专利摘要:
The invention relates to a method for receiving a data frame transmitted by a node, wherein a database containing records on said nodes and at least one hash code included in said frame for decoding said frame is used.
公开号:FR3019957A1
申请号:FR1453141
申请日:2014-04-09
公开日:2015-10-16
发明作者:Olivier Hersent
申请人:ACTILITY;
IPC主号:
专利说明:

[0001] TECHNICAL FIELD OF THE INVENTION The present invention belongs to the field of encoding / decoding of data transmitted in a telecommunication network, in particular in a low bit rate network. It relates to a method using encryption and decryption techniques to reduce the size of transmitted frames. This method is particularly advantageous in the case of sensors performing measurements to be transmitted to a remote device. PRIOR ART In the context of the evolution of the Internet of Things, more and more devices need to be connected, permanently or periodically, to a communication network. These devices often require sending or receiving a very small amount of data, typically a few bytes sent once per hour. Until recently, these devices have not been correctly taken into account by existing M2M (Machine to Machine) communication networks when they are extended: Cellular data, for example General Packet Radio Service (GPRS) or 3G (3rd generation), are generally intended for high-speed data use. The power consumption of wireless devices connected to such networks generally renders them unsuitable for market segments in which battery-powered sensors (eg gas or water sensors) must operate for several years; the wMBUS ("wireless M-BUS", "wireless M-BUS" in French) and similar technologies have a limited range, requiring large and expensive batteries for the sensors.
[0002] New radio technologies, using ultra-narrow frequency bands or spread spectrum techniques, have recently been able to provide extended connectivity (typically 1 to 2 km in urban areas) for very low throughput (typically 100 at 1000 bits per second) on the ISM frequency bands for "Industry, Scientific and Medical". However, low throughput involves relatively long transmission times in the air while mobilizing spectral resources that are rare. It is therefore essential for the success of these M2M low bit rate networks to reduce the size of the transmitted data frames as much as possible. Frame size depends quite heavily on link and network layer headers, especially when the device only has to transmit a small amount of data when sending a frame. The maximum number of sensors per cell depends directly on the size of the frames transmitted: - the low-speed networks are often non-synchronized and require a low occupancy rate of the channel in order to maintain low collision rates and in order to function properly (typically canal occupancy below 5%). The occupancy rate of the channel is proportional to the number of messages sent per unit of time, and the size of the frame transmitted; - in many countries, ISM spectrum regulation requires each antenna to transmit less than a given percentage of time (typically about 1%). This is usually the dominant limiting factor for bidirectional networks. Again, the base station airtime rate is proportional to the number of messages sent by the antenna per unit of time, and the size of the frame transmitted. An example of a current optimization system for efficient low bandwidth use is the 6LoWPAN network for "IPv6 Low Power Wireless Personal Area Networks" in English (IPv6 low power wireless networks on a personal area). Such a network relies on the shared state between the endpoints and the network coordinator, and also exploits the redundancies between the MAC layer ("Medium Access Control" in French) and the layer IP ("Internet Protocol", "Internet Protocol" in French).
[0003] In the MAC layer, the optimization mechanisms include address spaces of smaller sensors (for example 16 bits instead of 64 bits), but this has the consequence of reducing the possible number of sensors in the network. However, such systems do not exploit the redundancies between the different PDU ("protocol data unit", "protocol data unit" in French) fields, within an open system interconnection (OSI) layer. interconnection of open systems "in French). The redundancy of information existing between two frames of successively decoded data is not exploited either.
[0004] In addition, these systems are designed to provide unambiguous decompression of each element of a data frame. Indeed, all the information necessary for decoding all the data is directly included in a frame. A particular decompression method is usually provided for each element of the frame. Finally, in the existing techniques, the transmission / reception methods employed make limited use of the diversity of information resulting from the signals received. Typically this information is only used to organize a migration from one receiving cell to another (so-called "handover" procedure). SUMMARY OF THE INVENTION The proposed system aims to reduce the overall frame size for low bit rate wireless M2M communications and to optimize its operation in a context of strong constraints on the bit rate, the busy time of the transmission channels. and the volume of information exchanged. The invention proposes a method of receiving a data frame transmitted in a network connected to several nodes, in which an address and a secret are respectively assigned to each node, the method comprising: extracting from the frame encrypted data and a frame hash code; consulting a database having respective records relating to the nodes, the record relating to a node containing information including the address and the secret assigned to that node; for at least one record of the database: calculating at least one hash code from elements comprising the encrypted data extracted from the frame and the secret contained in the record; - comparing the calculated hash code with the frame hash code extracted from the frame; and - select the record if the compared hash codes coincide; and treat the frame. The processing includes an identification of the address contained in the selected record as the address assigned to the node from which the frame originates, and a decryption of the encrypted data extracted from the frame using the secret contained in the selected record.
[0005] The term "node" means a data acquisition device associated at least with a radiocommunication station. The hash code, conventionally usable to check the integrity of the frame, is here used also to contribute to the identification of the address of the device that sent the frame. Thus, a reduction in the size of the headers is made possible since the address no longer needs to be entirely transmitted in the header. The most drastic is to no longer include any address in the header, but this may require the exploration of a large database by the telecommunication system in charge of receiving the frame . A reasonable compromise between minimizing the size of the frame and the load imposed on the system in charge of receiving the frame is to truncate the address included in the header. For example, it is possible to reduce the address field size of the header to 16 bits instead of 32. Thus, in one embodiment, an incomplete address data is further extracted from the frame. , and the steps of calculating and comparing the hash code are executed for the records of the database containing an address corresponding to the extracted incomplete address data. The elements for calculating the hash code for a database record may comprise at least part of the address contained in said record.
[0006] In one embodiment, the information in the database record for a node further includes pointing information of at least one sequence number of a frame that has been received and processed by identifying it. address contained in the record. In this embodiment, the elements from which at least one hash code is calculated further comprise an integer determined according to the pointing information contained in the record. Thus, the information derived from the decoding of previous frames can be reused for the current frame. The sequence number of a last frame has been previously stored during the decoding thereof, and can, when decoding a new frame, be read in order to locate a sequence number, or a range of sequence numbers if Frame losses are possible, to be tried in the steps of calculating and comparing hash codes. This makes it possible to inform the system in charge of receiving the frame of the sequence number of the current frame without having to include it in the information explicitly provided in the frame. The processing of the frame may thus comprise a determination of a sequence number of the frame among a sequence of frames transmitted from the identified address, and an update of the pointing information contained in the selected record according to the number determined sequence of the frame. In a particular embodiment, the steps for calculating and comparing the hash code are executed several times for at least one record of the database.
[0007] These steps are executed with respective integers selected in an interval marked by the pointing information contained in the record. In this embodiment, after selecting a record from the database, determining the sequence number of the frame includes an identification of the integer for which the compared hash codes coincide.
[0008] The size of the interval indicated by the pointing information contained in the recording may vary according to the computing capacities used for the implementation of the method according to the invention. In another embodiment, an evaluation of a power level and / or timestamp information of the frame is performed. The processing of the frame then comprises an update, in the record concerning the node whose address has been identified, of a power information as a function of the evaluated power level and / or the timestamp information. . By timestamp information is meant any information relating to the temporal aspects of the transmission of the frames. Such information may relate to frame transmission time, reception times, etc. Typically, such a power level may be a signal-to-noise ratio of the received signal, an average energy or power calculated over the time interval corresponding to the reception of the frame. This information is related to the antenna that received the signal. The system in charge of receiving the frame may comprise several antennas and several antennas may receive the same frame. Thus, in one embodiment, the record for the node whose address has been identified includes power information as a function of the evaluated power level and / or time stamp information for each of the antennas that received the address. frame.
[0009] In another embodiment, an adaptation message of at least one transmission parameter of the node whose address has been identified is transmitted by the system in charge of receiving the frame to this node. This adaptation message is generated based on information included in the record concerning this node whose address has been identified.
[0010] By transmission parameter is meant any variable characteristic influencing the transmission conditions of the signal transmitted by the node. Thus, the adaptation message may contain an instruction for modifying at least one of the transmit channel, the transmit power, the spread spectrum factor, and the coding redundancy.
[0011] The management of the activity of the nodes is thus rationalized. Indeed, the adaptation message being generated based on precise information on the transmission conditions of the frames between nodes and all the systems, it is possible to generate very relevant adaptation messages. Managed globally, these adaptation messages make it possible, for example, to maximize the capacity of the network or to reduce the overall energy consumption of the system. For example, a node for which the evaluated power is high can receive an adaptation message for the reduction of its power output so as not to consume too much energy and not to unnecessarily encumber the network. The record concerning the node whose address has been identified may advantageously comprise at least one of the following elements: an indication of the geographical location of the nodes, such an indication being advantageously deduced or estimated from data relating to the power and / or the timestamp information; a waiting time and frequency of reception of acknowledgment specific to a node. The node may go to sleep to receive an acknowledgment message for a predetermined time following the transmission of the frame. The waiting time, possibly specific to a node, can therefore correspond to this predetermined duration of standby. The system in charge of receiving the frame and responsible for issuing the acknowledgments can therefore issue the acknowledgments at the precise times when the nodes concerned by the acknowledgment are likely to listen. This makes it possible to precisely allocate the occupancy time of the transmission channel provided for the acknowledgments. For very busy frequencies, such as the ISM spectrum, this optimization of the occupancy time is particularly advantageous. The invention furthermore relates to a method of transmitting a data frame by a node, an address and a secret being assigned to the node, the method comprising: encrypting data by means of the secret assigned to the node; generate a hash code from elements comprising the encrypted data and the secret assigned to the node; and - include the encrypted data and hash code generated in the transmitted frame. In one embodiment, the method further comprises: - truncating the address assigned to the node to form an incomplete address data; and - include the incomplete address data in the transmitted frame. In a particular embodiment, the address assigned to the node to form incomplete address data is 32-bit and is truncated to form the 16-bit incomplete address data. In one embodiment, the elements from which the hash code is calculated further include a sequence number of the transmitted frame, which sequence number of the transmitted frame is excluded from the transmitted frame.
[0012] In one embodiment, the node goes into standby for the reception of an acknowledgment message for a predetermined duration following the transmission of the frame. This predetermined duration advantageously corresponds to the processing time (typically of the order of one second) required by the system in charge of receiving the frame to process the frame transmitted by the node and to send a relative acknowledgment to this frame. Typically this duration is one second. This sleep can be done periodically. For example, the node can go to sleep every two seconds for one second. Thus, the constraints imposed by the regulation of the ISM spectrum are advantageously respected without additional management effort. Indeed, in this situation, the antennas of the system in charge of the reception of the frame transmit only when the listening window of a node is open (when this node is not in standby). This has the effect of significantly reducing the percentage of time occupied for transmissions. It is recalled here that this percentage of time allowed for transmissions is typically about 1% for the ISM spectrum. The invention also relates to a computer program comprising instructions for implementing the method described above. The invention can be implemented by a processing and optimization unit for communicating with several nodes, the processing and optimization unit comprising: an interface with a database having respective records concerning the nodes, the registration relating to a node containing information including an address and a secret assigned to said node; an extraction unit for receiving a data frame and extracting encrypted data and a frame hashing code therefrom; a code checker arranged to perform the following operations for at least one record of the database: calculate at least one hash code from elements comprising the encrypted data extracted from the received frame and the secret included in the information of said record; comparing the calculated hash code with the frame hash code extracted from the received frame; and - selecting said record if the compared hash codes coincide; and a decryption unit of the received frame for executing a processing comprising an identification of the address contained in the selected record as being the address assigned to the node from which the received frame originates, and a decryption of the extracted encrypted data the received frame using the secret contained in the selected record.
[0013] The invention can also be implemented by a system for communicating with several nodes, the system comprising: a plurality of antennas for receiving signals from said nodes, said signals comprising data frames; and the processing and optimization unit described above for the processing of the data frames. Thus, the processing steps of the data frames, which are expensive in terms of computing resources, are advantageously centralized. Moreover, a discriminating element in terms of speed of processing is that of the connection between the database and the unit in charge of deciphering the frames. Indeed, the unit in charge of processing must traverse all the records of the database in order to identify the address of the node that sent the frame. Direct and fast access between a processing unit and optimization that is central and the database is easier to implement, which significantly reduces the processing time frames.
[0014] The invention can also be implemented by a node for communicating on a network having at least one system, an address being assigned to the node and a secret being further assigned to the node, the node comprising: a data encryption unit by means of the secret assigned to the node; a hash code generator, the hash code being generated from elements comprising the encrypted data and the secret assigned to the node; and a frame generator to be transmitted, the frame including the encrypted data and the hash code generated. In one embodiment, the frame further comprises incomplete address data obtained by truncating the address assigned to the node.
[0015] BRIEF DESCRIPTION OF THE DRAWINGS Other advantages and characteristics of the invention will appear on reading the following detailed description of exemplary embodiments of the invention and on examining the drawings in which: FIG. an overview of an exemplary node capable of implementing the invention, - FIG. 1B is an overall view of an exemplary system capable of implementing the invention, FIG. an overview of a network interface device, capable of implementing the invention, - FIG. 1D is an overview of a processing and optimization unit capable of implementing the FIG. 2 schematically illustrates the steps of a transmission method of a frame according to the invention, in an example embodiment, FIG. 3 schematically illustrates the steps of a reception method capable of implementing the invention, in an exemplary embodiment, and - Figure 4 is a flowchart showing an exemplary embodiment of the identification of a node in an exemplary method of comparison of hash codes capable of implementing the invention.
[0016] DETAILED DESCRIPTION The invention is described below in its non-limiting application to sensor and actuator networks. The sensors are, for example, devices for geolocation of objects or persons, measuring instruments for a water or gas distribution network, air quality measuring or noise measuring apparatus, electronic parking tickets, etc. These sensors or actuators are integrated or connected to radiocommunication stations. A sensor or actuator associated with a radiocommunication station is here called a "node". The method described here relates to the communication of digital signal frames from the nodes to application servers, and from application servers to the nodes. The "system" is the set of devices between the application servers and the nodes, the application servers and the nodes being excluded from said system. It will be noted that communications can take place in both directions between the nodes and the application servers. An upstream communication is a communication sent by a node to a system operating as a network receiver for the application servers. Downlink communication is a communication from a system operating as a network transmitter for application servers to a node.
[0017] In one embodiment, the system comprises only a set of antennas and network interfaces with the application servers. Each antenna is connected to a network interface which performs the deciphering steps of the frames described hereinafter with reference to FIGS. 3 and 4.
[0018] In another embodiment, the system includes a set of antennas and network interfaces that are managed by one or more processing and optimization units. These processing and optimization units perform in particular the deciphering steps of the frames described below with reference to FIGS. 3 and 4. The processing and optimization unit is distinct from the antennas and the network interfaces. This processing and optimization unit is connected to the network interfaces via a communication channel. The network interfaces here are responsible for conventional steps relating to the formatting of a radio signal. The invention is described below with reference to this embodiment. With reference to FIG. 1A, a sensor 12 provides data of interest within a Tx1 node. An address ADD32, for example of 32 bits, and a secret SS are assigned to the node Tx1. Other secrets, known only to the node, can be used by this node for the encoding of the application data. At the output of the sensor 12, the data of interest are supplied to a processor 14 which ensures the construction of the frames to be transmitted. ADD32 addresses identify the nodes within the network. The SS secret is only known from the node to which it is assigned, and it is also registered, in connection with the corresponding address, in a DB3 database accessible only to the authorized processing and optimization units of the network. The application secrets, if present, are known only application servers. The processor 14 of the Tx1 node processes the data of interest to produce a digital signal B composed of frames. A radio-frequency (RF) transceiver stage 16 of the node Tx1 receives each frame from the processor 14 to shape, modulate and amplify, in a manner known per se, a radio signal adapted to the wireless M2M communication at low speed. debit. This radio signal is transmitted via an antenna 18 of the node Tx1.
[0019] The processor 14 of the network node Tx1 accesses a local memory 20 where the address ADD32 of the sensor in the network and its associated secret SS are recorded. This memory 20 further contains a sequence number SN of the last frame that the processor 14 has generated. The frames that a node produces are numbered consecutively, which allows the processing and optimization units to reposition each received frame in the sequence. The exemplary system Rx1 shown in FIG. 1B comprises several network antennas 24, 28, 32 which pick up radio signals and which are respectively connected to network interfaces 26, 30, 34. These network interfaces process the radio signals to produce signals. digital frames included in a signal Bt. The frames of the signal Bt are similar, with transmission errors, to digital frames included in the signals B of remote nodes. These frames are then applied to a processing and optimization unit 36 which delivers decrypted data. This data can be sent to one or more application servers via another NTW network which will generally be a fixed network. Several system architectures are possible. Thus, several systems as described above in Figure 1B may be present. It is also possible that several processing and optimization units are present in a system. Alternatively, a single system comprising at least one processing and optimization unit can manage all the nodes. The processing and optimization unit 36 includes an access interface 37 to the database DB3 in which are stored records concerning the nodes considered. A record k included in the database DB3 comprises in particular the address ADD32 (k) and the secret SS (k) assigned to a node k and pointing information P (k) relating to the sequence of frames that it has transmitted and that the processing and optimization unit 36 has correctly detected.
[0020] In one possible embodiment, the pointing information P (k) simply consists of the highest SN (k) sequence number that has been observed by the processing and optimization unit 36 when processing frames previously received from the node k, i.e. the sequence number of the most recent frame for node k.
[0021] In another possible embodiment, the pointing information P (k) comprises a sequence number SN (k) and a bitmap (bitmap) BM (k) in which a bit of rank q indicates whether the frame SN (k + q) has been received (1) or not (0). If there are multiple processing and optimization units in the network, the DB3 database can be shared between these units. Used as a reception interface, a network interface 26 described here with reference to FIG. 1C receives from the antenna 24 radio signals coming from a certain number of nodes and delivers them to an RF transmission / reception stage 38 then at an input-output 39 which perform conventional filtering, amplifying, demultiplexing and demodulating operations to produce digital frames. These frames then accumulate in a buffer memory 40 which stores them temporarily until they are processed by a device 42 interfacing with the processing and optimization unit 36. When the communication to the processing unit and optimization 36 is available, the device 42 extracts frames from the stack of frames temporarily stored in the buffer memory 40 and sends them to the processing and optimization unit 36. The RF transmit-receive stage can also be arranged to evaluate information relating to the transmission conditions of a received frame. Typically, such information relates to received signal strength levels, reception timestamp, receive antenna code, and so on. This transmission information is also stored temporarily in the buffer memory 40 and then transmitted with the frame by the device 42 when the processing and optimization unit 36 is available. Typically, this evaluation is performed for a reception channel and an indication of this channel can be included in this transmission information. Channel means any information used to characterize the radio properties of the signal: frequency or pattern of frequency hopping, modulation parameters, spreading and / or coding.
[0022] The digital frames, possibly accompanied by the transmission information, are then received by the processing and optimization unit 36, described with reference to FIG. 1D, via an input / output interface 44. Several processing units and different optimization may have to decipher the same frame. Indeed, two different antennas can capture the same frame and reorient these frames to two different processing units (within the same system or not). In order to rationalize the management of the processing and optimization units, a selection device 46 may be included in the processing and optimization units to cooperate with similar devices provided in the other processing units so that only one of these units are used for decryption of a given frame. This device 46 is shown in dashed lines in FIG. 1D because it is optional. This selection of the processing and optimization unit can be performed according to the transmission information. The processing and optimization units can share information received from the antennas with each other. Thus, the selection of the processing and optimization unit decrypting the frame may be a function of an identifier of at least one antenna having received the frame and a power level of the frame received by this antenna. A performance index is calculated by the means 46 and compared with those of the selection modules of the other processing and optimization units. Once this comparison is made, only the processing and optimization unit for which the index is the highest will allow the transfer of the frame to the processor 48. The selection can also be performed by a lexicographic algorithm in the following order : signal-to-noise ratio; receiving power; identifier of the antenna having received the frame. The digital frames included in the signal Bt, possibly accompanied by the transmission information, are then transmitted to the processor 48 in order to be decrypted.
[0023] A module 49 for defining an absolute time base is used for the synchronization of the devices used in the Rx1 system. For example, this module can be GPS type for "global positioning system", global positioning system in French. As is specified hereinafter with reference to FIGS. 3 and 4, for each decrypted frame, the processor 48 identifies the address of the node k from which this frame was sent. It is recalled here that a node k is associated with a record k in the database DB3. The decrypted data can then be sent to one or more application servers via the NTW network. Several antennas 26, 30, 34 connected to one and the same processing and optimization unit 36 in an Rx1 system may have received the same frame of a node k. In one embodiment, corresponding to that described hereinafter with reference to FIGS. 3 and 4, the unencrypted frames received from several different antennas are compared and one of the identical frames is selected before decryption. This selection returns a single frame, for example the first received or the one for which the transmission information relating to the antenna that received it is the most favorable.
[0024] In a variant, this same frame is decrypted several times, for each antenna having received it. The transmission information specific to each of the antennas that received the same frame are then collected in the record k. For example, a number e of sub-records are created within record k to store transmission information relating to e antennas having received the radio signal from node k. This information is updated each time a new frame is received from a node k. In another example, an average of the transmission information relating to the antennas is performed and then stored within the record k. Upon receipt of a J-frame, an acknowledgment management module 52 of the frame decoder 36 returns an acknowledgment. A module 22 of the node Tx1 is coupled to the RF stage 16 to receive the acknowledgments and, if necessary, retransmit the frames that would not have been acknowledged after a given time. In the case where several identical frames are decrypted, only one acknowledgment is returned. Acknowledgment and repetition processes are well known to those skilled in the art. The exact content of the pointing information P (k) in the database DB3 of the system Rx1 depends on the mode of acknowledgment and repetition chosen (modules 22 and 52) and the manner of managing the frame losses. For this same number J frame, a centralized network optimization module 54 generates an adaptation message of a transmission parameter of the node k having sent the frame J. This device 54 is shown in dotted lines because it is optional . This adaptation message is generated for each decrypted frame according to the transmission information included in the record k stored on the DB3 database, when the analysis of this transmission information indicates that the current transmission parameters of the node are not optimal. Such parameters are not optimal when too much network resources are consumed compared to the quality of the link. If e sub-recordings are available for record k, the reception quality of the best antenna is used to calculate the optimal fit. In the case where an additional service, for example the location of the node, is activated, then the reception quality of the N (typically 3) best antennas is used to perform the adaptation. Various transmission parameters can thus be modified. For example, the adaptation message may contain an instruction to modify the transmit power, the spread spectrum factor, the redundancy of the coding, the speed of transmission of the information, and so on. The acknowledgment message generated by the module 52 and the adaptation message generated by the device 54 are then formatted in a so-called "acknowledgment" frame by the processor 56. This acknowledgment frame may also comprise instructions (for example, to go into high frequency reporting mode) from the application servers connected to the NTW network and recipients of data from the nodes. The decryption of the Bt frames by the processor 48 may be relatively long (for example of the order of 1 s). Sending the acknowledgment frames formatted by the module 56 is delayed compared to a traditional procedure for sending these acknowledgments. Bidirectional nodes, in conventional networks, listen immediately after each transmission. This is sub-optimal from the point of view of energy consumption in the case of a longer processing time. Thus, in one embodiment, after sending a frame, a node waiting for an acknowledgment will not continue to listen, but rather immediately enter sleep mode for a predetermined time (typically about one second). During this sleep time, the processing and optimization unit has enough time to completely process the frame. The possible additional delay caused by the aforementioned processing steps is therefore advantageously taken into account.
[0025] Other listening windows of the node can be set. For example, a first listening window can be opened by the node one second after sending and a second listening window can be opened five seconds after sending. This gives a greater latitude to manage the network occupancy rate, this parameter being strongly constrained by the regulation of the frequencies. The occupancy rate of certain frequencies may for example be limited to 1%. These listening windows can also be periodic (one second after last transmission, then every second to a maximum number of windows that can also be known from the database containing the records). A plurality of reception windows over a large total period smooths the traffic of the systems, which are constrained by the spectrum usage rules at a maximum activity rate. The sending of the acknowledgments can be further delayed in order to allow time for the servers connected to the NTW network to process the data and to send to the processing and optimization unit 36 an instruction for the node. If other processing tasks need to be performed, the delay can be further lengthened. For example, a triangulation may require the processing of data received from a plurality of antennas. The temporal management of the acknowledgments described above can be implemented for any type of decoding method. This management is particularly advantageous when the process involves a long treatment time.
[0026] If the frame for which the acknowledgment message was generated had been received by several antennas, transmission information relating to each of these antennas is available in the e sub-records. In this situation, a device 58 for selecting a better antenna compares this transmission information and deduces the best antenna for transmitting the acknowledgment frame. This device 58 is shown in dotted lines because it is optional. The transmission parameters of the acknowledgment frame (transmitted power, modulation, degree of redundancy, etc.) by the selected antenna can also be advantageously deduced from the transmission information available in the sub-records and relating to each of the antennas. Similarly, the desired transmission timestamp of the frame to be transmitted can be calculated according to the current spectral occupancy rate of the selected transmission channel and the listening windows mentioned above. The acknowledgment frame is then transmitted via the interface 44 to the network interface associated with the selected antenna, for example at the network interface 26. The acknowledgment frame is received by the network interface 26, described here. with reference to FIG. 1C, via the interface 42 with the optimization and processing unit. Buffer 40 temporarily stores the acknowledgment frames to be sent. An input-output 39 and an RF transmission-reception stage of the interface 26 then prepare the sending of these frames respecting the transmission parameters defined by the device 58, including the transmission time of the transmission. frame.
[0027] The input data of the processor 14 for the construction of a digital frame include, as shown in the upper part of Figure 2: - the address ADD32 read in the memory 20; data of interest DI to be transmitted from the sensor 12; the secret SS read in the memory 20; the sequence number SN to be assigned to the frame, corresponding to the number read in the memory 20 and incremented by one unit (step S20). A step S21 of the processing applied by the processor 14 consists of encrypting the data of interest DI by means of the secret SS assigned to the node. Such encryption can use a symmetric encryption algorithm conventionally used in cryptographic techniques, for example AES 128 (Advanced Encryption Standard). A step S22 of the processing applied by the processor 14 consists of truncating the address ADD32 assigned to the node Tx1. For example, the 32-bit address assigned to the Tx1 node is truncated to form an incomplete 16-bit address data, denoted here as ADD16. This incomplete address data comprises for example the only 16 low-order bits of the 32-bit address. The processor 14 can then form a word D24 composed of the following elements: the address ADD16 which has been truncated at the step S22; the encrypted data of interest DC following step S21; - the SS secret; the sequence number SN incremented in step S20. In step S23, the processor 14 calculates a hash code H from the word D24. This hash code is calculated by a unidirectional hash function conventionally used in cryptographic techniques, for example MD5 ("Message Digest 5"). After the aforementioned steps S20-S23, the processor 14 assembles the digital signal frame D25 which, in the example under consideration, includes: the address ADD16 which has been truncated at the step S22; the encrypted data of interest DC following step S21; the hash code H calculated in step S23. It is observed that the sequence number SN is not necessarily included in the frames to be transmitted although it is made accessible to the processing and optimization unit as will be explained later. It is thus possible to limit the size of the frames and to optimize the energy consumption as well as the occupation of the transmission channel. On the processing and optimization unit 36 side, the input data of the processor 48 for processing a digital frame D25 'included in the signal Bt include, as shown in the upper part of FIG. the truncated address ADD16; - the encrypted data of interest DC; and the hash code H. A step S31 for identifying K records included in the database DB3 and corresponding to the truncated address ADD16 is executed by the processor 48. This identification leads to the selection of a number of the N records included in the DB3 database. Indeed, the incomplete address data ADD16 may correspond to a plurality of complete addresses. For example, if this incomplete address data contains the only 16 low-order bits of a 32-bit complete address, up to 232-16 65536 complete addresses may correspond to this incomplete address data. As mentioned above with reference to FIG. 1B, the records contain information including the full address ADD32 (k) assigned to a node k, the secret SS (k) assigned to this node k and the pointing information P ( k) positioned relative to a sequence number SN (k). A step S32 for checking the hash code H extracted from the received frame D25 'is executed by the processor 48. Hash codes calculated from the records identified in step S31 are compared with the hash code H received. The steps implemented during this verification are for example those described below with reference to FIG. 4.
[0028] A step S33 of identification of a record m (that is to say of a node m) giving rise to a hash code identical to the hash code H extracted from the received frame D25 'is then implemented by the processor 48. As explained hereinafter with reference to FIG. 4, the step S32 is repeated for the K records identified in the step S31 as long as no comparison code is identified. Statistically, a single record will result in a hash code identical to the hash code H. The record m identified corresponds to a node m and therefore includes the complete address ADD32 (m) and the secret SS (m) assigned to it. knot m. The sequence number SN 'of the received frame is furthermore deduced from steps S32 and S3 3. In step S34, the pointing information P (m) is updated in the record m stored in the database DB3 relative to the address ADD32 (m), taking into account the sequence number SN 'which has been detected. The transmission information related to this frame is also added in the record m. Within a record m, this information can be stored separately for each decrypted frame or simply updated each time a new frame is decrypted.
[0029] Finally, in step S35, the encrypted data extracted from the received frame is deciphered using the secret SS (m) contained in the identified record m. After the aforementioned steps S31-S35, the processor 48 transmits data D26, resulting from the processing of the received frame, to one or more application servers via the NTW network. The data D26 transmitted for one frame comprises: the ADD16 address received in the frame; the sequence number SN 'which has been identified in step S33; the data of interest DI decrypted in step S35. This data may also include the transmission information of the received frame. Referring now to FIG. 4, an exemplary implementation of step S32 for checking the hash code H extracted from the received frame, comprising the following steps: S40: initialization of a variable to 1 Counting q. This count variable q 15 makes it possible to browse a set of sequence numbers subsequent to that SN (k) contained in the pointing information P (k) of a record k of the database DB3. S41: initialization to 1 of a count variable k. This count variable k makes it possible to traverse all the K records identified in step S31. S42: formation of a word X composed of the following elements: the complete address ADD32 (k) assigned to the node k and extracted from the record k; o the encrypted data DC extracted from the received frame; o the secret SS (k) assigned to the node k and extracted from the record k; o an integer equal to SN (k) + q. The sequence number SN (k) is extracted from the pointing information P (k) included in the record k. - S43: calculation of a hash code Y from the word X (Y = h (X)). The hash function h is the same as that used at the node Tx1. - T44: verification that the hash code Y is equal to the hash code H extracted from the received frame. Moving to step T45 if the codes are different, moving to step S33 otherwise. - T45: checking that the count variable k is not equal to the maximum number K of records identified in step S31. Moving to step S46 if k is different from K, moving to step T47 otherwise. - S46: incrementing a unit of the count variable k then return to the aforementioned step S42. - T47: check that the count variable q is not equal to the maximum value Q allowed for the count variable q. The integer number Q can be determined by taking into account the usual number of frames transmitted successively by a node, the available computing capacities, the storage capacities of the database, the time available for decoding, etc. Moving to step S48 if q is different from Q, moving to step S49 (fail) otherwise. - S48: incrementing a unit of the count variable q then return to the aforementioned step S41. S33: identification of a node m (step shown diagrammatically in FIG. 3), comprising: S33 ': holding as index of registration m the index k which gave a positive result in the preceding test T44; o S33 ": to control the module 52 of the processing and optimization unit 36 to confirm the reception, to the address node ADD32 (m) of a sequence number frame SN ', and to deliver the number SN 'to be included in the output data D26 .- S34 (also with reference to FIG. 3): update of the pointing information P (m) contained in the record m of the base of DB3 data - S49: failure, no record has been identified - S50: end.
[0030] In the case where the pointing information P (k) of a record k is limited to the sequence number SN (k) of the last frame received from the node k, the step S34 consists simply in taking SN (m) = SN . The verification of the hash codes S32 according to FIG. 4 above then abruptly deals with the case of a loss of frame. Let us take the example of a (p + 1) - th frame of a node m which is received by the processing and optimization unit before the pth frame of the same node m (sequence break or loss of the frame p). In this situation, the update value of the sequence number included in the record m is taken equal to p + 1 in step S34. Thus, when processing the next frame transmitted from a node k, the loop browsing the sequence numbers will start at p + 2 for the record m. Any frame from the node m and having sequence number p will be ignored. If, in the node m, the module 22 for managing the acknowledgments repeats the sending of the sequence number frame p, the repetition will be useless if the next frame p + 1 has been sent and correctly received. It is therefore appropriate, in this situation, to limit the number of repetitions of a frame. For example, we can limit ourselves to three repetitions. Limiting the pointing information P (k) to the only sequence number SN (k) of the last received frame (with SN (m) = SN 'in step S34) is appropriate in the case of an acknowledgment protocol and repetitions where a node is allowed to transmit a frame SN + 1 number after receiving the acknowledgment of the SN number frame. In this situation, the loop on the sequence numbers (indexed by q in FIG. 4) is no longer necessary, which amounts to taking Q = 1.
[0031] In a variant of the method described above, a bitmap BM (k) of length Q is included in the pointing information P (k) of a record k in addition to the sequence number pointer SN ( k). This table is updated together with the sequence number SN (k) for the record k = m in step S34.
[0032] This bitmap BM (k) comprises a bit BM (k) q for each integer q ranging from 1 to Q, the value of which indicates whether the sequence number frame SN (k) + q has already been received (1) from the node k or if it has never been received (0). Here, the sequence number SN (k) is that of the last frame of a sequence of frames all correctly received and which have been transmitted by the same node k.
[0033] A test on the bit BM (k) q may possibly be added (at least when q> 1) just before step S42 of FIG. 4 to check whether the frame whose sequence number SN (k) + q has already been received from the node k. If this is the case (BM (k) q = 1), the hash code is not calculated, the processor 48 passing directly to the T45 end of iteration test in the loop. In this variant, updating the bitmap BM (m) in step S34 may consist in: positioning the bit BM (m), 1 at 1; - if all the BM (m) q are at 1, take r = Q + 1; if not, find the smallest index r such that BM (k), = 0; take SN (m) = SN (m) + r-1; - advance the BM (k) bitmap of r-1 positions and place r-1 zeros at the end.
[0034] In this variant, a frame loss occurs only if the processing and optimization unit successfully receives a frame p + Q + 1 without having managed to receive the frame p and all its repetitions occurring up to emission of the frame p + Q + 1. The number Q can be dimensioned to make this case scenario very unlikely. Increase Q does not necessarily charge the processor 48 excessively since the vast majority of the frames are received without loss of sequence. It will be noted that many other schemes for acknowledging and managing frame reception windows are possible within the scope of the present invention. The hash code generally has the primary function of allowing the integrity of the frame to be verified when it is decoded. In the present invention, the hash code H is well used for this integrity check, but it is also used to retrieve other useful information which, therefore, need not be explicitly transmitted. This information is: - the bits of the address ADD32 assigned to the node from which the frame originates, which are not part of the truncated address ADD16 included in the frame; the sequence number SN of the frame. If the address assigned to the node is 32-bit, the 16-bit sequence number, and the 32-bit hash code for the integrity check, the size of the transmitted-frame headers is reduced by 80 bits ( 32 + 16 + 32 = 80 bits) at only 48 bits (16 + 32 = 48 bits). In the particular case of data of interest of a single bit (alarms), this represents an improvement of (81-49) / 81 = 39.5%, making it possible to multiply the number of sensors in an extensive M2M network on a given area.
[0035] The truncation of 32-bit to 16-bit node addresses is of course only a particular case to which the invention is not limited. There are two extreme cases: (1) the entire address is transmitted; and (2) no bit of the address is transmitted. In the case (1), the processing load of the processor 48 of the processing and optimization unit is minimal (the loop indexed by k is not necessary because the node is explicitly identified), but the reduction of the The size of the headers is limited to that resulting from the possible non-transmission of the sequence number. In the case (2), the headers have a very small size, but to the detriment of the computational load imposed on the processor 48 which must then browse all the records of the database. Any length of truncation between these two extreme cases is possible, the choice being made according to the general dimensioning of the M2M network and a compromise between compression ratio of the headers and the computing power. We have described above the formation of a word D24 used for calculating the hash code and having the truncated address ADD16. As a variant, this word comprises the complete address ADD32 instead of the truncated address ADD16 for calculating the hash code, and it is then the complete address ADD32 (k) retrieved from the database D23 that the processor 48 will use in step S42 to compose the word X to hash. It is also possible to include in this word a truncated address of a different length. Another variant consists in including the sequence number SN in the transmitted frames, the bulk of the reduction in the size of the headers being then caused by the transmission of incomplete address data. It is also possible to include in the transmitted frames only part of the sequence number SN, for example a few bits of low weight, the processor 48 being able to complete the number using the information updated in its database. In another particular embodiment, the processing and optimization unit performs additional tasks before transmitting the decrypted data to the application servers. Thus, when a frame transmitted by a given node has been received via several antennas, it is possible, at the level of the processing and optimization unit, to use the triangulation to compute geolocation information. The use of the DB3 centralized nodes database also makes possible a very flexible use of the processing and optimization unit: each node can use a different version of the medium access layer (MAC, "Medium access control"), indexed in the centralized database, without requiring MAC version information that could still clutter the headers. Processor 48 may attempt to decode a packet by trying multiple MAC layers as needed. This makes it easy to upgrade, maintain the network, and introduce new features. - Sleep time counters in connection with the acknowledgment ACK, and the delayed acknowledgment mechanism, can be configured for each sensor. - Update information relating to the different encryption techniques used (hash code, encryption of data of interest) can also be integrated into this database. Thus, the updating of the system is advantageously carried out in a transparent and fluid manner (simple updating of the centralized database). More generally, the reception, coding and decoding process can be adapted to each node by means of such a database. The present invention is not limited to the embodiments described above as examples; it extends to other variants.
[0036] Thus, an embodiment has been described above in which the frames comprise 32 or 16 bit headers. Of course, the size and format of such frames may change and take for example 64 or 128 bit values.
权利要求:
Claims (17)
[0001]
REVENDICATIONS1. A method of receiving a data frame transmitted in a multi-node network (Tx1), wherein an address (ADD32) and a secret (SSk) are respectively assigned to each node, the method comprising: - extracting the frame encrypted data and a hash code; consulting a database having respective records relating to the nodes, the record relating to a node containing information including the address and the secret assigned to said node; for at least one record of the database: calculating at least one hash code from elements comprising the encrypted data extracted from the frame and the secret contained in said record; - comparing the calculated hash code with the frame hash code extracted from the frame; and - selecting said record if the compared hash codes coincide; and processing the frame, the processing comprising an identification of the address contained in the selected record as being the address assigned to the node from which the frame originates, and a decryption of the encrypted data extracted from the frame using of the secret contained in the selected record.
[0002]
The method of claim 1, wherein an incomplete address data (ADD16) is further extracted from the frame, and wherein the steps of calculating and comparing the hash code are executed for the database records. data containing an address corresponding to the extracted incomplete address data.
[0003]
The method of claim 2, wherein the elements for calculating the hash code for a database record further comprise at least a portion of the address contained in said record.
[0004]
A method according to any one of the preceding claims, wherein the information contained in the database record relating to a node further includes pointing information (P) of at least one sequence number of a a frame which has been received and processed by identifying the address contained in said record, and wherein the elements from which at least one hash code for said record is calculated further comprise an integer determined according to the pointing information contained in said recording.
[0005]
The method of claim 4, wherein the processing of the frame further comprises determining a sequence number of the frame among a sequence of frames transmitted from the identified address, and an update of the pointing information. contained in the selected record according to the determined sequence number of the frame.
[0006]
The method of claim 5, wherein the steps of computing and comparing the hash code are performed multiple times for at least one record of the database, with respective integers selected in an interval marked by the pointing information. contained in said record, and wherein, after selecting a record from the database, determining the sequence number of the frame includes an identification of the integer for which the compared hash codes coincide.
[0007]
The method of any of the preceding claims, further comprising an evaluation of a power level and / or timestamp information of the frame, and wherein the processing of the frame further comprises a setting of updating, in the record pertaining to the node whose address has been identified, a power information according to the evaluated power level and / or the timestamp information.
[0008]
The method according to any one of the preceding claims, further comprising: transmitting an adaptation message of at least one transmission parameter to the node whose address has been identified, said adaptation message being generated in function of information included in the record concerning said node.
[0009]
A method of transmitting a data frame by a node (Tx1), an address (ADD32) and a secret (SS) being assigned to the node, the method comprising: - encrypting data by means of the secret assigned to the node ; generate a hash code from elements comprising the encrypted data and the secret assigned to the node; and - include the encrypted data and hash code generated in the transmitted frame.
[0010]
The method of claim 9, further comprising: truncating the address assigned to the node to form an incomplete address data; and - include the incomplete address data in the transmitted frame.
[0011]
The method of any one of claims 9 to 10, wherein the elements from which the hash code is calculated further comprise a sequence number of the transmitted frame, and wherein said sequence number of the transmitted frame. is excluded from the transmitted frame.
[0012]
12. Method according to any one of claims 9 to 10, further comprising, following the transmission of the frame: - standby the node for receiving an acknowledgment message for a predetermined time.
[0013]
Computer program comprising instructions for carrying out the method according to any of the preceding claims, when these instructions are executed by a processor.
[0014]
14. Processing and optimization unit (36) for communicating with multiple nodes (Tx1), the processing and optimizing unit comprising: an interface with a database (DB3) having respective records relating to the nodes of the network, the record relating to a node containing information including an address (ADD32) and a secret (SS) assigned to said node; an extraction unit for receiving a data frame and extracting encrypted data and a frame hashing code therefrom; a code checker arranged to perform the following operations for at least one record of the database: calculate at least one hash code from elements comprising the encrypted data extracted from the received frame and the secret included in the information of said record; comparing the calculated hash code with the frame hash code extracted from the received frame; and - selecting said record if the compared hash codes coincide; - and a decryption unit of the received frame to execute a process comprising an identification of the address contained in the selected record as being the address assigned to the node of where the received frame comes from, and a decryption of the encrypted data extracted from the received frame using the secret contained in the selected record.
[0015]
15. System (Rx1) for communicating with multiple nodes (Tx1), the system comprising: - a plurality of antennas for receiving signals from said nodes, said signals including data frames; and a processing and optimization unit according to claim 14 for processing the data frames.
[0016]
16. Node (Tx1) for communicating over a telecommunication network, an address (ADD32) being assigned to the node and a secret (SS) being further assigned to the node, the node comprising: - a data encryption unit by means of the secret assigned to the node; a hash code generator, the hash code being generated from elements comprising the encrypted data and the secret assigned to the node; and a frame generator to be transmitted, the frame including the encrypted data and the hash code generated.
[0017]
The node of claim 16, wherein the frame further comprises incomplete address data (ADD16) obtained by truncating the address (ADD32) assigned to the node.
类似技术:
公开号 | 公开日 | 专利标题
EP3130168B1|2021-11-10|Methods for encoding and decoding frames in a telecommunication network
FR2933557A1|2010-01-08|METHOD AND DEVICE FOR PROTECTING THE INTEGRITY OF DATA TRANSMITTED ON A NETWORK
FR2935493A1|2010-03-05|METHOD AND DEVICE FOR MONITORING ANTENNA
Yu et al.2015|PYRAMID: Informed content reconciliation for vehicular peer-to-peer systems
Staikopoulos et al.2020|Image Transmission via LoRa Networks–A Survey
FR3052944B1|2019-07-19|METHOD FOR SEGMENTING HIGH-PERFORMANCE DATA
EP2517187B1|2013-11-27|Method and device for managing transmissions of measurements periodically carried out by a sensor
CN111741373A|2020-10-02|Video data transmission method and video source equipment
EP2879460B1|2019-05-15|Node of an improved multi-hop ad-hoc radio network, and associated method
EP3934107A1|2022-01-05|Method and device for transmitting a message
Murray et al.2021|Exploring the Characteristics and Limits of LoRaWAN
EP3504932B1|2020-08-12|Method for controlling the load of a data concentration gateway for a wireless communication network
WO2007113418A1|2007-10-11|Confidential transmission of data by change of frequency in a telecommunications network
WO2021105571A1|2021-06-03|Method and device for transmitting data for a vehicle
CN110582098A|2019-12-17|Digital information transmission system, method and device based on ZigBee and data compression
FR2949033A1|2011-02-11|METHOD OF SEARCHING AN ENTITY USING A VERIFIER DEVICE AND ASSOCIATED DEVICES
WO2017114926A1|2017-07-06|Method for unambiguous and secret coding for transmission over a propagation channel with capacity advantage
WO2018178242A1|2018-10-04|Method for learning from a compression/decompression context and corresponding device, system and computer program product
FR3076421A1|2019-07-05|METHOD OF ESTABLISHING A CRYPTOGRAPHIC KEY SHARED BETWEEN A FIRST AND A SECOND TERMINAL
FR3052943A1|2017-12-22|METHOD FOR RECONSTRUCTING DATA IN LOW-FLOW TRANSMISSION
FR3022421A1|2015-12-18|METHOD FOR MANAGING A PRIVATE VIRTUAL COMMUNICATION CHANNEL BETWEEN A TERMINAL AND A SERVER
EP1515472A1|2005-03-16|Linear encoding for erratic transmissions
FR2934736A1|2010-02-05|Data packet transmission method for e.g. mesh wireless communication network, involves selecting transmission mode with or without implementation of coding based on comparison of transmission quality level with predetermined threshold
FR2954659A1|2011-06-24|Method for determining sequence of wireless audio decoder type nodes in home cinema type communication network, involves selecting sequence of source nodes and relay nodes among sequences of determined source and relay nodes
FR2932934A1|2009-12-25|Reallocatable time intervals notifying method for wireless mesh communication network, involves notifying identified time intervals to part of set of nodes, and constituting reallocatable time intervals
同族专利:
公开号 | 公开日
WO2015155440A1|2015-10-15|
EP3130168A1|2017-02-15|
EP3130168B1|2021-11-10|
IL248208D0|2016-11-30|
ZA201607106B|2018-05-30|
CN106537959A|2017-03-22|
RU2016143825A3|2018-10-22|
KR102251121B1|2021-05-12|
FR3019957B1|2016-05-27|
US20170041826A1|2017-02-09|
IL248208A|2020-08-31|
RU2016143825A|2018-05-11|
CN106537959B|2020-07-14|
PT3130168T|2022-01-21|
KR20170021767A|2017-02-28|
RU2683688C2|2019-04-01|
CA2945253A1|2015-10-15|
JP2017514420A|2017-06-01|
US10129789B2|2018-11-13|
JP6615179B2|2019-12-04|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题
US20100046443A1|2008-08-22|2010-02-25|Qualcomm Incorporated|Addressing schemes for wireless communication|
EP2571306A1|2011-09-15|2013-03-20|Kabushiki Kaisha Toshiba|An authentication client proxy for a communication apparatus|FR3056867A1|2016-09-29|2018-03-30|Airbus Defence And Space Sas|METHOD OF TRANSMITTING, BY A TERMINAL OF A SLOT-ACCESS COMMUNICATION SYSTEM, A MESSAGE WITH INTRA-MESSAGE FREQUENCY SAVINGS|US5613012A|1994-11-28|1997-03-18|Smarttouch, Llc.|Tokenless identification system for authorization of electronic transactions and electronic transmissions|
MY123040A|1994-12-19|2006-05-31|Salbu Res And Dev Proprietary Ltd|Multi-hop packet radio networks|
US6944162B1|2000-10-03|2005-09-13|Alcatel|Tuple-based lookup scheme for packet switching node|
US7346167B2|2002-05-10|2008-03-18|Harris Corporation|Secure mobile ad-hoc network and related methods|
US6895493B2|2002-07-25|2005-05-17|Texas Instruments Incorporated|System and method for processing data in an integrated circuit environment|
US7409544B2|2003-03-27|2008-08-05|Microsoft Corporation|Methods and systems for authenticating messages|
US20050240989A1|2004-04-23|2005-10-27|Seoul National University Industry Foundation|Method of sharing state between stateful inspection firewalls on mep network|
IL179202D0|2006-11-12|2008-01-20|Nds Ltd|Secure communication|
EP2239882A4|2008-01-04|2016-11-02|Univ Yamanashi|Confidential communication method|
US8290473B2|2007-10-31|2012-10-16|Freescale Semiconductor, Inc.|Remotely modifying data in memory in a mobile device|
US8713666B2|2008-03-27|2014-04-29|Check Point Software Technologies, Ltd.|Methods and devices for enforcing network access control utilizing secure packet tagging|
US8806590B2|2008-06-22|2014-08-12|Microsoft Corporation|Signed ephemeral email addresses|
WO2010001557A1|2008-06-30|2010-01-07|パナソニック株式会社|Radio communication system, communication terminal, management terminal, communication method, and integrated circuit|
US20100199095A1|2009-01-30|2010-08-05|Texas Instruments Inc.|Password-Authenticated Association Based on Public Key Scrambling|
US8868907B2|2009-03-18|2014-10-21|University Of Louisville Research Foundation, Inc.|Device, method, and system for processing communications for secure operation of industrial control system field devices|
EP2548392B1|2010-03-16|2013-11-13|ABB Research Ltd.|An energy efficient method for communication in a wireless sensor network of an industrial control system.|
WO2011154051A1|2010-06-11|2011-12-15|Abb Research Ltd|An energy efficient method for communication between a wireless sensor network and an industrial control system|
GB2501847A|2011-01-18|2013-11-06|Fortress Gb Ltd|System and method for computerized negotiations based on coded integrity|
KR101234784B1|2011-05-30|2013-02-20|삼성에스디에스 주식회사|Method of encryping basded on terminal's identification and apparatus thereof|
US10778663B2|2013-03-15|2020-09-15|Cox Communications, Inc.|Network token authentication scheme|
CN104751163B|2013-12-27|2018-06-19|同方威视技术股份有限公司|The fluoroscopic examination system and method for automatic Classification and Identification are carried out to cargo|
US8984635B1|2014-01-06|2015-03-17|Cloudflare, Inc.|Authenticating the identity of initiators of TCP connections|WO2015053698A1|2013-10-07|2015-04-16|Telefonaktiebolaget L M Ericsson |Methods and arrangements for device discovery|
WO2019113629A1|2017-12-13|2019-06-20|Metamako General Pty Ltd In Its Capacity As General Partner Of Metamako Technology Lp|System and methods for generating and authenticating verifiable network traffic|
GB2570449A|2018-01-23|2019-07-31|Canon Kk|Method and system for auto-setting of cameras|
法律状态:
2015-03-27| PLFP| Fee payment|Year of fee payment: 2 |
2016-02-26| PLFP| Fee payment|Year of fee payment: 3 |
2017-03-29| PLFP| Fee payment|Year of fee payment: 4 |
2018-02-26| PLFP| Fee payment|Year of fee payment: 5 |
2019-02-27| PLFP| Fee payment|Year of fee payment: 6 |
2020-02-26| PLFP| Fee payment|Year of fee payment: 7 |
2021-02-22| PLFP| Fee payment|Year of fee payment: 8 |
优先权:
申请号 | 申请日 | 专利标题
FR1453141A|FR3019957B1|2014-04-09|2014-04-09|METHODS FOR ENCODING AND DECODING FRAMES IN A TELECOMMUNICATION NETWORK|FR1453141A| FR3019957B1|2014-04-09|2014-04-09|METHODS FOR ENCODING AND DECODING FRAMES IN A TELECOMMUNICATION NETWORK|
CN201580021819.9A| CN106537959B|2014-04-09|2015-03-31|Method for encoding and decoding frames in a telecommunication network|
PCT/FR2015/050826| WO2015155440A1|2014-04-09|2015-03-31|Methods for encoding and decoding frames in a telecommunication network|
PT157170481T| PT3130168T|2014-04-09|2015-03-31|Methods for encoding and decoding frames in a telecommunication network|
KR1020167031225A| KR102251121B1|2014-04-09|2015-03-31|Methods for encoding and decoding frames in a telecommunication network|
JP2017504273A| JP6615179B2|2014-04-09|2015-03-31|Method for encoding and decoding frames within a telecommunication network|
CA2945253A| CA2945253A1|2014-04-09|2015-03-31|Methods for encoding and decoding frames in a telecommunication network|
US15/302,831| US10129789B2|2014-04-09|2015-03-31|Methods for encoding and decoding frames in a telecommunication network|
EP15717048.1A| EP3130168B1|2014-04-09|2015-03-31|Methods for encoding and decoding frames in a telecommunication network|
RU2016143825A| RU2683688C2|2014-04-09|2015-03-31|Methods for encoding and decoding frames in telecommunication network|
IL248208A| IL248208A|2014-04-09|2016-10-06|Methods for encoding and decoding frames in a telecommunication network|
ZA2016/07106A| ZA201607106B|2014-04-09|2016-10-14|Methods for encoding and decoding frames in a telecommunication network|
[返回顶部]