摘要:
A wireless mesh network with digital rights management (DRM) interoperability is disclosed. A first DRM-capable mesh point (MP) performs a discovery procedure for detecting neighbor MPs and identifies at least one other DRM-capable MP among the detected neighbor MPs. The first DRM-capable MP then performs an association procedure only with the DRM-capable MPs. The first DRM-capable MP assigns DRM roles to the associated DRM-capable MPs. A digital content is then distributed from the first DRM-capable MP to another DRM-capable MP via the mesh network. The DRM interoperability may be based on a networked environment for media orchestration (NEMO) architecture proposed by the Coral Consortium or any DRM interoperability architectures.
摘要:
The present invention relates to secret key generation and authentication methods that are based on joint randomness not shared by others (JRNSO), in which unique channel response between two communication terminals generates a secret key. Multiple network access points use a unique physical location of a receiving station to increase user data security. High data rate communication data is encrypted by generating a random key and a pseudo-random bit stream. A configurable interleaving is achieved by introduction of JRNSO bits to an encoder used for error-correction codes. Databases of user data are also protected by JRNSO-based key mechanisms. Additional random qualities are induced on the joint channel using MIMO eigen-beamforming, antenna array deflection, polarization selection, pattern deformation, and path selection by beamforming or time correlation. Gesturing induces randomness according to uniquely random patterns of a human user's arm movements inflected to the user device.
摘要:
Signals encoded with watermark information are generated and broadcast into a protected area for capture by illicit recording devices along with their intended targets. An illicit recording in which at least a portion of the broadcast watermark signals are recorded is obtained and correlated with a known position of the broadcast watermark signals to yield the location of illicit recording devices. In an alternate embodiment, a surveillance device, being image and time synchronized with a signal broadcasting device, monitors and records the protected area. Illicit recordings containing the broadcast watermark are obtained and correlated with corresponding recordings taken by the surveillance device to identify the location of illicit recording devices. In an alternate embodiment, the surveillance device further monitors the quality of the broadcast watermark signals and adjusts them accordingly to achieve a desired quality level.
摘要:
A method and system for securing wireless communications is disclosed. In one embodiment, different security policies are used based on the distance between a receiver and a transmitter, whereby data in the wireless communications can only be demodulated if received in particular trust zones. In another embodiment, a plurality of bit stream fragments are transmitted by a plurality of transmitters to a receiver located in an area where transmission patterns radiated by the transmitters intersect. Alternatively, the receiver performs a function on packet data units (PDUs) transmitted by the transmitters. In yet another embodiment, primary modulation points of a modulation constellation are split into clusters of proximate secondary modulation points which can be demodulated only by a receiver that is within range of the transmitter. In yet another embodiment, a main waveform is transmitted which overlays a QPSK signal with hierarchical modulation (HM) having encoded descrambling information.
摘要:
A method and system for using watermarks in communication systems is disclosed. Watermarks are typically small amounts of auxiliary data embedded in a cover signal. The cover signal is the primary communication signal, and may be binary bits, multi valued symbols, analog waveforms, or any other type of primary communication signal. Security strength indication, location tracking, intrusion detection and transmission of non-security information using watermarks are disclosed, along with a system for managing watermarks.
摘要:
Tokens/keys are produced for wireless communications. These tokens/keys are used for watermarks, signature insertion, encryption and other uses. In one embodiment, contextual information is used to generate tokens/keys. The tokens/keys may be derived directly from the contextual information. The contextual information may be used in conjunction with other information to derive the tokens/keys. Tokens/keys may be exchanged between transmit/receive units. The exchange of these tokens/keys may be encrypted.
摘要:
A method and system for enforcing user rights on user data, and maintaining consistency of the user data in a data network are disclosed. Each of a plurality of entities controls one or more network devices which are connected via the data network. Each network device includes at least one user data node which contains at least one elementary piece of user data. The elementary piece of user data is associated with a traceability graph including at least one traceability link. The traceability link connects a source user data node and a destination user data node. The user data node also contains rights information which comprises a rule-based policy regarding the user data. The rights information is also propagated to other entities based on the traceability graph. Consistency of the user data is achieved and owner's rights are enforced based on the traceability graph.
摘要:
A method for generating a media independent handover (MIH) trigger in a wireless local area network begins by sending a measurement report request message to a measurement entity in the network. The measurement entity takes the measurements and sends a measurement report response message to a medium access control (MAC) function. The MAC function evaluates the measurements and determines whether a handover condition exists, based on the measurements. The MAC function generates a MIH trigger if the handover condition exists.
摘要:
An Application Server Autonomous Access (ASAA) system for providing autonomous access to a wireless infrastructure by devices employing different types of access technology. The system includes a server, having an associated data storage device, for storing at least one policy, and a plurality of subnetworks, coupled to server, for providing access to the server. The plurality of subnetworks employ at least two different types of access technology. A plurality of wireless transmit/receive units (WTRUs) are wirelessly coupled to at least one of the subnetworks. The server monitors the wireless coupling and, depending upon the at least one policy, switches the WTRUs between different ones of the subnetworks.
摘要:
An all Internet protocol (IP) network is disclosed. The all IP network includes an application server autonomous access (ASAA) server having a management policy database, a plurality of diverse IP networks and at least one converged IP communication unit. The ASAA server downloads a plurality of different management policies to respective ones of the diverse IP networks and the converged IP communication unit based on events associated with the converged IP communication unit and the diverse IP networks, such as changes in the location of the converged IP communication unit.