摘要:
The present invention relates to secret key generation and authentication methods that are based on joint randomness not shared by others (JRNSO), in which unique channel response between two communication terminals generates a secret key. Multiple network access points use a unique physical location of a receiving station to increase user data security. High data rate communication data is encrypted by generating a random key and a pseudo-random bit stream. A configurable interleaving is achieved by introduction of JRNSO bits to an encoder used for error-correction codes. Databases of user data are also protected by JRNSO-based key mechanisms. Additional random qualities are induced on the joint channel using MIMO eigen-beamforming, antenna array deflection, polarization selection, pattern deformation, and path selection by beamforming or time correlation. Gesturing induces randomness according to uniquely random patterns of a human user's arm movements inflected to the user device.
摘要:
A method and system for securing wireless communications is disclosed. In one embodiment, different security policies are used based on the distance between a receiver and a transmitter, whereby data in the wireless communications can only be demodulated if received in particular trust zones. In another embodiment, a plurality of bit stream fragments are transmitted by a plurality of transmitters to a receiver located in an area where transmission patterns radiated by the transmitters intersect. Alternatively, the receiver performs a function on packet data units (PDUs) transmitted by the transmitters. In yet another embodiment, primary modulation points of a modulation constellation are split into clusters of proximate secondary modulation points which can be demodulated only by a receiver that is within range of the transmitter. In yet another embodiment, a main waveform is transmitted which overlays a QPSK signal with hierarchical modulation (HM) having encoded descrambling information.
摘要:
Tokens/keys are produced for wireless communications. These tokens/keys are used for watermarks, signature insertion, encryption and other uses. In one embodiment, contextual information is used to generate tokens/keys. The tokens/keys may be derived directly from the contextual information. The contextual information may be used in conjunction with other information to derive the tokens/keys. Tokens/keys may be exchanged between transmit/receive units. The exchange of these tokens/keys may be encrypted.
摘要:
A method and apparatus is used for generating a perfectly random secret key between two or more transceivers in a wireless communication network. In a point-to-point system, both transceivers produce an estimate of the channel impulse response (CIR) based on the received radio signal. The CIR estimation is synchronized and may include error correction and detection. A long secret key of bits is generated from a digitized version of the CIR estimate, from which a perfectly secret encryption key is derived by privacy amplification.
摘要:
A secret stream of bits begins by receiving a public random stream contained in a wireless communication signal at a transmit/receive unit. The public random stream is sampled and specific bits are extracted according to a shared common secret. These extracted bits are used to create a longer secret stream. The shared common secret may be generated using JRNSO techniques, or provided to the transmit/receive units prior to the communication session. Alternatively, one of the transmit/receive unit is assumed to be more powerful than any potential eavesdropper. In this situation, the powerful transmit/receive unit may broadcast and store a public random stream. The weaker transmit/receive unit selects select random bits of the broadcast for creating a key. The weaker transmit/receive unit sends the powerful transmit/receive unit the selected bit numbers, and powerful transmit/receive unit uses the random numbers to produce the key created by the weaker transmit/receive unit.
摘要:
A system and method for providing variable security levels in a wireless communication network. The present invention optimizes the often conflicting demands of highly secure wireless communications and high speed wireless communications. According to a preferred embodiment of the present invention, various security sensors are scanned to determine the likely presence of an intruder within a predetermined trust zone. If an intruder is likely present, the security level is changed to the highest setting, and consequently a lower data rate, while the intruder is identified. If the identified intruder is in fact a trusted node, the security level is returned to a lower setting. If the identified intruder is not a trusted node, the security level is maintained at an elevated state while the intruder is within the trust zone.
摘要:
A spread spectrum method and apparatus for protecting and authenticating wirelessly transmitted digital information using numerous techniques. The apparatus may be a wireless code division multiple access (CDMA) communication system, a base station, a wireless transmit/receive unit (WTRU), a transmitter, a receiver and/or an integrated circuit (IC). The wireless CDMA communication system includes a transmitter which steganographically embeds digital information in a CDMA communication signal and wirelessly transmits the CDMA communication signal. The system further includes a receiver which receives the CDMA communication signal and extracts the steganographically embedded digital information from the received CDMA communication signal.
摘要:
At least one At least one user data stream is layer 2/3 processed, physical layer processed and radio frequency processed. A watermark/signature is embedded at at least one of layer 2/3, physical layer or radio frequency, producing an embedded wireless communication. The embedded wireless communication is wirelessly transferred. The embedded wireless communication is received and the watermark/signature is extracted from the embedded wireless communication.
摘要:
Systems, apparatuses and methods for bandwidth management, aggregation and internet protocol (“IP”) flow mobility (“IFOM”) across multiple-access technologies are provided. Included is a method that includes selecting, from a packet data network (“PDN”) connection formed through a plurality of access systems communicatively coupled with a wireless transmit and/or receive unit (“WTRU”), an access system over which to transport a flow of internet protocol (“IP”) traffic to and/or from the WTRU. The method may also include sending, to the WTRU, a request to associate the flow of IP traffic with the selected access system.
摘要:
Systems, apparatuses and methods for bandwidth management, aggregation and internet protocol (“IP”) flow mobility (“IFOM”) across multiple-access technologies are provided. Included is a method that includes selecting, from a packet data network (“PDN”) connection formed through a plurality of access systems communicatively coupled with a wireless transmit and/or receive unit (“WTRU”), an access system over which to transport a flow of internet protocol (“IP”) traffic to and/or from the WTRU. The method may also include sending, to the WTRU, a request to associate the flow of IP traffic with the selected access system.