04.03.2013 Views

2011 - Europe Direct Iasi

2011 - Europe Direct Iasi

2011 - Europe Direct Iasi

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

EUROINVENT <strong>2011</strong><br />

Patent no. Patent application RO No: A/10017/2010<br />

The goal of the QoS sensitive framework is to ensure endto-end<br />

quality of service in heterogeneous computer<br />

networks, through admission control and self-adaptive<br />

bandwidth reconfiguration. The dynamic bandwidth<br />

Description allocation method consists in allocating a quantity of<br />

bandwidth to achieve end-to-end connections, by statically<br />

dividing the physical line into three main sections:<br />

Guaranteed Link, local Common Link and global<br />

Common Link, thus extending the SAR (Self-Adaptive<br />

Bandwidth Reconfiguration) framework’s method.<br />

10.3.<br />

Title<br />

System and method for secure communication between<br />

fixed and mobile devices<br />

Aştilean Adina, Folea Silviu, Avram Camelia, Hulea<br />

Authors Mihai, Miron Radu Florin, Leţia Tiberiu Ștefan, Ciupan<br />

Emilia<br />

Institution Technical University of Cluj-Napoca<br />

Patent no. Patent application RO No: A/10037/2010<br />

The patent refers to a system and a secure method of<br />

communication between fixed and mobile devices based<br />

on fingerprints. The secured access system consists of one<br />

or more transmitter subsystems and a receiver subsystem<br />

consisting of a distributed application server connected to<br />

the Internet. The transmitter subsystem has a fingerprint<br />

reader equipped with storage and processing unit, with the<br />

added possibility of communicating using Bluetooth<br />

technology, Wi-Fi for short range communications, or<br />

Description GPRS, for large distances. The secured method of<br />

communication assumes the sending-receiving of an<br />

encrypted message using a symmetric key encryption<br />

algorithm and limited key lifetime. The symmetric key<br />

generation method uses information from a fingerprint<br />

reader belonging to the communication session<br />

participants and their positions. Authentication is<br />

performed according to a protocol involving the user<br />

position, the identity codes of the entities involved in the<br />

communication process and the number of communication<br />

sessions between users, in addition to fingerprints.<br />

Class 10<br />

120

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!