Abstract:
A method and apparatus for protecting and authenticating wirelessly transmitted digital information using numerous techniques. The apparatus may be a wireless orthogonal frequency division multiplexing (OFDM) communication system, a base station, a wireless transmit/receive unit (WTRU), a transmitter, a receiver and/or an integrated circuit (IC). The wireless OFDM communication system includes a transmitter which steganographically embeds digital information in an OFDM communication signal and wirelessly transmits the OFDM communication signal. The system further includes a receiver which receives the OFDM communication signal and extracts the steganographically embedded digital information from the received OFDM communication signal.
Abstract:
Method and apparatus delivering voice/data services within a piconet operating over a limited range or over a WLAN communicating with 3GPP devices by reformatting data into IP format before delivering to the WLAN. The service is short message service (SMS). Upon receipt of an SMS message, relevant routing information is retrieved. A PDGW address for the SMS message is identified and is sent to the PDGW address which identifies the WLAN user equipment (UE) for receiving the SMS and reformats the SMS message into IP format (text or encapsulation) for delivery to the UE. A protocol architecture is provided for SMS delivery over WLANs, in particular, for UMTS/CDMA based SMS over WLAN through two alternative mechanisms, i.e., SMS tunneling and SMS proxy, for protocols for the delivery of SMS across the WLAN. The invention enhances standard 802.11 in the context of UMTS and CDMA 2000; as well as other scenarios.
Abstract:
An improved system for minimizing toll charges is disclosed wherein line quality is measured and a call is terminated if the line quality is not at an acceptable level to allow for the highest possible bit rates during data transfer or to guarantee a certain minimum degree of quality.
Abstract:
A tone blocking system and method for use preferably in conferencing systems in order to prevent control tones from being transmitted to other conferees is disclosed. The buffer length used to process the signal and detect tones is varied, being increased when a tone is suspected to allow for sophisticated tone detection algorithms, and being decreased when silence is present by trimming the silence away. The technique minimizes delay, and its degrading effect on echo, but nonetheless provides for a lengthy buffer required to do reliable tone detection. The invention is applicable to any signal other than tone as well.
Abstract:
Systems, apparatuses and methods for bandwidth management, aggregation and internet protocol (“IP”) flow mobility (“IFOM”) across multiple-access technologies are provided. Included is a method that includes selecting, from a packet data network (“PDN”) connection formed through a plurality of access systems communicatively coupled with a wireless transmit and/or receive unit (“WTRU”), an access system over which to transport a flow of internet protocol (“IP”) traffic to and/or from the WTRU. The method may also include sending, to the WTRU, a request to associate the flow of IP traffic with the selected access system.
Abstract:
Systems, apparatuses and methods for bandwidth management, aggregation and internet protocol (“IP”) flow mobility (“IFOM”) across multiple-access technologies are provided. Included is a method that includes selecting, from a packet data network (“PDN”) connection formed through a plurality of access systems communicatively coupled with a wireless transmit and/or receive unit (“WTRU”), an access system over which to transport a flow of internet protocol (“IP”) traffic to and/or from the WTRU. The method may also include sending, to the WTRU, a request to associate the flow of IP traffic with the selected access system.
Abstract:
A method and apparatus is used for generating a perfectly random secret key between two or more transceivers in a wireless communication network. In a point-to-point system, both transceivers produce an estimate of the channel impulse response (CIR) based on the received radio signal. The CIR estimation is synchronized and may include error correction and detection. A long secret key of bits is generated from a digitized version of the CIR estimate, from which a perfectly secret encryption key is derived by privacy amplification.
Abstract:
A method and apparatus for securing wireless communications are disclosed. A watermark message is encoded to watermark message symbols. A cover message is encoded to cover message symbols. The watermark message symbols are then overlaid onto the cover message symbols to generate a watermark-embedded cover message in a physical layer. The watermark message symbols have a substantially lower amplitude than the cover message symbols. Thus, the watermark message introduces small perturbation around the constellation points of the cover message symbols. The watermark message symbol may span or spread over a plurality of cover message symbols and may be encrypted with a secret key. The watermark message is used for improving receiver performance by transmitting additional information or for security enhancement purposes. The watermarking function may be selectively turned on and off.
Abstract:
The present invention relates to secret key generation and authentication methods that are based on joint randomness not shared by others (JRNSO), in which unique channel response between two communication terminals generates a secret key. Multiple network access points use a unique physical location of a receiving station to increase user data security. High data rate communication data is encrypted by generating a random key and a pseudo-random bit stream. A configurable interleaving is achieved by introduction of JRNSO bits to an encoder used for error-correction codes. Databases of user data are also protected by JRNSO-based key mechanisms. Additional random qualities are induced on the joint channel using MIMO eigen-beamforming, antenna array deflection, polarization selection, pattern deformation, and path selection by beamforming or time correlation. Gesturing induces randomness according to uniquely random patterns of a human user's arm movements inflected to the user device.
Abstract:
Internet protocol version 6 (IPv6) is substantially utilized throughout the entire cellular network and employs routing headers of the packets to ensure that the packets are routed via the gateway router (GR) to the end destination which is accomplished by a user equipment (UE) specifying the IP address of the gateway router as the IP address of an intermediate router in the routing header. Packets may also be routed to UEs from the GR through an intermediate router.