摘要:
A secret stream of bits begins by receiving a public random stream contained in a wireless communication signal at a transmit/receive unit. The public random stream is sampled and specific bits are extracted according to a shared common secret. These extracted bits are used to create a longer secret stream. The shared common secret may be generated using JRNSO techniques, or provided to the transmit/receive units prior to the communication session. Alternatively, one of the transmit/receive unit is assumed to be more powerful than any potential eavesdropper. In this situation, the powerful transmit/receive unit may broadcast and store a public random stream. The weaker transmit/receive unit selects select random bits of the broadcast for creating a key. The weaker transmit/receive unit sends the powerful transmit/receive unit the selected bit numbers, and powerful transmit/receive unit uses the random numbers to produce the key created by the weaker transmit/receive unit.
摘要:
A method and apparatus for password management and single sign-on (SSO) access based on trusted computing (TC) technology. The methods implement the Trusted Computing Group (TCG)'s trusted platform module (TPM), which interacts with both proxy SSO unit and web-accessing applications to provide a secure, trusted mechanism to generate, store, and retrieve passwords and SSO credentials. The various embodiments of the present invention allow a user to hop securely and transparently from one site to another that belong to a pre-identified group of sites, after signing on just once to a secured proxy residing at the user's device.
摘要:
A communications system includes a fixed transmitter and a mobile wireless communications device. The fixed transmitter transmits a source signal defined by a character set made up of symbols. At least one of the symbols in the character set is transmitted at a different power level so that the transmitted source signal appears with linearly independent power level time periods. The linearly independent power level time periods are used by the mobile wireless communications device to populate a mixing matrix for signal separation processing.
摘要:
A communications device includes an antenna array for receiving different summations of source signals from a plurality of signal sources, a receiver coupled to the antenna array for receiving the different summations of source signals, and a signal separation processor coupled to the receiver Processing by the signal separation processor includes creating a matrix based upon the different summations of source signals, with the matrix being defined by linear independent equations with fewer equations than unknowns. The matrix is underdetermined, and parameters associated with the matrix are modified based upon different sets of parameter values, and respective matrix quality factors associated with the different sets of parameter values are determined. The matrix is then biased with a preferred set of parameter values so that the solution space may be narrowed for obtaining a solution.
摘要:
A method and system for securing wireless communications is disclosed. In one embodiment, different security policies are used based on the distance between a receiver and a transmitter, whereby data in the wireless communications can only be demodulated if received in particular trust zones. In another embodiment, a plurality of bit stream fragments are transmitted by a plurality of transmitters to a receiver located in an area where transmission patterns radiated by the transmitters intersect. Alternatively, the receiver performs a function on packet data units (PDUs) transmitted by the transmitters. In yet another embodiment, primary modulation points of a modulation constellation are split into clusters of proximate secondary modulation points which can be demodulated only by a receiver that is within range of the transmitter. In yet another embodiment, a main waveform is transmitted which overlays a QPSK signal with hierarchical modulation (HM) having encoded descrambling information.
摘要:
A cellular network monitors the location of a wireless transmit/receive unit (WTRU). The cellular network is also aware of the location of each data pump capable of communicating with the cellular network. The data pump capable of transmitting data at a high data rate. The cellular network coordinating a high data rate transfer between the WTRU and the data pump.
摘要:
An authentication method selection using a home enhanced Node B (H(e)NB) profile is disclosed. A method for selecting an H(e)NB authentication method includes authenticating at least one of the device or the hosting party module by a security gateway (SeGW). The SeGW receives a request from the H(e)NB to start the authentication process. Based on information received from the H(e)NB and an authentication information server, the SeGW determines how to authenticate the H(e)NB. The possible authentication methods include device authentication only, device authentication and hosting party module authentication, requesting the H(e)NB to perform authentication using Extensible Authentication Protocol-Authentication and Key Agreement, or authentication of both the H(e)NB and one or more WTRUs connected to or attempting to connect to the H(e)NB.
摘要:
A receiver is capable of demodulating both high data rate and low data rate transmissions. An antenna receives the high and low data rate transmissions, as a received signal. An interference canceling device cancels a contribution of at least one shared/common channel from the received signal, producing a first interference canceled signal. A first data detector for detecting data of one of the high or low data rate transmissions by processing the first interference canceled signal. An interference canceling device for canceling the detected data of the one transmissions from the first interference canceled signal, producing a second interference canceled signal. A second data detector for detecting data of an other of the high or low data rate transmissions from the second interference canceled signal.
摘要:
A communications device includes an antenna array for receiving different summations of source signals from a plurality of signal sources, a receiver coupled to the antenna array for receiving the different summations of source signals, and a signal separation processor coupled to the receiver. Processing by the signal separation processor includes creating a matrix based upon the different summations of source signals, with the matrix being defined by linear independent equations with fewer equations than unknowns. The matrix is underdetermined, and parameters associated with the matrix are modified based upon different sets of parameter values, and respective matrix quality factors associated with the different sets of parameter values are determined. The matrix is then biased with a preferred set of parameter values so that the solution space may be narrowed for obtaining a solution.
摘要:
The present invention is related to a wireless transmit/receive unit (WTRU) for providing advanced security functions. The WTRU includes trusted platform module (TPM) for performing trusted computing operations; and a secure time component (STC) for providing a secure measurement of a current time. The STC and the TPM are integrated to provide accurate trusted time information to internal and external to the WTRU. The STC may be located on an expanded a subscriber identity module (SIM), on the WTRU platform, or two STCs may be used, one in each location. Similarly, the TPM may be located on an expanded SIM, on the WTRU platform, or two TPMs may be used, one in each location. Preferably, the STC will include a real time clock (RTC); a tamper detection and power failure unit; and a time report and sync controller.