Patent application number | Description | Published |
20110029778 | METHOD FOR DISTRIBUTED IDENTIFICATION, A STATION IN A NETWORK - The present invention relates to a method for identifying and/or, authenticating, and/or authorizing a first radio station in a radio network, comprising the steps of (a) at the first radio station, transmitting to a second radio station a first radio station identifier computed from a set of identity parameters based on the identity of the first radio station, comprising at least one identity parameter, (b) at the first radio station, transmitting at least one identity parameter from the set of identity parameters, (c) at the second radio station, comparing an authentication identifier computed on the basis of the transmitted identity parameter to the first radio station identifier for enabling a subsequent communication between the first and second radio stations. | 02-03-2011 |
20110033054 | METHOD FOR DISTRIBUTING ENCRYPTION MEANS - The present invention relates to method for operating a trust centre for distributing key material to at least one radio station, comprising the steps of at the trust centre, dividing an identifier of the radio station, said identifier being a code word consisting a first number of bits, into a plurality of subidentifiers, and generating for each subidentifier, an keying material function selected out of a set of keying material functions on the basis of the considered subidentifier at the trust centre, transmitting to the radio station the identifier and the key material comprising the generated encryption functions. | 02-10-2011 |
20110164750 | METHOD FOR COMMUNICATING IN A NETWORK, A COMMUNICATION DEVICE AND A SYSTEM THEREFOR - The present invention relates to a communication system comprising a first node and second node adapted for communicating in a network, wherein the first node comprises a first list of keying materials including a plurality of keying materials, wherein the second node comprises a second list of keying materials including a plurality of keying materials, wherein the first node further comprises a receiver for receiving from the second node a second node identifier, a controller being arranged for determining from the second node identifier the position in the first list of at least one keying material having a common root with one keying material of the second list, and for generating an encryption key by means of the keying material having a common root and the second node identifier. | 07-07-2011 |
20110167273 | METHOD FOR SECURE COMMUNICATION IN A NETWORK, A COMMUNICATION DEVICE, A NETWORK AND A COMPUTER PROGRAM THEREFOR - The present invention relates to a method for secure communications and communication networks having communication devices, using secure means like encryption system for securing communications. More particularly, the present invention relates to a method for secure communications from a first node (N | 07-07-2011 |
20110197064 | METHOD FOR OPERATING A NETWORK, A SYSTEM MANAGEMENT DEVICE, A NETWORK AND A COMPUTER PROGRAM THEREFOR - The present invention relates to a method for operating a network comprising communicating devices representing nodes of the network. More precisely, the invention relates to a method for operating a network ( | 08-11-2011 |
20110206201 | METHOD OF GENERATING A CRYPTOGRAPHIC KEY, NETWORK AND COMPUTER PROGRAM THEREFOR - The present invention relates to security systems for communication networks. More precisely, the invention relates to a method for generating a shared key between a first node (D | 08-25-2011 |
20110317838 | METHOD FOR SECURE COMMUNICATION IN A NETWORK, A COMMUNICATION DEVICE, A NETWORK AND A COMPUTER PROGRAM THEREFOR - A method for securing communications between a first node (N | 12-29-2011 |
20120047361 | METHOD FOR SECURING COMMUNICATIONS IN A WIRELESS NETWORK, AND RESOURCE-RESTRICTED DEVICE THEREFOR - The present invention relates to a method for securing communications between a resource-restricted device ( | 02-23-2012 |
20120084863 | METHOD AND SYSTEM FOR IDENTIFYING COMPROMISED NODES - The invention relates to a method for identifying compromised nodes in a ZigBee network comprising a general trust center, divided in at least two security domains, each security domain corresponding to a spatial or temporal area, and being associated with a different root keying material, and each node being identified by an identifier, the method comprising: upon detection of a node (U | 04-05-2012 |
20120114123 | METHOD FOR SECURELY BROADCASTING SENSITIVE DATA IN A WIRELESS NETWORK - The invention relates to a method for securely broadcasting sensitive data in a wireless sensor networks comprising a central device, called trust center, and a plurality of sensor nodes, the trust center being initialized with a cryptographic hash chain and each node being initialized with a node key and the anchor of the trust center hash chain, the method comprising the following steps: the trust center broadcasting a first secure message to the nodes, each node, after reception of the first message, creating a first acknowledgment message, and transmitting it back to the trust center, the trust center checking whether all the nodes have transmitted respective first acknowledgment message, and in case all messages have been received, the trust center securely broadcasting sensitive data in a third message, the nodes checking, based on elements included in the first message, whether sensitive data actually originates from the trust center. | 05-10-2012 |
20120195431 | METHOD FOR OPERATING A NODE IN A WIRELESS SENSOR NETWORK - The present invention relates to a method for operating a first node in a network, the network including a plurality of nodes, the method comprising (a) the first node having a first identifier joining the network by transmitting the first identifier to a second node having a second identifier, (b) the first node generating a first key on the basis of the second identifier (c) the first node authenticating the second node by means of the first key, (d) the first node communicating with a third node if the first and second keys are equal. | 08-02-2012 |
20130272125 | COMPONENT, SYSTEM AND METHOD FOR CONTROLLING COMMUNICATION OF DATA OF AT LEAST ONE APPLICATION OF A COMMUNICATIONS NETWORK - For improving application data traffic in a communications network, data traffic of at least one application of the communications network is divided into two types in view of the current situation of the network—a first type comprising data, which can be transmitted by delaying the transmission, and a second type comprising data, which should not be delayed but should be transmitted at the current time. When an analysis of the current (average) load of the network shows that transmitting both types of data could lead to a heavy data traffic, a temporal transmission suppression session can be performed with regard to at least one entity of the communications network. In the temporal transmission suppression session, transmitting of data of the first type is interrupted during transmitting data of the second type. After completion of transmitting data of the second type, transmitting data of the first type is resumed. | 10-17-2013 |
20150341172 | KEY SHARING NETWORK DEVICE AND CONFIGURATION THEREOF - A method of configuring a network device for key sharing, the method comprising obtaining ( | 11-26-2015 |
20150358154 | RANDOM NUMBER GENERATOR AND STREAM CIPHER - An electronic random number generating device ( | 12-10-2015 |
Patent application number | Description | Published |
20090264712 | AUTOMATIC TRANSFER AND IDENTIFICATION OF MONITORED DATA WITH HIERARCHICAL KEY MANAGEMENT INFRASTRUCTURE - A measurement device ( | 10-22-2009 |
20100183152 | NETWORK AND METHOD FOR INITIALIZING A TRUST CENTER LINK KEY - The invention relates in general to a network and to a method for initializing a trust center link key. According to an embodiment of the invention, a network is provided with a new node ( | 07-22-2010 |
20100241862 | MULTIDIMENSIONAL IDENTIFICATION, AUTHENTICATION, AUTHORIZATION AND KEY DISTRIBUTION SYSTEM FOR PATIENT MONITORING - A method, wireless system and a wireless device are described. The method, system and device provide multidimensional identification, authentication, authorization and key distribution providing secure communications at a deepest common security domain. | 09-23-2010 |
20100290622 | WIRELESS COMMUNICATION SYSTEM AND METHOD FOR AUTOMATIC NODE AND KEY REVOCATION - A wireless system and method to control the cryptographic keying material that has been compromised in the network; exclude captured nodes from the network; and update compromised keying material in uncompromised devices are described. This system and method is useful in alpha-secure key distribution systems comprising a multitude of alpha-secure keying material shares to be controlled, revoked or updated. | 11-18-2010 |
20110113475 | NODE FOR A NETWORK AND METHOD FOR ESTABLISHING A DISTRIBUTED SECURITY ARCHITECTURE FOR A NETWORK - The invention relates to a node ( | 05-12-2011 |
20110119489 | NETWORK AND METHOD FOR ESTABLISHING A SECURE NETWORK - The invention relates to a network with a first node ( | 05-19-2011 |
20110145894 | PERSONAL SECURITY MANAGER FOR UBIQUITOUS PATIENT MONITORING - The present invention relates to a system and corresponding method for a secure end-to-end patient healthcare system which includes wireless medical sensors adapted to be attached to a patient's body and in communication with each other forming a body sensor network within a wireless medical sensor network including one or more body sensor networks; λ-secure keying means incorporated into each wireless medical sensor for enabling secure communications between the wireless medical sensors, and a personal security manager within the body sensor network and in communication with the wireless medical sensors within the body sensor network, the personal security manager providing secure communications with backend services and providing security relationships within the body sensor network by means of the λ-secure keying means, wherein the λ-secure keying means are such that a coalition of no more than λ compromised wireless medical sensors conceals a pairwise key between any two non-compromised wireless medical sensors and provides protection against node compromise until λ+1 wireless medical sensors have been compromised. | 06-16-2011 |
20130182566 | DEVICE AND METHOD FOR LOAD BALANCING FOR DATA PACKET TRANSMISSIONS IN WIRELESS NETWORKS - For load balancing in a large-scale wireless mesh network, a device, a system and a method are provided for controlling data packet transmissions in the wireless mesh network, wherein answers to more than one received data packet are aggregated in one answer-batch. | 07-18-2013 |
20130188562 | DEVICE AND METHOD FOR DELAY OPTIMIZATION OF END-TO-END DATA PACKET TRANSMISSIONS IN WIRELESS NETWORKS - For reducing and homogenizing an end-to-end delay of data packet transmissions in a large-scale wireless mesh network, a device, a system and a method are provided for controlling data packet transmission in the wireless network, wherein transmission parameters of an intermediate node are adjusted based on a distance between the intermediate node and a sender node. | 07-25-2013 |
20130242929 | SYSTEM AND METHOD FOR OPTIMIZING DATA TRANSMISSION TO NODES OF A WIRELESS MESH NETWORK - For improving data packet transmission from a collector node to one or more network nodes without additional routing protocols or increase of the overall network load, a system and a method are provided, wherein a node and/or the collector node receiving an uplink data packet addressed to the collector node is adapted to store at least a sender node information and a transmitting node information as a reverse-route information for a predetermined time. | 09-19-2013 |
20130279697 | Lighting system, a light source, a device and a method of authorizing the device by the light source - A lighting system ( | 10-24-2013 |
20130285574 | CONTROL OF NETWORK LIGHTING SYSTEMS - The invention relates to the control of networked lighting systems, particularly large scale networked lighting systems, and more specifically to an efficient transmission of messages to control luminaries of a networked lighting system. A basic idea of the invention is to provide an efficient and flexible multicast, particularly group cast message that addresses several or a group of luminaires, and that can control the addressed luminaries in an efficient way by compressing the distributed light settings using a function in order to reduce the communicational overhead. An embodiment of the invention relates to a method for controlling a networked lighting system comprising the steps of—selecting several controllable luminaries of the networked lighting system (S | 10-31-2013 |
20140096253 | AVOIDANCE OF HOSTILE ATTACKS IN A NETWORK - For improving the protection of a network against denial of service attacks and other hostile attacks, while keeping the operation of the network simple and efficient and considering restricted capacities of single network nodes, a control unit, a system and a method for operating a network with a plurality of nodes are provided, wherein at least one operation parameter of at least one node is adjusted based on a current network phase and a data packet received by the node ( | 04-03-2014 |
20140115666 | SECURE PROTOCOL EXECUTION IN A NETWORK - For secure configuration of network nodes from a backend with low connectivity requirements and workload at the backend and reduced communication overhead, a system, a control unit for a segment controller and a method for secure protocol execution in a network are provided, wherein protocol information is provided to a segment controller ( | 04-24-2014 |
20140143855 | Methods, devices and systems for establishing end-to-end secure connections and for securely communicating data packets - The invention provides methods, devices ( | 05-22-2014 |
20140192723 | Device and method for controlling a node of a wireless network - In order to increase transmission reliability and transmission efficiency in the presence of interference at a transmitting or receiving node of a wireless network a device for controlling the node of the wireless network is provided, wherein the node is associated to at least one load unit. The device comprises a control unit that is adapted to adjust a communication mode of the node based on an operation state of the load unit. | 07-10-2014 |
20150069920 | Failure detection in lighting system - The present invention relates to a method of detecting a failed luminaire and/or light sensor in a lighting system comprising M luminaires and N light sensors. The elements D | 03-12-2015 |
20150134960 | DETERMINATION OF CRYPTOGRAPHIC KEYS - A first communication unit ( | 05-14-2015 |
20150263861 | VERIFYING THE AUTHENTICITY OF A LIGHTING DEVICE - The present invention relates to verification of the authenticity of a lighting device. There is provided a lighting device which is capable of emitting coded light. The lighting device has a challenge receiver, arranged to receive a challenge, and a response transmitter, arranged to generate and transmit a response to the challenge. The response is generated by means of the challenge and a secret key in combination. Furthermore, there is provided a corresponding verification device generating the challenge and providing it to the lighting device, and analyzing the response in order to check the authenticity of the lighting device. | 09-17-2015 |
20150381365 | NETWORK DEVICE CONFIGURED TO DERIVE A SHARED KEY - A network device ( | 12-31-2015 |