2011 - Europe Direct Iasi
2011 - Europe Direct Iasi
2011 - Europe Direct Iasi
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
EUROINVENT <strong>2011</strong><br />
Patent no. Patent application RO No: A/10017/2010<br />
The goal of the QoS sensitive framework is to ensure endto-end<br />
quality of service in heterogeneous computer<br />
networks, through admission control and self-adaptive<br />
bandwidth reconfiguration. The dynamic bandwidth<br />
Description allocation method consists in allocating a quantity of<br />
bandwidth to achieve end-to-end connections, by statically<br />
dividing the physical line into three main sections:<br />
Guaranteed Link, local Common Link and global<br />
Common Link, thus extending the SAR (Self-Adaptive<br />
Bandwidth Reconfiguration) framework’s method.<br />
10.3.<br />
Title<br />
System and method for secure communication between<br />
fixed and mobile devices<br />
Aştilean Adina, Folea Silviu, Avram Camelia, Hulea<br />
Authors Mihai, Miron Radu Florin, Leţia Tiberiu Ștefan, Ciupan<br />
Emilia<br />
Institution Technical University of Cluj-Napoca<br />
Patent no. Patent application RO No: A/10037/2010<br />
The patent refers to a system and a secure method of<br />
communication between fixed and mobile devices based<br />
on fingerprints. The secured access system consists of one<br />
or more transmitter subsystems and a receiver subsystem<br />
consisting of a distributed application server connected to<br />
the Internet. The transmitter subsystem has a fingerprint<br />
reader equipped with storage and processing unit, with the<br />
added possibility of communicating using Bluetooth<br />
technology, Wi-Fi for short range communications, or<br />
Description GPRS, for large distances. The secured method of<br />
communication assumes the sending-receiving of an<br />
encrypted message using a symmetric key encryption<br />
algorithm and limited key lifetime. The symmetric key<br />
generation method uses information from a fingerprint<br />
reader belonging to the communication session<br />
participants and their positions. Authentication is<br />
performed according to a protocol involving the user<br />
position, the identity codes of the entities involved in the<br />
communication process and the number of communication<br />
sessions between users, in addition to fingerprints.<br />
Class 10<br />
120