RU2334362C2 - Способ и устройство для безопасного обмена данными и совместное использование ресурсов между анонимными сторонами, не имеющими доверительных отношений, без центрального администрирования - Google Patents

Способ и устройство для безопасного обмена данными и совместное использование ресурсов между анонимными сторонами, не имеющими доверительных отношений, без центрального администрирования Download PDF

Info

Publication number
RU2334362C2
RU2334362C2 RU2005126731/09A RU2005126731A RU2334362C2 RU 2334362 C2 RU2334362 C2 RU 2334362C2 RU 2005126731/09 A RU2005126731/09 A RU 2005126731/09A RU 2005126731 A RU2005126731 A RU 2005126731A RU 2334362 C2 RU2334362 C2 RU 2334362C2
Authority
RU
Russia
Prior art keywords
computing device
network
computing devices
hierarchical
transmitting
Prior art date
Application number
RU2005126731/09A
Other languages
English (en)
Other versions
RU2005126731A (ru
Inventor
Джереми БРУСТЛ (US)
Джереми БРУСТЛ
Марк ТАКЕР (US)
Марк ТАКЕР
Original Assignee
Коко Коммьюникейшнз Корп.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Коко Коммьюникейшнз Корп. filed Critical Коко Коммьюникейшнз Корп.
Publication of RU2005126731A publication Critical patent/RU2005126731A/ru
Application granted granted Critical
Publication of RU2334362C2 publication Critical patent/RU2334362C2/ru

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3249Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/44Star or tree networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/22Arrangements for preventing the taking of data from a data transmission channel without authorisation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0893Assignment of logical groups to network elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/02Topology update or discovery
    • H04L45/04Interdomain routing, e.g. hierarchical routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/46Cluster building
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/12Avoiding congestion; Recovering from congestion
    • H04L47/125Avoiding congestion; Recovering from congestion by balancing the load, e.g. traffic engineering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/16Flow control; Congestion control in connection oriented networks, e.g. frame relay
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/24Traffic characterised by specific attributes, e.g. priority or QoS
    • H04L47/2441Traffic characterised by specific attributes, e.g. priority or QoS relying on flow classification, e.g. using integrated services [IntServ]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/41Flow control; Congestion control by acting on aggregated flows or links
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/70Admission control; Resource allocation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/70Admission control; Resource allocation
    • H04L47/74Admission control; Resource allocation measures in reaction to resource unavailability
    • H04L47/746Reaction triggered by a failure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/70Admission control; Resource allocation
    • H04L47/78Architectures of resource allocation
    • H04L47/782Hierarchical allocation of resources, e.g. involving a hierarchy of local and centralised entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/70Admission control; Resource allocation
    • H04L47/80Actions related to the user profile or the type of traffic
    • H04L47/805QOS or priority aware
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/70Admission control; Resource allocation
    • H04L47/80Actions related to the user profile or the type of traffic
    • H04L47/806Broadcast or multicast traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/70Admission control; Resource allocation
    • H04L47/82Miscellaneous aspects
    • H04L47/822Collecting or measuring resource availability data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/70Admission control; Resource allocation
    • H04L47/82Miscellaneous aspects
    • H04L47/828Allocation of resources per group of connections, e.g. per group of users
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/302Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0894Policy-based network configuration management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/02Communication route or path selection, e.g. power-based or shortest path routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/24Connectivity information management, e.g. connectivity discovery or connectivity update
    • H04W40/246Connectivity information discovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/24Connectivity information management, e.g. connectivity discovery or connectivity update
    • H04W40/248Connectivity information update
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02BCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO BUILDINGS, e.g. HOUSING, HOUSE APPLIANCES OR RELATED END-USER APPLICATIONS
    • Y02B70/00Technologies for an efficient end-user side electric power management and consumption
    • Y02B70/30Systems integrating technologies related to power network operation and communication or information technologies for improving the carbon footprint of the management of residential or tertiary loads, i.e. smart grids as climate change mitigation technology in the buildings sector, including also the last stages of power distribution and the control, monitoring or operating management systems at local level
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Изобретение относится к системе передачи данных, к которым предъявляются требования обеспечения безопасности при передаче голосовых данных. Технический результат - повышение защиты потока данных при передаче данных от несанкционированного доступа и обеспечение функциональной совместимости, мобильности и управления ресурсами, включая приоритет и качество услуг. Сеть в модели сети структурирована как иерархическая сотовая сеть, с динамически генерируемыми таблицами маршрутизации. Конфигурация модели сети оптимизирует маршрутизацию и распределяет нагрузку при передаче данных. Каждое устройство в сети может быть как конечной точкой, так и ретранслятором при обмене данными. Модель сети может включать сети более низкого уровня, которые представлены одной из двух моделей, модели с последовательным соединением или модели типа звезда. Узлы организованы в виде структуры иерархической взаимозависимости для оптимизации пропускной способности. Модель может включать криптографический метод динамического выделения локальных сетевых адресов. 14 з.п. ф-лы, 1 ил., 35 табл.

Description

Текст описания приведен в факсимильном виде.
Figure 00000001
Figure 00000002
Figure 00000003
Figure 00000004
Figure 00000005
Figure 00000006
Figure 00000007
Figure 00000008
Figure 00000009
Figure 00000010
Figure 00000011
Figure 00000012
Figure 00000013
Figure 00000014
Figure 00000015
Figure 00000016
Figure 00000017
Figure 00000018
Figure 00000019
Figure 00000020
Figure 00000021
Figure 00000022
Figure 00000023
Figure 00000024
Figure 00000025
Figure 00000026
Figure 00000027
Figure 00000028
Figure 00000029
Figure 00000030
Figure 00000031
Figure 00000032
Figure 00000033
Figure 00000034
Figure 00000035
Figure 00000036
Figure 00000037
Figure 00000038
Figure 00000039
Figure 00000040
Figure 00000041
Figure 00000042
Figure 00000043
Figure 00000044
Figure 00000045
Figure 00000046
Figure 00000047
Figure 00000048
Figure 00000049
Figure 00000050
Figure 00000051
Figure 00000052
Figure 00000053
Figure 00000054
Figure 00000055

Claims (15)

1. Система организации сети без центрального администрирования из не имеющих доверительных отношений вычислительных устройств так, что вычислительные устройства могут безопасно совместно использовать сетевые ресурсы и выполнять обмен данными с ожидаемым качеством услуги, содержащая приемное вычислительное устройство и передающее вычислительное устройство, которое передает запрос на установление физического канала, обеспечивая, таким образом, установление физического канала для передачи данных между передающим вычислительным устройством и принимающим вычислительным устройством так, что маршрут рассчитывается динамически от передающего вычислительного устройства до приемного вычислительного устройства через множество промежуточных вычислительных устройств, без консультирования с центральным администрирующим вычислительным устройством, причем запрос на установление физического канала содержит указание требуемого качества услуги, которое принудительно обеспечивается каждым вычислительным устройством в множестве промежуточных вычислительных устройств.
2. Система по п.1, в которой передающее вычислительное устройство передает пакет в приемное вычислительное устройство, используя иерархический протокол динамической маршрутизации.
3. Система по п.2, в которой протокол динамической маршрутизации распространяет информацию о качестве услуги в каждое промежуточное вычислительное устройство.
4. Система по п.2, в которой иерархический протокол динамической маршрутизации использует при передаче данных криптографический метод шифрования.
5. Система по п.2, в которой передающее вычислительное устройство передает документ, который используется промежуточными вычислительными устройствами для принятия решения.
6. Система по п.5, в которой документ описывает качество услуги.
7. Система по п.6, в которой документ дополнительно описывает права и делегирование прав на использование сети.
8. Система по п.5, в которой документ описывает делегирование разрешения.
9. Система по п.8, в которой делегирование разрешения позволяет вычислительному устройству принимать решение о перемещении данных.
10. Система по п.2, в которой иерархический протокол динамической маршрутизации может использовать либо надежный или ненадежный протокол передачи данных более низкого уровня.
11. Система по п.1, в которой сеть организована как иерархическая сотовая сеть.
12. Система по п.11, в которой каждое вычислительное устройство иерархической сотовой сети идентифицировано по имени, содержащему множество идентификаторов, разделенных разделителем.
13. Система по п.12, в которой идентификаторы организованы по имени от конкретного к общему.
14. Система по п.11, в которой иерархическая сотовая сеть включает метаузел.
15. Система по п.14, в которой метаузел указывает на вычислительное устройство и сеть вычислительных устройств, причем указанные вычислительные устройства и сеть вычислительных устройств представляют собой равноправные объекты иерархии.
RU2005126731/09A 2003-01-24 2004-01-21 Способ и устройство для безопасного обмена данными и совместное использование ресурсов между анонимными сторонами, не имеющими доверительных отношений, без центрального администрирования RU2334362C2 (ru)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US44232803P 2003-01-24 2003-01-24
US60/442,328 2003-01-24

Publications (2)

Publication Number Publication Date
RU2005126731A RU2005126731A (ru) 2006-03-27
RU2334362C2 true RU2334362C2 (ru) 2008-09-20

Family

ID=32825201

Family Applications (1)

Application Number Title Priority Date Filing Date
RU2005126731/09A RU2334362C2 (ru) 2003-01-24 2004-01-21 Способ и устройство для безопасного обмена данными и совместное использование ресурсов между анонимными сторонами, не имеющими доверительных отношений, без центрального администрирования

Country Status (10)

Country Link
US (4) US20060136721A1 (ru)
EP (2) EP1590915A4 (ru)
JP (1) JP2006517077A (ru)
KR (1) KR20050103205A (ru)
CN (1) CN1762123A (ru)
AU (1) AU2004207949B8 (ru)
BR (1) BRPI0406978A (ru)
CA (1) CA2513653C (ru)
RU (1) RU2334362C2 (ru)
WO (1) WO2004068722A2 (ru)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9585177B2 (en) 2013-12-11 2017-02-28 At&T Intellectual Property I, L.P. Cellular connection sharing
RU2663708C1 (ru) * 2014-12-31 2018-08-08 Хуавей Текнолоджиз Ко., Лтд. Способ и устройство для передачи данных
RU2722925C1 (ru) * 2019-10-09 2020-06-04 Общество с ограниченной ответственностью "Доверенные Решения" (ООО "Доверенные Решения") Способ защищенного информационного обмена данными
RU2748966C1 (ru) * 2020-02-26 2021-06-02 Акционерное общество "Лаборатория Касперского" Способ синхронизации анонимных идентификаторов

Families Citing this family (36)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6770852B1 (en) * 2003-02-27 2004-08-03 Lam Research Corporation Critical dimension variation compensation across a wafer by means of local wafer temperature control
US8139507B2 (en) * 2004-09-15 2012-03-20 Hewlett-Packard Development Company, L.P. Network graph for alternate routes
US8799472B2 (en) * 2004-10-06 2014-08-05 Riverbed Technology, Inc. Peer signaling protocol and system for decentralized traffic management
US7783728B2 (en) * 2004-11-22 2010-08-24 International Business Machines Corporation Concurrent evaluation of policies with synchronization
CN101160988B (zh) * 2005-02-01 2011-11-23 Exs有限公司 用于无线接入的分层网格网络
EP1938203B1 (en) 2005-02-26 2019-04-24 Unium Inc. Naming system layer
US8539481B2 (en) 2005-12-12 2013-09-17 Microsoft Corporation Using virtual hierarchies to build alternative namespaces
US7996841B2 (en) * 2005-12-12 2011-08-09 Microsoft Corporation Building alternative views of name spaces
US8312459B2 (en) 2005-12-12 2012-11-13 Microsoft Corporation Use of rules engine to build namespaces
US8370928B1 (en) * 2006-01-26 2013-02-05 Mcafee, Inc. System, method and computer program product for behavioral partitioning of a network to detect undesirable nodes
CA2641269C (en) 2006-02-01 2017-05-02 Coco Communications Corp. Protocol circuit layer
JP4957075B2 (ja) * 2006-05-15 2012-06-20 富士通株式会社 信頼度評価プログラムおよび信頼度評価装置
CN100466859C (zh) * 2006-06-29 2009-03-04 华为技术有限公司 用于无线mesh网的业务QoS保证方法和装置
US9276774B2 (en) * 2006-08-29 2016-03-01 The Boeing Company Visualizing and modifying ad-hoc network nodes
US20080123586A1 (en) * 2006-08-29 2008-05-29 Manser David B Visualization of ad hoc network nodes
US7895345B2 (en) * 2007-04-13 2011-02-22 Microsoft Corporation Distributed routing table architecture and design
KR100901691B1 (ko) * 2007-12-04 2009-06-08 한국전자통신연구원 메쉬-스타 혼합 온칩 네트워크 통신 시스템 및 그의 통신방법
KR101279500B1 (ko) * 2011-11-10 2013-06-27 한국기초과학지원연구원 노드의 동적 상태 변화에 따른 라우팅 경로 결정 방법
US8904526B2 (en) * 2012-11-20 2014-12-02 Bank Of America Corporation Enhanced network security
JP5967222B2 (ja) * 2012-12-19 2016-08-10 日本電気株式会社 パケット処理装置、フローエントリの配置方法及びプログラム
WO2015108700A1 (en) 2014-01-14 2015-07-23 Zsolutionz, LLC Sensor-based evaluation and feedback of exercise performance
WO2015108701A1 (en) 2014-01-14 2015-07-23 Zsolutionz, LLC Fuzzy logic-based evaluation and feedback of exercise performance
WO2015108702A1 (en) * 2014-01-14 2015-07-23 Zsolutionz, LLC Cloud-based initiation of customized exercise routine
US10043029B2 (en) 2014-04-04 2018-08-07 Zettaset, Inc. Cloud storage encryption
US10298555B2 (en) * 2014-04-04 2019-05-21 Zettaset, Inc. Securing files under the semi-trusted user threat model using per-file key encryption
US10873454B2 (en) 2014-04-04 2020-12-22 Zettaset, Inc. Cloud storage encryption with variable block sizes
US9838870B2 (en) * 2015-03-25 2017-12-05 Juniper Networks, Inc. Apparatus and method for authenticating network devices
CN105260429B (zh) * 2015-09-30 2019-04-26 河南科技大学 一种基于多重布隆过滤器的icn网络信息名字查找方法
US10944669B1 (en) 2018-02-09 2021-03-09 GoTenna, Inc. System and method for efficient network-wide broadcast in a multi-hop wireless network using packet echos
US11243321B2 (en) 2018-05-04 2022-02-08 Chevron U.S.A. Inc. Correcting a digital seismic image using a function of speed of sound in water derived from fiber optic sensing
CN211668521U (zh) * 2018-05-31 2020-10-13 上海快仓智能科技有限公司 用于图像采集的自动引导车、以及图像采集和处理***
EP3831021A1 (en) 2018-07-27 2021-06-09 Gotenna Inc. VINEtm ZERO-CONTROL ROUTING USING DATA PACKET INSPECTION FOR WIRELESS MESH NETWORKS
US11075763B2 (en) * 2019-02-15 2021-07-27 International Business Machines Corporation Compute digital signature authentication sign with encrypted key instruction
US11108567B2 (en) 2019-02-15 2021-08-31 International Business Machines Corporation Compute digital signature authentication verify instruction
US11303456B2 (en) 2019-02-15 2022-04-12 International Business Machines Corporation Compute digital signature authentication sign instruction
CN110119129A (zh) * 2019-05-10 2019-08-13 上海新联合电气有限公司 工业控制网络

Family Cites Families (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5511122A (en) * 1994-06-03 1996-04-23 The United States Of America As Represented By The Secretary Of The Navy Intermediate network authentication
US5677851A (en) * 1994-12-15 1997-10-14 Novell, Inc. Method and apparatus to secure digital directory object changes
US6085238A (en) * 1996-04-23 2000-07-04 Matsushita Electric Works, Ltd. Virtual LAN system
US5987011A (en) * 1996-08-30 1999-11-16 Chai-Keong Toh Routing method for Ad-Hoc mobile networks
US6266704B1 (en) * 1997-05-30 2001-07-24 The United States Of America As Represented By The Secretary Of The Navy Onion routing network for securely moving data through communication networks
DE19746904B4 (de) * 1997-10-23 2004-09-30 Telefonaktiebolaget L M Ericsson (Publ) Verkehrsdaten-Bewertungsgerät und zugeordnetes Verfahren für ein Netzwerk mit dynamischer Vermittlung
US6487170B1 (en) * 1998-11-18 2002-11-26 Nortel Networks Limited Providing admission control and network quality of service with a distributed bandwidth broker
JP2002534842A (ja) * 1998-12-23 2002-10-15 ノキア・ワイヤレス・ルーターズ・インコーポレーテッド アドホック・インターネットワーキングのための統一されたルーティング方式
JP2000235493A (ja) * 1999-02-12 2000-08-29 Fujitsu Ltd トレーディング装置
US6721555B1 (en) * 1999-02-19 2004-04-13 Qualcomm Incorporated System and method for facilitating device authentication in a wireless communications system
US6505254B1 (en) * 1999-04-19 2003-01-07 Cisco Technology, Inc. Methods and apparatus for routing requests in a network
US6757823B1 (en) * 1999-07-27 2004-06-29 Nortel Networks Limited System and method for enabling secure connections for H.323 VoIP calls
US6738900B1 (en) * 2000-01-28 2004-05-18 Nortel Networks Limited Method and apparatus for distributing public key certificates
US7278017B2 (en) * 2000-06-07 2007-10-02 Anoto Ab Method and device for secure wireless transmission of information
JP3729051B2 (ja) * 2000-10-18 2005-12-21 日本電気株式会社 インタードメインルーティング装置、システムおよび方法
DE10062303C2 (de) * 2000-12-14 2002-11-28 Layers Ag 7 Verfahren zum Betrieb eines Ad Hoc-Netzwerkes zur drahtlosen Datenübertragung von synchronen und asynchronen Nachrichten
WO2002057917A2 (en) * 2001-01-22 2002-07-25 Sun Microsystems, Inc. Peer-to-peer network computing platform
JP2002232410A (ja) * 2001-01-30 2002-08-16 Nippon Telegr & Teleph Corp <Ntt> 暗号化データの通信装置および通信方法
US7266085B2 (en) 2001-03-21 2007-09-04 Stine John A Access and routing protocol for ad hoc network using synchronous collision resolution and node state dissemination
CA2450224C (en) * 2001-06-14 2012-06-19 Meshnetworks, Inc. Routing algorithms in a mobile ad-hoc network
EP1282024A1 (en) * 2001-07-30 2003-02-05 Hewlett-Packard Company Trusted identities on a trusted computing platform
US7089298B2 (en) * 2001-08-20 2006-08-08 Nokia Corporation Naming distribution method for ad hoc networks
US6987764B2 (en) * 2001-11-05 2006-01-17 Qualcomm, Incorporated Method and apparatus for selecting a packet data serving node for multi-cast/broadcast services
US7512649B2 (en) * 2002-03-22 2009-03-31 Sun Microsytems, Inc. Distributed identities
JP2003316576A (ja) * 2002-04-25 2003-11-07 Hitachi Ltd アプリケーション制御方法及びその実施装置並びにその処理プログラム
US6954435B2 (en) * 2002-04-29 2005-10-11 Harris Corporation Determining quality of service (QoS) routing for mobile ad hoc networks
US6718394B2 (en) * 2002-04-29 2004-04-06 Harris Corporation Hierarchical mobile ad-hoc network and methods for performing reactive routing therein using ad-hoc on-demand distance vector routing (AODV)
US6879574B2 (en) * 2002-06-24 2005-04-12 Nokia Corporation Mobile mesh Ad-Hoc networking
US8046832B2 (en) * 2002-06-26 2011-10-25 Microsoft Corporation Spam detector with challenges
US7395311B2 (en) * 2003-01-10 2008-07-01 Microsoft Corporation Performing generic challenges in a distributed system
US7606915B1 (en) * 2003-02-25 2009-10-20 Microsoft Corporation Prevention of unauthorized scripts
US20050132226A1 (en) * 2003-12-11 2005-06-16 David Wheeler Trusted mobile platform architecture

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9585177B2 (en) 2013-12-11 2017-02-28 At&T Intellectual Property I, L.P. Cellular connection sharing
US10420167B2 (en) 2013-12-11 2019-09-17 At&T Intellectual Property I, L.P. Cellular connection sharing
RU2663708C1 (ru) * 2014-12-31 2018-08-08 Хуавей Текнолоджиз Ко., Лтд. Способ и устройство для передачи данных
RU2722925C1 (ru) * 2019-10-09 2020-06-04 Общество с ограниченной ответственностью "Доверенные Решения" (ООО "Доверенные Решения") Способ защищенного информационного обмена данными
RU2748966C1 (ru) * 2020-02-26 2021-06-02 Акционерное общество "Лаборатория Касперского" Способ синхронизации анонимных идентификаторов

Also Published As

Publication number Publication date
US9866395B2 (en) 2018-01-09
WO2004068722A2 (en) 2004-08-12
CA2513653A1 (en) 2004-08-12
US20080320305A1 (en) 2008-12-25
KR20050103205A (ko) 2005-10-27
CN1762123A (zh) 2006-04-19
WO2004068722A3 (en) 2004-12-16
US20120311334A1 (en) 2012-12-06
US20060136721A1 (en) 2006-06-22
EP1590915A4 (en) 2010-05-19
AU2004207949A1 (en) 2004-08-12
EP1590915A2 (en) 2005-11-02
EP2562980A1 (en) 2013-02-27
CA2513653C (en) 2013-10-01
JP2006517077A (ja) 2006-07-13
AU2004207949B2 (en) 2009-12-10
US20160323113A1 (en) 2016-11-03
AU2004207949A8 (en) 2004-08-12
US9391806B2 (en) 2016-07-12
RU2005126731A (ru) 2006-03-27
BRPI0406978A (pt) 2006-01-10
AU2004207949B8 (en) 2010-05-13

Similar Documents

Publication Publication Date Title
RU2334362C2 (ru) Способ и устройство для безопасного обмена данными и совместное использование ресурсов между анонимными сторонами, не имеющими доверительных отношений, без центрального администрирования
Nour et al. Security and privacy challenges in information-centric wireless internet of things networks
Yue et al. DataClouds: Enabling community-based data-centric services over the Internet of Things
EP2641187B1 (en) Method and apparatus to create and manage virtual private groups in a content oriented network
Bays et al. Security-aware optimal resource allocation for virtual network embedding
US20070094273A1 (en) System topology for secure end-to-end communications between wireless device and application data source
CN101106450A (zh) 分布式报文传输安全保护装置和方法
TWI265690B (en) Network management
Leiner Critical issues in high bandwidth networking
de Ree et al. Key management for secure network coding-enabled mobile small cells
Chuah et al. Secure descriptive message dissemination in dtns
Yang et al. Bands: an inter-domain internet security policy management system for IPSEC/VPN
JP2004023597A (ja) ネットワークシステムおよびプログラム
US9172685B2 (en) System and method for providing a secure book device using cryptographically secure communications across secure networks
Araghi et al. An access control framework in an Ad Hoc network infrastructure
Edris et al. Security in network services delivery for 5g enabled d2d communications: Challenges and solutions
CN1260923C (zh) 实现建立随机隧道的方法
CN111682940B (zh) 一种基于l-dht的多租户虚拟域隔离构建方法
RU106474U1 (ru) Региональная информационно-вычислительная сеть
Clarke et al. A novel security architecture for a space-data DTN
Savva et al. Joint Content Placement and Secure Lightpath Provisioning in EONs Supporting Anycast Traffic
Nagy Secure and usable services in opportunistic networks
Zhou et al. The cross-layer oriented security performance to wireless network fibre communication router: the optimisation perspective
Setyawan et al. Performance Border Gateway Protocol (BGP) on VLAN Network for Development Smart Hospitals
CN101296242B (zh) Spdf代理实体、资源接纳控制方法及***

Legal Events

Date Code Title Description
PD4A Correction of name of patent owner
MM4A The patent is invalid due to non-payment of fees

Effective date: 20200122