Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

82results about "Security arrangement" patented technology

Communication System And Communication Device

InactiveUS20080020707A1Easy to identifyReduce riskKey distribution for secure communicationMultiple keys/algorithms usageComputer hardwareCommunications system
A communication apparatus capable of easily identifying a communication partner and securely sharing a session key between the communication apparatus and the communication partner even if the communication apparatus has a processing power that is not so high includes a short-range active communication unit 101 transmitting an inquiry signal to a short-range external communication apparatus by electromagnetic waves and waiting for a response to the inquiry signal; a long-range communication unit 104 capable of communication by the electromagnetic waves in a range wider than the communication area of the short-range active communication means; a switching unit 111 switching to either the short-range active communication unit or the long-range communication unit; and an asymmetric key generator 102 generating a pair of an encryption key and a decryption key corresponding to the encryption key. The communication apparatus is characterized by using the decryption key to decrypt an encrypted session key transmitted from the external communication apparatus and transmitting to the external communication apparatus a communication switching request signal to request the switching to the long-range communication unit and communication by using the long-range communication unit.
Owner:SONY CORP

Key distribution and authentication methods, devices and systems

ActiveCN107317789AReduce the burden onSolve the problem that it cannot be applied to smart devices that do not support USIM cardsKey distribution for secure communicationSecurity arrangementSecure communicationWeb authentication
Embodiments of the invention provide key distribution and authentication methods, devices and systems. The methods comprise the following steps that a business center server receives a first key request message sent by a user management server, generates a first-layer key of the user management server according to the first key request message and sends the first-layer key to the user management server; and the user management server generates a second-layer key of a terminal device according to the first-layer key and sends the second-layer key of the terminal device to the terminal device in order to make the terminal device and a network authentication server carry out mutual authentication according to the second-layer key. The business center server and the user management server distribute the different keys to each terminal device, each terminal device carries out mutual authentication with the network authentication center based on the respective key, and a communication key of the terminal device and a function network element is finally obtained, a method for establishing a safety communication channel is provided for the terminal device, and the application range is wide.
Owner:HUAWEI TECH CO LTD

Mobile phone anti-theft system and method based on camera and GPS (Global Position System) of mobile phone

InactiveCN102638628AGood policeTimely and accurate recoverySubstation equipmentLocation information based serviceAnti theftMobile phone camera
The invention discloses a mobile phone anti-theft system and method based on a camera and a GPS (Global Position System) of a mobile phone. The mobile phone anti-theft system comprises a mobile phone CPU (Central Processing Unit), a microprocessor, a camera driving module, an input module and an unlocking detection module, wherein the input module is connected with the unlocking detection module; the unlocking detection module is connected with the mobile phone CPU; and the mobile phone CPU is connected with the camera driving module through the microprocessor. Compared with the prior art, the mobile phone anti-theft system and method provided by the invention have the advantages as follows: an unlocking operation is carried out when the mobile phone is used after the mobile phone is lost or stolen, and a background operation program which is installed in the mobile phone is triggered and started when the unlocking operation is inaccurate; and a user who currently uses the mobile phone is positioned and photographed through a GPS module and the camera of the mobile phone; meanwhile, obtained information is sent to a mailbox or other addresses which are specified by the user in time, so that the user is convenient to alarm and can find the mobile phone back accurately in time, and the problems of the mobile phone loss and personnel information release of the user can be solved.
Owner:SHENZHEN GIONEE COMM EQUIP

Telecommunication fraud prevention system and method based on big data and machine learning

InactiveCN106970911APrevent fraudulent incidentsCombating Telecom FraudSemantic analysisSubstation equipmentData informationMobile end
The invention discloses a telecommunication fraud prevention system and method based on big data and machine learning. The system comprises a mobile terminal, a big data analysis terminal and a fraud interdiction governance terminal, wherein the mobile terminal is used for performing fraud detection determination on current telecommunication data according to predetermined constraint rules when receiving a short message or an incoming call message, a machine learning algorithm is adopted to detect whether the telecommunication data is a telecommunication fraud, and if the detection result is that the telecommunication data is determined as a telecommunication fraud, fraud data information is uploaded to the big data analysis terminal; the big data analysis terminal is used for performing real-time statistics on the fraud data information uploaded and reported from the mobile terminal and sending fraud early-warning information to the fraud interdiction governance terminal according to a bank card account or/and a phone number with the number of received reports exceeding a certain threshold value; and the fraud interdiction governance terminal is used for taking corresponding measures in time to interdict occurrence of a telecommunication fraud event when receiving the fraud early-warning information. The system can unite the mobile terminal, an operator, a public security institution, a bank and other institutions, quick and effective prevention can be realized, and the telecommunication fraud can be cracked down in time.
Owner:INST OF SOFTWARE APPL TECH GUANGZHOU & CHINESE ACAD OF SCI

CDMA port-to-port encryption communication system and key distribution method thereof

InactiveCN101635924AImprove securityReduce security risksSecurity arrangementCommunications securityCommunications system
The invention discloses a CDMA port-to-port encryption communication system and a key distribution method thereof, the CDMA port-to-port encryption communication system comprises a CDMA network and a terminal mobile telephone thereof, a public switched telephone network and a terminal fixed-line telephone thereof, a short message service center as well as the following three cipher processing units including a cipher chip of a mobile telephone terminal, a key distribution management center (KDMC) and a Firmware cipher module of a gateway mobile switching center. The key distribution management center is used for key distribution management of the communication system. The key distribution is realized by a layered distribution method, i.e. a first layer is an equipment key which is distributed in the process of initialization; a second layer is a key-encryption key and a short message service key which are distributed in startup of an enciphered mobile telephone; and a third layer is a session key which is distributed every time a session is launched between the enciphered mobile telephones. At the same time, by adopting a bidirectional certification technology for key distribution and combination of a key update and remote destroying method, the safety risk in key exposure is reduced, and the communication safety is improved.
Owner:CETC CYBERSPACE SECURITY TECH CO LTD

Safety authentication method and system for wireless network

InactiveCN101959191ASecurity arrangementAuthentication systemWeb authentication
The invention discloses a safety authentication method and a safety authentication system for a wireless network. The system comprises a signal fingerprint monitoring and processing module and a wireless network access authentication module at an access point. The method comprises the following steps that: at a network access point, the signal fingerprint monitoring and processing module performsdown-conversion and digitized sampling on a detected steady-state communication signal and extracts the conventional signal characteristic and the spurious signal characteristic of the steady-state signal by a communication signal processing method; after a higher-dimension spurious signal characteristic is reduced and optimized, the conventional signal characteristic and the spurious characteristic are fused into a steady-state signal fingerprint; and a signal fingerprint matching and safety authentication module matches the monitored steady-state fingerprint of unknown communication equipment and provides a corresponding safety strategy service according to a recognition result by a network authentication protocol. The method and the system are used for performing safety authentication on wireless communication equipment and enhancing the safety of a wireless communication network in combination with a software authentication system and have the characteristics of high concealment, high stability and safe management.
Owner:HUAZHONG UNIV OF SCI & TECH

System and Method for Detecting and Evicting Malicious Vehicles in a Vehicle Communications Network

ActiveUS20110214178A1Improve performanceReduce impactMemory loss protectionError detection/correctionMathematical modelSimulation
In a vehicle communication network, some vehicles may be used by attackers to send false information to other vehicles which may jeopardize the safety of other vehicles. Vehicles should be able to detect malicious communications activities and to mitigate the impact of malicious vehicles by evicting (eliminating) suspected malicious vehicles from the system. Evicting a vehicle is to ignore the messages sent from the vehicle for a specified time period. Voting and sacrifice principles are combined using a mathematical model based on the “Mafia Game”. The Mafia Game model focuses on the relative size of the group of attackers within a neighborhood necessary to dominate the entire network in the neighborhood (i.e., to eventually evict all the innocent vehicles).
Owner:PERSPECTA LABS INC

Method for realizing the public wireless broadband network access and wireless network access equipment

InactiveCN101521878AOvercome the shortcomings of small range and being affected by obstaclesUniversal coverageNetwork topologiesConnection managementInformation processingAccess method
The invention discloses a telecommunication broadband wireless network access method and wireless network access equipment and aims at providing a shared telecommunication wired access broadband to simultaneously provide a shared broadband access circuit service for wired broadband contracted users and public wireless roaming users. The invention uses the following method to realize the wireless broadband access: the public wireless roaming user can get an access to the wireless network access equipment through a special wireless interface; and after the necessary information processing, the public wireless roaming user can get an access to operator certificate and service devices via a broadband route rented by the wired user to complete the data recovery, security certificate and public network service provision. The wireless network access equipment comprises more than one wireless circuit access modules which can identify internal users and public roaming users through special design; the wireless network access equipment can lead the identified internal users to be linked with an internal local area network firstly; and for identified external roaming users, the wireless network access equipment provides public network broadband services by building up a link which is connected with the certificate and service device of the telecommunication operator via a wired broadband circuit.
Owner:张泽华

System and method for biometric verification of ticket users

InactiveUS20180082220A1ReservationsCommerceBiometric dataMobile device
Techniques are disclosed for validating a ticket based on biometric data provided by a ticket holding user. A ticket controller device broadcasts an inquiry frame specifying a request for authentication data for a ticket user requesting access to a service hosted by the ticket controller. A mobile device may receive the inquiry frame and generate a response frame encapsulating a ticket identifier and biometric data associated with a user. The ticket controller receives the response frame including the ticket identifier and the biometric data. Upon determining that the ticket identifier and the biometric data encapsulated in the response frame matches a stored ticket identifier and biometric data, the ticket controller grants the user access to the service.
Owner:INT BUSINESS MASCH CORP

Session management with relaying and charging for indirect connection for internet of things appplications in 3gpp network

ActiveCN109997334AConnection managementData switching networksProcessing InstructionSession management
The application is at least directed to a core network including a non-transitory memory including instructions stored thereon for transferring infrequent small data to a service capability or application server on a 5G network. The core network also includes a processor operably coupled to the non-transitory memory. The processor is configured to execute the instructions of detecting a relay userequipment (UE) sending a data transfer request message to the core network based on uplink traffic generated at a remote UE and control information of the remote UE. The processor is also configuredto execute the instructions of querying a database in the core network for subscription information of the remote UE based on the control information. The processor is also configured to execute the instructions of receiving the subscription information from the database. The processor is further configured to execute the instructions of processing the received subscription information. The processor is even further configured to execute the instructions of selecting a network function for transmitting the uplink traffic to the server based on the processing instruction.
Owner:INTERDIGITAL PATENT HLDG INC

Communication method, device and system

ActiveCN109600339AAvoid the problem of large delayNetwork traffic/resource managementTransmissionQuality of serviceSession management
The invention relates to the technical field of wireless communication, in particular to a communication method, a communication system and communication equipment, which are used for realizing safetyprotection based on quality of service (QoS) flow so as to meet the safety requirements of different services and improve the flexibility of network safety. The method comprises the following steps that session management equipment receives a request, wherein the request is used for requesting session establishment or session modification; the session management equipment obtains a target security policy of the QoS flow according to the request; and the session management equipment sends indication information to a mobility management device, wherein the indication information is used for indicating a target security policy of the QoS flow.
Owner:HUAWEI TECH CO LTD

Wireless payment method between vehicles based on 5G communication network and system thereof

ActiveCN108307349AEnsure safetyImprove performanceCryptography processingParticular environment based servicesPaymentE communication
The invention relates to a wireless payment method between vehicles based on a 5G communication network. The method includes the steps that: a requesting vehicle sends a payment request to a base station; the base station retrieves vehicle information of a friend vehicle of the requesting vehicle based on the payment request; the base station encrypts the requesting information by using the vehicle information of the friend vehicle for broadcasting; the vehicle within the broadcast range of the base station decodes the broadcast information by utilizing the own vehicle information, the friendvehicle acquires the requesting information as a responding vehicle if the decoding is successful; the responding vehicle generates payment information based on the requesting information and sends the payment information to the base station, the base station sends the payment information to a payment platform, and the payment platform returns the payment result to the responding vehicle; the basestation assigns a D2D communication channel to the requesting vehicle and the responding vehicle, and the responding vehicle and the requesting vehicle communicate via the D2D communication channel.According to the invention, the communication between vehicles can be realized, and the security of payment can be ensured.
Owner:CHINA UNIONPAY

Mesh communications network having mesh ports

A method for communicating over a mesh network established between a plurality of devices is disclosed. Each device has a wireless radio and the method involves launching a mesh service on each device, the mesh service being operable to cause a processor circuit of the device to provide functionality for controlling the wireless radio for communication between devices over the mesh network. Each device has at least one application running on the device, the at least one application being associated with a mesh port, the mesh port being used to designate data transmissions as being associated with instances of a specific application running on at least some of the devices in the plurality of devices, the at least one application and the mesh service on each device being in data communication. The method also involves, in response to a specific application running on a device requesting the mesh service to provide access to the mesh network for communication via a specific mesh port, causing the mesh service to determine whether the specific application is authorized for communications on the specific mesh port, and if the specific application is authorized, processing requests from the application to communicate on the specific mesh port over the mesh network and forwarding data transmissions associated with the specific mesh port to the specific application, and if the specific application is not authorized, declining requests from the application to communicate on the specific mesh port over the mesh network and preventing access by the specific application to data transmissions associated with the specific mesh port.
Owner:LEFT OF THE DOT MEDIA

Interference blocking scheme switching method for millimeter wave cellular network uplink secure transmission

ActiveCN110381503AIncrease freedomGuaranteed transmission reliabilityCommunication jammingLocation information based serviceTelecommunications linkSecure transmission
The invention provides an interference blocking scheme switching method for millimeter wave cellular network uplink secure transmission. The interference blocking scheme switching method specificallycomprises the following steps: the step 1, taking an optimal cooperative user in K-1 cooperative users to carry out interference blocking and taking full duplex interference blocking of a base stationas an interference blocking scheme respectively; the step 2, calculating the safety throughput of a communication link when the K-1 cooperative users in the step 1 interfere, and taking the cooperative user corresponding to the maximum safety throughput as an interference node of an interference blocking scheme, meanwhile, calculating the safety throughput during full duplex interference of the base station in the step 1; and the step 3, comparing the communication link security throughput obtained in the step 2 with the communication link throughput when the base station interferes, and taking the interference blocking scheme corresponding to the maximum security throughput as the interference blocking scheme of the current time slot; According to the invention, the safety throughput istaken as an evaluation index, and the user position information is utilized to efficiently and flexibly switch between the two interference blocking schemes, so that the system always works in an environment with the optimal safety throughput.
Owner:XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products