Security association for apparatuses
    11.
    发明专利
    Security association for apparatuses 审中-公开
    安全保护协会

    公开(公告)号:JP2005244988A

    公开(公告)日:2005-09-08

    申请号:JP2005050844

    申请日:2005-02-25

    Abstract: PROBLEM TO BE SOLVED: To provide a security association for apparatuses.
    SOLUTION: Steps forming symmetrical keys between distributed devices include a step which forms public values or private values of at least one device, a step which imports the public values from another device through out-of-band mechanism, and a step which forms private values corresponding to local devices and private values as function values received from other devices.
    COPYRIGHT: (C)2005,JPO&NCIPI

    Abstract translation: 要解决的问题:为设备提供安全关联。 解决方案:在分布式设备之间形成对称密钥的步骤包括形成至少一个设备的公共值或私有值的步骤,通过带外机制从另一个设备导入公共值的步骤,以及步骤 形成对应于本地设备和私有值的私有值作为从其他设备接收的功能值。 版权所有(C)2005,JPO&NCIPI

    Method, computer program and recording medium for improving automation level when computer system prepares to access to network
    14.
    发明专利
    Method, computer program and recording medium for improving automation level when computer system prepares to access to network 审中-公开
    方法,计算机程序和记录介质,用于在计算机系统准备访问网络时改善自动化水平

    公开(公告)号:JP2004213632A

    公开(公告)日:2004-07-29

    申请号:JP2003406559

    申请日:2003-12-04

    Abstract: PROBLEM TO BE SOLVED: To improve an automation level when a computer system prepares to access to a network. SOLUTION: When a computer system receives a certification from a server and try to get a permission of accessing to a first network and if the access to the first network is not permitted, the system gets a permission of accessing to a second network for downloading a file necessary for accessing to the first network. A first schema base document including a user input information is transferred to the server. When the server determines the appropriateness of the user input information, the system can receive the second schema document including an instruction of the permission of accessing to the first network. A third schema base document is executed in the computer system and the computer system is constituted to fit to the access to the first network. COPYRIGHT: (C)2004,JPO&NCIPI

    Abstract translation: 要解决的问题:提高计算机系统准备访问网络时的自动化级别。 解决方案:当计算机系统从服务器接收认证并尝试获得访问第一个网络的权限时,如果不允许访问第一个网络,则系统获得访问第二个网络的权限 用于下载访问第一个网络所需的文件。 包括用户输入信息的第一模式基本文档被传送到服务器。 当服务器确定用户输入信息的适当性时,系统可以接收包括访问第一网络的许可的指令的第二模式文档。 在计算机系统中执行第三模式基本文档,并且构造计算机系统以适应对第一网络的访问。 版权所有(C)2004,JPO&NCIPI

    Method and apparatus for managing power in network interface modules
    16.
    发明专利
    Method and apparatus for managing power in network interface modules 审中-公开
    用于管理网络接口模块功率的方法和装置

    公开(公告)号:JP2013084288A

    公开(公告)日:2013-05-09

    申请号:JP2012269181

    申请日:2012-12-10

    Abstract: PROBLEM TO BE SOLVED: To provide a method and system for managing power consumption in a portable computing device having a network interface module.SOLUTION: A power management module receives inputs from other modules and determines whether the network interface module is to be put in a doze state for a predetermined number of beacon intervals to conserve power consumption in the network interface module. The network interface module in a device that is associated with a network is put in the doze state after an event has occurred including when a scan has been performed, after a delayed sleep timer has expired, and after a beacon transmission has been completed and no traffic is buffered for the device. The delayed sleep-time is set based on the estimated round trip time of a packet.

    Abstract translation: 要解决的问题:提供一种用于管理具有网络接口模块的便携式计算设备中的功耗的方法和系统。 解决方案:电源管理模块从其他模块接收输入,并确定是否将网络接口模块置于打盹状态达预定数量的信标间隔,以节省网络接口模块中的功耗。 在事件发生之后,与网络相关联的设备中的网络接口模块在执行扫描之后,在延迟的睡眠定时器期满之后以及在信标传输完成之后并且没有 流量被缓冲为设备。 基于分组的估计往返时间来设置延迟休眠时间。 版权所有(C)2013,JPO&INPIT

    Security link management in dynamic networks
    17.
    发明专利
    Security link management in dynamic networks 有权
    动态网络中的安全链路管理

    公开(公告)号:JP2012100294A

    公开(公告)日:2012-05-24

    申请号:JP2011270401

    申请日:2011-12-09

    Abstract: PROBLEM TO BE SOLVED: To provide a method for setting up and managing secure data/audio/video links with secure key exchanges, authentication and authorization.SOLUTION: The invention enables establishment of a secure link with limited privileges using the machine identifier of a trusted machine. This is particularly useful if the user of the machine does not have a user identifying information suitable for authentication in the machine. Furthermore, the presentation of default user identifying information by a user advantageously initiates intervention by a system administrator instead of a blanket denial. This decentralized procedure allows new users access to the network without having to physically access a centralized facility to present their credentials. Another embodiment of the invention enables a remote user to connect to a secure network with limited privileges.

    Abstract translation: 要解决的问题:提供一种通过安全密钥交换,认证和授权设置和管理安全数据/音频/视频链路的方法。 解决方案:本发明可以使用受信任机器的机器标识符来建立具有有限权限的安全链路。 如果机器的用户没有适合在机器中认证的用户识别信息,则这是特别有用的。 此外,由用户呈现默认用户识别信息有利地启动系统管理员的干预,而不是一揽子拒绝。 这种分散式过程允许新用户访问网络,而无需物理访问集中式设施来呈现其凭据。 本发明的另一实施例使得远程用户能够以有限的权限连接到安全网络。 版权所有(C)2012,JPO&INPIT

    Method and apparatus for controlling electric power in network interface module
    18.
    发明专利
    Method and apparatus for controlling electric power in network interface module 有权
    用于控制网络接口模块电力的方法和装置

    公开(公告)号:JP2010171987A

    公开(公告)日:2010-08-05

    申请号:JP2010025583

    申请日:2010-02-08

    Abstract: PROBLEM TO BE SOLVED: To provide a method and a system for controlling electric power consumption in a mobile computing device that has a network interface module. SOLUTION: A power management module receives an input from another module, and determines whether to put the network interface module in a doze state during an interval corresponding to a predetermined number of beacons to prevent a waste in electric power consumption in a network interface module. As for a network interface module of a device that is related to a network, after an event including the time of scanning occurs, after a delay sleep timer times out and after transmission of a beacon is completed and when traffic is not buffered for the device, the network interface module is put in the doze state. A delay sleep time is set based on an estimated round trip time of a packet. COPYRIGHT: (C)2010,JPO&INPIT

    Abstract translation: 要解决的问题:提供一种用于控制具有网络接口模块的移动计算设备中的电力消耗的方法和系统。 电源管理模块从另一模块接收输入,并且在与预定数量的信标相对应的间隔期间确定是否将网络接口模块置于打盹状态,以防止网络中的电力消耗浪费 接口模块 对于与网络相关的设备的网络接口模块,在包括扫描时间的事件发生之后,在延迟睡眠定时器超时并且在信标发送完成之后以及当设备没有缓冲流量时 ,网络接口模块处于doze状态。 基于分组的估计往返时间来设置延迟休眠时间。 版权所有(C)2010,JPO&INPIT

    High-speed radio interior bus
    19.
    发明专利
    High-speed radio interior bus 有权
    高速无线电内部总线

    公开(公告)号:JP2006246443A

    公开(公告)日:2006-09-14

    申请号:JP2006017079

    申请日:2006-01-26

    CPC classification number: H04W92/18 H04W8/005 H04W76/02

    Abstract: PROBLEM TO BE SOLVED: To provide a method and a system for mutually connecting two or more computing devices by using high-speed wireless bus. SOLUTION: A first computing device detects that there is a second computing device over a wireless network. A wireless bridge is formed between the first computing device and the second computing device. COPYRIGHT: (C)2006,JPO&NCIPI

    Abstract translation: 要解决的问题:提供一种通过使用高速无线总线相互连接两个或多个计算设备的方法和系统。 解决方案:第一计算设备通过无线网络检测到存在第二计算设备。 在第一计算设备和第二计算设备之间形成无线桥接器。 版权所有(C)2006,JPO&NCIPI

    Efficient and secure authentication of computing system
    20.
    发明专利
    Efficient and secure authentication of computing system 有权
    计算系统的有效和安全的认证

    公开(公告)号:JP2005269656A

    公开(公告)日:2005-09-29

    申请号:JP2005080088

    申请日:2005-03-18

    Abstract: PROBLEM TO BE SOLVED: To provide a system for more efficiently and securely authenticating a computing system. SOLUTION: A client receives a limited usage (for example, single usage) certificate and transmits the limited usage certificate to a server through a secure link. The server provides an additional certificate (for subsequent authentication) and transmits the additional certificate to the client through the secure link. In another embodiment, the computing system uses an expandable protocol to automatically negotiate an authenticating method. An authenticating method to be mutually arranged is selected, and secure authentication is performed by a tunnel key to be used to encrypt (and later decrypt) authentication contents to be transferred between the client and the server. The tunnel key is derived from a shared secret key (e.g., session key) and a nansu. COPYRIGHT: (C)2005,JPO&NCIPI

    Abstract translation: 要解决的问题:提供一种更有效和安全地认证计算系统的系统。

    解决方案:客户端接收有限的使用(例如,单次使用)证书,并通过安全链路将有限使用证书发送到服务器。 服务器提供附加证书(用于后续认证),并通过安全链路将附加证书发送给客户端。 在另一个实施例中,计算系统使用可扩展协议来自动协商认证方法。 选择要相互排列的认证方法,并且通过隧道密钥执行安全认证,以用于对客户端和服务器之间要传送的认证内容进行加密(以后解密)。 隧道密钥是从共享秘密密钥(例如会话密钥)和南苏派生的。 版权所有(C)2005,JPO&NCIPI

Patent Agency Ranking