用安全关联向来自授权组件请求安全注册凭证的操作员控制的网络元件进行请求。 运营商控制的网络元件构造安全注册凭证,并将安全注册凭证发送到请求的毫微微接入点,从而授权请求的毫微微接入点的可信访问访问运营商控制的网络元件。 实施例包括通过从操作者控制的域内的安全网关接收的IPsec安全关联来建立安全关联,并且使用操作者控制的IPsec内部地址的数据库。 在一些实施例中,毫微微接入点使用一个或多个IMS协议和组件进行消息交换,所述IMS协议和组件包括呼叫会话控制功能元件,哪些元件又可以授权IMS域内的毫微微接入点,或可以访问非IMS网络元件 授权
    • 7. 发明申请
    • SYSTEMS AND METHODS FOR DATA AUTHORIZATION IN DISTRIBUTED STORAGE NETWORKS
    • 在分布式存储网络中进行数据授权的系统和方法
    • US20100125670A1
    • 2010-05-20
    • US12416046
    • 2009-03-31
    • Lakshminath R. DondetiRanjith S. JayaramVidya Narayanan
    • Lakshminath R. DondetiRanjith S. JayaramVidya Narayanan
    • G06F15/173
    • H04L67/104H04L63/0823H04L67/1065H04L67/1076
    • Storage authorization and access control of data stored on a peer-to-peer overlay network is provided. A publishing node stores data on a storage node in the overlay network. The publishing node is adapted to facilitate data storage authorization by generating a resource identifier as a function of a usage string associated with a data type to be stored. A storage request is generated that includes the resource identifier and data to be stored. The storage request may be sent to the storage node. The storage device receives the storage request sent by a publishing node, including a resource identifier and data to be stored. Independent storage authorization is performed by the storage node at an overlay level by verifying the resource identifier. The data in the storage request is stored at the storage node if the resource identifier is successfully verified.
    • 提供存储在对等覆盖网络上的数据的存储授权和访问控制。 发布节点将数据存储在覆盖网络中的存储节点上。 发布节点适于通过根据与要存储的数据类型相关联的使用字符串生成资源标识符来促进数据存储授权。 生成包含要存储的资源标识符和数据的存储请求。 存储请求可以被发送到存储节点。 存储装置接收由发布节点发送的存储请求,包括资源标识符和要存储的数据。 通过验证资源标识符,通过存储节点在覆盖级别执行独立存储授权。 如果资源标识符被成功验证,则存储请求中的数据被存储在存储节点处。
    • 8. 发明授权
    • Dual encryption protocol for scalable secure group communication
    • 双重加密协议,用于可扩展的安全组通信
    • US06263435B1
    • 2001-07-17
    • US09401450
    • 1999-09-22
    • Lakshminath R. DondetiSarit MukherjeeAshok Samal
    • Lakshminath R. DondetiSarit MukherjeeAshok Samal
    • H04L900
    • H04L9/0836H04L9/0822H04L9/0891H04L63/0442H04L63/064H04L63/065H04L63/0823H04L63/104
    • A logical tree structure and method for managing membership in a multicast group provides scalability and security from internal attacks. The structure defines key groups and subgroups, with each subgroup having a subgroup manager. Dual encryption allows the sender of the multicast data to manage distribution of a first set of encryption keys whereas the individual subgroup managers manage the distribution of a second set of encryption keys. The two key sets allow the sender to delegate much of the group management responsibilities without compromising security because a key from each set is required to access the multicast data. Security is further maintained via a method in which subgroup managers can be either member subgroup managers or participant subgroup managers. Access to both keys is provided to member subgroup managers whereas access to only one key is provided to participant subgroup managers. Nodes can be added without the need to generate a new encryption key at the top level which provides improved scalability.
    • 用于管理多播组中的成员资格的逻辑树结构和方法提供来自内部攻击的可扩展性和安全性。 该结构定义了关键组和子组,每个子组都有一个子组管理器。 双重加密允许多播数据的发送者管理第一组加密密钥的分发,而各个子组管理器管理第二组加密密钥的分发。 两个密钥集允许发送方委托大量的组管理职责,而不会影响安全性,因为需要每组密钥来访问组播数据。 通过子组管理员可以是成员子组管理员或参与者子组管理器的方法进一步维护安全性。 向成员子组管理员提供对这两个密钥的访问,而只向一个密钥的访问提供给参与者子组管理器。 可以添加节点,而无需在顶层生成新的加密密钥,从而提供改进的可扩展性。