Abstract:
A method, implemented in a communication device, of indicating a service supported by the communication device. A hash value is generated, using a hash function, based on a service identifier associated with the service. Respective portions of the hash value are mapped to respective bit locations in a bit string that represents membership of the service in a set of services supported by the communication device. The bit string is generated at least by setting the bit locations in the bit string to values that indicate that the service is supported by the communication device.
Abstract:
In a method for efficient password based public key authentication between a first user device and a second user device, a shared password is received by a first user device which generates a first hash value of the shared password and a first value, wherein the first value is composed of at least a product of the first hash value and a first unique security constant associated with the first user. The first user device then generates a first random value generated using data from a generator element, and a first blind public key associated with the first user device, wherein the first blind public key is generated using a first public key. The first user device concurrently sends the first value and the first blind public key to the second user device for authentication.
Abstract:
A method and apparatus for deriving an encryption key for use between two stations in a wireless network using information intrinsic to one of the stations, without exchanging pairwise transient keys.
Abstract:
The present disclosure describes methods and apparatus for selecting a device to perform shared functionality in a deterministic and fair manner in a wireless data communication system. A wireless data communication system includes multiple wireless transceiver devices and certain functionality, such as the transmitting of a beacon used to synchronize the wireless transceiver devices, is distributed among the wireless transceiver devices. Each wireless transceiver device generates a device rank for a given time for itself as well as one or more other wireless transceiver devices in a deterministic and fair manner. Each wireless transceiver device determines the same device ranks for the wireless transceiver devices, and each wireless transceiver device selects the wireless transceiver device having a highest device rank at any given time as the wireless transceiver device that is to perform the functionality at that given time.
Abstract:
A system including a time stamp module, an encryption module, and a packet generator module. The time stamp module is configured to generate a time stamp for a packet. The encryption module is configured to encrypt data using the time stamp and a security key. The packet generator module is configured to generate the packet. The packet includes (i) the time stamp in a header portion of the packet, and (ii) the encrypted data in a payload portion of the packet.
Abstract:
Apparatus, methods, and other embodiments associated with the coexistence of multiple radio devices in a same environment are described. According to one embodiment, a non-transitory computer-readable medium storing computer-executable instructions includes instructions for transmitting and receiving radio signals in accordance with at least one wireless communication technology. The instructions also include instructions for discovering a plurality of radio devices operating within a same radio band within a same geographic region. At least one radio device of the plurality of radio devices operates based on at least two different wireless communication technologies. The instructions further include instructions for generating a master clock reference and temporally synchronizing the plurality of radio devices with respect to the master clock reference.
Abstract:
The present disclosure describes methods and apparatus for selecting a device to perform shared functionality in a deterministic and fair manner in a wireless data communication system. A wireless data communication system includes multiple wireless transceiver devices and certain functionality, such as the transmitting of a beacon used to synchronize the wireless transceiver devices, is distributed among the wireless transceiver devices. Each wireless transceiver device generates a device rank for a given time for itself as well as one or more other wireless transceiver devices in a deterministic and fair manner. Each wireless transceiver device determines the same device ranks for the wireless transceiver devices, and each wireless transceiver device selects the wireless transceiver device having a highest device rank at any given time as the wireless transceiver device that is to perform the functionality at that given time.
Abstract:
Systems, methods, and other embodiments associated with secure service discovery in a neighbor awareness network are described. According to one embodiment, a device includes service logic configured to generate a discovery communication that is associated with a service provided in a neighbor awareness network (NAN). The NAN includes a plurality of remote devices. Encoding logic configured to generate a secure identifier from a unique identifier of the service by, (i) encoding the unique identifier, and (ii) truncating the encoded unique identifier to form the secure identifier. The secure identifier is inserted in the discovery communication.
Abstract:
Methods for transmitting information in a regulated spectrum and networks configured to operate within a regulated spectrum (and optionally, within a given geographic region) are disclosed. The methods generally include receiving or transmitting radio signals encoded with spectral allocation information, analyzing the spectral allocation information to determine available bands in the regulated spectrum for signal transmission, and transmitting signals on at least one of the available bands in the regulated spectrum. The spectral allocation information includes restriction(s) on a bandwidth or bandwidth range in the regulated spectrum; The network generally includes a central database storing the spectral allocation information, a transmitter configured to transmit radio signals encoded with the spectral allocation information, and a receiving device configured to receive the radio signals, analyze the available bands in the regulated spectrum from the spectral allocation information, and transmit signals on at least one of the available bands.
Abstract:
Systems, methods, and other embodiments associated with reducing storage space used for cryptographic keys in a memory are described. According to one embodiment, an apparatus includes a non-volatile memory. The apparatus includes key logic configured to expand a seed value to form a key. The seed value is a sequence of random bits. The apparatus includes inspection logic configured to inspect the key to determine whether the key is valid for use as a cryptographic key. The key logic is configured to store the seed value in the non-volatile memory if the key is valid, and if the key is not valid, the key logic is configured to modify the seed value to form a modified seed value, to generate a new key from the modified seed value, and to repeat inspecting the new key and modifying the seed value until a valid key is determined.