会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • Method and apparatus for communication between wireless telecommunications networks of different technology types
    • 用于不同技术类型的无线电信网络之间通信的方法和装置
    • US20090245200A1
    • 2009-10-01
    • US12080015
    • 2008-03-31
    • Violeta CakulevMichael Francis DolanSubramanian VasudevanLily H. Zhu
    • Violeta CakulevMichael Francis DolanSubramanian VasudevanLily H. Zhu
    • H04Q7/00
    • H04W36/14H04W36/0066H04W36/08H04W92/20
    • For handover between wireless telecommunications networks of different technology types, an air interface is set up between a first node 4 included in a network of a first technology type and a second node 10 included in a network of a second different technology type. Signaling messaging, in accordance with the second technology type, is related to handover of a mobile terminal from the network of the first technology type to the network of the second technology type. The signaling messaging is encapsulated in a container for transmission over the signaling interface. An identifier is associated with the container to indicate that it encapsulates the signaling messaging. When the identifier is detected at the first node, the container is sent over the interface to the second node. In one method in accordance with the invention, the first technology type is WiMAX and the identifier is a special service flow identifier. This may be detected at an Access Services Network Gateway (ASN GW), for example. A method in accordance with the invention thus permits the use of logical radio channels for encapsulating inter-technology signaling.
    • 对于不同技术类型的无线电信网络之间的切换,在包括在第一技术类型的网络中的第一节点4和第二不同技术类型的网络中包括的第二节点10之间建立空中接口。 根据第二技术类型的信令消息传送涉及移动终端从第一技术类型的网络到第二技术类型的网络的切换。 信令消息被封装在容器中,用于通过信令接口进行传输。 标识符与容器相关联,以指示其封装信令消息。 当在第一节点处检测到标识符时,容器通过接口发送到第二节点。 在根据本发明的一种方法中,第一种技术类型是WiMAX,标识符是特殊业务流标识符。 例如,这可以在接入服务网络网关(ASN GW)处检测。 因此,根据本发明的方法允许使用逻辑无线电信道来封装技术间信令。
    • 2. 发明授权
    • Method and apparatus for communication between wireless telecommunications networks of different technology types
    • 用于不同技术类型的无线电信网络之间通信的方法和装置
    • US08804662B2
    • 2014-08-12
    • US12935852
    • 2009-03-13
    • Violeta CakulevMichael Francis DolanSubramanian VasudevanLily H. Zhu
    • Violeta CakulevMichael Francis DolanSubramanian VasudevanLily H. Zhu
    • H04W4/00
    • H04W36/14H04W36/0066H04W36/08H04W92/20
    • For handover between wireless telecommunications networks of different technology types, an air interface is set up between a first node 4 included in a network of a first technology type and a second node 10 included in a network of a second different technology type. Signaling messaging, in accordance with the second technology type, is related to handover of a mobile terminal from the network of the first technology type to the network of the second technology type. The signaling messaging is encapsulated in a container for transmission over the signaling interface. An identifier is associated with the container to indicate that it encapsulates the signaling messaging. When the identifier is detected at the first node, the container is sent over the interface to the second node. In one method in accordance with the invention, the first technology type is WiMAX and the identifier is a special service flow identifier. This may be detected at an Access Services Network Gateway (ASN GW), for example. A method in accordance with the invention thus permits the use of logical radio channels for encapsulating inter-technology signaling.
    • 对于不同技术类型的无线电信网络之间的切换,在包括在第一技术类型的网络中的第一节点4和第二不同技术类型的网络中包括的第二节点10之间建立空中接口。 根据第二技术类型的信令消息传送涉及移动终端从第一技术类型的网络到第二技术类型的网络的切换。 信令消息被封装在容器中,用于通过信令接口进行传输。 标识符与容器相关联,以指示其封装信令消息。 当在第一节点处检测到标识符时,容器通过接口发送到第二节点。 在根据本发明的一种方法中,第一种技术类型是WiMAX,标识符是特殊业务流标识符。 例如,这可以在接入服务网络网关(ASN GW)处检测。 因此,根据本发明的方法允许使用逻辑无线电信道来封装技术间信令。
    • 3. 发明申请
    • METHOD AND APPARATUS FOR COMMUNICATION BETWEEN WIRELESS TELECOMMUNICATIONS NETWORKS OF DIFFERENT TECHNOLOGY TYPES
    • 不同技术类型的无线电信网络之间的通信方法与装置
    • US20110188469A1
    • 2011-08-04
    • US12935852
    • 2009-03-13
    • Violeta CakulevMichael Francis DolanSubramanian VasudevanLily H. Zhu
    • Violeta CakulevMichael Francis DolanSubramanian VasudevanLily H. Zhu
    • H04W36/14
    • H04W36/14H04W36/0066H04W36/08H04W92/20
    • For handover between wireless telecommunications networks of different technology types, an air interface is set up between a first node 4 included in a network of a first technology type and a second node 10 included in a network of a second different technology type. Signaling messaging, in accordance with the second technology type, is related to handover of a mobile terminal from the network of the first technology type to the network of the second technology type. The signaling messaging is encapsulated in a container for transmission over the signaling interface. An identifier is associated with the container to indicate that it encapsulates the signaling messaging. When the identifier is detected at the first node, the container is sent over the interface to the second node. In one method in accordance with the invention, the first technology type is WiMAX and the identifier is a special service flow identifier. This may be detected at an Access Services Network Gateway (ASN GW), for example. A method in accordance with the invention thus permits the use of logical radio channels for encapsulating inter-technology signaling.
    • 对于不同技术类型的无线电信网络之间的切换,在包括在第一技术类型的网络中的第一节点4和第二不同技术类型的网络中包括的第二节点10之间建立空中接口。 根据第二技术类型的信令消息传送涉及移动终端从第一技术类型的网络到第二技术类型的网络的切换。 信令消息被封装在容器中,用于通过信令接口进行传输。 标识符与容器相关联,以指示其封装信令消息。 当在第一节点处检测到标识符时,容器通过接口发送到第二节点。 在根据本发明的一种方法中,第一种技术类型是WiMAX,标识符是特殊业务流标识符。 例如,这可以在接入服务网络网关(ASN GW)处检测。 因此,根据本发明的方法允许使用逻辑无线电信道来封装技术间信令。
    • 5. 发明授权
    • Manipulation and restoration of authentication challenge parameters in network authentication procedures
    • 网络认证过程中的认证挑战参数的操作和恢复
    • US09537663B2
    • 2017-01-03
    • US13528802
    • 2012-06-20
    • Semyon MizikovskyIoannis BroustisVioleta Cakulev
    • Semyon MizikovskyIoannis BroustisVioleta Cakulev
    • H04L9/32H04W12/06H04L29/06
    • H04L9/3271H04L63/0853H04W12/06
    • A challenge manipulation and restoration capability is provided for use during network authentication. A mobile device (MD) and a subscriber server (SS) each have provisioned therein a binding key (B-KEY) that is associated with a subscriber identity of a network authentication module (NAM) of the MD. The SS obtains an authentication vector (AV) in response to a request from a Radio Access Network (RAN) when the MD attempts to attach to the RAN. The AV includes an original authentication challenge parameter (ACP). The SS encrypts the original ACP based on its B-KEY, and updates the AV by replacing the original ACP with the encrypted ACP. The MD receives the encrypted ACP, and decrypts the encrypted ACP based on its B-KEY to recover the original ACP. The MD provides the original ACP to the NAM for use in computing an authentication response for validation by the RAN.
    • 提供在网络认证期间使用的挑战操纵和恢复能力。 移动设备(MD)和订户服务器(SS)各自已经提供了与MD的网络认证模块(NAM)的订户身份相关联的绑定密钥(B-KEY)。 当MD尝试附加到RAN时,SS响应于来自无线电接入网络(RAN)的请求而获得认证向量(AV)。 AV包括原始认证挑战参数(ACP)。 SS根据其B-KEY加密原始ACP,并通过用加密的ACP替换原始ACP来更新AV。 MD接收加密的ACP,并根据其B-KEY对加密的ACP进行解密,以恢复原来的ACP。 MD将原始ACP提供给NAM,用于计算用于RAN的验证的认证响应。
    • 6. 发明授权
    • Secure group messaging
    • 安全群组讯息
    • US09166778B2
    • 2015-10-20
    • US13548835
    • 2012-07-13
    • Ganapathy S. SundaramIoannis BroustisVioleta Cakulev
    • Ganapathy S. SundaramIoannis BroustisVioleta Cakulev
    • H04L9/08H04L9/30
    • H04L9/08H04L9/0833H04L9/0847H04L9/3073
    • A method for securing at least one message transferred in a communication system from a first computing device to a second computing device in a peer-to-peer manner. At the first computing device, an identity based authenticated key exchange session is established with a third computing device operating as a peer authenticator. The identity based authenticated key exchange session has an identity based authenticated session key associated therewith. The first computing device obtains from the third computing device a random key component of the second computing device, wherein the random key component of the second computing device is encrypted by the third computing device using the identity based authenticated session key prior to sending the random key component of the second computing device to the first computing device. A peer-to-peer messaging key is computed at the first computing device using the random key component of the second computing device.
    • 一种用于将通信系统中传送的至少一个消息从第一计算设备以对等方式保护到第二计算设备的方法。 在第一计算设备处,基于身份的认证密钥交换会话与作为对等体认证者操作的第三计算设备建立。 基于身份的认证密钥交换会话具有与其相关联的基于身份的经认证的会话密钥。 第一计算设备从第三计算设备获得第二计算设备的随机密钥组件,其中第二计算设备的随机密钥组件在发送随机密钥之前由第三计算设备使用基于身份的认证会话密钥加密 第二计算设备的组件到第一计算设备。 使用第二计算设备的随机密钥组件在第一计算设备处计算对等消息传递密钥。
    • 7. 发明授权
    • Secure key management in conferencing system
    • 会议系统中的安全密钥管理
    • US09049024B2
    • 2015-06-02
    • US13596823
    • 2012-08-28
    • Ganapathy S. SundaramVioleta Cakulev
    • Ganapathy S. SundaramVioleta Cakulev
    • H04M3/42H04L9/30H04L9/08H04L29/06
    • H04L9/3073H04L9/0825H04L9/0833H04L9/0847H04L63/306H04L2209/80
    • A method for managing a conference between two or more parties comprises an identity based authenticated key exchange between a conference management element and each of the two or more parties seeking to participate in the conference. Messages exchanged between the conference management element and the two or more parties are encrypted based on respective identities of recipients of the messages. The method comprises the conference management element receiving from each party a random group key component. The random group key component is computed by each party based on a random number used by the party during the key authentication operation and random key components computed by a subset of others of the two or more parties seeking to participate in the conference. The conference management element sends to each party the random group key components computed by the parties such that each party can compute the same group key.
    • 一种用于在两个或多个方之间管理会议的方法包括会议管理元件与寻求参加会议的两个或多个方中的每个之间的基于身份的认证密钥交换。 在会议管理单元与两个或多个会话之间交换的消息基于消息的接收者的相应身份被加密。 该方法包括从各方接收随机组密钥分量的会议管理单元。 随机组密钥分量由各方根据在密钥认证操作期间由该方使用的随机数和由寻求参与会议的两个或多个方的其他人的子集计算的随机密钥分量来计算。 会议管理单元向各方发送由各方计算的随机组密钥分量,使得各方可以计算相同的组密钥。