RU2005126731A - Способ и устройство для безопасного обмена данных и совместное использование ресурсов между анонимными сторонами, не имеющими доверительных отношений, без центрального администрирования - Google Patents
Способ и устройство для безопасного обмена данных и совместное использование ресурсов между анонимными сторонами, не имеющими доверительных отношений, без центрального администрирования Download PDFInfo
- Publication number
- RU2005126731A RU2005126731A RU2005126731/09A RU2005126731A RU2005126731A RU 2005126731 A RU2005126731 A RU 2005126731A RU 2005126731/09 A RU2005126731/09 A RU 2005126731/09A RU 2005126731 A RU2005126731 A RU 2005126731A RU 2005126731 A RU2005126731 A RU 2005126731A
- Authority
- RU
- Russia
- Prior art keywords
- computing device
- network
- computing devices
- transmitting
- hierarchical
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3249—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/44—Star or tree networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/22—Arrangements for preventing the taking of data from a data transmission channel without authorisation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0893—Assignment of logical groups to network elements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/02—Topology update or discovery
- H04L45/04—Interdomain routing, e.g. hierarchical routing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/46—Cluster building
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/10—Flow control; Congestion control
- H04L47/12—Avoiding congestion; Recovering from congestion
- H04L47/125—Avoiding congestion; Recovering from congestion by balancing the load, e.g. traffic engineering
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/10—Flow control; Congestion control
- H04L47/16—Flow control; Congestion control in connection oriented networks, e.g. frame relay
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/10—Flow control; Congestion control
- H04L47/24—Traffic characterised by specific attributes, e.g. priority or QoS
- H04L47/2441—Traffic characterised by specific attributes, e.g. priority or QoS relying on flow classification, e.g. using integrated services [IntServ]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/10—Flow control; Congestion control
- H04L47/41—Flow control; Congestion control by acting on aggregated flows or links
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/70—Admission control; Resource allocation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/70—Admission control; Resource allocation
- H04L47/74—Admission control; Resource allocation measures in reaction to resource unavailability
- H04L47/746—Reaction triggered by a failure
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/70—Admission control; Resource allocation
- H04L47/78—Architectures of resource allocation
- H04L47/782—Hierarchical allocation of resources, e.g. involving a hierarchy of local and centralised entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/70—Admission control; Resource allocation
- H04L47/80—Actions related to the user profile or the type of traffic
- H04L47/805—QOS or priority aware
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/70—Admission control; Resource allocation
- H04L47/80—Actions related to the user profile or the type of traffic
- H04L47/806—Broadcast or multicast traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/70—Admission control; Resource allocation
- H04L47/82—Miscellaneous aspects
- H04L47/822—Collecting or measuring resource availability data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/70—Admission control; Resource allocation
- H04L47/82—Miscellaneous aspects
- H04L47/828—Allocation of resources per group of connections, e.g. per group of users
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/302—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0894—Policy-based network configuration management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/02—Communication route or path selection, e.g. power-based or shortest path routing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/24—Connectivity information management, e.g. connectivity discovery or connectivity update
- H04W40/246—Connectivity information discovery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/24—Connectivity information management, e.g. connectivity discovery or connectivity update
- H04W40/248—Connectivity information update
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organising networks, e.g. ad-hoc networks or sensor networks
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02B—CLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO BUILDINGS, e.g. HOUSING, HOUSE APPLIANCES OR RELATED END-USER APPLICATIONS
- Y02B70/00—Technologies for an efficient end-user side electric power management and consumption
- Y02B70/30—Systems integrating technologies related to power network operation and communication or information technologies for improving the carbon footprint of the management of residential or tertiary loads, i.e. smart grids as climate change mitigation technology in the buildings sector, including also the last stages of power distribution and the control, monitoring or operating management systems at local level
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/50—Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
- Mobile Radio Communication Systems (AREA)
Claims (15)
1. Система организации сети без центрального администрирования из не имеющих доверительных отношений вычислительных устройств так, что вычислительные устройства могут безопасно совместно использовать сетевые ресурсы и выполнять обмен данными с ожидаемым качеством услуги, содержащая приемное вычислительное устройство; и передающее вычислительное устройство, которое передает запрос на установление физического канала, обеспечивая, таким образом, установление физического канала для передачи данных между передающим вычислительным устройством и принимающим вычислительным устройством так, что маршрут рассчитывается динамически от передающего вычислительного устройства до приемного вычислительного устройства через множество промежуточных вычислительных устройств, без консультирования с центральным администрирующим вычислительным устройством, причем запрос на установление физического канала содержит указание требуемого качества услуги, которое принудительно обеспечивается каждым вычислительным устройством в множестве промежуточных вычислительных устройств.
2. Система по п.1, в которой передающее вычислительное устройство передает пакет в приемное вычислительное устройство, используя иерархический протокол динамической маршрутизации.
3. Система по п.2, в которой протокол динамической маршрутизации распространяет информацию о качестве услуги в каждое промежуточное вычислительное устройство.
4. Система по п.2, в которой иерархический протокол динамической маршрутизации использует при передаче данных криптографический метод шифрования.
5. Система по п.2, в которой передающее вычислительное устройство передает документ, который используется промежуточными вычислительными устройствами для принятия решения.
6. Система по п.5, в которой документ описывает качество услуги.
7. Система по п.6, в которой документ дополнительно описывает права и делегирование прав на использование сети.
8. Система по п.5, в которой документ описывает делегирование разрешения.
9. Система по п.8, в которой делегирование разрешения позволяет вычислительному устройству принимать решение о перемещении данных.
10. Система по п.2, в которой иерархический протокол динамической маршрутизации может использовать либо надежный, или ненадежный протокол передачи данных более низкого уровня.
11. Система по п.1, в которой сеть организована как иерархическая сотовая сеть.
12. Система по п.11, в которой каждое вычислительное устройство иерархической сотовой сети идентифицировано по имени, содержащему множество идентификаторов, разделенных разделителем.
13. Система по п.12, в которой идентификаторы организованы по имени от конкретного к общему.
14. Система по п.11, в которой иерархическая сотовая сеть включает метаузел.
15. Система по п.14, в которой метаузел указывает на вычислительное устройство и сеть вычислительных устройств, причем указанные вычислительные устройства и сеть вычислительных устройств представляют собой равноправные объекты иерархии.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US44232803P | 2003-01-24 | 2003-01-24 | |
US60/442,328 | 2003-01-24 |
Publications (2)
Publication Number | Publication Date |
---|---|
RU2005126731A true RU2005126731A (ru) | 2006-03-27 |
RU2334362C2 RU2334362C2 (ru) | 2008-09-20 |
Family
ID=32825201
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
RU2005126731/09A RU2334362C2 (ru) | 2003-01-24 | 2004-01-21 | Способ и устройство для безопасного обмена данными и совместное использование ресурсов между анонимными сторонами, не имеющими доверительных отношений, без центрального администрирования |
Country Status (10)
Country | Link |
---|---|
US (4) | US20060136721A1 (ru) |
EP (2) | EP1590915A4 (ru) |
JP (1) | JP2006517077A (ru) |
KR (1) | KR20050103205A (ru) |
CN (1) | CN1762123A (ru) |
AU (1) | AU2004207949B8 (ru) |
BR (1) | BRPI0406978A (ru) |
CA (1) | CA2513653C (ru) |
RU (1) | RU2334362C2 (ru) |
WO (1) | WO2004068722A2 (ru) |
Families Citing this family (40)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6770852B1 (en) * | 2003-02-27 | 2004-08-03 | Lam Research Corporation | Critical dimension variation compensation across a wafer by means of local wafer temperature control |
US8139507B2 (en) * | 2004-09-15 | 2012-03-20 | Hewlett-Packard Development Company, L.P. | Network graph for alternate routes |
US8799472B2 (en) * | 2004-10-06 | 2014-08-05 | Riverbed Technology, Inc. | Peer signaling protocol and system for decentralized traffic management |
US7783728B2 (en) * | 2004-11-22 | 2010-08-24 | International Business Machines Corporation | Concurrent evaluation of policies with synchronization |
CN101160988B (zh) * | 2005-02-01 | 2011-11-23 | Exs有限公司 | 用于无线接入的分层网格网络 |
WO2006093879A2 (en) | 2005-02-26 | 2006-09-08 | Coco Communications Corporation | Naming system layer |
US7996841B2 (en) * | 2005-12-12 | 2011-08-09 | Microsoft Corporation | Building alternative views of name spaces |
US8312459B2 (en) | 2005-12-12 | 2012-11-13 | Microsoft Corporation | Use of rules engine to build namespaces |
US8539481B2 (en) | 2005-12-12 | 2013-09-17 | Microsoft Corporation | Using virtual hierarchies to build alternative namespaces |
US8370928B1 (en) * | 2006-01-26 | 2013-02-05 | Mcafee, Inc. | System, method and computer program product for behavioral partitioning of a network to detect undesirable nodes |
US8208466B2 (en) * | 2006-02-01 | 2012-06-26 | Coco Communications Corp. | Protocol circuit layer |
JP4957075B2 (ja) * | 2006-05-15 | 2012-06-20 | 富士通株式会社 | 信頼度評価プログラムおよび信頼度評価装置 |
CN100466859C (zh) * | 2006-06-29 | 2009-03-04 | 华为技术有限公司 | 用于无线mesh网的业务QoS保证方法和装置 |
US9276774B2 (en) * | 2006-08-29 | 2016-03-01 | The Boeing Company | Visualizing and modifying ad-hoc network nodes |
US20080123586A1 (en) * | 2006-08-29 | 2008-05-29 | Manser David B | Visualization of ad hoc network nodes |
US7895345B2 (en) * | 2007-04-13 | 2011-02-22 | Microsoft Corporation | Distributed routing table architecture and design |
KR100901691B1 (ko) * | 2007-12-04 | 2009-06-08 | 한국전자통신연구원 | 메쉬-스타 혼합 온칩 네트워크 통신 시스템 및 그의 통신방법 |
KR101279500B1 (ko) * | 2011-11-10 | 2013-06-27 | 한국기초과학지원연구원 | 노드의 동적 상태 변화에 따른 라우팅 경로 결정 방법 |
US8904526B2 (en) * | 2012-11-20 | 2014-12-02 | Bank Of America Corporation | Enhanced network security |
US9876716B2 (en) * | 2012-12-19 | 2018-01-23 | Nec Corporation | Packet processing apparatus, flow entry configuration method and program |
US9585177B2 (en) | 2013-12-11 | 2017-02-28 | At&T Intellectual Property I, L.P. | Cellular connection sharing |
WO2015108702A1 (en) * | 2014-01-14 | 2015-07-23 | Zsolutionz, LLC | Cloud-based initiation of customized exercise routine |
WO2015108700A1 (en) | 2014-01-14 | 2015-07-23 | Zsolutionz, LLC | Sensor-based evaluation and feedback of exercise performance |
WO2015108701A1 (en) | 2014-01-14 | 2015-07-23 | Zsolutionz, LLC | Fuzzy logic-based evaluation and feedback of exercise performance |
US10873454B2 (en) | 2014-04-04 | 2020-12-22 | Zettaset, Inc. | Cloud storage encryption with variable block sizes |
US10298555B2 (en) * | 2014-04-04 | 2019-05-21 | Zettaset, Inc. | Securing files under the semi-trusted user threat model using per-file key encryption |
US10043029B2 (en) | 2014-04-04 | 2018-08-07 | Zettaset, Inc. | Cloud storage encryption |
KR20170102173A (ko) * | 2014-12-31 | 2017-09-07 | 후아웨이 테크놀러지 컴퍼니 리미티드 | 데이터 전송 방법 및 디바이스 |
US9838870B2 (en) * | 2015-03-25 | 2017-12-05 | Juniper Networks, Inc. | Apparatus and method for authenticating network devices |
CN105260429B (zh) * | 2015-09-30 | 2019-04-26 | 河南科技大学 | 一种基于多重布隆过滤器的icn网络信息名字查找方法 |
US10944669B1 (en) | 2018-02-09 | 2021-03-09 | GoTenna, Inc. | System and method for efficient network-wide broadcast in a multi-hop wireless network using packet echos |
US11243321B2 (en) | 2018-05-04 | 2022-02-08 | Chevron U.S.A. Inc. | Correcting a digital seismic image using a function of speed of sound in water derived from fiber optic sensing |
CN211668521U (zh) * | 2018-05-31 | 2020-10-13 | 上海快仓智能科技有限公司 | 用于图像采集的自动引导车、以及图像采集和处理系统 |
CA3107919A1 (en) | 2018-07-27 | 2020-01-30 | GoTenna, Inc. | Vinetm: zero-control routing using data packet inspection for wireless mesh networks |
US11303456B2 (en) | 2019-02-15 | 2022-04-12 | International Business Machines Corporation | Compute digital signature authentication sign instruction |
US11075763B2 (en) * | 2019-02-15 | 2021-07-27 | International Business Machines Corporation | Compute digital signature authentication sign with encrypted key instruction |
US11108567B2 (en) | 2019-02-15 | 2021-08-31 | International Business Machines Corporation | Compute digital signature authentication verify instruction |
CN110119129A (zh) * | 2019-05-10 | 2019-08-13 | 上海新联合电气有限公司 | 工业控制网络 |
RU2722925C1 (ru) * | 2019-10-09 | 2020-06-04 | Общество с ограниченной ответственностью "Доверенные Решения" (ООО "Доверенные Решения") | Способ защищенного информационного обмена данными |
RU2748966C1 (ru) * | 2020-02-26 | 2021-06-02 | Акционерное общество "Лаборатория Касперского" | Способ синхронизации анонимных идентификаторов |
Family Cites Families (32)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5511122A (en) * | 1994-06-03 | 1996-04-23 | The United States Of America As Represented By The Secretary Of The Navy | Intermediate network authentication |
US5677851A (en) * | 1994-12-15 | 1997-10-14 | Novell, Inc. | Method and apparatus to secure digital directory object changes |
US6085238A (en) * | 1996-04-23 | 2000-07-04 | Matsushita Electric Works, Ltd. | Virtual LAN system |
US5987011A (en) * | 1996-08-30 | 1999-11-16 | Chai-Keong Toh | Routing method for Ad-Hoc mobile networks |
US6266704B1 (en) * | 1997-05-30 | 2001-07-24 | The United States Of America As Represented By The Secretary Of The Navy | Onion routing network for securely moving data through communication networks |
DE19746904B4 (de) * | 1997-10-23 | 2004-09-30 | Telefonaktiebolaget L M Ericsson (Publ) | Verkehrsdaten-Bewertungsgerät und zugeordnetes Verfahren für ein Netzwerk mit dynamischer Vermittlung |
US6487170B1 (en) * | 1998-11-18 | 2002-11-26 | Nortel Networks Limited | Providing admission control and network quality of service with a distributed bandwidth broker |
AU774602B2 (en) * | 1998-12-23 | 2004-07-01 | Nokia Inc. | A unified routing scheme for ad-hoc internetworking |
JP2000235493A (ja) * | 1999-02-12 | 2000-08-29 | Fujitsu Ltd | トレーディング装置 |
US6721555B1 (en) * | 1999-02-19 | 2004-04-13 | Qualcomm Incorporated | System and method for facilitating device authentication in a wireless communications system |
US6505254B1 (en) * | 1999-04-19 | 2003-01-07 | Cisco Technology, Inc. | Methods and apparatus for routing requests in a network |
US6757823B1 (en) * | 1999-07-27 | 2004-06-29 | Nortel Networks Limited | System and method for enabling secure connections for H.323 VoIP calls |
US6738900B1 (en) * | 2000-01-28 | 2004-05-18 | Nortel Networks Limited | Method and apparatus for distributing public key certificates |
US7278017B2 (en) * | 2000-06-07 | 2007-10-02 | Anoto Ab | Method and device for secure wireless transmission of information |
JP3729051B2 (ja) * | 2000-10-18 | 2005-12-21 | 日本電気株式会社 | インタードメインルーティング装置、システムおよび方法 |
DE10062303C2 (de) * | 2000-12-14 | 2002-11-28 | Layers Ag 7 | Verfahren zum Betrieb eines Ad Hoc-Netzwerkes zur drahtlosen Datenübertragung von synchronen und asynchronen Nachrichten |
WO2002057917A2 (en) * | 2001-01-22 | 2002-07-25 | Sun Microsystems, Inc. | Peer-to-peer network computing platform |
JP2002232410A (ja) * | 2001-01-30 | 2002-08-16 | Nippon Telegr & Teleph Corp <Ntt> | 暗号化データの通信装置および通信方法 |
US7266085B2 (en) * | 2001-03-21 | 2007-09-04 | Stine John A | Access and routing protocol for ad hoc network using synchronous collision resolution and node state dissemination |
US7756041B2 (en) * | 2001-06-14 | 2010-07-13 | Meshnetworks, Inc. | Embedded routing algorithms under the internet protocol routing layer of a software architecture protocol stack in a mobile Ad-Hoc network |
EP1282024A1 (en) * | 2001-07-30 | 2003-02-05 | Hewlett-Packard Company | Trusted identities on a trusted computing platform |
US7089298B2 (en) * | 2001-08-20 | 2006-08-08 | Nokia Corporation | Naming distribution method for ad hoc networks |
US6987764B2 (en) * | 2001-11-05 | 2006-01-17 | Qualcomm, Incorporated | Method and apparatus for selecting a packet data serving node for multi-cast/broadcast services |
US7512649B2 (en) * | 2002-03-22 | 2009-03-31 | Sun Microsytems, Inc. | Distributed identities |
JP2003316576A (ja) * | 2002-04-25 | 2003-11-07 | Hitachi Ltd | アプリケーション制御方法及びその実施装置並びにその処理プログラム |
US6954435B2 (en) * | 2002-04-29 | 2005-10-11 | Harris Corporation | Determining quality of service (QoS) routing for mobile ad hoc networks |
US6718394B2 (en) * | 2002-04-29 | 2004-04-06 | Harris Corporation | Hierarchical mobile ad-hoc network and methods for performing reactive routing therein using ad-hoc on-demand distance vector routing (AODV) |
US6879574B2 (en) * | 2002-06-24 | 2005-04-12 | Nokia Corporation | Mobile mesh Ad-Hoc networking |
US8046832B2 (en) * | 2002-06-26 | 2011-10-25 | Microsoft Corporation | Spam detector with challenges |
US7395311B2 (en) * | 2003-01-10 | 2008-07-01 | Microsoft Corporation | Performing generic challenges in a distributed system |
US7606915B1 (en) * | 2003-02-25 | 2009-10-20 | Microsoft Corporation | Prevention of unauthorized scripts |
US20050132226A1 (en) * | 2003-12-11 | 2005-06-16 | David Wheeler | Trusted mobile platform architecture |
-
2004
- 2004-01-21 US US10/542,824 patent/US20060136721A1/en not_active Abandoned
- 2004-01-21 CN CNA2004800073308A patent/CN1762123A/zh active Pending
- 2004-01-21 WO PCT/US2004/001458 patent/WO2004068722A2/en active Application Filing
- 2004-01-21 EP EP04703985A patent/EP1590915A4/en not_active Withdrawn
- 2004-01-21 KR KR1020057013701A patent/KR20050103205A/ko not_active Application Discontinuation
- 2004-01-21 CA CA2513653A patent/CA2513653C/en not_active Expired - Fee Related
- 2004-01-21 EP EP12180918A patent/EP2562980A1/en not_active Withdrawn
- 2004-01-21 RU RU2005126731/09A patent/RU2334362C2/ru not_active IP Right Cessation
- 2004-01-21 AU AU2004207949A patent/AU2004207949B8/en not_active Ceased
- 2004-01-21 JP JP2006502897A patent/JP2006517077A/ja active Pending
- 2004-01-21 BR BR0406978-1A patent/BRPI0406978A/pt not_active Application Discontinuation
-
2008
- 2008-01-22 US US12/018,032 patent/US20080320305A1/en not_active Abandoned
-
2012
- 2012-06-08 US US13/492,169 patent/US9391806B2/en not_active Expired - Fee Related
-
2016
- 2016-07-11 US US15/207,325 patent/US9866395B2/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
JP2006517077A (ja) | 2006-07-13 |
EP1590915A4 (en) | 2010-05-19 |
US9866395B2 (en) | 2018-01-09 |
US20080320305A1 (en) | 2008-12-25 |
KR20050103205A (ko) | 2005-10-27 |
US20060136721A1 (en) | 2006-06-22 |
US20160323113A1 (en) | 2016-11-03 |
CN1762123A (zh) | 2006-04-19 |
AU2004207949B2 (en) | 2009-12-10 |
RU2334362C2 (ru) | 2008-09-20 |
WO2004068722A2 (en) | 2004-08-12 |
AU2004207949A1 (en) | 2004-08-12 |
CA2513653C (en) | 2013-10-01 |
CA2513653A1 (en) | 2004-08-12 |
BRPI0406978A (pt) | 2006-01-10 |
WO2004068722A3 (en) | 2004-12-16 |
US20120311334A1 (en) | 2012-12-06 |
AU2004207949A8 (en) | 2004-08-12 |
US9391806B2 (en) | 2016-07-12 |
EP2562980A1 (en) | 2013-02-27 |
AU2004207949B8 (en) | 2010-05-13 |
EP1590915A2 (en) | 2005-11-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
RU2005126731A (ru) | Способ и устройство для безопасного обмена данных и совместное использование ресурсов между анонимными сторонами, не имеющими доверительных отношений, без центрального администрирования | |
Tysowski et al. | The engineering of a scalable multi-site communications system utilizing quantum key distribution (QKD) | |
CN100596062C (zh) | 分布式报文传输安全保护装置和方法 | |
CN101242630B (zh) | 安全算法协商的方法、装置及网络系统 | |
CN101515896B (zh) | 安全套接字层协议报文转发方法、装置、系统及交换机 | |
Bhattacharjee et al. | Postmodern internetwork architecture | |
CN102742247A (zh) | 一种数据分路传输方法及装置、系统 | |
Tang et al. | Strong authentication for tactical mobile ad hoc networks | |
CN101834722B (zh) | 一种加密设备和非加密设备混合组网的通信方法 | |
de Ree et al. | Key management for secure network coding-enabled mobile small cells | |
Nasiraee et al. | A new three party key establishment scheme: Applicable for internet-enabled sensor networks | |
JP2004023597A (ja) | ネットワークシステムおよびプログラム | |
US20140282892A1 (en) | System and method for providing a secure book device using cryptographically secure communications across secure networks | |
Jagetiya et al. | Survey of transport layer multihoming protocols and performance analysis of MPTCP | |
Ylitalo et al. | End-point Identifiers in Secure Multi-homed Mobility. | |
Al-Momin et al. | Adaptive Three-Layer Weighted Links Routing Protocol for Secure Transmission over Optical Networks | |
Conti et al. | RICe: Remote Attestation of Internet of Mobile Things in Information Centric Networking | |
Vidya et al. | Investigation of Open Short Path First for Implementing Hub and Spoke Topologies in Virtual Private Networks | |
Staessens et al. | Design of the Ouroboros packet network | |
Clarke et al. | A novel security architecture for a space-data DTN | |
Eddy et al. | Secure Naming and Addressing Operations for Store, Carry and Forward Networks | |
Sheshasaayee et al. | Implementation for Securing the Cloud Data and Providing Secured Access Across the Network | |
JP2005005854A (ja) | 通信経路設定方法 | |
WO2003069828A3 (en) | System and methods for protecting network sites from denial of service attacks | |
KR101212351B1 (ko) | 이동성과 보안성을 구비한 애드 혹 게이트웨이 및 단말기 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PD4A | Correction of name of patent owner | ||
MM4A | The patent is invalid due to non-payment of fees |
Effective date: 20200122 |