Patent application number | Description | Published |
20110029778 | METHOD FOR DISTRIBUTED IDENTIFICATION, A STATION IN A NETWORK - The present invention relates to a method for identifying and/or, authenticating, and/or authorizing a first radio station in a radio network, comprising the steps of (a) at the first radio station, transmitting to a second radio station a first radio station identifier computed from a set of identity parameters based on the identity of the first radio station, comprising at least one identity parameter, (b) at the first radio station, transmitting at least one identity parameter from the set of identity parameters, (c) at the second radio station, comparing an authentication identifier computed on the basis of the transmitted identity parameter to the first radio station identifier for enabling a subsequent communication between the first and second radio stations. | 02-03-2011 |
20110033054 | METHOD FOR DISTRIBUTING ENCRYPTION MEANS - The present invention relates to method for operating a trust centre for distributing key material to at least one radio station, comprising the steps of at the trust centre, dividing an identifier of the radio station, said identifier being a code word consisting a first number of bits, into a plurality of subidentifiers, and generating for each subidentifier, an keying material function selected out of a set of keying material functions on the basis of the considered subidentifier at the trust centre, transmitting to the radio station the identifier and the key material comprising the generated encryption functions. | 02-10-2011 |
20110164750 | METHOD FOR COMMUNICATING IN A NETWORK, A COMMUNICATION DEVICE AND A SYSTEM THEREFOR - The present invention relates to a communication system comprising a first node and second node adapted for communicating in a network, wherein the first node comprises a first list of keying materials including a plurality of keying materials, wherein the second node comprises a second list of keying materials including a plurality of keying materials, wherein the first node further comprises a receiver for receiving from the second node a second node identifier, a controller being arranged for determining from the second node identifier the position in the first list of at least one keying material having a common root with one keying material of the second list, and for generating an encryption key by means of the keying material having a common root and the second node identifier. | 07-07-2011 |
20110167273 | METHOD FOR SECURE COMMUNICATION IN A NETWORK, A COMMUNICATION DEVICE, A NETWORK AND A COMPUTER PROGRAM THEREFOR - The present invention relates to a method for secure communications and communication networks having communication devices, using secure means like encryption system for securing communications. More particularly, the present invention relates to a method for secure communications from a first node (N | 07-07-2011 |
20110197064 | METHOD FOR OPERATING A NETWORK, A SYSTEM MANAGEMENT DEVICE, A NETWORK AND A COMPUTER PROGRAM THEREFOR - The present invention relates to a method for operating a network comprising communicating devices representing nodes of the network. More precisely, the invention relates to a method for operating a network ( | 08-11-2011 |
20110206201 | METHOD OF GENERATING A CRYPTOGRAPHIC KEY, NETWORK AND COMPUTER PROGRAM THEREFOR - The present invention relates to security systems for communication networks. More precisely, the invention relates to a method for generating a shared key between a first node (D | 08-25-2011 |
20110317838 | METHOD FOR SECURE COMMUNICATION IN A NETWORK, A COMMUNICATION DEVICE, A NETWORK AND A COMPUTER PROGRAM THEREFOR - A method for securing communications between a first node (N | 12-29-2011 |
20120047361 | METHOD FOR SECURING COMMUNICATIONS IN A WIRELESS NETWORK, AND RESOURCE-RESTRICTED DEVICE THEREFOR - The present invention relates to a method for securing communications between a resource-restricted device ( | 02-23-2012 |
20120084863 | METHOD AND SYSTEM FOR IDENTIFYING COMPROMISED NODES - The invention relates to a method for identifying compromised nodes in a ZigBee network comprising a general trust center, divided in at least two security domains, each security domain corresponding to a spatial or temporal area, and being associated with a different root keying material, and each node being identified by an identifier, the method comprising: upon detection of a node (U | 04-05-2012 |
20120114123 | METHOD FOR SECURELY BROADCASTING SENSITIVE DATA IN A WIRELESS NETWORK - The invention relates to a method for securely broadcasting sensitive data in a wireless sensor networks comprising a central device, called trust center, and a plurality of sensor nodes, the trust center being initialized with a cryptographic hash chain and each node being initialized with a node key and the anchor of the trust center hash chain, the method comprising the following steps: the trust center broadcasting a first secure message to the nodes, each node, after reception of the first message, creating a first acknowledgment message, and transmitting it back to the trust center, the trust center checking whether all the nodes have transmitted respective first acknowledgment message, and in case all messages have been received, the trust center securely broadcasting sensitive data in a third message, the nodes checking, based on elements included in the first message, whether sensitive data actually originates from the trust center. | 05-10-2012 |
20120195431 | METHOD FOR OPERATING A NODE IN A WIRELESS SENSOR NETWORK - The present invention relates to a method for operating a first node in a network, the network including a plurality of nodes, the method comprising (a) the first node having a first identifier joining the network by transmitting the first identifier to a second node having a second identifier, (b) the first node generating a first key on the basis of the second identifier (c) the first node authenticating the second node by means of the first key, (d) the first node communicating with a third node if the first and second keys are equal. | 08-02-2012 |
20130272125 | COMPONENT, SYSTEM AND METHOD FOR CONTROLLING COMMUNICATION OF DATA OF AT LEAST ONE APPLICATION OF A COMMUNICATIONS NETWORK - For improving application data traffic in a communications network, data traffic of at least one application of the communications network is divided into two types in view of the current situation of the network—a first type comprising data, which can be transmitted by delaying the transmission, and a second type comprising data, which should not be delayed but should be transmitted at the current time. When an analysis of the current (average) load of the network shows that transmitting both types of data could lead to a heavy data traffic, a temporal transmission suppression session can be performed with regard to at least one entity of the communications network. In the temporal transmission suppression session, transmitting of data of the first type is interrupted during transmitting data of the second type. After completion of transmitting data of the second type, transmitting data of the first type is resumed. | 10-17-2013 |