摘要:
A laser pulse representing a bit of a quantum key is split into two pulses. In addition to known round trip phase encoding schema, a secret phase key is modulated into one of the two pulses: P1 and P2. The secret phase key is used to identify whether the returning pulses originated from the sender, i.e., whether the key distribution has been attacked by an eavesdropper. A secret key phase modulator randomly modulates pulse P1. An attenuator then reduces the average photon number of the modulated pulse P1 to a selected level greater than one to increase the likelihood of efficient, successful transmission while reducing the possibility of eavesdropping, e.g., μ=10. Both pulses P1 and P2 are sent to the intended recipient and reflected to the sender. Pulse P2 is modulated upon return to the sender using the same secret phase key previously modulated into pulse P1. Therefore, when both pulses meet together at a coupler/beamsplitter of the sender, both pulses should contain the same secret key in their phase and therefore exhibit no resulting phase difference if the photon pulse is the same pulse originated by the sender. If the returning pulse is not the pulse originated by the sender then phase differences indicative of a so-called intercept-resend attack applied by an eavesdropper EVE are indicated by a large quantum bit error rate (“QBER”) will be detectable. If EVE applies photon-split attack, the secret phase key modulated by the sender prevents Eve from knowing the encoded key information in the photon(s). Therefore, double phase encoding QKD enables use of multi-photon pulses without unacceptable loss of security, thereby enhancing QKD bit rate.
摘要:
A method of distributing a quantum key from a sender to a recipient. The recipient generates a pulse having multiple photons; splits the pulse into first and second sub-pulses; phase modulates the first sub-pulse with a secret key; and transmits both the phase-modulated first sub-pulse and the second sub-pulse to the sender. The sender receives the phase-modulated first sub-pulse and the second sub-pulse from the recipient; encodes a quantum key bit into one of the sub-pulses received from the recipient; and transmits both the phase-modulated first sub-pulse and the second sub-pulse back to the recipient. Then, the recipient receives the phase-modulated first sub-pulse and the second sub-pulse from the sender; phase modulates the second sub-pulse with the secret key; combines the phase-modulated first sub-pulse and the phase-modulated second sub-pulse to produce a composite pulse; and processes the composite pulse in an attempt to detect the quantum key bit.
摘要:
A Point to Multipoint (PMP) multi-hop relay network includes a base station, one or more relay stations and one or more subscriber stations. Active service flows in a PMP multi-hop relay network have a 16-bit connection identifier (CID). A CID defines the connection that a packet is servicing. Before traffic can be transmitted, the path through the network, and the association of CIDs with respective hops needs to be established. The CID mapping relationship from the ingress air link to the egress air link at each relay station is first set up, which is then followed by a traffic phase where the CID mapping relationship is used to route traffic from a base station to a subscriber station.
摘要:
The present invention provides a method for generating routing paths in a multi-hop network. The multi-hop network includes a base station, at least one relay station, and at least one non-relay mobile station. The routing paths are paths between the base station and the at least one non-relay mobile station via the at least one relay station. The base station broadcasts a path discovery message (PDM) including a path list with a starting point of the path list being the base station. Each of the relay stations receives the PDM and updates the PDM by adding their own respective node identifier to the path list and broadcasting the updated PDM. The PDMs eventually reach the non-relay mobile station. The non-relay mobile stations reply to the base station by sending the base station the updated path list between the base station and the non-relay mobile station. In some embodiments the base station or the at least one non-relay mobile station acting as a source node sends a dynamic service (DSx) message including an end-to-end path list to an end of path destination. The relay stations use the path list to forward the message between the source node and the end of path destination. In some implementations the multi-hop network operates in a manner that is consistent with any one of: IEEE 802.16, IEEE 802.16d, and IEEE 802.16e.
摘要:
A method and apparatus for associating metric information with an abstracted link of an abstracted network map that includes certain network elements (NEs) of a data transport network involves computing routes through the data transport network between the NEs of the abstracted network map. The routes may be computed using the shortest widest path algorithm. The routes from an NE are exchanged with the other NEs of the abstracted network map, so that an edge NE receives the resource availability information of all optimal routes between pairs of NEs in the abstracted network map. The edge NE then transforms the resource availability of a corresponding optimal route into metric information of an abstracted link. The metric information is sent to a client associated with the abstracted network map to permit the client to make routing decisions.
摘要:
A method of computing allowable routes through a data network that includes a subnetwork that introduces a subnet intransitivity constraint on allowable paths through the network involves using an abstracted network map to construct a directed graph that compensates for the subset intransitivity constraint by removing all unallowable paths. The abstracted network map may be used to compute least cost allowable paths through the network. The directed graph represents the same network, and is constructed by representing bi-directional links between the subnetwork elements with two directed edges, and representing the subnetwork elements as paired ingress and egress nodes. A method for constructing the directed graph representing an abstracted map of a network that exhibits subset intransitivity is also described.
摘要:
A transmitter classifies quantum pulses into supervisory pulses and message pulses, and assigns each message pulse to a message bit. Each message pulse is then encoded using a coding base randomly selected from a set of coding bases, and with a polarity relative to the coding base that depends on the value of the corresponding message bit. Supervisory pulses are encoded using a coding base different from the coding bases in the aforementioned set. The encoded pulses are sent to a recipient over a quantum channel. The transmitter also informs the recipient of the positions of the supervisory pulses. The recipient detects the pulses relative to a locally selected coding base, producing a zero-click, a one-click or a two-click. By measuring the received proportion of zero-clicks, one-clicks and two-clicks, for both message pulses and supervisory pulses, and by verifying whether these detection statistics obey certain expected relationships, the recipient can determine whether an attack is taking place on the quantum channel.
摘要:
A communications device (100) and method (300) for selectively answering an incoming call received by the communications device (100). The method (100) provides an alert signal (330) in response to receiving; the incoming call (310) and then provides for automatically answering the incoming call (360) when the device detects (355) a change in state from an inoperative coupling state to an operative coupling state between the device (100) and an earpiece and microphone accessory (210).
摘要:
A method for providing amine functional groups on a surface for binding proteins, peptides, DNAs, cells, small molecules, and other chemical or biological molecules that are of interests in the areas of proteomic, genomic, pharmaceutical, drug discovery, and diagnostic studies.