Abstract:
At least one At least one user data stream is layer 2/3 processed, physical layer processed and radio frequency processed. A watermark/signature is embedded at at least one of layer 2/3, physical layer or radio frequency, producing an embedded wireless communication. The embedded wireless communication is wirelessly transferred. The embedded wireless communication is received and the watermark/signature is extracted from the embedded wireless communication.
Abstract:
One embodiment of the present invention, file transfers are performed in a wireless communication network between a wireless transmit/receive unit (WTRU) and a location external to the WTRU for purposes of utilizing the data under predetermined conditions. In another embodiment, file transfer is performed by determining conditions for file transfer using the WTRU. The file transfer takes place subject to the determined conditions, and using the WTRU to automatically request the file transfer in response to the existence of the determined conditions.
Abstract:
A method and apparatus for protecting and authenticating wirelessly transmitted digital information using numerous techniques. The apparatus may be a wireless orthogonal frequency division multiplexing (OFDM) communication system, a base station, a wireless transmit/receive unit (WTRU), a transmitter, a receiver and/or an integrated circuit (IC). The wireless OFDM communication system includes a transmitter which steganographically embeds digital information in an OFDM communication signal and wirelessly transmits the OFDM communication signal. The system further includes a receiver which receives the OFDM communication signal and extracts the steganographically embedded digital information from the received OFDM communication signal.
Abstract:
Method and apparatus delivering voice/data services within a piconet operating over a limited range or over a WLAN communicating with 3GPP devices by reformatting data into IP format before delivering to the WLAN. The service is short message service (SMS). Upon receipt of an SMS message, relevant routing information is retrieved. A PDGW address for the SMS message is identified and is sent to the PDGW address which identifies the WLAN user equipment (UE) for receiving the SMS and reformats the SMS message into IP format (text or encapsulation) for delivery to the UE. A protocol architecture is provided for SMS delivery over WLANs, in particular, for UMTS/CDMA based SMS over WLAN through two alternative mechanisms, i.e., SMS tunneling and SMS proxy, for protocols for the delivery of SMS across the WLAN. The invention enhances standard 802.11 in the context of UMTS and CDMA 2000; as well as other scenarios.
Abstract:
An improved system for minimizing toll charges is disclosed wherein line quality is measured and a call is terminated if the line quality is not at an acceptable level to allow for the highest possible bit rates during data transfer or to guarantee a certain minimum degree of quality.
Abstract:
Systems, apparatuses and methods for bandwidth management, aggregation and internet protocol (“IP”) flow mobility (“IFOM”) across multiple-access technologies are provided. Included is a method that includes selecting, from a packet data network (“PDN”) connection formed through a plurality of access systems communicatively coupled with a wireless transmit and/or receive unit (“WTRU”), an access system over which to transport a flow of internet protocol (“IP”) traffic to and/or from the WTRU. The method may also include sending, to the WTRU, a request to associate the flow of IP traffic with the selected access system.
Abstract:
Systems, apparatuses and methods for bandwidth management, aggregation and internet protocol (“IP”) flow mobility (“IFOM”) across multiple-access technologies are provided. Included is a method that includes selecting, from a packet data network (“PDN”) connection formed through a plurality of access systems communicatively coupled with a wireless transmit and/or receive unit (“WTRU”), an access system over which to transport a flow of internet protocol (“IP”) traffic to and/or from the WTRU. The method may also include sending, to the WTRU, a request to associate the flow of IP traffic with the selected access system.
Abstract:
A method and apparatus is used for generating a perfectly random secret key between two or more transceivers in a wireless communication network. In a point-to-point system, both transceivers produce an estimate of the channel impulse response (CIR) based on the received radio signal. The CIR estimation is synchronized and may include error correction and detection. A long secret key of bits is generated from a digitized version of the CIR estimate, from which a perfectly secret encryption key is derived by privacy amplification.
Abstract:
A method and apparatus for securing wireless communications are disclosed. A watermark message is encoded to watermark message symbols. A cover message is encoded to cover message symbols. The watermark message symbols are then overlaid onto the cover message symbols to generate a watermark-embedded cover message in a physical layer. The watermark message symbols have a substantially lower amplitude than the cover message symbols. Thus, the watermark message introduces small perturbation around the constellation points of the cover message symbols. The watermark message symbol may span or spread over a plurality of cover message symbols and may be encrypted with a secret key. The watermark message is used for improving receiver performance by transmitting additional information or for security enhancement purposes. The watermarking function may be selectively turned on and off.
Abstract:
The present invention relates to secret key generation and authentication methods that are based on joint randomness not shared by others (JRNSO), in which unique channel response between two communication terminals generates a secret key. Multiple network access points use a unique physical location of a receiving station to increase user data security. High data rate communication data is encrypted by generating a random key and a pseudo-random bit stream. A configurable interleaving is achieved by introduction of JRNSO bits to an encoder used for error-correction codes. Databases of user data are also protected by JRNSO-based key mechanisms. Additional random qualities are induced on the joint channel using MIMO eigen-beamforming, antenna array deflection, polarization selection, pattern deformation, and path selection by beamforming or time correlation. Gesturing induces randomness according to uniquely random patterns of a human user's arm movements inflected to the user device.