摘要:
A transaction authentication system uses a computer network and mobile telephone network to authenticate a user. The user initiates a transaction and provides an identity token, such as the mobile telephone number. The identity token is used by an authentication server to initiate the issuance of a new temporary identity for the corresponding mobile device. The new temporary identity is forwarded from the mobile device to the authentication server which issues a security code if there is a match between the new temporary identities. The security code is forwarded to a transaction server which relays it to the authentication server. If the forwarded security code matches the generated security code, the transaction is permitted to continue.
摘要:
The identity of a mobile communication device can be authenticated to allow the device to access a web site without the need for a user log-in operation. The mobile device stores an identity token and sends it to the web server in the web browser data stream. Additionally, the mobile device transmits an identity token to an authentication entity using a data stream other than the web browser data. The authentication entity queries the wireless network to verify authentication of the mobile device. The identity token may be the mobile telephone number itself, a temporary mobile subscriber identity assigned by the mobile network, or encrypted or hashed versions of either. Alternatively, a new temporary mobile subscriber identity may be sent to the mobile device and retransmitted back to the authentication entity.
摘要:
A system to permit push-to-talk communications in an orthogonal frequency division multiplexed (OFDM) communication network. Individual wireless communication devices that are part of a Group Call are assigned the same set or sets of OFDM tones for a downlink timeslot. Because each wireless communication device receives the same set of tones, each device will receive a communication simultaneously. The assigned OFDM tones need not be contiguous within a block of available tones. Because a large number of OFDM tones are available, the concept may be extended to a large number of groups that each separately support a Group Call function.
摘要:
An integrated communication system includes a satellite portion and a terrestrial portion. A plurality of timeslots are allocated for transmission and reception of data by the various components of the satellite portion and terrestrial portion. The allocation of timeslots to the satellite portion and the terrestrial portion may be predetermined or dynamically allocated based on traffic loads, time of day, day of week, and the like. Communication may be accomplished on a single frequency with the appropriate allocation of timeslots. The system includes delay compensation to accommodate signal processing delays and signal propagation delays. For example, a satellite may be instructed to terminate transmission prior to the end of its allocated timeslot to permit the signal from the satellite to propagate to its intended destination within the allocated timeslot to thereby avoid spillover into the next timeslot. This avoids interference between various elements of the communication system.
摘要:
A discrete multitone stacked-carrier spread spectrum communication method is based on frequency domain spreading including multiplication of a baseband signal by a set of superimposed, or stacked, complex sinusoid carrier waves. In a preferred embodiment, the spreading involves energizing the bins of a large Fast Fourier transform (FFT). This provides a considerable savings in computational complexity for moderate output FFT sizes. Point-to-multipoint and multipoint-to-multipoint (nodeless) network topologies are possible. A code-nulling method is included for interference cancellation and enhanced signal separation by exploiting the spectral diversity of the various sources. The basic method may be extended to include multielement antenna array nulling methods for interference cancellation and enhanced signal separation using spatial separation. Such methods permit directive and retrodirective transmission systems that adapt or can be adapted to the radio environment. Such systems are compatible with bandwidth-on-demand and higher-order modulation formats and use advanced adaptation algorithms. In a specific embodiment the spectral and spatial components of the adaptive weights are calculated in a unified operation based on the mathematical analogy between the spectral and spatial descriptions of the airlink.
摘要:
Client and server computers on a network can be authenticated using a shared secret. During a log-on and authentication process, the server transmits an image to the client. A mobile communication device captures and analyzes the image. If the image contains the shared secret, the mobile device can authenticate the server. The secret in the image can be a geometric relationship between elements of the picture, a mathematical relationship between elements, a particular number or types of elements in the picture, colors of elements, or combinations of the above. A single image may contain multiple shared secrets. The mobile device can readily analyze the image to determine if it contains the shared secret and thereby authenticate the server.
摘要:
A transaction authentication system uses a computer network and mobile telephone network to authenticate a user. The user initiates a transaction and provides an identity token, such as the mobile telephone number. The identity token is used by an authentication server to initiate the issuance of a new temporary identity for the corresponding mobile device. The new temporary identity is forwarded from the mobile device to the authentication server which issues a security code if there is a match between the new temporary identities. The security code is forwarded to a transaction server which relays it to the authentication server. If the forwarded security code matches the generated security code, the transaction is permitted to continue.
摘要:
Client and server computers on a network can be authenticated using a shared secret. During a log-on and authentication process, the server transmits an image to the client. A mobile communication device captures and analyzes the image. If the image contains the shared secret, the mobile device can authenticate the server. The secret in the image can be a geometric relationship between elements of the picture, a mathematical relationship between elements, a particular number or types of elements in the picture, colors of elements, or combinations of the above. A single image may contain multiple shared secrets. The mobile device can readily analyze the image to determine if it contains the shared secret and thereby authenticate the server.
摘要:
A system to verify user identity on a computer uses a server with a set of stored or created images. An image is selected and transmitted over a computer network to the computer whose user identity is to be verified. The user captures the image on a mobile communication device using, by way of example, a built-in camera. The captured image is transmitted via a public mobile network back to the server where the captured image is compared with the stored image. If the images match, the user identity is verified. In another embodiment, multiple images may be displayed and user-selectable options are selected by capturing one of the multiple images.
摘要:
A system to verify user identity on a computer uses a server with a set of stored or created images. An image is selected and transmitted over a computer network to the computer whose user identity is to be verified. The user captures the image on a mobile communication device using, by way of example, a built-in camera. The captured image is transmitted via a public mobile network back to the server where the captured image is compared with the stored image. If the images match, the user identity is verified. In another embodiment, multiple images may be displayed and user-selectable options are selected by capturing one of the multiple images.