A SECURE NOMA METHOD BASED ON PHYSICAL LAYER SECURITY

    公开(公告)号:WO2022146365A1

    公开(公告)日:2022-07-07

    申请号:PCT/TR2021/051509

    申请日:2021-12-26

    Abstract: The present invention proposes a secure scheme that incorporates both internal and external eavesdroppers to secure all users' links in the downlink PD-NOMA. In particular, the proposed scheme implies that the BS induces a phase shift in each user's symbol based on its corresponding instantaneous channel phase. The phase shift of each user is restricted such that the original symbol is moved to the location of another symbol in the constellation diagram. Therefore, as each user is aware of its instantaneous channel phase only, it will be able to recover the actual phase of its corresponding symbol. Thus, the proposed scheme does not only protect the data against eavesdroppers, but it also guarantees confidentiality and privacy against all other users.

    SYSTEM AND METHOD FOR SECURE BEAMFORMING IN WIRELESS COMMUNICATION NETWORKS

    公开(公告)号:WO2021230448A1

    公开(公告)日:2021-11-18

    申请号:PCT/KR2020/016134

    申请日:2020-11-17

    Abstract: Method and system for secure beamforming in a wireless communication system are disclosed. In an embodiment, a method of beamforming for at least one transmitting antenna is disclose, the method comprises identifying at least one obstruction in at least one three-dimensional (3D) view image. The method further comprises, forming at least one set of virtual layers comprising one or more virtual layers corresponding to the at least one obstruction. The method further comprises, classifying the one or more virtual layers into a plurality of subsets based on a first set of threshold values that is defined randomly by a first randomizer. The method further comprises, forming at least one secure beam based on at least one subset selected from the plurality of subsets and a random code obtained using a second randomizer. In a non-limiting manner, aspects described herein disclose artificial intelligence/machine learning techniques based approach for secure beamforming. Meanwhile, the above-described beamforming method performed by an electronic device may be performed using an artificial intelligence model.

    SPEAKER IDENTITY AND CONTENT DE-IDENTIFICATION

    公开(公告)号:WO2021219554A1

    公开(公告)日:2021-11-04

    申请号:PCT/EP2021/060845

    申请日:2021-04-26

    Abstract: One embodiment of the invention provides a method for speaker identity and content de-identification under privacy guarantees. The method comprises receiving input indicative of privacy protection levels to enforce, extracting features from a speech recorded in a voice recording, recognizing and extracting textual content from the speech, parsing the textual content to recognize privacy-sensitive personal information about an individual, generating de-identified textual content by anonymizing the personal information to an extent that satisfies the privacy protection levels and conceals the individual's identity, and mapping the de-identified textual content to a speaker who delivered the speech. The method further comprises generating a synthetic speaker identity based on other features that are dissimilar from the features to an extent that satisfies the privacy protection levels, and synthesizing a new speech waveform based on the synthetic speaker identity to deliver the de-identified textual content. The new speech waveform conceals the speaker's identity.

    SECURING DOWNLINK CONTROL INFORMATION IN CELLULAR COMMUNICATION NETWORKS

    公开(公告)号:WO2021063470A1

    公开(公告)日:2021-04-08

    申请号:PCT/EP2019/076374

    申请日:2019-09-30

    Abstract: According to an example aspect of the present invention, there is provided a method comprising, determining at least one possible downlink control information for the user equipment to schedule the data transmission, checking a scrambled version of the at least one possible downlink control information to determine whether the scrambled version of the at least one possible downlink control information defines valid downlink control information, transmitting the scrambled version of the at least one possible downlink control information and scheduling the data transmission based on the at least one possible downlink control information and if it is determined that the scrambled version of the at least one possible downlink control information defines valid downlink control information, scheduling the jamming transmission based on the scrambled version of the at least one possible downlink control information.

    通信装置および通信方法
    6.
    发明申请

    公开(公告)号:WO2019167785A1

    公开(公告)日:2019-09-06

    申请号:PCT/JP2019/006521

    申请日:2019-02-21

    Abstract: 盗聴者が複数のアンテナを備えている場合であっても、安全に通信することが可能な通信装置及び通信方法を提供すること。データから変調シンボルを生成する変調部と、前記変調シンボルを共有チャネルに配置して送信する送信部と、を備え、前記共有チャネルは複数の変調シンボルグループを含み、前記変調シンボルグループは、1又は複数の前記変調シンボルを含み、前記複数の前記変調シンボルグループの少なくとも2つは互いに異なる振幅が設定され、前記振幅は、複数の振幅候補のうちの1つであり、前記複数の振幅候補は0を含む。

    SECURE DEVICE LOCATION DETECTION MECHANISM BY PSEUDO-RANDOM SEQUENCES
    7.
    发明申请
    SECURE DEVICE LOCATION DETECTION MECHANISM BY PSEUDO-RANDOM SEQUENCES 审中-公开
    伪随机序列的安全装置位置检测机制

    公开(公告)号:WO2018010763A1

    公开(公告)日:2018-01-18

    申请号:PCT/EP2016/066427

    申请日:2016-07-11

    CPC classification number: G01S5/0036 G01S5/0205 H04K1/00

    Abstract: A method, network (200) and base station device, the method including receiving a time stamped segment of a randomly generated value sequence from at least one base station (20), the randomly generated value sequence is generated by at least one first random value generator (32) executed on a user equipment device (30), executing at least one random second value generator (14) for generating at least one reference value sequence, identifying a match between the time stamped segment and a time correlated reference segment of the at least one reference value sequence, and determining a location of the user equipment device according to the match and location data received from the at least one base station, wherein the at least one first random value generator and the at least one random second value generator are correlated.

    Abstract translation: 一种方法,网络(200)和基站设备,所述方法包括:从至少一个基站(20)接收随机生成的值序列的带时间戳的片段,所述随机生成的值序列是 由在用户设备装置(30)上执行的至少一个第一随机值生成器(32)生成,执行至少一个随机第二值生成器(14),用于生成至少一个参考值序列,识别所述时间戳片段 以及所述至少一个参考值序列的时间相关的参考段,并且根据从所述至少一个基站接收的所述匹配和位置数据来确定所述用户设备的位置,其中,所述至少一个第一随机值生成器和 至少一个随机的第二值生成器被关联。

    INOCULATION OF INTER-DEVICE COMMUNICATIONS
    8.
    发明申请
    INOCULATION OF INTER-DEVICE COMMUNICATIONS 审中-公开
    交互设备间通信

    公开(公告)号:WO2017222721A1

    公开(公告)日:2017-12-28

    申请号:PCT/US2017/034015

    申请日:2017-05-23

    Applicant: XATTIC, INC.

    Abstract: A sending processing environment establishes a connection with a receiving processing environment for purposes of providing data during a communication session from the sending environment to the receiving environment. The communication session is monitored and the data being sent is intercepted. The data is rendered from a first format that the data was sent in into an innocuous format that is incapable of being executed on any computing device. The data in the innocuous format is then provided to the receiving environment where the data can only be viewed.

    Abstract translation: 为了在从发送环境到接收环境的通信会话期间提供数据,发送处理环境建立与接收处理环境的连接。 通信会话被监控并且正在发送的数据被截获。 数据从第一种格式呈现,数据被发送到无法在任何计算设备上执行的无害格式。 然后将无害格式的数据提供给只能查看数据的接收环境。

    DETECTION OF PRIVACY BREACH DURING A COMMUNICATION SESSION
    9.
    发明申请
    DETECTION OF PRIVACY BREACH DURING A COMMUNICATION SESSION 审中-公开
    检测通信会话期间的隐私违规

    公开(公告)号:WO2017212470A1

    公开(公告)日:2017-12-14

    申请号:PCT/IL2017/050582

    申请日:2017-05-25

    CPC classification number: H04M3/2281 H04M1/6041 H04M1/68 H04M3/205 H04M3/42

    Abstract: A method of identifying a breach in privacy during a communication session, including communicating with a remote communication device using a local communication device, analyzing an audio signal from the remote communication device to identify an audio input/output configuration of the remote communication device, determining from the audio input/output configuration if a breach in privacy is signified.

    Abstract translation: 一种在通信会话期间识别隐私泄露的方法,包括使用本地通信设备与远程通信设备通信,分析来自远程通信设备的音频信号以识别音频输入/输出 远程通信设备的配置,根据音频输入/输出配置确定是否隐含隐私泄露。

    IDENTITY AUTHENTICATION METHOD, SYSTEM, BUSINESS SERVER AND AUTHENTICATION SERVER
    10.
    发明申请
    IDENTITY AUTHENTICATION METHOD, SYSTEM, BUSINESS SERVER AND AUTHENTICATION SERVER 审中-公开
    身份认证方法,系统,业务服务器和认证服务器

    公开(公告)号:WO2017091401A1

    公开(公告)日:2017-06-01

    申请号:PCT/US2016/062183

    申请日:2016-11-16

    Abstract: Embodiments of the present application provide an identity authentication method, business server, authentication server and identity authentication system. According to some embodiments, the method includes acquiring a first user identification code corresponding to a client when a data interaction request sent by the client is received, sending the first user identification code to the authentication server, acquiring an intermediate number corresponding to the first user identification code from the authentication server, sending the intermediate number to the client for a client-side user to initiate a call request to the intermediate number using a telephone communication network, receiving an authentication result of the identity authentication from the authentication server according to the call request, and processing the data interaction request according to the authentication result. The identity authentication method of embodiments of the present application improves the reliability and security of identity authentication.

    Abstract translation: 本申请实施例提供了一种身份认证方法,业务服务器,认证服务器和身份认证系统。 根据一些实施例,该方法包括:当接收到客户端发送的数据交互请求时,获取与客户端对应的第一用户识别码,将第一用户识别码发送给认证服务器,获取第一用户对应的中间号码 从认证服务器向中间号码发送中间号码,以便客户端用户使用电话通信网络向中间号码发起呼叫请求;根据所述号码从认证服务器接收身份认证的认证结果 呼叫请求,并根据认证结果处理数据交互请求。 本申请实施例的身份认证方法提高了身份认证的可靠性和安全性。

Patent Agency Ranking