摘要:
The present invention relates to secret key generation and authentication methods that are based on joint randomness not shared by others (JRNSO), in which unique channel response between two communication terminals generates a secret key. Multiple network access points use a unique physical location of a receiving station to increase user data security. High data rate communication data is encrypted by generating a random key and a pseudo-random bit stream. A configurable interleaving is achieved by introduction of JRNSO bits to an encoder used for error-correction codes. Databases of user data are also protected by JRNSO-based key mechanisms. Additional random qualities are induced on the joint channel using MIMO eigen-beamforming, antenna array deflection, polarization selection, pattern deformation, and path selection by beamforming or time correlation. Gesturing induces randomness according to uniquely random patterns of a human user's arm movements inflected to the user device.
摘要:
Tokens/keys are produced for wireless communications. These tokens/keys are used for watermarks, signature insertion, encryption and other uses. In one embodiment, contextual information is used to generate tokens/keys. The tokens/keys may be derived directly from the contextual information. The contextual information may be used in conjunction with other information to derive the tokens/keys. Tokens/keys may be exchanged between transmit/receive units. The exchange of these tokens/keys may be encrypted.
摘要:
A method and system for using watermarks in communication systems is disclosed. Watermarks are typically small amounts of auxiliary data embedded in a cover signal. The cover signal is the primary communication signal, and may be binary bits, multi valued symbols, analog waveforms, or any other type of primary communication signal. Security strength indication, location tracking, intrusion detection and transmission of non-security information using watermarks are disclosed, along with a system for managing watermarks.
摘要:
A multiple radio access technology (RAT) apparatus with mobility middleware provides a user with access to various RAT networks, such as a frequency division duplex (FDD) network and a wireless local area network (WLAN). In one embodiment, the apparatus is a dual mode FDD/WLAN converged wireless communication handset which includes a terminal equipment (TE) module having mobility middleware, an applications and protocols processor and a terminal interface (TI). The dual mode FDD/WLAN converged wireless communication handset further includes a user services identity module (USIM), a mobile termination (MT) module and a protocol stack which interface with the mobility middleware via a plurality of links. In another embodiment, the multi-RAT apparatus is terminal equipment which includes a mobility middleware core module, a mobility middleware communication module, a driver and an insertably removable wireless communication device for providing a multiple radio transport medium to applications running in the terminal equipment.
摘要:
A method and apparatus are disclosed for selectively regulating devices. In a wireless communication system, a regulation zone is defined. Devices within a regulation zone (e.g. an electronic do-not-disturb (EDND) zone) are regulated by generating and transmitting inhibiting signals into or near the regulation zone. The inhibiting signals may be messages instructing devices to disable one or more of their sensing components or actual interference signals that prevent sensing components from functioning properly or watermarks that mark illicit recordings so that such illicit recordings are precluded from being transmitted over the network.
摘要:
Tokens/keys are produced for wireless communications. These tokens/keys are used for watermarks, signature insertion, encryption and other uses. In one embodiment, contextual information is used to generate tokens/keys. The tokens/keys may be derived directly from the contextual information. The contextual information may be used in conjunction with other information to derive the tokens/keys. Tokens/keys may be exchanged between transmit/receive units. The exchange of these tokens/keys may be encrypted.
摘要:
Method and apparatus delivering voice/data services within a piconet operating over a limited range or over a WLAN communicating with 3GPP devices by reformatting data into IP format before delivering to the WLAN. The service is short message service (SMS). Upon receipt of an SMS message, relevant routing information is retrieved. A PDGW address for the SMS message is identified and is sent to the PDGW address which identifies the WLAN user equipment (UE) for receiving the SMS and reformats the SMS message into IP format (text or encapsulation) for delivery to the UE. A protocol architecture is provided for SMS delivery over WLANs, in particular, for UMTS/CDMA based SMS over WLAN through two alternative mechanisms, i.e., SMS tunneling and SMS proxy, for protocols for the delivery of SMS across the WLAN. The invention enhances standard 802.11 in the context of UMTS and CDMA 2000; as well as other scenarios.
摘要:
A method for tracking content objects created on a wireless device in a wireless communication system begins by creating a content object at the wireless device. A content creation request message is sent from the wireless device to an information storage entity (ISE). The ISE determines whether any permissions are required to create the content object. A content creation response message is sent from the ISE to the wireless device, the content creation response message including an identification key specific to the content object. The identification key is embedded into the content object by the wireless device.
摘要:
An embodiment is related to a database system for protecting data privacy and efficient organization of data. An enhanced database system comprises a DBMS, a data classifier, a database of applications and a rules and policy unit. The DBMS includes a query processor for processing a query from a user. The rules and policy unit outputs a pointer to a node within the data classification tree based on several criteria. In accordance with another embodiment, a DBMS residing within a communication network organizes data related to the ID of mobile users. In accordance with another embodiment, an enhanced database system comprises a DRM user agent and a DBMS. The DRM user agent receives a CO protected by DRM. The DBMS stores the CO and controls access to the CO based on restrictions specified in an RO associated with the CO.
摘要:
An embodiment is related to a database system for protecting data privacy and efficient organization of data. An enhanced database system comprises a DBMS, a data classifier, a database of applications and a rules and policy unit. The DBMS includes a query processor for processing a query from a user. The rules and policy unit outputs a pointer to a node within the data classification tree based on several criteria. In accordance with another embodiment, a DBMS residing within a communication network organizes data related to the ID of mobile users. In accordance with another embodiment, an enhanced database system comprises a DRM user agent and a DBMS. The DRM user agent receives a CO protected by DRM. The DBMS stores the CO and controls access to the CO based on restrictions specified in an RO associated with the CO.