会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • WIMAX R6 MANAGEMENT PROTOCOL
    • WIMAX R6管理协议
    • US20120207116A1
    • 2012-08-16
    • US13454740
    • 2012-04-24
    • Zhihong ChenRandy Kuang
    • Zhihong ChenRandy Kuang
    • H04W40/00
    • H04L69/08H04L43/0805H04L43/10H04L43/18H04W92/12H04W92/14
    • Within an access services network (ASN) operable for providing wireless access services to an access terminal and including a base station communicatively coupled to an ASN gateway, a new management protocol is provided for managing the R6 communications. The protocol includes a common set of message types that may be used for data plane, control plane, and individual peer applications communicating over the control plane. In one embodiment, a keepalive procedure or process is used to manage the R6 interface between the ASN gateway and the base station by sending keepalive messages through an established data path tunnel and maintaining one or more keepalive timers.
    • 在可操作用于向接入终端提供无线接入服务并且包括通信地耦合到ASN网关的基站的接入服务网络(ASN)内,提供用于管理R6通信的新管理协议。 该协议包括可用于数据平面,控制平面和通过控制平面进行通信的各个对等应用的通用消息类型集合。 在一个实施例中,通过在建立的数据路径隧道发送保持性消息并维护一个或多个保持活动定时器,使用保持活动过程或过程来管理ASN网关和基站之间的R6接口。
    • 2. 发明授权
    • WiMAX R6 management protocol
    • WiMAX R6管理协议
    • US08184644B1
    • 2012-05-22
    • US11712347
    • 2007-02-28
    • Zhihong ChenRandy Kuang
    • Zhihong ChenRandy Kuang
    • H04L12/28
    • H04L69/08H04L43/0805H04L43/10H04L43/18H04W92/12H04W92/14
    • Within an access services network (ASN) operable for providing wireless access services to an access terminal and including a base station communicatively coupled to an ASN gateway, a new management protocol is provided for managing the R6 communications. The protocol includes a common set of message types that may be used for data plane, control plane, and individual peer applications communicating over the control plane. In one embodiment, a keepalive procedure or process is used to manage the R6 interface between the ASN gateway and the base station by sending keepalive messages through an established data path tunnel and maintaining one or more keepalive timers.
    • 在可操作用于向接入终端提供无线接入服务并且包括通信地耦合到ASN网关的基站的接入服务网络(ASN)内,提供用于管理R6通信的新管理协议。 该协议包括可用于数据平面,控制平面和通过控制平面进行通信的各个对等应用的通用消息类型集合。 在一个实施例中,通过在建立的数据路径隧道发送保持性消息并维护一个或多个保持活动定时器,使用保持活动过程或过程来管理ASN网关和基站之间的R6接口。
    • 3. 发明授权
    • WiMAX R6 management protocol
    • WiMAX R6管理协议
    • US08718076B2
    • 2014-05-06
    • US13454740
    • 2012-04-24
    • Zhihong ChenRandy Kuang
    • Zhihong ChenRandy Kuang
    • H04L12/28
    • H04L69/08H04L43/0805H04L43/10H04L43/18H04W92/12H04W92/14
    • Within an access services network (ASN) operable for providing wireless access services to an access terminal and including a base station communicatively coupled to an ASN gateway, a new management protocol is provided for managing the R6 communications. The protocol includes a common set of message types that may be used for data plane, control plane, and individual peer applications communicating over the control plane. In one embodiment, a keepalive procedure or process is used to manage the R6 interface between the ASN gateway and the base station by sending keepalive messages through an established data path tunnel and maintaining one or more keepalive timers.
    • 在可操作用于向接入终端提供无线接入服务并且包括通信地耦合到ASN网关的基站的接入服务网络(ASN)内,提供用于管理R6通信的新管理协议。 该协议包括可用于数据平面,控制平面和通过控制平面进行通信的各个对等应用的通用消息类型集合。 在一个实施例中,通过在建立的数据路径隧道发送保持性消息并维护一个或多个保持活动定时器,使用保持活动过程或过程来管理ASN网关和基站之间的R6接口。
    • 5. 发明申请
    • METHODS AND SYSTEMS FOR COMMUNICATING OVER A QUANTUM CHANNEL
    • 用于在量子通道上进行通信的方法和系统
    • US20100239092A1
    • 2010-09-23
    • US12790937
    • 2010-05-31
    • Randy Kuang
    • Randy Kuang
    • H04L9/08
    • H04L9/0855
    • Alice generates a sequence of key bits forming an initial cryptographic key. Alice then uses the sequence of key bits and a sequence of cipher bits to control respective control parameters of a quantum encoding process applied to a sequence of quantum pulses, where the sequence of cipher bits used is known to Bob. Alice then releases the encoded pulses towards Bob over a quantum channel. Bob uses the previously agreed-upon sequence of cipher bits to control a control parameter, such as the quantum basis, of a quantum detection process applied to the pulses received from Alice, thus producing a detection outcome for each received pulse. Bob then derives a final cryptographic key from the detection outcomes. Because the cipher bits used to select the quantum bases used by both Alice and Bob are known by both parties, the method allows the final cryptographic key to be distributed with full basis alignment compared to 50% for BB84, thus allowing efficient quantum key distribution over multiple hops.
    • 爱丽丝生成形成初始加密密钥的密钥位序列。 然后,爱丽丝使用密钥比特序列和密码比特序列来控制应用于量子脉冲序列的量子编码过程的相应控制参数,其中使用的密码比特序列对于Bob是已知的。 爱丽丝然后在量子通道上向Bob释放编码的脉冲。 Bob使用先前商定的密码比特序列来控制应用于从Alice接收的脉冲的量子检测过程的控制参数(例如量子基础),从而为每个接收到的脉冲产生检测结果。 然后,Bob从检测结果中得到最终的加密密钥。 由于用于选择Alice和Bob所使用的量子库的密码比特由双方都知道,所以该方法允许最终加密密钥以全基对齐方式分布,而对于BB84为50%,从而允许有效的量子密钥分配 多跳
    • 6. 发明授权
    • Technique for transferring information in a passive optical network
    • 在无源光网络中传输信息的技术
    • US07272315B1
    • 2007-09-18
    • US10364401
    • 2003-02-12
    • How Kee AuRandy KuangGuo Qiang Wang
    • How Kee AuRandy KuangGuo Qiang Wang
    • H04B10/20H04J14/00
    • H04Q11/0062H04J3/14H04J3/1694H04Q11/0067H04Q2011/0064H04Q2011/0079
    • A technique for transferring information in a passive optical network is disclosed. The technique may be realized as a method for transferring information in a passive optical network having a plurality of network nodes. The method comprises transmitting a downstream signal during a control/management time slot of a periodic frame having N control/management time slots and M data time slots, wherein the downstream signal includes an identifier of a service node in the network, wherein each of the N control/management time slots corresponds to a respective one of N possible service nodes in the network. The method also comprises responding to the downstream signal with an upstream signal during the control/management time slot of the periodic frame. The method further comprises allocating at least one of the M data time slots of the periodic frame to the service node based at least in part upon the upstream signal.
    • 公开了一种用于在无源光网络中传送信息的技术。 该技术可以被实现为用于在具有多个网络节点的无源光网络中传送信息的方法。 该方法包括在具有N个控制/管理时隙和M个数据时隙的周期性帧的控制/管理时隙期间发送下行信号,其中下行信号包括网络中的业务节点的标识符,其中, N个控制/管理时隙对应于网络中的N个可能的服务节点中的相应一个。 该方法还包括在周期性帧的控制/管理时隙期间利用上行信号响应下行信号。 该方法还包括至少部分地基于上游信号将周期性帧的M个数据时隙中的至少一个分配给服务节点。
    • 7. 发明申请
    • Double phase encoding quantum key distribution
    • 双相编码量子密钥分配
    • US20070076887A1
    • 2007-04-05
    • US11241164
    • 2005-09-30
    • Randy KuangGuo WangJohn Stankus
    • Randy KuangGuo WangJohn Stankus
    • H04L9/00
    • H04L9/0858
    • A laser pulse representing a bit of a quantum key is split into two pulses. In addition to known round trip phase encoding schema, a secret phase key is modulated into one of the two pulses: P1 and P2. The secret phase key is used to identify whether the returning pulses originated from the sender, i.e., whether the key distribution has been attacked by an eavesdropper. A secret key phase modulator randomly modulates pulse P1. An attenuator then reduces the average photon number of the modulated pulse P1 to a selected level greater than one to increase the likelihood of efficient, successful transmission while reducing the possibility of eavesdropping, e.g., μ=10. Both pulses P1 and P2 are sent to the intended recipient and reflected to the sender. Pulse P2 is modulated upon return to the sender using the same secret phase key previously modulated into pulse P1. Therefore, when both pulses meet together at a coupler/beamsplitter of the sender, both pulses should contain the same secret key in their phase and therefore exhibit no resulting phase difference if the photon pulse is the same pulse originated by the sender. If the returning pulse is not the pulse originated by the sender then phase differences indicative of a so-called intercept-resend attack applied by an eavesdropper EVE are indicated by a large quantum bit error rate (“QBER”) will be detectable. If EVE applies photon-split attack, the secret phase key modulated by the sender prevents Eve from knowing the encoded key information in the photon(s). Therefore, double phase encoding QKD enables use of multi-photon pulses without unacceptable loss of security, thereby enhancing QKD bit rate.
    • 表示量子键位的激光脉冲被分成两个脉冲。 除了已知的往返相位编码模式之外,秘密相位键被调制成两个脉冲之一:P 1和P 2。 秘密相位键用于识别来自发送者的返回脉冲是否是密钥分发是否已被窃听者攻击。 秘密密钥相位调制器随机调制脉冲P 1。 然后,衰减器将调制脉冲P 1的平均光子数减小到大于1的选定电平,以增加有效成功传输的可能性,同时降低窃听的可能性,例如,μ= 10。 两个脉冲P 1和P 2被发送到预期的接收者并被反射到发送者。 在使用预先调制到脉冲P 1中的相同秘密相位键返回发送器时,脉冲P 2被调制。 因此,当两个脉冲在发送器的耦合器/分束器处相遇在一起时,两个脉冲在它们的相位中应该包含相同的秘密密钥,因此如果光子脉冲是由发送器产生的相同的脉冲,则不会产生相位差。 如果返回的脉冲不是由发送器产生的脉冲,则指示由窃听者EVE施加的所谓的截距重发攻击的相位差由大量子比特误码率(“QBER”)指示。 如果EVE应用光子分裂攻击,则由发送者调制的秘密相位键防止Eve知道光子中的编码密钥信息。 因此,双相编码QKD使得能够使用多光子脉冲而不会无法接受的安全损失,从而提高QKD比特率。
    • 9. 发明授权
    • Network transaction verification and authentication
    • 网络交易验证和认证
    • US08510811B2
    • 2013-08-13
    • US12639464
    • 2009-12-16
    • Randy KuangStanislus K. Xavier
    • Randy KuangStanislus K. Xavier
    • G06F21/00
    • H04L63/0869H04L63/0853H04L63/0884H04L63/105H04L2463/082
    • A two-level authentication system is described supporting two-factor authentication that offers efficient protection for secure on-line web transactions. It includes a global unique identity (UID) provided either by an institute-issued/personal trusted device, or based on client computing platform hardware attributes, and generated using institution authorized private software, institution-authorized authentication proxy software, and an institution-generated credential code which is pre-stored in the token and only accessible by the institute-authorized authentication proxy software. The institution-authorized authentication proxy software uses the user's PIN and the trusted device's UID as input and verifies the user and device identities through institution-generated credential code which was pre-stored in the trusted device. Authentication is performed in two levels: the first authenticates the user and the trusted device locally; and the second authenticates the user remotely at the institution-owned authentication server. Various embodiments add extra levels of security, including one-time-password management.
    • 描述了支持双因素身份验证的两级身份验证系统,为安全的在线Web事务提供有效的保护。 它包括由机构颁发/个人信任设备提供的全球唯一身份(UID),或基于客户端计算平台的硬件属性,并使用机构授权的私有软件,机构授权的认证代理软件和机构生成的 凭证代码预先存储在令牌中,并且只能由机构授权的认证代理软件访问。 机构授权的认证代理软件使用用户的PIN和可信设备的UID作为输入,并通过预先存储在可信设备中的机构生成的凭证代码来验证用户和设备身份。 认证在两个层次上进行:首先在本地认证用户和受信任的设备; 第二个在机构拥有的认证服务器上远程认证用户。 各种实施例增加了额外的安全级别,包括一次性密码管理。