Abstract:
The present invention proposes a secure scheme that incorporates both internal and external eavesdroppers to secure all users' links in the downlink PD-NOMA. In particular, the proposed scheme implies that the BS induces a phase shift in each user's symbol based on its corresponding instantaneous channel phase. The phase shift of each user is restricted such that the original symbol is moved to the location of another symbol in the constellation diagram. Therefore, as each user is aware of its instantaneous channel phase only, it will be able to recover the actual phase of its corresponding symbol. Thus, the proposed scheme does not only protect the data against eavesdroppers, but it also guarantees confidentiality and privacy against all other users.
Abstract:
Method and system for secure beamforming in a wireless communication system are disclosed. In an embodiment, a method of beamforming for at least one transmitting antenna is disclose, the method comprises identifying at least one obstruction in at least one three-dimensional (3D) view image. The method further comprises, forming at least one set of virtual layers comprising one or more virtual layers corresponding to the at least one obstruction. The method further comprises, classifying the one or more virtual layers into a plurality of subsets based on a first set of threshold values that is defined randomly by a first randomizer. The method further comprises, forming at least one secure beam based on at least one subset selected from the plurality of subsets and a random code obtained using a second randomizer. In a non-limiting manner, aspects described herein disclose artificial intelligence/machine learning techniques based approach for secure beamforming. Meanwhile, the above-described beamforming method performed by an electronic device may be performed using an artificial intelligence model.
Abstract:
A computer processing hardware architecture system in a highly secure isogeny based cryptosystem that includes at least one computer processor operably configured to target accelerating operations involved in isogenies on elliptic curves and having a secret key register operably configured to register a secret key, a pseudo-random function, and a secret message buffer, each operably written to by a 2:4 demultiplexer circuit operably configured to receive outside data in regions therein and read by a 4:2 multiplexer circuit.
Abstract:
One embodiment of the invention provides a method for speaker identity and content de-identification under privacy guarantees. The method comprises receiving input indicative of privacy protection levels to enforce, extracting features from a speech recorded in a voice recording, recognizing and extracting textual content from the speech, parsing the textual content to recognize privacy-sensitive personal information about an individual, generating de-identified textual content by anonymizing the personal information to an extent that satisfies the privacy protection levels and conceals the individual's identity, and mapping the de-identified textual content to a speaker who delivered the speech. The method further comprises generating a synthetic speaker identity based on other features that are dissimilar from the features to an extent that satisfies the privacy protection levels, and synthesizing a new speech waveform based on the synthetic speaker identity to deliver the de-identified textual content. The new speech waveform conceals the speaker's identity.
Abstract:
According to an example aspect of the present invention, there is provided a method comprising, determining at least one possible downlink control information for the user equipment to schedule the data transmission, checking a scrambled version of the at least one possible downlink control information to determine whether the scrambled version of the at least one possible downlink control information defines valid downlink control information, transmitting the scrambled version of the at least one possible downlink control information and scheduling the data transmission based on the at least one possible downlink control information and if it is determined that the scrambled version of the at least one possible downlink control information defines valid downlink control information, scheduling the jamming transmission based on the scrambled version of the at least one possible downlink control information.
Abstract:
A method, network (200) and base station device, the method including receiving a time stamped segment of a randomly generated value sequence from at least one base station (20), the randomly generated value sequence is generated by at least one first random value generator (32) executed on a user equipment device (30), executing at least one random second value generator (14) for generating at least one reference value sequence, identifying a match between the time stamped segment and a time correlated reference segment of the at least one reference value sequence, and determining a location of the user equipment device according to the match and location data received from the at least one base station, wherein the at least one first random value generator and the at least one random second value generator are correlated.
Abstract:
A sending processing environment establishes a connection with a receiving processing environment for purposes of providing data during a communication session from the sending environment to the receiving environment. The communication session is monitored and the data being sent is intercepted. The data is rendered from a first format that the data was sent in into an innocuous format that is incapable of being executed on any computing device. The data in the innocuous format is then provided to the receiving environment where the data can only be viewed.
Abstract:
A method of identifying a breach in privacy during a communication session, including communicating with a remote communication device using a local communication device, analyzing an audio signal from the remote communication device to identify an audio input/output configuration of the remote communication device, determining from the audio input/output configuration if a breach in privacy is signified.
Abstract:
Embodiments of the present application provide an identity authentication method, business server, authentication server and identity authentication system. According to some embodiments, the method includes acquiring a first user identification code corresponding to a client when a data interaction request sent by the client is received, sending the first user identification code to the authentication server, acquiring an intermediate number corresponding to the first user identification code from the authentication server, sending the intermediate number to the client for a client-side user to initiate a call request to the intermediate number using a telephone communication network, receiving an authentication result of the identity authentication from the authentication server according to the call request, and processing the data interaction request according to the authentication result. The identity authentication method of embodiments of the present application improves the reliability and security of identity authentication.