Abstract:
A method and apparatus for securing wireless communications are disclosed. A watermark message is encoded to watermark message symbols. A cover message is encoded to cover message symbols. The watermark message symbols are then overlaid onto the cover message symbols to generate a watermark-embedded cover message in a physical layer. The watermark message symbols have a substantially lower amplitude than the cover message symbols. Thus, the watermark message introduces small perturbation around the constellation points of the cover message symbols. The watermark message symbol may span or spread over a plurality of cover message symbols and may be encrypted with a secret key. The watermark message is used for improving receiver performance by transmitting additional information or for security enhancement purposes. The watermarking function may be selectively turned on and off.
Abstract:
The present invention relates to secret key generation and authentication methods that are based on joint randomness not shared by others (JRNSO), in which unique channel response between two communication terminals generates a secret key. Multiple network access points use a unique physical location of a receiving station to increase user data security. High data rate communication data is encrypted by generating a random key and a pseudo-random bit stream. A configurable interleaving is achieved by introduction of JRNSO bits to an encoder used for error-correction codes. Databases of user data are also protected by JRNSO-based key mechanisms. Additional random qualities are induced on the joint channel using MIMO eigen-beamforming, antenna array deflection, polarization selection, pattern deformation, and path selection by beamforming or time correlation. Gesturing induces randomness according to uniquely random patterns of a human user's arm movements inflected to the user device.
Abstract:
Internet protocol version 6 (IPv6) is substantially utilized throughout the entire cellular network and employs routing headers of the packets to ensure that the packets are routed via the gateway router (GR) to the end destination which is accomplished by a user equipment (UE) specifying the IP address of the gateway router as the IP address of an intermediate router in the routing header. Packets may also be routed to UEs from the GR through an intermediate router.
Abstract:
A wireless communication system includes a base station that receives information regarding neighboring wireless systems and updates and stores this information for use in handover of user equipments (UEs).
Abstract:
The present invention is related to a method and apparatus for enhancing security of communications. The apparatus comprises a security processing unit, a data processing unit, a cross-layer watermarking unit, and optionally a smart antenna processor. The security processing unit generates a token/key to be used in watermarking and sends a node security policy to other components. The data processing unit generates user data. The cross-layer watermarking unit includes at least one of Layer-2/3, Layer-1 and Layer-0. Each layer performs a different scheme or degree of watermarking. The cross-layer watermarking unit embeds the token/key into the user data transmission on at least one of the layers selectively in accordance with a security policy.
Abstract:
An electronic device receives user inputs. The user inputs indicating interactions of the user with processing of the electronic device. The device determines interaction patterns of the user with the device. The device uses the determined interaction patterns to determine adjustments for the electronic device. The electronic device is adjusted using the determined adjustments.
Abstract:
A technique for utilization of call processing resources in a call processing system is disclosed wherein echo characteristics of a telephone line ascertained and utilized by a echo canceler, and are also stored for subsequent use by a different echo canceler which processes a call on that same telephone line. The technique may also be used with call processing resources other than echo cancelers.