BRPI0716594A2 - Método e sistema para o processamento seguro de material chave de autenticação em uma rede sem fio ad hoc - Google Patents

Método e sistema para o processamento seguro de material chave de autenticação em uma rede sem fio ad hoc

Info

Publication number
BRPI0716594A2
BRPI0716594A2 BRPI0716594-3A2A BRPI0716594A BRPI0716594A2 BR PI0716594 A2 BRPI0716594 A2 BR PI0716594A2 BR PI0716594 A BRPI0716594 A BR PI0716594A BR PI0716594 A2 BRPI0716594 A2 BR PI0716594A2
Authority
BR
Brazil
Prior art keywords
wireless network
authentication key
secure processing
hoc wireless
key materials
Prior art date
Application number
BRPI0716594-3A2A
Other languages
English (en)
Inventor
Anthony J Braskich
Stephen P Emeott
Original Assignee
Motorola Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Motorola Inc filed Critical Motorola Inc
Publication of BRPI0716594A2 publication Critical patent/BRPI0716594A2/pt
Publication of BRPI0716594A8 publication Critical patent/BRPI0716594A8/pt

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • H04L9/0833Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
    • H04L9/0836Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key using tree structure or hierarchical structure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0431Key distribution or pre-distribution; Key agreement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/061Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying further key derivation, e.g. deriving traffic keys from a pair-wise master key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Small-Scale Networks (AREA)
BRPI0716594A 2006-09-07 2007-08-23 Método e nó de malha para processamento seguro de material chave de autenticação em uma rede sem fio ad hoc BRPI0716594A8 (pt)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US11/470,921 US7734052B2 (en) 2006-09-07 2006-09-07 Method and system for secure processing of authentication key material in an ad hoc wireless network
PCT/US2007/076592 WO2008030704A2 (en) 2006-09-07 2007-08-23 Method and system for secure processing of authentication key material in an ad hoc wireless network

Publications (2)

Publication Number Publication Date
BRPI0716594A2 true BRPI0716594A2 (pt) 2013-12-03
BRPI0716594A8 BRPI0716594A8 (pt) 2023-04-18

Family

ID=39157939

Family Applications (1)

Application Number Title Priority Date Filing Date
BRPI0716594A BRPI0716594A8 (pt) 2006-09-07 2007-08-23 Método e nó de malha para processamento seguro de material chave de autenticação em uma rede sem fio ad hoc

Country Status (11)

Country Link
US (1) US7734052B2 (pt)
EP (1) EP2062189B1 (pt)
JP (1) JP5101620B2 (pt)
KR (1) KR101019300B1 (pt)
CN (1) CN101512537B (pt)
AU (1) AU2007292553B2 (pt)
BR (1) BRPI0716594A8 (pt)
CA (1) CA2662841C (pt)
MX (1) MX2009002509A (pt)
RU (1) RU2009112619A (pt)
WO (1) WO2008030704A2 (pt)

Families Citing this family (42)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9049592B2 (en) * 2006-09-18 2015-06-02 Intel Corporation Techniques for key derivation for secure communication in wireless mesh networks
MX2009007338A (es) * 2007-01-08 2009-07-31 S & C Electric Co Sistema de distribucion de energia, sistema y metodo de comunicacion de acceso seguro.
US8571211B2 (en) * 2007-05-14 2013-10-29 Samsung Electronics Co., Ltd Method and apparatus for generating security key in a mobile communication system
US8280057B2 (en) * 2007-09-04 2012-10-02 Honeywell International Inc. Method and apparatus for providing security in wireless communication networks
US8208635B2 (en) * 2007-11-13 2012-06-26 Rosemount Inc. Wireless mesh network with secure automatic key loads to wireless devices
KR101407573B1 (ko) * 2007-12-18 2014-06-13 한국전자통신연구원 무선 액세스 기술과 이동ip 기반 이동성 제어 기술이적용된 차세대 네트워크 환경을 위한 통합 핸드오버 인증방법
DE102008046563A1 (de) * 2008-09-10 2010-03-11 Siemens Aktiengesellschaft Verfahren zur Datenübertragung zwischen Netzwerkknoten
US20100115261A1 (en) * 2008-11-06 2010-05-06 International Business Machines Corporation Extensible seal management for encrypted data
CN101431518B (zh) * 2008-12-09 2011-06-01 西安西电捷通无线网络通信股份有限公司 一种认证关联套件的发现与协商方法
US8966265B2 (en) * 2009-01-30 2015-02-24 Texas Instruments Incorporated Pairwise temporal key creation for secure networks
KR101171905B1 (ko) 2009-06-09 2012-08-07 기아자동차주식회사 엔진의 점화 시스템 및 이의 제어방법
US9451452B2 (en) * 2009-06-29 2016-09-20 Motorola Solutions, Inc. Method of triggering a key delivery from a mesh key distributor
CN102026171B (zh) * 2009-09-17 2013-06-12 国基电子(上海)有限公司 安全控制远程无线设备的方法
CN102056163B (zh) * 2009-11-03 2013-06-05 杭州华三通信技术有限公司 分布式mesh网络密钥管理方法和无线接入点设备
KR101683286B1 (ko) * 2009-11-25 2016-12-06 삼성전자주식회사 이동통신망을 이용한 싱크 인증 시스템 및 방법
US20110238498A1 (en) * 2010-03-29 2011-09-29 Microsoft Corporation Service stage for subscription management
CN102244862A (zh) * 2010-05-10 2011-11-16 北京三星通信技术研究有限公司 一种获取安全密钥的方法
US8725196B2 (en) * 2010-11-05 2014-05-13 Qualcomm Incorporated Beacon and management information elements with integrity protection
US9542203B2 (en) 2010-12-06 2017-01-10 Microsoft Technology Licensing, Llc Universal dock for context sensitive computing device
US8923770B2 (en) 2010-12-09 2014-12-30 Microsoft Corporation Cognitive use of multiple regulatory domains
US8792429B2 (en) 2010-12-14 2014-07-29 Microsoft Corporation Direct connection with side channel control
US8589991B2 (en) 2010-12-14 2013-11-19 Microsoft Corporation Direct connection with side channel control
US9294545B2 (en) 2010-12-16 2016-03-22 Microsoft Technology Licensing, Llc Fast join of peer to peer group with power saving mode
US8948382B2 (en) * 2010-12-16 2015-02-03 Microsoft Corporation Secure protocol for peer-to-peer network
US8971841B2 (en) 2010-12-17 2015-03-03 Microsoft Corporation Operating system supporting cost aware applications
US9331852B2 (en) * 2011-04-07 2016-05-03 Infosys Technologies, Ltd. System and method for securing data transaction
US8762742B2 (en) * 2011-05-16 2014-06-24 Broadcom Corporation Security architecture for using host memory in the design of a secure element
FR2980607B1 (fr) * 2011-09-27 2014-04-25 Proton World Int Nv Procede de derivation de cles dans un circuit integre
US9084111B2 (en) * 2012-02-07 2015-07-14 Aruba Networks, Inc. System and method for determining leveled security key holder
US9537899B2 (en) * 2012-02-29 2017-01-03 Microsoft Technology Licensing, Llc Dynamic selection of security protocol
US8923516B2 (en) * 2012-08-29 2014-12-30 Qualcomm Incorporated Systems and methods for securely transmitting and receiving discovery and paging messages
US9425959B1 (en) * 2012-10-03 2016-08-23 Altera Corporation Security variable scrambling
US9251355B2 (en) 2013-07-30 2016-02-02 International Business Machines Corporation Field level database encryption using a transient key
EP2978158A1 (en) * 2014-07-21 2016-01-27 Nxp B.V. Methods and architecture for encrypting and decrypting data
CN104301332B (zh) * 2014-10-31 2017-10-27 成都卫士通信息产业股份有限公司 一种基于无线级联的密钥分发系统
US10111095B2 (en) * 2016-03-14 2018-10-23 Verizon Patent And Licensing Inc. Caching a pairwise master key for dropped wireless local area network (WLAN) connections to prevent re-authentication
WO2018170061A1 (en) * 2017-03-15 2018-09-20 Intel IP Corporation Apparatus, system and method of securing wireless communication
US10749692B2 (en) 2017-05-05 2020-08-18 Honeywell International Inc. Automated certificate enrollment for devices in industrial control systems or other systems
US11962685B2 (en) * 2018-01-16 2024-04-16 Raytheon Company High availability secure network including dual mode authentication
US10972916B2 (en) 2019-04-29 2021-04-06 Sonicwall Inc. Instant secure wireless network setup
US11381391B2 (en) * 2020-06-15 2022-07-05 Cisco Technology, Inc. Pre-shared secret key capabilities in secure MAC layer communication protocols
WO2022046798A1 (en) * 2020-08-24 2022-03-03 Eleven Software Inc. Key matching for eapol handshake using distributed computing

Family Cites Families (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5572528A (en) 1995-03-20 1996-11-05 Novell, Inc. Mobile networking method and apparatus
US7016949B1 (en) 2000-11-20 2006-03-21 Colorado Computer Training Institute Network training system with a remote, shared classroom laboratory
US20020184487A1 (en) 2001-03-23 2002-12-05 Badamo Michael J. System and method for distributing security processing functions for network applications
US20020184055A1 (en) 2001-05-29 2002-12-05 Morteza Naghavi System and method for healthcare specific operating system
EP1286506B1 (en) 2001-08-07 2005-10-19 Kabushiki Kaisha Toshiba Wireless communication system and wireless station
US7039068B1 (en) 2001-09-26 2006-05-02 Cisco Technology, Inc. Packet assembly
US7418596B1 (en) 2002-03-26 2008-08-26 Cellco Partnership Secure, efficient, and mutually authenticated cryptographic key distribution
US7529933B2 (en) 2002-05-30 2009-05-05 Microsoft Corporation TLS tunneling
US8630414B2 (en) 2002-06-20 2014-01-14 Qualcomm Incorporated Inter-working function for a communication system
WO2004015958A2 (en) 2002-08-12 2004-02-19 Wireless Security Corporation Fine grained access control for wireless networks
JP3992579B2 (ja) 2002-10-01 2007-10-17 富士通株式会社 鍵交換代理ネットワークシステム
US7350077B2 (en) 2002-11-26 2008-03-25 Cisco Technology, Inc. 802.11 using a compressed reassociation exchange to facilitate fast handoff
US7263357B2 (en) * 2003-01-14 2007-08-28 Samsung Electronics Co., Ltd. Method for fast roaming in a wireless network
JP3891145B2 (ja) 2003-05-16 2007-03-14 ソニー株式会社 無線通信装置、無線通信方法及びプログラム
US7275157B2 (en) 2003-05-27 2007-09-25 Cisco Technology, Inc. Facilitating 802.11 roaming by pre-establishing session keys
US7171555B1 (en) 2003-05-29 2007-01-30 Cisco Technology, Inc. Method and apparatus for communicating credential information within a network device authentication conversation
US7693143B2 (en) 2003-08-15 2010-04-06 Accton Technology Corporation Forwarding and routing method for wireless transport service
EP1692595A2 (en) 2003-11-04 2006-08-23 Nexthop Technologies, Inc. Secure, standards-based communications across a wide-area network
GB2412038B (en) 2004-03-10 2006-04-19 Toshiba Res Europ Ltd Packet format
US7231530B1 (en) 2004-04-06 2007-06-12 Cisco Technology, Inc. System and method for saving power in a wireless network by reducing power to a wireless station for a time interval if a received packet fails an integrity check
US20060002426A1 (en) 2004-07-01 2006-01-05 Telefonaktiebolaget L M Ericsson (Publ) Header compression negotiation in a telecommunications network using the protocol for carrying authentication for network access (PANA)
WO2006080623A1 (en) 2004-09-22 2006-08-03 Samsung Electronics Co., Ltd. Method and apparatus for managing communication security in wireless network
US7502331B2 (en) 2004-11-17 2009-03-10 Cisco Technology, Inc. Infrastructure-less bootstrapping: trustless bootstrapping to enable mobility for mobile devices
US7330696B2 (en) 2004-11-24 2008-02-12 Symbol Technologies, Inc. System and method for multi-mode radio operation
US7724732B2 (en) 2005-03-04 2010-05-25 Cisco Technology, Inc. Secure multipoint internet protocol virtual private networks
US7814322B2 (en) * 2005-05-03 2010-10-12 Sri International Discovery and authentication scheme for wireless mesh networks
KR101248906B1 (ko) * 2005-05-27 2013-03-28 삼성전자주식회사 무선 랜에서의 키 교환 방법
US7676676B2 (en) * 2005-11-14 2010-03-09 Motorola, Inc. Method and apparatus for performing mutual authentication within a network
US7752441B2 (en) 2006-02-13 2010-07-06 Alcatel-Lucent Usa Inc. Method of cryptographic synchronization
US8023478B2 (en) * 2006-03-06 2011-09-20 Cisco Technology, Inc. System and method for securing mesh access points in a wireless mesh network, including rapid roaming
JP4804983B2 (ja) 2006-03-29 2011-11-02 富士通株式会社 無線端末、認証装置、及び、プログラム
US7707415B2 (en) 2006-09-07 2010-04-27 Motorola, Inc. Tunneling security association messages through a mesh network
US7499547B2 (en) * 2006-09-07 2009-03-03 Motorola, Inc. Security authentication and key management within an infrastructure based wireless multi-hop network
US7508803B2 (en) 2006-09-07 2009-03-24 Motorola, Inc. Transporting management traffic through a multi-hop mesh network

Also Published As

Publication number Publication date
BRPI0716594A8 (pt) 2023-04-18
EP2062189A4 (en) 2014-07-30
CA2662841C (en) 2012-12-18
KR20090051119A (ko) 2009-05-20
EP2062189B1 (en) 2016-08-03
US20080063204A1 (en) 2008-03-13
WO2008030704A2 (en) 2008-03-13
WO2008030704A3 (en) 2008-08-21
KR101019300B1 (ko) 2011-03-07
CA2662841A1 (en) 2008-03-13
AU2007292553A1 (en) 2008-03-13
CN101512537A (zh) 2009-08-19
MX2009002509A (es) 2009-03-25
RU2009112619A (ru) 2010-10-20
EP2062189A2 (en) 2009-05-27
CN101512537B (zh) 2013-01-16
AU2007292553B2 (en) 2010-07-01
JP2010503329A (ja) 2010-01-28
US7734052B2 (en) 2010-06-08
JP5101620B2 (ja) 2012-12-19

Similar Documents

Publication Publication Date Title
BRPI0716594A2 (pt) Método e sistema para o processamento seguro de material chave de autenticação em uma rede sem fio ad hoc
BRPI0716595A2 (pt) Método e aparelho para estabelecer associações de segurança entre nós de uma rede sem fio ad hoc
BRPI0822820A2 (pt) Método e aparelhagem para identificação e retransmissão de dados multidifundidos em redes de trabalho sem fio em área local
BRPI0916929A2 (pt) etiqueta de ci sem fio, e, sistema de administração de qualidade de objeto estrutural de concreto
BRPI0906775A2 (pt) Notificação de modificação de informação de sistema e detecção em comunicações sem fio.
BRPI0819263A2 (pt) sistema e método para fornecer segurança de roubo de identidade
BRPI0919779A2 (pt) método e sistema para controlar o acesso sem fio a recursos de rede seguras baseado no contexto
BRPI0810989A2 (pt) Método e equipamento para sondagem em um sistema de comunicação sem fio
BRPI0822399A2 (pt) Método para uso em um sistema de acesso celular sem fio, e, terminal de usuário
BRPI0911602A2 (pt) sistema e método para o controle de recepção descontínua em uma rede sem fio
BRPI0813060A2 (pt) "sistema sem fio e módulo sem fio para sistema sem fio"
BRPI0918239A2 (pt) sistema e método de gerenciamento sem fio passivo e ativo de construção
BRPI1011591A2 (pt) métodos e aparelho para registro com redes externas em ambientes em rede sem fio
BRPI0917526A2 (pt) métodos e equipamentos para processar intervalos de medição em um sistema de comunicação sem fio
BRPI0905845A2 (pt) "método, sistema e aparelho para modificação de superfícies"
BRPI1008100A2 (pt) método e sistema para a determinação de localização de equipamento de usuário em um sistema de transmissão sem fio.
BRPI0821648A2 (pt) Método e dispositivo para pó desagregante
BRPI0613893A2 (pt) sistema e método para tratar pele
BRPI0816546A2 (pt) método e aparelho de processamento de camada 2 e criação de unidades de dados de protocolo para comunicação sem fio
BR112012002552A2 (pt) método e sistema para emparelhamento de dispositivo sem fio de campo proximo
BRPI0811965A2 (pt) método e equipamento para derivação de nova chave por handoff em redes sem fio
BRPI0809132A2 (pt) método e aparelhos para pré-peneiramento
BRPI0818029A2 (pt) Sistema de autenticação biométrico sem contato e método de autenticação
BRPI0906146A2 (pt) Método, dispositivo e programa para associação e reassociação em rede wireless
BRPI0917436A2 (pt) método e equipamento para tratar intervalos de medição em redes sem fio

Legal Events

Date Code Title Description
B25D Requested change of name of applicant approved

Owner name: MOTOROLA SOLUTIONS, INC (US)

B07A Application suspended after technical examination (opinion) [chapter 7.1 patent gazette]
B09B Patent application refused [chapter 9.2 patent gazette]
B12B Appeal against refusal [chapter 12.2 patent gazette]
B25A Requested transfer of rights approved

Owner name: ARRIS ENTERPRISES LLC (US)

B25L Entry of change of name and/or headquarter and transfer of application, patent and certificate of addition of invention: publication cancelled

Owner name: MOTOROLA SOLUTIONS, INC (US)

Free format text: ANULADA A PUBLICACAO CODIGO 25.1 NA RPI NO 2724 DE 21/03/2023 POR TER SIDO INDEVIDA.

B25A Requested transfer of rights approved

Owner name: ARRIS ENTERPRISES LLC (US)

B11D Dismissal acc. art. 38, par 2 of ipl - failure to pay fee after grant in time