Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


Wireless communication

Subclass of:

380 - Cryptography

380255000 - COMMUNICATION SYSTEM USING CRYPTOGRAPHY

Patent class list (only not empty are listed)

Deeper subclasses:

Class / Patent application numberDescriptionNumber of patent applications / Date published
380272000 Including hand-off based cryptographic alteration 26
380273000 Rekeying system 21
380274000 Synchronization 11
380033000 Using plural paths or channels 10
380031000 Plural modulation of single carrier 6
380271000 Having receiver selection (e.g., pager) 5
20090161872Contact-less tag with signature, and applications thereof - A method, comprising: receiving an encrypted signature from a tag associated with an item; determining a dynamic parameter; obtaining a key based at least in part on the dynamic parameter; decrypting the signature with the key to obtain an identifier; and performing an action related to identification of the item, based on the identifier. Also, a system, comprising: a tag reader configured to receive an encrypted signature from a tag associated with an item; and a processing entity configured to (i) determine a dynamic parameter; (ii) obtain a key based at least in part on the dynamic parameter; (iii) decrypt the signature with the key to obtain an identifier; and (iv) perform an action related to identification of the item, based on the identifier.06-25-2009
20090316903TIME SYNC-TYPE OTP GENERATION DEVICE AND METHOD FOR MOBILE PHONES - The present invention relates to a time sync-type One-Time Password (OTP) generation device and method for a mobile phone. The present invention is configured such that an IC chip, in which a serial number and a secret key for OTP generation are encoded and stored, is mounted in an IC interface provided in the battery mounting part of a mobile phone, and is configured such that a decoding unit for encoding the serial number and secret key of the IC chip, a time counter for counting time information provided from a base station, and an OTP generation module for generating OTP numbers using the time information, the serial number and the secret key as a key value for an OTP program are included in the mobile phone. Accordingly, in accordance with the present invention, it is not necessary for a user to carry a separate OTP generation terminal, and concerns with respect to the hacking of OTP numbers can be alleviated because a serial number and a secret key are stored in an IC chip that cannot be hacked. Furthermore, OTP numbers are generated using time information that is provided by a satellite and is transmitted via a base station, so that no time error relative to a financial institute server occurs, therefore errors in generated time sync-type OTP numbers can be eliminated.12-24-2009
20100080390SYSTEM AND METHOD OF DISTRIBUTING GAME PLAY INSTRUCTIONS TO PLAYERS DURING A GAME - The present invention is directed to a system and method of distributing game play instructions to players during a game, more specifically a system and method for allowing a portable remote terminal and/or a game apparatus to dynamically transmit and/or receive in game instructions in real-time concerning game play instructions to be effected on the field or court, and to be distributed to one, a plurality, or all team players wearing a headgear configured to receive audio transmissions of the game play instructions from a game play apparatus, another headgear and/or the portable remote terminal.04-01-2010
20120207305SECURE SMART POSTER - A smart poster system is provided, which includes a smart poster comprising an NFC device, a mobile device for communicating with the NFC device, and a server unit for providing content to the mobile device, wherein the NFC device is arranged to provide the mobile device with an address of the server unit, the address comprising a counter value, which counter value represents the number of executed read accesses to the NFC device. Also, a method for providing a secure communication channel between a mobile device and a server unit in a smart poster system is conceived, wherein the smart poster system comprises an NFC device for providing the mobile device with an address of the server unit, and wherein the NFC device, upon generating the address, incorporates a counter value into the address, the counter value representing the number of executed read accesses to the NFC device. Thereby, the authenticity of both the NFC device and the server unit is ensured.08-16-2012
20090016530ROLLING CODE SECURITY SYSTEM - A rolling code transmitter is useful in a security system for providing secure encrypted RF transmission comprising an interleaved trinary bit fixed code and rolling code. A receiver demodulates the encrypted RF transmission and recovers the fixed code and rolling code. Upon comparison of the fixed and rolling codes with stored codes and determining that the signal has emanated from an authorized transmitter, a signal is generated to actuate an electric motor to open or close a movable barrier.01-15-2009
Entries
DocumentTitleDate
20080273700Systems and Methods For Multicast Retransmission over a Secure Wireless LAN - Systems and methods for broadcast and multicast retransmissions within a protected wireless communications system are described. Retransmitted broadcast or multicast frames are designated by modification of fields or subfields in the MAC header of the frame which are constituent parts of the additional authentication data used to generate encryption keys. Such modifications cause legacy receivers to disregard the retransmitted frames or render legacy receivers to be unable to decrypt the retransmitted frame, avoiding the generation of duplicate frames. Non-legacy receivers recognizing the modification conventions can restore the MAC header to the original state and can reconstruct the original encryption keys and decrypt the retransmitted frames. A non-legacy transmitter can retransmit a frame without the need to re-encrypt the frame.11-06-2008
20130028420CIRCUIT SWITCHED MOBILE TELEPHONY IN FIXED WIRELESS ACCESS - A fixed wireless terminal (01-31-2013
20130028421Method and System for Establishing Enhanced Key when Terminal Moves to Enhanced Universal Terrestrial Radio Access Network (UTRAN) - The present invention discloses a method and system for establishing an enhanced key when a terminal moves from an EUTRAN to an enhanced UTRAN, so as to ensure that the terminal can carry out normal communication safely in the enhanced UTRAN. The method includes: when the terminal moves from the EUTRAN to the enhanced UTRAN, a target enhanced serving GPRS support node (SGSN+) in the enhanced UTRAN deducing an intermediate key used in the UTRAN according to a mapped traditional key obtained from a source mobile management entity; and the terminal, after deducing the mapped traditional key, further deduces the intermediate key used in the enhanced UTRAN by using an algorithm which is the same as that of the target SGSN+ according to the mapped traditional key.01-31-2013
20120163600METHOD AND APPARATUS FOR SUPPORTING SECURITY IN MULITICAST COMMUNICATION - A method of supporting a security for a multicast communication is provided in a mobile station. The mobile station shares an MAK with a base station, derives a prekey based on a first parameter including the MAK, and derives a multicast security key including an MTEK based on a second parameter including the prekey, and decrypts a multicast traffic using the multicast security key.06-28-2012
20120170748METHOD AND SYSTEM FOR PROTECTING BROADCAST SERVICE/CONTENT IN A MOBILE BROADCAST SYSTEM, AND METHOD FOR GENERATING SHORT TERM KEY MESSAGE THEREFOR - A terminal and method for receiving a broadcast service by the terminal in a broadcast system are provided. The method includes performing a registration procedure for subscription and reception of the broadcast service through a Browser And Content Mobile Broadcast (BSCAST) Subscription Management (BSM) responsible for managing subscription information; receiving a Long Term Key Message (LTKM), including key information for encryption of the broadcast service, generated from the BSM; receiving a completed Short Term Key Message (STKM), the completed STKM being generated by performing Message Authentication Code (MAC) processing on a partially created STKM; receiving, from a Broadcast Service Distribution/Adaptation (BSD/A) which is responsible for transmitting the broadcast service, an encrypted broadcast service which is encrypted by a Traffic Encryption Key (TEK) for deciphering the broadcast service; and deciphering the encrypted broadcast service by the TEK obtained using the LTKM and the completed STKM.07-05-2012
20120170744Mobile Communication Devices and Deciphering Methods - A wireless communications device with a wireless module and a controller module is provided. The wireless module is arranged for performing wireless transmission and reception to and from a service network. The controller module is arranged for receiving a first ciphered data packet from the service network via the wireless module, and deciphering the first ciphered data packet according to a first deciphering parameter. Also, the controller module is arranged for deciphering the first ciphered data packet according to a second deciphering parameter in response to unsuccessful deciphering of the first ciphered data packet according to the first deciphering parameter. Particularly, the second deciphering parameter is for deciphering a second ciphered data packet received prior to the first ciphered data packet from the service network.07-05-2012
20130044877LONG RANGE WLAN DATA UNIT FORMAT - In a method for generating a data unit for transmission in a wireless network, a physical layer (PHY) preamble is generated. In generating the PHY preamble, a first indicator is generated to indicate at least one of (i) whether the data unit includes data offloaded from a mobile telephony network separate from the wireless network, or (ii) whether the data unit (a) was generated by, or (b) is addressed to, a communication device that supports offloading of data from the mobile telephony network to the wireless network. The first indicator is included in the PHY preamble. Additionally, a media access control layer (MAC) header is generated. The data unit is generated to include the PHY preamble and the MAC header. The data unit is then caused to be transmitted.02-21-2013
20080285755Method and Device for Accessing a Sim Card Housed in a Mobile Terminal - The invention concerns a cryptographic device (11-20-2008
20080260154METHOD AND SYSTEM FOR PROTECTING THE INTERNET ACCESS OF A MOBILE TELEPHONE, AND CORRESPONDING MOBILE TELEPHONE AND TERMINAL - SIM cards of mobile telephones contain an identification code for having access to the Internet. However, such cards can be removed from the mobile telephone which they are normally provided for, in order to be inserted into other mobile telephones, smartphones or on the PCMCIA card of a PC.10-23-2008
20100080388Apparatus and method for improving in-game communications during a game - The present invention is directed to an apparatus for improving communications between players and coaches during a sporting event, more specifically allowing players to dynamically receive real-time communications from their coaches concerning intended game plays to be effected on the field or court. Said game apparatus comprises of a transparent, protective top cover having the same contour as a middle portion, wherein said middle portion is provided with a display element, and wherein said top cover, middle portion and the display element are all enclosed by a rear cover forming a housing for a receiving means for receiving an encrypted signal of an intended game play from a portable remote terminal, and wherein said top cover, middle portion, display element and housing are positioned on an upper portion of an elasticized band, which has an extended flap, wherein said extended flap includes a closing means used to secure the game apparatus and to conceal the display element from public view.04-01-2010
20130039493DATA TRANSMITTING DEVICES, DATA RECEIVING DEVICES, METHODS FOR CONTROLLING A DATA TRANSMITTING DEVICE, AND METHODS FOR CONTROLLING A DATA RECEIVING DEVICE - In an embodiment, a data transmitting device may be provided. The data transmitting device may include a ciphering method selector configured to select a ciphering method based on a type of data to be transmitted. The data transmitting device may further include a ciphering circuit configured to cipher the data based on the selected ciphering method. The data transmitting device may further include a transmitter configured to transmit the ciphered data to a data receiving device.02-14-2013
20130034230Method and system for embedding security in a mobile communications device - Methods and systems are provided that provide a portable, cryptographic hardware-software device allowing balancing of the needed heightened security while maintaining the modified communication device's original features and value. The system comprises a single chip comprising a self-contained security boundary and cryptographic processing, and is enabled to quickly and easily connect to and modify an existing, commercial, off the shelf mobile communication device. The systems may be enabled to modify the existing device by being contained in hardware, for example the battery of a smart phone. Then, the system may be connected to the existing device's interface, for example via a “micro-USB” or other suitable connection, and subsequently provide cryptographic functionality to the existing device.02-07-2013
20090220085Relay MAC Header for Tunneling in a Wireless Multi-User Multi-Hop Relay Networks - Provided is a data structure for transmitting a relay media access control (MAC) protocol data unit (PDU) between stations in a multi-hop relay network. The MAC PDU includes an encryption control bit, an allocation subheader bit, a grant management subheader bit, a fragmentation subheader bit, a packing subheader bit, a quality of service subheader bit, and an encryption key sequence. The relay MAC PDU is transmitted in a tunnel established between base station and relay station.09-03-2009
20100104099IMAGE FORMING APPARATUS AND SECURITY SETTING METHOD THEREOF - An image forming apparatus and a security setting method thereof, the method including: inputting an encryption key of a wireless network connection of the image forming apparatus; displaying a selection screen including one or more functions which the image forming apparatus provides; and selecting at least one of the displayed functions with which to share the encryption key as a password.04-29-2010
20090154702METHOD AND SYSTEM FOR MOBILE COMMUNICATIONS - When a network pages the temporary user mobile identifier of a mobile station, the mobile station sends a response to the network. Next, the network checks the authenticity of the user using a ciphering key, corresponding to the temporary user mobile identifier and a random number. If the temporary user mobile identifier is authenticated, a normal incoming call acceptance procedure is executed. If the mobile station is authenticated although the temporary user mobile identifier is wrong, the network reassigns a new temporary user mobile identifier to the mobile station and stops the current communication. In communication, the network and the mobile station mutually notify encipherment-onset time and negotiate about encipherment manner with each other. In addition, diversity handover is commenced upon a call attempt. Furthermore, if a branch replacement is necessary, the current branch is replaced by new branches capable of executing the diversity handover. Additionally, when a new call occurs to or from the mobile station capable of treating a plurality of calls simultaneously, the mobile station uses the same branch structure and the same communication frequency band for all of calls. Additionally, when a new call occurs to or from the mobile station capable of treating a plurality of calls simultaneously, a branch structure and a communication frequency band, which can continue all of the calls, are selected and used. Therefore, the mobile communications system is suitable for transmission of various sorts of data in accordance with the development of multimedia.06-18-2009
20090154701ON DEVICE NUMBER LOCK DRIVEN KEY GENERATION FOR A WIRELESS ROUTER IN WIRELESS NETWORK SECURITY SYSTEMS - The present invention solve the problems in the prior art by a embedding a number lock system on the router which serves as a input mechanism for entering the shared key or a shared seed which generates a shared key. A combination of numbers and letters may be used on the dials of the number lock. There is a slider to set the security protocol in use or turn it off. Once the user sets his key combination using the number lock on the device and sets a security mechanism he can go to his computer or a PDA or any device that supports Wi-Fi he will use the same mechanism that he does today with existing technology to enter the shared key and select the security mechanism.06-18-2009
20100040232METHOD AND SYSTEM FOR MULTIMEDIA TAGS - A multimedia data construct called a tag (FIG. 02-18-2010
20120183140Methods And Apparatus For Protecting Digital Content - A processing system to serve as a source device for protected digital content comprises a processor and control logic. When used by the processor, the control logic causes the processing system to receive a digital certificate from a presentation device. The processing system then uses public key infrastructure (PKI) to determine whether the presentation device has been authorized by a certificate authority (CA) to receive protected content. The processing system may also generate a session key and use the session key to encrypt data. The processing system may transmit the encrypted data to the presentation device only if the presentation device has been authorized by the CA to receive protected content. Presentation devices and repeaters may perform corresponding operations, thereby allowing content to be transmitted and presented in a protected manner. Other embodiments are described and claimed.07-19-2012
20100002882Method and Device for Anonymous Encrypted Mobile Data and Speech Communication - The invention relates to a method for anonymising the communication of mobile terminals which permit speech communication, using an anonymising network which comprises a series of routers and which has at least one access node, wherein each mobile terminal establishes a connection with at least one access node, comprising the following steps: 01-07-2010
20100272261Data Security Transmission Wirelessly with Zigbee Chips - A wireless network system for data transmitting securely is disclosed. The system comprises a central control end for generating a cipher password per predetermined time unit. The central control end has a first Zigbee chip, a computer terminal for a user to input parameters, and a cryptographic algorithm program provided wherein the cryptographic algorithm program and the parameters are provided for password encryption using the cryptographic algorithm program is run by a microprocessor of the first Zigbee chip. The system also comprises a data transmitting end and a several data receiving ends. The data transmitting end using the Zigbee decrypts the cipher password and encrypts the data file using the plain password and the Zigbee chip. The data receiving ends using the Zigbee decrypt the cipher password and decrypt the cipher data file into plain data file by the WiFi chips using plain password.10-28-2010
20110007900AUTOMATIC DATA ENCRYPTION AND ACCESS CONTROL BASED ON BLUETOOTH DEVICE PROXIMITY - A method, apparatus, and system for using Bluetooth devices to secure sensitive data on other Bluetooth devices is described. A Bluetooth device is paired with a “trusted” Bluetooth device. When contact with the trusted device is lost, designated sensitive data on the secured Bluetooth device is automatically encrypted. When contact is restored, the data is automatically decrypted. In an alternate embodiment, a secured device can be associated with multiple trusted devices, and the secured device designate different sensitive data for each trusted device. In this way, multiple users can share a common, “public” Bluetooth device without concern that the other users will access their sensitive data on the device when the device is not being used by that user.01-13-2011
20090041246ENCRYPTION OF THE SCHEDULED UPLINK MESSAGE IN RANDOM ACCESS PROCEDURE - Systems and methodologies are described that facilitate employing a random access procedure that leverages encrypted and/or unencrypted data in a scheduled uplink message. A random access preamble can be sent from an access terminal to a base station, and a random access response can be sent from the base station to the access terminal. A scheduled transmission message can be sent from the access terminal to the base station based upon a grant included in the random access response. When contention based random access is employed, the scheduled transmission message or a portion thereof can be unencrypted. Further, non-security-critical information can be sent in an unencrypted manner in the scheduled transmission message, while security-critical information can be encrypted for transmission (e.g., included in an encrypted portion of the scheduled transmission message and/or transmitted in a subsequent encrypted normal scheduled transmission message).02-12-2009
20130070926TERMINAL AND METHOD FOR COMMUNICATING VIA NEAR FIELD COMMUNICATION - A near field communication (NFC) terminal includes: a NFC communication unit to communicate with a NFC communication relay device via NFC; a processor to process data; and a protocol information unit, wherein the NFC communication unit communicates the data and the profile information via to the NFC communication relay device via NFC. A method includes: at a NFC communication relay device, receiving data augmented with profile information; storing the data augmented with profile information; retrieving the data based on a request from the second NFC terminal; and transmitting the data to the second NFC terminal. A NFC relay device, includes: a processor to process data; an information storage unit to store the received data, wherein if the NFC relay device receives a request from a NFC terminal, the processor retrieves data from the information unit, and the NFC transmitter transmits the data to the NFC terminal.03-21-2013
20130058485RANDOMIZATION OF PLAIN TEXT FOR GSM SACCH - The present document relates to the transmission of data in a digital cellular telecommunications network. In particular, the present document relates to the secure transmission of data over Global System for Mobile Communications (GSM) networks. A method for encoding a SACCH information block in a wireless network is described. The method comprises randomizing a plurality of randomization unit input bits derived from at least some of a plurality of payload bits of the SACCH information block using a pseudo-random bit block, thereby yielding a plurality of randomized bits; and ciphering a plurality of ciphering unit input bits derived from at least some of the plurality of randomized bits, thereby yielding an encoded data burst of a SACCH frame; wherein ciphering is based on a ciphering algorithm using a ciphering key Kc and a frame number COUNT of the SACCH frame; wherein the pseudo-random bit block is determined based on the ciphering key Kc.03-07-2013
20090268912DATA USE MANAGING SYSTEM - [Problems] To provide a data use managing system which forces a face- to face permission by an administrator of confidential data when using the confidential data stored in mobile terminal.10-29-2009
20090268911Securing Wireless Body Sensor Networks Using Physiological Data - A password protocol for establishing secure communications between sensor nodes in a network using secure environmental values (SEV). A first sensor sends a message to a second sensor comprising the first sensor's location and a key encrypted by a first SEV. The second sensor responds with a message comprising a key encrypted by a second SEV and a first nonce encrypted by a session key. The first sensor sends a third message comprising the first nonce and a second nonce encrypted by the session key. The second sensor verifies the first nonce and sends a fourth message comprising the encrypted second nonce. The first sensor then verifies the second nonce.10-29-2009
20120224694CLASSIFIED RELATION NETWORKING OPTIMIZATION PLATFORM IN OPEN WIRELESS ARCHITECTURE (OWA) MOBILE CLOUD TERMINAL DEVICE - A fully user-centric mobile relation networking management of business networking, personal networking and social networking for mobile terminal device with networking services adaptively and intelligently optimized by converged wireless connections based on open wireless architecture (OWA) mobile cloud infrastructure with QoW (Quality of Wireless connection) control through OWA Operating System (OS) to enable highly secured relation networking for mobile business and personal networking users.09-06-2012
20120224693Method and System for Security Authentication of Radio Frequency Identification - A method and system for security authentication of radio frequency identification are disclosed. All the security control in this method is completed by the security authentication control apparatus. The reader is for the command transmission and the tag data forwarding, and there is not the security authentication control logic, the security authentication and the non security authentication can be supported at the same time. The key in the tag is unreadable, which ensures that the tag is unable to be replicated; the constant for every security authentication is randomly generated by the control module, and is returned by the tag after being encrypted, which presents the air interface from intercepting the useful information. This method provides the inventory with the mask code before the security authentication, which can have a certain filtering function on the tag data. The mask code can be configured flexibly.09-06-2012
20130064372CODE HOPPING BASED SYSTEM WITH INCREASED SECURITY - An access system includes a transmitter and a receiver for exchange of secure data wherein the system uses an encryption and a decryption algorithm to exchange a secure data packet. The secure data packet may include an unencrypted data packet and an encrypted data packet. The encrypted data packet may include first data encrypted by the encryption algorithm, and data decrypted by the decryption algorithm, wherein the data decrypted by the decryption algorithm includes a combination of a secure signature and second data encrypted by the encryption algorithm.03-14-2013
20130064373METHOD TO ENCRYPT INFORMATION THAT IS TRANSFERRED BETWEEN TWO COMMUNICATION UNITS - Method for encrypting information transferred between two mobile telephones, each having a security module and where a security application contains encryption and decryption algorithms. The security application is stored on an SD card introduced into a card-holder location in the relevant telephone, then transferred from the card to the security module with a session key stored on the card, a key stream forms in the card on the basis of the session key, and during encryption is transferred from the card to the security module where encryption takes place, such encrypted stream of data is transmitted by the telephone, the stream of data is received by a second mobile telephone, decryption takes place with a corresponding key stream in the security module of the second telephone and the corresponding key stream is formed in the SD card of the second telephone on the basis of the session key.03-14-2013
20090238366Random access method for improving scrambling efficiency - A random access method for improving scrambling performance is disclosed. In particular, when a terminal performs a random access to a specific network, the present invention proposes a scheme for transmitting an uplink transmission signal corresponding to an uplink grant by scrambling the uplink transmission signal using a terminal identification information value received via a random access response message. Preferably, the terminal identification information value used for the scrambling is able to use a temporary C-RNTI received via the random access response message.09-24-2009
20090232309METHOD AND APPARATUS FOR SCRAMBLING FOR DISCRIMINATION OF SEMI PERSISTENT SCHEDULING GRANTS - A method for wireless communications is provided. The method includes receiving a control payload and a check protocol on a wireless link and decoding the control payload and the check protocol. The method also includes analyzing the control payload and the check protocol in view of a scrambling protocol and determining at least one control command based on the control payload, the check protocol, and the scrambling protocol.09-17-2009
20090232307METHOD OF ESTABLISHING VIRTUAL SECURITY KEYPAD SESSION FROM A MOBILE DEVICE USING JAVA VIRTUAL MACHINE - A system and method are provided that allow mobile devices to securely communicate over wireless network with one or more security system control panels for controlling the security systems remotely. A mobile device may include an application or software that presents a virtual security keypad to the user on the mobile device for entering data or receiving data as if the user were directly using a security system control panel at a premise being secured. Mobile device communicates with a network operating center system using encrypted communication. The network operating decrypts the communication from the mobile device and sends it to a security system control panel. The network operating center system receives responses from the security system control panel, encrypts the responses and sends to the mobile device.09-17-2009
20090046860INTEGRATED DATA TRANSCEIVER AND SENSOR FOR THE GENERATION OF A SYMMETRICAL CRYPTOGRAPHIC KEY - Systems for exchanging encrypted data communications between devices. A system can comprise a first device and a second device. The first device can comprise a first sensor adapted to create a first data profile based at least in part on a sensed condition, and a first transceiver integrated with the first sensor and adapted to generate a first cryptographic key from the first data profile. The second device can comprise a second sensor adapted to create a second data profile based at least in part on the sensed condition, the second data profile being substantially similar to the first data profile, and a second transceiver integrated with the second sensor and adapted to generate a second cryptographic key from the second data profile, the first and second cryptographic keys comprising a set of identical cryptographic keys.02-19-2009
20120114123METHOD FOR SECURELY BROADCASTING SENSITIVE DATA IN A WIRELESS NETWORK - The invention relates to a method for securely broadcasting sensitive data in a wireless sensor networks comprising a central device, called trust center, and a plurality of sensor nodes, the trust center being initialized with a cryptographic hash chain and each node being initialized with a node key and the anchor of the trust center hash chain, the method comprising the following steps: the trust center broadcasting a first secure message to the nodes, each node, after reception of the first message, creating a first acknowledgment message, and transmitting it back to the trust center, the trust center checking whether all the nodes have transmitted respective first acknowledgment message, and in case all messages have been received, the trust center securely broadcasting sensitive data in a third message, the nodes checking, based on elements included in the first message, whether sensitive data actually originates from the trust center.05-10-2012
20130163760Method of Elliptic Curve Cryptography Using EW-MOF on Scalar Multiplication - A method of elliptic curve cryptography (ECC) using the enhanced window-based mutual opposite form (EW-MOF) on scalar multiplication. First, an elliptic curve and a base point on the elliptic curve are selected. Next, essential pre-computed points for a selected window size are calculated. Then, a private key is randomly generated and the mutual opposite form (MOF) is used to convert the private key's binary representation into a signed binary representation. Finally, a public key is calculated by using the enhanced window (EW) method. By greatly reducing the number of essential pre-computed points, the EW-MOF reduces average key generation time (including pre-computation time).06-27-2013
20130163761WIRELESS COMMUNICATION METHOD AND SYSTEM FOR TRANSMISSION AUTHENTICATION AT THE PHYSICAL LAYER - The subject authentication scheme encompasses a large family of authentication systems which may be built over existing transmission systems. By superimposing a carefully designed secret modulation on the waveforms, authentication is added to the signal without requiring additional bandwidth. The authentication information (tag signal) is sent concurrently with data (message signal). The authentication is designed to be stealthy to the uninformed user, robust to interference, and secure for identity verification. The tradeoffs between these three goals are identified and analyzed. The use of the authentication for channel estimation is also considered, and improved bit errors are demonstrated for time-varying channels. With a long enough authentication code word an authentication system is achieved with very slight data degradation. Additionally, by treating the authentication tag as a sequence of pilot symbols, the data recovery may be improved by the aware receiver.06-27-2013
20130163762RELAY NODE DEVICE AUTHENTICATION MECHANISM - A solution of relay node authentication is proposed. The solution includes mutual authentication of relay node and relay UICC, mutual authentication of relay node and network, secure channel establishment between relay UICC and relay node. AKA procedure in TS 33.401 is re-used so that no extra NAS message is needed. IMEI is sent to network in the initial NAS message, according to which MME-RN can retrieve RN's public key from HSS, and perform access control for DeNB. MME-RN will generate a session key based on IMSI, IMEI and Kasme, and encrypt it by RN's public key and send it to RN. UICC will also generate the same key and thus RN can authenticate both UICC and network. When the key or other parameters sent between UICC and RN do not match, UICC or RN will send Authentication Reject message with a new cause to inform network.06-27-2013
20120269347Medical device with secure data transmission - Secure transmission of electronic data via a data communication link is provided between a device and an additional device with independent transmission channels, wherein at least one of the devices is a medical device. Secure transmission comprises the following steps or means: providing a password in the device, receiving the password in the a additional device separate from the data communication link, selecting one of the independent transmission channels, encrypting the channel identification of the selected independent transmission channel using the received password in the additional device, transmitting the encrypted channel identification from the additional device to the device via the data communication link and decrypting the encrypted channel identification in the device, providing a session key in the device and the additional device and transmitting encrypted electronic data between the device and the additional device via the independent transmission channel.10-25-2012
20090016529METHOD AND SYSTEM FOR PREVENTION OF UNAUTHORIZED COMMUNICATION OVER 802.11W AND RELATED WIRELESS PROTOCOLS - A method for disrupting undesirable wireless communication in wireless network is provided. The method includes providing one or more sniffer devices to monitor wireless communications in a wireless network and detecting a wireless connection established between an access point device and a client device using the one or more sniffer devices. Preferably, the wireless connection is configured for not being disconnected upon receiving a spoofed disconnection request transmitted from a wireless device other than the access point device and the client device. The method also includes disrupting the wireless connection established between the access point device and the client device by transmitting one or more spoofed connection requests from at least one of the one or more sniffer devices.01-15-2009
20090323957SCRAMBLING UNDER AN EXTENDED PHYSICAL-LAYER CELL IDENTITY SPACE - A method for wireless communications is provided. The method includes determining a set of physical layer cell identities and analyzing a current set of scrambling sequences. The method increases the current set of scrambling sequences to account for increases in the physical layer cell identities.12-31-2009
20110158408SUPPLEMENTAL MOBILE COMMUNICATION DEVICE - Systems and methods provide a supplemental mobile communication device that allows use of a host communication device with a network different from that associated with the host device, e.g., a network of a different service provider or that is otherwise restricted to the host device. The system may include a supplemental mobile communication device having a transmitter selectively communicating with a plurality of host devices associated with a different wireless network. The system may further include a processor configured to compare a service plan associated with the supplemental mobile communication device with a service plan associated with the host device, and selectively route communications initiated by a user interface of the host device through one of the first and second communication networks based upon at least the comparison of the first and second service plans.06-30-2011
20130016840Mobile Certificate Distribution in a PKI - A method of providing certificate issuance and revocation checks involving mobile devices in a mobile ad-hoc network (MANET). The wireless devices communicate with each other via Bluetooth wireless technology in the MANET, with an access point (AP) to provide connectivity to the Internet. A Certificate authority (CA) distributes certificates and certification revocation lists (CRLs) to the devices via the access point (AP). Each group of devices has the name of the group associated with the certificate and signed by the CA. A device that is out of the radio range of the access point may still connect to the CA to validate a certificate or download the appropriate CRL by having all the devices participate in the MANET.01-17-2013
20100014672Counter Initialization, Particularly For Radio Frames - A method for protecting traffic in a radio access network connected to at least two core networks. The method comprises maintaining a corenetwork-specific authentication protocol and a radio-bearer-specific ciphering process, and generating, for each ciphering process, a count parameter comprising a cyclical sequence number and a hyperframe number (HFN) which is incremented each time the cyclical sequence number completes one cycle. For each core network or authentication protocol, a first radio bearer of a session is initialized with a HFN exceeding the highest HFN used during the previous session. When a new radio bearer is established, the mobile station selects the highest HFN used during the session for the core network in question, increments it and uses it for initializing the count parameter for the new radio bearer. At the end of a session, the mobile station stores at least part of the highest HFN used during the session.01-21-2010
20110280401SYSTEM AND METHOD FOR EXCHANGING ENCRYPTION KEYS BETWEEN A MOBILE DEVICE AND A PERIPHERAL DEVICE - Embodiments of a system and method for providing additional security for data being transmitted across a wireless connection that has been established using a known wireless protocol (e.g. Bluetooth) are described. An encryption key is exchanged between a computing device (e.g. a mobile device) and a wireless peripheral device (e.g. a keyboard, a printer). In exemplary embodiments, the encryption key is generated at one of the two devices. Data associated with the encryption key is output at the one device, which can be input by the user at the other device. The encryption key is then recovered at the other device from the input, thereby completing the key exchange. The encryption key can then be used to encrypt and decrypt data transmitted over the established wireless connection, providing additional security.11-17-2011
20130022202SYSTEMS AND METHODS FOR MULTI LAYER DELIVERY OF INFORMATION - Systems and methods that may be implemented to provide digital data from a remote information source to multiple local user devices using a multi-layer communication path and a local wireless server node. The multi-layer communication path may, for example, include a relatively long range secure first layer wireless communications path from the remote information source to a local wireless server node, and relatively short range second layer wireless communications path from the local wireless server node to one or more local user devices.01-24-2013
20090310786Systems for Channel Coordination of Audio and Data Transmission in a Broadcast Band - Systems for audio and data transmission in a broadcast band are disclosed. The system comprises a channel condition assessment module at the transmit side to identify an un-occupied or empty channel to transmit. The system also comprises a means to achieve automatic channel coordination between the transmit side and the receive side. Further, the transmit side includes a digital interface module and the receive side includes a digital output interface module configured to control an embedding electronic device. Means for enhancing audio privacy and digital data rate are also disclosed.12-17-2009
20100266125COMMUNICATION SYSTEM, BASE STATION DEVICE, AND TERMINAL DEVICE - An identifier generator generates a second identifier containing information on contents. The second identifier is different from a first identifier used to grant a connection request sent from a terminal apparatus. A beacon transmitter transmits the second identifier, generated by the identifier generator, as a beacon. A connection processing unit permits the connection request by the first identifier stored beforehand in the terminal apparatus, and rejects the connection request by the second identifier. A base station apparatus generates the first identifier containing address information used to access a server apparatus, as an identifier used to permit a connection request sent from the terminal apparatus. The base station apparatus transmits, as beacons, a first identifier and a second identifier used to identify the base station itself. The terminal apparatus acquires the address information contained in the received first identifier, conveys the second identifier to the server apparatus identified by the address information, and acquires information on the contents distributed by the base station apparatus.10-21-2010
20120230490SMART CARD ACCESSIBLE OVER A PERSONAL AREA NETWORK - Some embodiments of a smart card accessible over a personal area network have been presented. In one embodiment, an apparatus includes a wireless transceiver to communicatively couple to a personal area network (PAN) to receive an authentication request via the PAN from a device. The device may include a computer. The apparatus further includes a storage device to store a digital certificate that uniquely identifies a user. An authentication module in the apparatus may authenticate the user in response to an authentication request from the device using the digital certificate, wherein the user is allowed to access the computer upon authentication.09-13-2012
20100054472INTEGRITY PROTECTION AND/OR CIPHERING FOR UE REGISTRATION WITH A WIRELESS NETWORK - Techniques for performing registration with a wireless network using integrity protection and/or ciphering are described. A user equipment (UE) may perform a security procedure with the wireless network for a first session and may generate UE security context data at the UE. The UE security context data may include a cipher key used for ciphering, an integrity key used for integrity protection, a temporary UE identity, and/or other information. The UE may use the UE security context data for secure communication with the wireless network during the first session. The UE may store the UE security context data upon termination of the first session. The UE may thereafter use the stored UE security context data for registration with the wireless network for a second session following the first session. The UE may perform integrity protection and/or ciphering for message(s) for registration based on the stored UE security context data.03-04-2010
20090208012DECRYPTION SYSTEM AND RELATED METHOD THEREOF - A decryption system is provided. The decryption system includes a first RFID tag, a second code providing apparatus and a decryption module. The first RFID tag is for storing an encrypted data generated by encrypting an original data according to a first code. The second code providing apparatus is for providing a second code. The decryption module includes an RFID reader and a computing unit. The RFID reader reads the encrypted data from the first RFID tag. The computing unit receives the second code from the second code providing apparatus without utilizing the Internet, and decrypts the encrypted data according to the second code to obtain the original data.08-20-2009
20120002815VPN NETWORK CLIENT FOR MOBILE DEVICE HAVING FAST RECONNECT - A virtual private network client for cellular mobile devices is described. The VPN network client establishes a secure VPN connection with a remote VPN security device. The VPN network client establishes a secure control channel with the secure VPN gateway and, upon a successful authentication, receives a session cookie with a unique identifier. In the event communication with the secure VPN gateway is subsequently temporarily lost, the VPN network client performs a fast reconnect without requiring re-authentication of the cellular mobile device by communicating the session cookie to the secure VPN gateway. Prior to performing the fast reconnect, the VPN network client identifies a set of transport mechanisms currently available to the cellular mobile device and, when only a cellular network is available and not a wireless packet-based connection, the VPN network client defers the fast reconnect until application-layer data is received from a user application and is ready to be sent to the remote VPN security device via the VPN connection01-05-2012
20110286597HOME AGENT PROXIED MIPv6 ROUTE OPTIMIZATION MODE - A method apparatus, processor, and computer program product for wireless communication, including employing a communication interface to obtain a binding update message from a mobile node (MN). A data process is employed to analyze the binding update message for a network address of a corresponding node (CN). A communication interface is employed to initiate a long-life secure association between the CN and a network agent serving the MN if the binding update message contains the network address of the CN, wherein the long-life secure association enables the MN and CN to participate in a route optimized (RO) mobile communication session. The method may include employing a data processor to generate a binding cache entry for the network entity or a network component serving the network entity, wherein the binding cache entry includes a security key that facilitates a route optimized communication session with the network entity or the network component.11-24-2011
20110110522PAIRING METHOD AND APPARATUS FOR AD-HOC CONNECTION IN WIRELESS COMMUNICATION TERMINAL - A pairing method and an apparatus thereof for an ad-hoc connection in a wireless communication terminal are provided. In the method, an event duration that occurs according to user manipulation is measured. A pairing key is generated using the measured duration. A pairing procedure is performed with a counterpart terminal using the pairing key.05-12-2011
20110293095SYSTEMS FOR INTELLIGENT AUTHENTICATION BASED ON PROXIMITY - A method and apparatus for intelligent authentication based on proximity and using a short wireless device.12-01-2011
20090196421METHOD OF ENCRYPTION AND DECRYPTION, TRANSMITTER, AND RECEIVER IN RADIO COMMUNICATION SYSTEM - A transmitter encrypts data blocks using the encryption key and variable number information (CTR) sequentially updated for every encryption of the respective data blocks; selectively attaches one of the variable number information (CTR) used for encrypting the respective data blocks, to the encrypted data block; and transmits the encrypted data blocks to a receiver. The receiver determines, based on (a) reception orders of a first encrypted data block with the variable number information (CTR) attached and a second encrypted data block without the variable number information (CTR) attached and (b) the variable number information (CTR) attached to the first encrypted data block, variable number information (CTR) used for encrypting the second encrypted data block; and decrypts the second encrypted data block using the determined variable number information (CTR) and the decryption key.08-06-2009
20090161871METHOD AND SYSTEM FOR PROVIDING A GENERIC PROGRAM GUIDE DATA FROM A PRIMARY CONTENT PROVIDER TO A USER NETWORK DEVICE THROUGH A PARTNER SERVICE PROVIDER - A system and method for providing program guide data includes a partner service provider generating a request for a first encrypted token using a partner site identifier and a primary service provider having an authentication web service receiving the request for the first encrypted token. The primary service provider validates the partner site identifier, generates a first encrypted token at the authentication web service when the partner site identifier is valid and communicates the encrypted token to the partner service provider. The partner service provider requests for program guide data from the partner service provider with the first encrypted token. The primary service provider communicates program guide data to the partner service provider through the network. A user network device requesting program guide data from the partner service provider. The partner service provider communicates the program guide data from the partner service provider through the network. The user network device displays the program guide data on a display.06-25-2009
20110110521ELECTRONIC DEVICE AND NETWORK ACCESSING METHOD THEREOF - Disclosed are an electronic device enabling wireless networking through a wireless network and a network accessing method thereof, the electronic device including: a communicating unit which accesses the wireless network to perform wireless networking; an encoding unit which encodes a signal transmitted from or received by the communicating unit; and a controller which controls the encoding unit to encode identification information of the electronic device, in response to the electronic device being powered on, and controls the communicating unit to initiate an access to the wireless network based on the identification information encoded by the encoding unit. Accordingly, an automatic access to the wireless network is initiated when the electronic device is powered on, without any special manipulation by the user, thereby enhancing convenience to the user.05-12-2011
20110261960METHOD FOR ALLOCATING AUTHORIZATION KEY IDENTIFIER FOR WIRELESS PORTABLE INTERNET SYSTEM - A method and authentication apparatus for sharing information for identifying an Authorization Key (AK) with a Base Station (BS) in a subscriber station are provided. The method includes, in the subscriber station, sharing a root key with the BS by performing an authentication with the BS, sharing an AK derived from the root key with the BS, sharing an AK sequence number of the AK with the BS, and sharing an AK Identifier (AKID) of the AK with the BS. The AK sequence number is generated by a sequence number of the root key. The AKID is generated by a parameter including the AK, the AK sequence number, a Medium Access Control (MAC) address of the subscriber station, and a BS Identifier (BSID) of the BS.10-27-2011
20100266126FRIEND OR FOE DETECTION - An identification friend or foe (IFF) system and method can covertly identify an object as friend or foe (FoF). An encoded illumination signal can be calculated using a detected ambient signal and an identification (ID) signal and emitted. The encoded illumination signal can be detected by analyzing a detected ambient signal and decoded using a specified key.10-21-2010
20100124332SECURE WIRELESS COMMUNICATIONS - A system includes a sending access point and a receiving access point. The sending access point divides a data stream into sets of packets, encrypts a first set of packets using a first encryption protocol, encrypts a second set of packets using a second encryption protocol, where the second encryption protocol is different from the first encryption protocol, transmits, using a first channel over a wireless network, the first set of packets, and transmits, using a second channel over the wireless network, the second set of packets. The receiving access point receives the first set of packets and the second set of packets, decrypts the first set of packets using the first encryption protocol, and decrypts the second set of packets using the second encryption protocol.05-20-2010
20120189122METHOD WITH DYNAMIC KEYS FOR MUTUAL AUTHENTICATION IN WIRELESS COMMUNICATION ENVIRONMENTS WITHOUT PRIOR AUTHENTICATION CONNECTION - A mutual authentication method with which a base station and a subscriber station can mutually authentication with each other is proposed. In this method, dynamic keys are employed, and SS and BS individually input random numbers to the Diffie-Hellman Public Key Distribution System (DH-PKDS for short) to generate a set of public keys and a set of common secret keys as the strong data connection for authentication (DCA for short) between the two stations. An addition function (ADR) which is more secure than that of an exclusive OR function in key transmission is used as a data carrier. SS and BS authenticate each other by using the identity certification keys. Plaintext is encrypted by a two-dimensional stream cipher method so that ciphertext can be more securely, also efficiently, transmitted. Further, dynamic keys and all other security parameters transmitted through wireless channels are only used once to further improve system security.07-26-2012
20100080389System and method for improving in-game communications during a game - The present invention is directed to a system and method for improving communications between players and coaches during a sporting event, more specifically allowing coaches to dynamically transmit secure real-time communications of an intended game plays in text, visual, sketch and/or verbal format to their players or other coaches on/off the field to be effected on the field during a game.04-01-2010
20100124333System and Method for Processing Encoded Messages for Exchange with a Mobile Data Communication Device - A system and method are provided for pre-processing encrypted and/or signed messages at a host system before the message is transmitted to a wireless mobile communication device. The message is received at the host system from a message sender. There is a determination as to whether any of the message receivers has a corresponding wireless mobile communication device. For each message receiver that has a corresponding wireless mobile communication device, the message is processed so as to modify the message with respect to one or more encryption and/or authentication aspects. The processed message is transmitted to a wireless mobile communication device that corresponds to the first message receiver. The system and method may include post-processing messages sent from a wireless mobile communications device to a host system. Authentication and/or encryption message processing is performed upon the message. The processed message may then be sent through the host system to one or more receivers.05-20-2010
20090141899DUAL-MODE WIRELESS SENSOR NETWORK SYSTEM AND KEY ESTABLISHING METHOD AND EVENT PROCESSING METHOD THEREOF - A dual-mode wireless sensor network system including a local wireless sensor, a local event processing device, and a remote event processing device is provided. The local wireless senor detects and announces an abnormal event. The local event processing device and the remote event processing device receive the abnormal event announcement. When the local wireless senor detects the abnormal event, the local wireless sensor encrypts an abnormal event message related to the abnormal event with a regular mode key and transmits the encrypted abnormal event message to the local event processing device. When the local wireless sensor does not receive a response message from the local event processing device, the local wireless sensor encrypts the abnormal event message with a special mode key and transmits the encrypted abnormal event message to the remote event processing device. Thereby, the abnormal event can be successfully announced even with highly protected privacy.06-04-2009
20120082314MOBILE COMMUNICATION SYSTEM, COMMUNICATION CONTROL METHOD, AND RADIO BASE STATION - A system includes: a first radio base station including: a first processor which performs processes to transmit and receive a first encryption key, and an first interface which transmits or receives the encapsulated packet, the second radio base station includes: a second interface which transmits or receives the encapsulated packet; and a second processor which encrypts or decrypts the packet with the first encryption key, the host node includes: a third processor which encrypts or decrypts the packet, and during processing of a handover of the mobile station, the host node transmits the packet encrypted with the first encryption key to the first radio base station, the first radio base station transmits the packet to the second radio base station by the tunneling, and the second radio base station decapsulates the packet, decrypts the packet with the first encryption key, and then transmits the packet to the mobile station.04-05-2012
20120106740DEFAULT ENCODING - The invention relates to a method for encoding a connection between a base (05-03-2012
20120106739System and Method for Securing Wireless Communications - A system and method for securing wireless communications are provided. A method for secure communications by a first user includes estimating a channel between the first user and a second user based on a pilot signal transmitted by the second user, determining a first threshold and a second threshold based on the estimate of channel, selecting a first subset of channel estimates, signaling the first subset of channel estimates to the second user, receiving a second subset of channel estimates from the second user, for each channel estimate in the second subset of channel estimates, quantizing the channel estimate based on a relationship between a gain of the channel estimate and the first threshold and the second threshold, generating a first secret key based on quantized channel estimates, verifying that the first secret key matches a second secret key generated by the second user, and transmitting information to the second user.05-03-2012
20120106738LOCATION BROKERING FOR PROVIDING SECURITY, PRIVACY AND SERVICES - Location brokering technique embodiments are presented that employ sensor data captured by a user's mobile device to determine the device's location, encrypt the location data and store it in a database. The location data is encrypted in such a way that it is possible to determine when a user's mobile device is currently in the same vicinity as another user's mobile device who is a member of the same group as the first user. However, the actual location and relative mobility or immobility of the users cannot be ascertained except by the users themselves via a decryption procedure or by trusted components. Services are provided can read the stored encrypted location data, processes it to determine if group members are in the same vicinity, and either respond to user queries about the location of other members of a group the user belongs to, or push this information to appropriate users.05-03-2012
20120106737System and Method for Securing Wireless Communications - A system and method for securing wireless communications are provided. A method for secure communications by a first user includes estimating a channel between the first user and a second user, thereby producing an first phase estimate of the channel, generating a first block of secret bits based on the first phase estimate of the channel, and transmitting public information regarding the first block of secret bits to the second user. The second user makes use of the public information to generate a second block of secret bits.05-03-2012
20090190761METHOD AND SYSTEM FOR MOBILE COMMUNICATIONS - When a network pages the temporary user mobile identifier of a mobile station, the mobile station sends a response to the network. Next, the network checks the authenticity of the user using a ciphering key, corresponding to the temporary user mobile identifier and a random number. If the temporary user mobile identifier is authenticated, a normal incoming call acceptance procedure is executed. If the mobile station is authenticated although the temporary user mobile identifier is wrong, the network reassigns a new temporary user mobile identifier to the mobile station and stops the current communication. In communication, the network and the mobile station mutually notify encipherment-onset time and negotiate about encipherment manner with each other. In addition, diversity handover is commenced upon a call attempt. Furthermore, if a branch replacement is necessary, the current branch is replaced by new branches capable of executing the diversity handover. Additionally, when a new call occurs to or from the mobile station capable of treating a plurality of calls simultaneously, the mobile station uses the same branch structure and the same communication frequency band for all of calls. Additionally, when a new call occurs to or from the mobile station capable of treating a plurality of calls simultaneously, a branch structure and a communication frequency band, which can continue all of the calls, are selected and used. Therefore, the mobile communications system is suitable for transmission of various sorts of data in accordance with the development of multimedia.07-30-2009
20090262939Authentication Apparatus, System and Method - An authentication apparatus includes a communication module, a storage module, a processing module and an authentication module. The communication module, based on a wireless communication protocol, establishes a communication link with an electronic apparatus. The storage module stores a plurality of encryption logics and a plurality of authentication logics corresponding to the plurality of encryption logics. The processing module chooses a first encryption logic among the plurality of encryption logics and transmits the first encryption logic to the electronic apparatus. The authentication module receives authentication data based on the first encryption logic from the electronic apparatus, retrieves a first authentication logic corresponding to the first encryption logic from the storage module, and authenticates the electronic apparatus according to the authentication data based on the first authentication logic.10-22-2009
20090262938METHOD FOR ENCRYPTING AND DECRYPTING WIRELESS SIGNALS AND APPARATUS THEREOF - An apparatus for encrypting wireless signals comprises an encryption engine, a transmit packet buffer and a transmit control logic. The encryption engine encrypts the wireless signals. The transmit packet buffer stores the encrypted wireless signals. The transmit control logic forwards the encrypted wireless signal from the transmit packet buffer to a wireless channel.10-22-2009
20090202076Communications System via Data Scrambling and Associated Methods - A communications system that may include a transmitter, a receiver, connected over a communications network. A communication link on the communications network may transfer data between the transmitter and the receiver. The system may also include a logic unit to scramble a plurality of portions of the data at the transmitter based upon the communication link and may unscramble the plurality of portions of the data at the receiver. As a result, the logic unit may provide improved performance of the communication link and/or reduced power consumption of the communication link.08-13-2009
20090046861SECURITY FOR A HETEROGENEOUS AD HOC MOBILE BROADBAND NETWORK - A server provides security for a heterogeneous ad hoc mobile broadband network. The server is configured to maintain an encrypted control session with an ad-hoc service provider and a mobile client while enabling the mobile client to support an encrypted data tunnel through the ad-hoc service provider.02-19-2009
20090279700INFORMATION-THEORETICALLY SECURE SECRECY GENERATION - A method and apparatus are provided for performing information-theoretically secure cryptography using joint randomness not shared by others. Two valid communicating entities independently generate samples of a shared source that is not available to an illegitimate entity. The shared source may be a satellite signal, and each legitimate entity may generate uniformly distributed samples from a binary phase-shift keying signal received on an independent channel. Alternatively, the shared source may be a channel between the two legitimate entities, such that each legitimate entity generates samples of unknown distribution based on the channel impulse response of the channel. One legitimate entity generates an encryption key, a quantization error, and a syndrome from its samples. The quantization error and the syndrome are reported to the other legitimate entity. The other legitimate entity generates a matching encryption key using its samples, the quantization error, and the syndrome.11-12-2009
20090103731Authentication of 6LoWPAN Nodes Using EAP-GPSK - A system is provided that includes at least one processor and instructions that when executed by the processor promote exchanging extensible authentication protocol (EAP) messages for authentication by sending a plurality of data packets formatted in accordance with an IEEE 802.15.4 standard. The EAP messages are encapsulated within a data field of the IEEE 802.15.4 standard data packet and wherein the encapsulated EAP message comprises an EAP header and a data portion.04-23-2009
20090103732Method of personalizing a NFC Chipset - The invention relates to a method for personalizing a secure processor in a NFC system to execute a secure application, comprising steps of obtaining by a server identification data of a user memorized in a secure storage medium, personalization data corresponding to the user identification data, and identification data of a NFC system of the user, comprising an encryption key of the secure processor, encrypting by the server personalization data using the encryption key, transmitting to the NFC system encrypted personalization data, receiving by the secure processor encrypted personalization data, deciphering personalization data, and memorizing in a secured way personalization data by the secure processor.04-23-2009
20100111306SECURITY MODEL FOR A RELAY NETWORK SYSTEM - According to one general aspect, a method may include acquiring a message. In some embodiments, the method may also include determining if a relay station (RS) is allowed to manipulate portions of the message. In some embodiments, the method may also include, if so, generating a message authentication code (MsgAC) based upon a MsgAC key (MsgACK) known to the RS. In some embodiments, the method may also include combining the message with the MsgAC. In some embodiments, the method may also include wirelessly transmitting the combined message to the RS.05-06-2010
20100278343WIRELESS COMMUNICATION APPARATUS AND PROCESSING METHOD THEREBY - When a wireless network is constructed, a wireless communication apparatus in the wireless network constructed of a plurality of communication apparatuses decides whether to function as a providing source of communication parameters or as a provision destination that receives communication parameters. In a case where it has been decided that this apparatus is to function as the provision destination that receives communication parameters, the apparatus requests authentication when it participates in the wireless network using communication parameters. In a case where it has been decided that this apparatus is to function as the providing source of communication parameters, the apparatus execute authentication processing in response to an authentication request.11-04-2010
20100278342DEVICE, SYSTEM, AND METHOD OF ESTABLISHING SECURE WIRELESS COMMUNICATION - Device, system, and method of establishing secure wireless communication. A system includes at least one wireless communication device having a sensor to measure one or more parameters of a physical event shared between that device and another wireless communication device, and a processor to translate the one or more measured parameters into a secret data sequence known only to the devices sharing the event. A first of the wireless communication devices sharing the event is to combine a communication key with the secret data sequence, thereby to generate an encoded message for distribution over a wireless link accessible by the devices, and a second of the wireless communication devices sharing the event is to decode said encoded message using the secret data sequence, thereby to obtain the communication key. The wireless communication devices may then connect using the secret communication key as a basis for secure communication.11-04-2010
20120263301METHOD AND APPARATUS FOR TRANSMITTING/RECEIVING ENCRYPTION INFORMATION IN A MOBILE BROADCAST SYSTEM - A method and apparatus for transmitting/receiving encryption information in a mobile broadcast system providing broadcast service (BCAST) are disclosed. In the mobile broadcast system, a broadcast (BCAST) Service Distribution/Adaptation (BSD/A) unit comprises a transmitter for transmitting a Registration Key Material (RKM) request message for requesting delivery of an RKM for registration of the BCAST service of a terminal to a BCAST Subscription Management (BSM) unit managing subscriber information of the terminal, and a receiver for receiving an RKM request response message from the BSM unit. The RKM request message includes an identifier (ID) of the BCAST service, and the RKM request response message includes the ID of the BCAST service and the RKM. The transmitter transmits a Long-Term Key Message (LTKM) request message for requesting delivery of an LTKM provided to the terminal during subscription of the BCAST service to the BSM unit.10-18-2012
20110268274Authentication and Key Establishment in Wireless Sensor Networks - A wireless sensor network (WSN) and a method for establishing a communication key between devices in a WSN. The WSN comprises a first device configured for sending a request message to a second device, the request identifying at least a third device for communication with which a communication key is intended, a first random number, and a first authentication code generated using a first secret key shared between the first and second devices; the second device configured for authenticating the first authentication code based on the first secret key, for generating the communication key based on the first secret key, the first random number, and a second random number using a hash function, for sending an approval message to the third device, the approval message comprising, in encrypted form based on a second secret key shared between the second and third device, the communication key and the first and second random numbers; the third device configured for decrypting the communication key and the first and second random numbers based on the second secret key and for sending a notice message to the first device, the notice message comprising the first and the second random numbers; and the first device configured for recalculating the communication key, based on the first secret key and said received first and second random numbers using said hash function.11-03-2011
20090169008SYSTEM AND METHOD FOR TRACKING TESTING OF SOFTWARE MODIFICATION PROJECTS FROM A WIRELESS MOBILE DEVICE - A wireless mobile device for tracking the progress of testing a set of software modification projects in an install plan uses a centralized project database where the testers can update their progress of testing software modification projects as they perform the tests. The central database advantageously eliminates the need to contact individual testers of each and every project every time a status report needs to be generated. Instead, through the wireless mobile device, a manager at any time can automatically generate status reports which contain the testing progress of particular projects in real-time to more accurately monitor what projects are on track and what projects may be falling behind schedule.07-02-2009
20080292101Method and System for Improving Robustness of Secure Messaging in a Mobile Communications Network - A mobile communications network has mobile communications capabilities and supports a secure messaging service, such as an SMS messaging service, that allows a message sender and at least one message receiver (at least one among the message sender and the message receiver being a user of the mobile communications network) to exchange messages encrypted by means of a cryptographic process performed by the message sender, so as to obtain an encrypted message that can be decrypted by a corresponding cryptographic process performed by the intended message receiver. End-to-end security of the exchanged message is thus achieved. A cryptographic algorithm, exploited by the user of the mobile communications network for performing the cryptographic process, is modified by exploiting the mobile communications capabilities of the mobile communications network. Robustness and reliability over time of the end-to-end security messaging is improved.11-27-2008
20120294444Method and system for establishing enhanced air interface key - The disclosure provides a method and a system for establishing an enhanced air interface key. During a serving Radio Network Controller (RNC) relocation process, a target RNC with an enhanced security capability enables a received legacy key to perform security protection on communication in the serving RNC relocation process when the target RNC cannot learn from a relocation request sent by a source RNC whether or not a user equipment supports the enhanced security capability (11-22-2012
20080279381Secure messaging - Secure authentication and messaging for mobile online transactions are performed by a secure messaging platform. The secure messaging platform may include a token coupled to a mobile device, or a mobile device alone. The token enables secure access, and client and server protocols enable secure transactions using text/SMS messaging.11-13-2008
20110007899SYSTEM FOR SUPPORTING OVER-THE-AIR SERVICE AND METHOD THEREOF - Disclosed herein is a system and method for providing Over-The-Air (OTA) service. The system according to the present invention includes an OTA server for, when OTA data is requested by a mobile terminal, encrypting the requested OTA data using a preset OTA key depending on the type of the requested OTA data, and creating a message for providing the encrypted OTA data; and a message center for receiving the created message, and sending the created message to the mobile terminal.01-13-2011
20080267404Security System for Devices of a Wireless Network - The invention relates to a security system for wireless networks, comprising a first portable unit (10-30-2008
20100142708APPARATUS AND METHOD FOR GENERATING SECRET KEY - An apparatus for generating a secret key generates the secret key by using information of a mobile RFID terminal, transmits the generated secret key to an RFID tag attached on an article, and decrypts a unique item identifier of the article encrypted by using the generated secret key after receiving the unique item identifier of the article encrypted by using the secret key from the RFID tag. By this configuration, it is possible to protect user's personal privacy of the mobile RFID terminal in a state where user's intervention is minimized.06-10-2010
20100142709ROGUE ACCESS POINT DETECTION IN WIRELESS NETWORKS - Methods to detect rogue access points (APs) and prevent unauthorized wireless access to services provided by a communication network are provided. A mobile station (MS) reports to a serving AP the received signal strength (RSS) for all APs in the area it travels. The serving AP detect a rogue AP based on inconsistencies perceived in the RSS reports, assessed during the handover phase or whilst the communication is active.06-10-2010
20110268276Apparatus and method for communication security in a nationwide wireless network - Systems and methods for security in a nationwide wireless network with geographically dispersed wireless routers are described. The wireless routers have an interface function with an ability to receive telephone calls from an authorized caller. The router, in response and on demand generates a set of bounded random numbers (BRN) as a random seed for use in generation of encryption keys for communication security between the router and a portable wireless device of the caller.11-03-2011
20080267405System for ensuring encrypted communication after handover - During connection setup with a first radio access network, a multimode mobile station sends an unprotected initial signaling message that includes information about those encryption algorithms that the multimode mobile station supports when it communications in a second radio access network. The first radio access network saves some or all the information. Then it composes and sends an integrity-protected message that includes information about the encryption algorithms supported by the multimode mobile station in the second radio access network.10-30-2008
20100135494METHOD FOR AGGREGATING DATA IN A NETWORK - A method for aggregating data in a network, particularly in a wireless sensor network, wherein the network (06-03-2010
20080240438SYSTEM AND METHOD FOR CIPHERING KEY FORWARDING AND RRC PACKET DECIPHERING IN A UMTS MONITORING SYSTEM - System and method for forwarding a ciphering key to a decipher application comprising capturing a first message carrying the ciphering key from a first network interface, identifying a network node associated with the first network interface, identifying a monitor responsible for processing messages captured from interfaces coupled to the network node, and forwarding the ciphering key to the monitor. In an alternative embodiment, the method may further comprise capturing second messages carrying encrypted messages from a second network interface, and deciphering the second messages using the ciphering key. The method may also comprise identifying user equipment associated with the first messages, and selecting a deciphering application running on the monitor using a user equipment identity.10-02-2008
20090122986SYSTEMS AND METHODS FOR PREVENTING TRANSMITTED CRYPTOGRAPHIC PARAMETERS FROM COMPROMISING PRIVACY - A method for secure cryptographic communication comprises transmitting information that identifies a group key from a first device to a second device. The method further comprises, in the first device, using the group key to encrypt an input vector, transmitting the encrypted input vector, encrypting privacy-sensitive information using a device key, an encryption algorithm, and the input vector, and transmitting the encrypted privacy-sensitive information to the second device.05-14-2009
20090028334Method and Apparatus for Providing Security in a Radio Frequency Identification System - One aspect involves a communication that contains a portion encrypted with a selected key can be wirelessly transmitted by a part for reception and decryption by plural tags. A different aspect involves a tag receiving a first sequence of wireless communications that each contain sequencing information regarding the first sequence, while receiving a second sequence of wireless communications that each include sequencing information regarding the second sequence, and further involves monitoring the sequencing information from received communications of the first sequence while separately monitoring the sequencing information from received communications of the second sequence.01-29-2009
20110268278Systems, Devices and Methods for Providing Access to a Distributed Network - In a cellular network system, an add-on base station (11-03-2011
20110268277COMMUNICATION SYSTEM, FEMTOCELL BASE STATION, AUTHENTICATION APPARATUS, COMMUNICATION METHOD, AND RECORDING MEDIUM - A communication system for solving a problem, in which secure communications security cannot be ensured in communications between a femtocell base station and UE, is provided. The communication system includes UE (User Equipment) and an HLR (Home Location Register) used in an IMS (IP Multimedia subsystem) network and a femtocell base station (Femto AP) that constructs a predetermined communication area. The femtocell base station exists between the UE and the HLR, acquires a concealment key corresponding to the UE from the HLR during authentication of the UE, and executes a concealment process to conceal the identity of the UE based on the concealment key.11-03-2011
20130216043Security Solution For Integrating a WiFi Radio Interface in LTE Access Network - A method for security for inter-RAT carrier aggregation is disclosed. The method includes encrypting a message using an encryption technique for a first RAT. The method also includes sending, to a UE, at least a portion of the encrypted message using a different, second RAT. Sending using the second RAT does not further encrypt the at least a portion of the encrypted message. The method further includes receiving the at least a portion of the message encrypted using the first RAT protocol. Receiving uses the second, different RAT. The method also includes decrypting the at least a portion of the message using the first RAT protocol. Apparatus and computer readable media are also described.08-22-2013
20110228941SYSTEMS AND METHODS FOR RFID SECURITY - An RFID system includes an RFID tag, an RFID reader, and a server. The RFID tag communicates to the server via encrypted information. The information may be encrypted with synchronized encryption keys. In this manner, the reader need not decrypt the information from the RFID tag. The effectiveness of malicious readers is thereby reduced, resulting in improved RFID tag security.09-22-2011
20120033814SHORT MESSAGE SERVICE CIPHER - A wireless phone system and methods performed thereon for cryptographically processing SMS messages is disclosed. A cryptographic pad is used to replace characters in a payload of a SMS message with coded characters. The cryptographic pad is used by the receiver of the SMS message to decode it. The cryptographic pad is one of two or more possible cryptographic pads stored in the receiver. In one embodiment, the two or more possible cryptographic pads are sent as a key where a particular cryptographic pad is referenced in the key using an index.02-09-2012
20130121493LOCAL TRUSTED SERVICES MANAGER FOR A CONTACTLESS SMART CARD - Systems, methods, computer programs, and devices are disclosed herein for deploying a local trusted service manager within a secure element of a contactless smart card device. The secure element is a component of a contactless smart card incorporated into a contactless smart card device. An asymmetric cryptography algorithm is used to generate public-private key pairs. The private keys are stored in the secure element and are accessible by a trusted service manager (TSM) software application or a control software application in the secure element. A non-TSM computer with access to the public key encrypts and then transmits encrypted application data or software applications to the secure element, where the TSM software application decrypts and installs the software application to the secure element for transaction purposes.05-16-2013
20090220086METHOD AND SYSTEM FOR SECURED WIRELESS DATA TRANSMISSION TO AND FROM A REMOTE DEVICE - The device tracking location adherence and route adherence technology, according to an exemplary embodiment of this invention, at least provides for secure message reception from a remote device. The present invention allows for secure data transmission between a remote device and while employing a small amount of bandwidth thereby providing a cost-effective data transmission system. This is especially advantageous where a fleet of remote devices is employed within a network.09-03-2009
20090245517SYSTEMS AND METHODS FOR GROUP KEY DISTRIBUTION AND MANAGEMENT FOR WIRELESS COMMUNICATIONS SYSTEMS - A novel group key distribution and management scheme for broadcast message security is provided that allows an access terminal to send a single copy of a broadcast message encrypted with a group key. Access nodes that are members of an active set of access nodes for the access terminal may decrypt and understand the message. The group key is generated and distributed by the access terminal to the access nodes in its active set using temporary unicast keys to secure the group key during distribution. A new group key is provided every time an access node is removed from the active set of access nodes for the access terminal.10-01-2009
20090225985METHOD, APPARATUS AND PRODUCT FOR RFID AUTHENTICATION - A method and apparatus for repeated communication sessions between a sender (e.g., RFID tag) and a receiver (RFID reader) that employs a proactive information security scheme is based on the assumption that the information exchanged during at least one of every n successive communication sessions is not exposed to an adversary. The sender and the receiver maintain a vector of n entries that is repeatedly refreshed by pairwise XORING entries, with a new vector of n entries that is randomly chosen by the sender and sent to the receiver as a part of each communication session. Also, a computational secure scheme based on the information secure scheme is employed to ensure that even in the case that the adversary listens to all the information exchanges, the communication between the sender and the receiver is secure. In particular, the scheme can be used in the domain of remote controls (e.g., for cars).09-10-2009
20080232588SYSTEM AND METHOD FOR IMPLEMENTING CONTENT PROTECTION IN A WIRELESS DIGITAL SYSTEM - A system includes a line-based receiver for receiving protected content from a source and a line-based transmitter for providing the protected content to a destination. The protected content is secure, such as by using a High-bandwidth Digital Content Protection (HDCP) mechanism. Between the line-based transmitter and receiver is a wireless transmitter and a wireless receiver. The wireless transmitter establishes an encrypted wireless link with the wireless receiver according to a second encryption mechanism. The wireless transmitter is further configured for receiving the protected content from the line-based receiver, encrypting the protected content according to the second encryption mechanism, and wirelessly transmitting the encrypted protected content. The wireless receiver is further configured for receiving the wirelessly transmitted protected content from the wireless transmitter and decrypting the protected content according to the second encryption mechanism.09-25-2008
20090220084SYSTEM AND METHOD FOR DYNAMICALLY UPDATING MESSAGE LIST INDICATORS - Systems and methods for processing messages within a wireless communications system are disclosed. At least part of an encrypted message is received at a device for which it is intended. A security indicator on the device indicates that a message is encrypted. The message is decrypted, and it is determined whether the decrypted message includes a logical attachment. If there is such a logical attachment, an attachment indicator on the device indicates that the encrypted message includes an attachment associated with the message independent of the encryption attachment itself. The indicators may be updated via direct user action, or transparently and free from direct user input to said device.09-03-2009
20120195431METHOD FOR OPERATING A NODE IN A WIRELESS SENSOR NETWORK - The present invention relates to a method for operating a first node in a network, the network including a plurality of nodes, the method comprising (a) the first node having a first identifier joining the network by transmitting the first identifier to a second node having a second identifier, (b) the first node generating a first key on the basis of the second identifier (c) the first node authenticating the second node by means of the first key, (d) the first node communicating with a third node if the first and second keys are equal.08-02-2012
20090316902METHOD AND APPARATUS FOR ENCODING SECURITY STATUS INFORMATION - A method of transmitting messages from a sender to a recipient over a wireless channel, the messages including a sequence counter and a frame counter. The method comprises establishing initial values of the sequence counter and the frame counter at the sender. Initial values of the frame counter and the sequence counter are provided to the recipient. The sender sends compressed messages including the value of the sequence counter and not the frame counter and monitors for an acknowledgement of receipt by the recipient. When no acknowledgment is received, the sender sends uncompressed messages until an acknowledgement of receipt is received from the recipient. The sequence counter is incremented and the next value of the frame counter is established as the integer next larger than previous value of the frame counter which is congruent to the sequence counter modulo 12-24-2009
20090274301VALIDATION OF STORED OR INCOMING MESSAGES - A mobile device can save time by validating a stored message, which was previously unreadable, by utilizing a related message, which can be received at a much quicker rate. In accordance with some aspects, the mobile device can save time by validating the stored message by reading a new related message and subsequently re-reading or descrambling the stored message or its CRC. The first attempt to read the message might not be successful due to a scrambling information change or due to other reasons. The reason for the failure of the first attempt to read the message may be determined based on whether a later attempt to read the message with the same or a different scrambling information is successful.11-05-2009
20100183152NETWORK AND METHOD FOR INITIALIZING A TRUST CENTER LINK KEY - The invention relates in general to a network and to a method for initializing a trust center link key. According to an embodiment of the invention, a network is provided with a new node (07-22-2010
20100195832Method and a system for transmitting an encrypted control message based on mobile multimedia broadcast - This invention provides a method and a system for transmitting an encrypted control message based on the mobile multimedia broadcast. The said method includes: encapsulating the media data of the program and the encrypted control message in the multiplex sub-frames of the multiplex frame; and setting the encrypted control message identifier in the header of multiplex sub-frames for indicating whether the encrypted control message is included in the multiplex sub-frames. The mobile multimedia system sends the media data and the encrypted control message out through the multiplex frame.08-05-2010
20100177897TELECOMMUNICATION SYSTEMS AND ENCRYPTION OF CONTROL MESSAGES IN SUCH SYSTEMS - The present invention relates to a solution for handling encryption of control messages in a wireless telecommunications network. Key generation is based on sequence numbers and the present invention reduces access to core network devices for updating sequence numbers relating to network events by separating sequence number generation to different parts of the network and different types of network events. This is done by providing a solution where sequence number rollover events and handover events are separated from each other in providing input to radio resource control message encryption. Three different counters may be used for different types of events and all three may be used as input to an encryption algorithm.07-15-2010
20100177895System For Transmitting The Scrambled Broadcast-Signals In Single Frequency Network, And A Method Thereof - Disclosed is a system for transmitting encrypted broadcast signals to different transmitters on a single frequency network (SFN) in a digital broadcasting system. The system for transmitting encrypted broadcast signals on the SFN includes: a main broadcasting system for transmitting encrypted broadcast signals including data streams and transmitter identification information (TII) through a main broadcasting network; a repeating system for amplifying encrypted broadcast signals of the main broadcasting network and transmitting the amplified broadcast signals, or modulating and amplifying streams input by the main broadcasting system through a private line and repeating broadcast signals of the main broadcasting system through a repeating network; and a decrypting key provider for receiving a decrypting key value from the main broadcasting or repeating system and transmitting a user authentication and decrypting key to a charged subscriber terminal through a mobile communication network.07-15-2010
20100177898DEVICE AND METHOD FOR PROVIDING AUTHENTICATION - The present invention relates to an electronic device, comprising a physical uncloneable function (PUF) module, and circuitry adapted to receive a cryptographic query (α) from an electronic unit, read, from the PUF module, data generated at a challenge of the PUF module, and generate a cryptographic response (β) based on the data, a random noise component comprised in the data, and the cryptographic query (α), thereby enabling authentication of the electronic device. An advantage with the invention is that it will not be necessary to include an additional random generator together with the electronic device, as the fuzzy output provided by the PUF module can be seen as already containing a random noise component. In some cryptographic schemes, the random noise provides for a possibility to reach a higher level of security and to minimize the possibility for a third party to find patterns in cryptographic responses generated during use of the electronic device. The present invention also relates to a similar authentication method.07-15-2010
20100177896COMMUNICATING VIA A WIRELESS GATEWAY DEVICE AND SSL - Systems (and corresponding methodologies) of deploying an enhanced access point (or an integrated router/access point) with embedded secure socket layer (SSL) tunneling capabilities are provided. The innovation enables users to initiate or prompt secure SSL tunnels between a wireless computer or device (and browser session) and the wireless gateway device (WGD). In particular, off-the-shelf web browser applications can be used to effect secure communication between a wireless mobile device and a SWAT-(Secure Wireless Application Tunnel-) equipped access point.07-15-2010
20100177899ENCRYPTED COMMUNICATION SYSTEM - Systems and methods of making secure communications in a communications network comprising a user device (07-15-2010
20100239093Data Transfer System and Data Transfer Method - In a data transfer system provided with a mobile terminal device, an information processing apparatus, and an authentication server, the mobile terminal device transmits authentication information to the authentication server through a first communication line, the authentication server transmits a predetermined permission code to the mobile terminal device through the first communication line in a case that the authentication succeeds based on the authentication information received from the mobile terminal device, the information processing apparatus permits data transfer between the information processing apparatus and the mobile terminal device in a case that the information processing apparatus receives an input of the permission code received by the mobile terminal from the authentication server, and the information processing apparatus and the mobile terminal device conduct the permitted data transfer through a second communication line.09-23-2010
20110058674Secure Communication Of Information Over A Wireless Link - Secure communication of information over a wireless link with apparatus including a blade management module and a plurality of blade servers, the blade servers connected for data communications with the blade management module through at least one wired link, the blade servers also connected for data communications with the blade management module through at least one wireless link, including sharing an encryption key between the blade management module and one or more of the blade servers only through the at least one wired link connecting the blade management module to the one or more blade servers; encrypting information by the blade management module with the encryption key; transmitting the encrypted information by the blade management module to the one or more blade servers through the at least one wireless link; and decrypting the encrypted information by the blade server with the encryption key.03-10-2011
20100232606METHOD AND SYSTEM FOR AUTHENTICATING IN A COMMUNICATION SYSTEM - A method and system for authenticating in a communication system are provided. The method includes, in a first authenticator, sending an authenticator relocation request to a second authenticator transmitting a hash value for an authentication parameter of a Mobile Terminal (MT), a random parameter 09-16-2010
20120140927CROSS-COMPONENT MESSAGE ENCRYPTION - Often, for reasons of wireless bandwidth conservation, incomplete messages are provided to wireless messaging devices. Employing cryptography, for secrecy or authentication purposes, when including a received message that has been incompletely received can lead to lack of context on the receiver's end. By automatically obtaining the entirety of the message to be included, an outgoing message that includes the received message can be processed in a manner that securely and accurately represents the intended outgoing message. Alternatively, a server can assemble a composite message from a new message and an original message and, in cooperation with a wireless messaging device, encrypt and sign the composite message. Conveniently, security considerations are maintained even in view of bandwidth optimization measures.06-07-2012
20100208894ENCODER AND DECODER APPARATUS AND METHODS - Embodiments provide remote control encoders and decoders, encryption algorithms and methods, singularly and in combination, and not limited thereto.08-19-2010
20090041247KEY IDENTIFIER IN PACKET DATA CONVERGENCE PROTOCOL HEADER - Systems and methodologies are described that facilitate identifying a plurality of keysets utilized in a communications network. The keysets can include ciphering keys that provide data encryption and decryption and integrity keys that provide data integrity protection. A key identifier can be included in a packet data convergence protocol header that indicates a keyset employed in connection with data in a protocol data unit. In addition, a route indicator can be provided in a radio link control header that distinguishes a source cell and a target cell in networks configured without RLC reset.02-12-2009
20090060192METHOD AND APPARATUS FOR PROVIDING SECURITY IN WIRELESS COMMUNICATION NETWORKS - A method includes receiving data at a first wireless node in a wireless network, where the data is associated with an industrial control and automation system. The method also includes decrypting the received data using a first encryption key to produce decrypted data and encrypting the decrypted data using a second encryption key to produce encrypted data. The method further includes communicating the encrypted data to at least a second wireless node in the wireless network. Another method includes generating first data at a first wireless node in a wireless network, where the data is associated with an industrial control and automation system. The other method also includes encrypting the first data using an encryption key and transmitting the first data to multiple second wireless nodes in the wireless network, where the second wireless nodes are capable of using the same encryption key to decrypt the first data.03-05-2009
20090074187WIRELESS COMMUNICATION SYSTEM AND WIRELESS COMMUNICATION METHOD - The present invention provides a technology of effectively avoiding tracing on a terminal performed with an identification number being a target and DoS attack without making any significant changes to a communication system.03-19-2009
20110033051METHOD AND APPARATUS FOR REDUCING PROBABILITY OF DETECTION, IMPROVING JAMMING RESISTANCE AND SECURITY FOR BROADBAND WIRELESS SYSTEMS - Systems and methods for generating OFDM signals are provided in which sub-carrier usage is selected and/or remapped in various manners. For example, in some embodiments remapping using a security sequence is employed; in other embodiments, decoy sub-carriers are employed; in other embodiments, mask sub-carriers are used to cover jammed portions of a channel.02-10-2011
20110211698Encryption/Decryption System for a Mobile Device - An encryption/decryption system for a mobile phone configured to make a voice packet encryption/decryption during mobile communication. The mobile phone has a connecting device for an external plug-in device. The external plug-in device has a control unit, a security chip. When a security communication mode is activated, the communication between users can be prevented from being disclosed.09-01-2011
20090141898Method and system for secure data aggregation in wireless sensor networks - A method for transmitting sensed data in a wireless sensor network including multiple sensors and a database, the method includes: automatically dividing the multiple sensors into sensor groups, each of the sensor groups including at least one sensor; determining a lead sensor in each of the sensor groups; encrypting the sensed data to generate encrypted data in ones of the multiple sensors excluding the determined lead sensors; and transmitting the encrypted data.06-04-2009
20130129092SYSTEM AND METHOD FOR PROVIDING VARIABLE SECURITY LEVEL IN A WIRELESS COMMUNICATION SYSTEM - A system and method for providing variable security levels in a wireless communication network. The present invention optimizes the often conflicting demands of highly secure wireless communications and high speed wireless communications. According to a preferred embodiment of the present invention, various security sensors are scanned to determine the likely presence of an intruder within a predetermined trust zone. If an intruder is likely present, the security level is changed to the highest setting, and consequently a lower data rate, while the intruder is identified. If the identified intruder is in fact a trusted node, the security level is returned to a lower setting. If the identified intruder is not a trusted node, the security level is maintained at an elevated state while the intruder is within the trust zone.05-23-2013
20100303235Method Providing the Means for Recognizing the Origin and/or Content of an RF Signal - The subject of the present invention is a method providing the means for recognizing the origin and/or the content of an RF signal without requiring substantial computation means, these recognition means being accessible only to authorized persons and being practically nonmodifiable and very difficult to detect by unauthorized persons, and this being so in various applications using RF signals transmitting information that is at least partly hidden. This method is characterized in that it spreads an item of information to be hidden with the aid of a hidden code, that it distributes, with the aid of an Exclusive OR function the information thus obtained in codes that are known with the aid of a hidden distribution algorithm, that, on reception, it applies the algorithm that is the inverse of that having served for the distribution in order to gain access to the spread code, that is correlates this spread code with the hidden code in order to find the hidden information.12-02-2010
20100303236METHOD AND APPARATUS FOR PROPAGATING ENCRYPTION KEYS BETWEEN WIRELESS COMMUNICATION DEVICES - A system for propagating encryption key information between wireless communication devices without the requirement of pairing each and every device. A wireless communication device may be paired with at least one device in a group of devices. When a secure link is established between these devices, a determination may be made as to whether encryption key information should be passed from one device to another. The additional encryption key information may allow a wireless communication device to create a secure link with other devices without having to first establish a trusted relationship (e.g., go through a pairing process) with the other devices.12-02-2010
20100310073SYSTEM AND METHOD OF CROSS-COMPONENT MESSAGE PROCESSING - Often, for reasons of wireless bandwidth conservation, incomplete messages are provided to wireless messaging devices. Employing cryptography, for secrecy or authentication purposes, when including a received message that has been incompletely received can lead to lack of context on the receiver's end. By automatically obtaining the entirety of the message to be included, an outgoing message that includes the received message can be processed in a manner that securely and accurately represents the intended outgoing message.12-09-2010
20130136260WCDMA 3G VOICE COMMUNICATION PROTECTION METHOD AND TERMINAL USING THE SAME - A WCDMA 3G voice communication protection method and a terminal using the method are provided. The method is performed by a terminal operating in conjunction with an S-USIM for voice communication protection. When a calling terminal connects a voice communication channel to a called terminal, secure voice communication is prepared for by collecting information about relevant voice communication. At the calling terminal, synchronous data is set by exchanging the voice communication information with the called terminal, and a secure synchronization procedure is performed based on the set synchronous data. At each of S-USIMs that operate in conjunction with the calling and called terminals, a session key for secure voice communication is generated based on the synchronous data. Secure communication is performed by encrypting and transmitting voice-coded data to be transmitted based on the session key, and decrypting and reproducing received voice-coded data based on the session key.05-30-2013
20130136261Method and System for Mobile Terminals Handing Over between Clear Session and Encrypted Session Communications - The present invention discloses a method for clear session and scrambled session communication handover between mobile terminals comprising: a first terminal initiating a scrambled session handover control request to a second terminal, and the second terminal returning a scrambled session handover control response after receiving the scrambled session handover control request; and the first terminal initiating a key negotiation process with the second terminal after receiving the scrambled session handover control response returned by the second terminal, and then transferring to scrambled session communication or suspending the scrambled session communication with the second terminal; wherein the scrambled session handover control request includes a scrambled session request or a clear session request. The present invention further provides a system for clear session and scrambled session communication handover between mobile terminals comprising a scrambled session handover control module and an encryption module set in a mobile terminal. The present invention protects end to end security in the communication process of the mobile terminals effectively.05-30-2013
20130136262SYSTEM AND METHOD FOR PROVIDING SECURITY IN MOBILE WiMAX NETWORK SYSTEM - A method for providing security between a radio access station and an access control router in a mobile microwave access network includes: receiving, by the radio access station and the access control router, the same certificate from a licensed certification authority; generating, by the access control router, an access service network traffic encryption key (asn_TEK); encrypting, by the access control router, a message to be transmitted with the generated asn_TEK and transmitting the encrypted message to the radio access station; verifying, by the radio access station, the certificate of the licensed certification authority appended to the message received from the access control router to check the asn_TEK, and decrypting the message received from the access control router to obtain an actual message; encrypting, by the radio access station, the actual message with the checked asn_TEK and transmitting the encrypted message to the access control router.05-30-2013
20110123027USE OF A MOBILE TELECOMMUNICATION DEVICE AS AN ELECTRONIC HEALTH INSURANCE CARD - The invention relates to a method for decoding a medicinal data object (05-26-2011
20100303237METHOD AND APPARATUS FOR CIPHERING DATA IN WIRELESS COMMUNICATION SYSTEM - An apparatus for ciphering data in a wireless communication system. The apparatus includes a memory which stores data to be ciphered; a controller which outputs a cipher command for each layer of a wireless protocol; a protocol processing unit including a cipher hardware, which receives the cipher command outputted from the controller, reads data to be ciphered from the memory, ciphers the data and outputs the ciphered data, and a transmission data processing unit, which receives ciphered data that is directly outputted from the cipher hardware, adds a header for transmission and generates a data packet; and an RF communication unit which directly receives the generated data packet and transmits the received data packet.12-02-2010
20100310074ENCRYPTION SYSTEM FOR VOCAL COMMUNICATIONS - An encryption system for audio or vocal communications, including a device for encrypted communication with a similar device, said device including at least one bluetooth chip arranged to effect a communication via at least one bluetooth connection between a first and a second of said devices, said bluetooth chip including encryption apparatus accessible to a user.12-09-2010
20100322426SELF-CONFIGURING CELLULAR BASESTATION - A basestation 12-23-2010
20110110523WIRELESS PERIMETER SECURITY DEVICE AND NETWORK USING SAME - A Radio Frequency based security system for providing security for wireless Local Area Networks (WLAN) that allows the creation and maintenance of arbitrarily shaped secure wireless access areas with boundaries around said wireless Local Area Network and prevents access to the said wireless LAN from outside the perimeter of the secure area. The system includes a plurality of perimeter Radio Frequency Sentry Devices (RFSDs) that are employed to establish the boundaries of said secure area around said wireless LAN. The wireless LAN being secured may be an industry standard IEEE 802.11a, 801.11b or 802.11g based wireless LAN or any other wireless LAN that uses packet based communication protocols. The said RFSDs may be stand-alone devices or they may be connected to a wired or wireless Local Area Network.05-12-2011
20100322425SYSTEM FOR SUPPORTING OVER-THE-AIR SERVICE AND METHOD THEREOF - Disclosed herein is a system and method for providing Over-The-Air (OTA) service. The system according to the present invention includes a mobile terminal for, when a message is received from an OTA server, dividing OTA data, included in the message, into data segments of a predetermined size depending on a size of the message, and a smart card for receiving each of the data segments, decrypting the data segment using a preset OTA key, and storing the decrypted OTA data in a preset area.12-23-2010
20110007901COMMUNICATION DEVICE - A communication device (01-13-2011
20110110520VIRTUAL NEIGHBOR OBJECTS FOR MANAGING IDLE MODE MOBILITY IN A WIRELESS NETWORK - Systems, methods, and apparatus that facilitate optimal idle mode reselection are presented herein. A virtual neighbor component can be configured to create at least one virtual neighbor object and associate the at least one virtual neighbor object with at least two wireless access points. A reselection component can be configured to facilitate idle mode reselection between a wireless access point of the at least two wireless access points and another wireless access point based on, at least in part, the at least one virtual neighbor object.05-12-2011
20110019825SYSTEM AND METHOD OF TRAINING A TRANSMIT/RECEIVE SYSTEM - A radio frequency transmitter is configured to send radio frequency messages to activate a remote system. Each message includes an encrypted counter value and a transmitter identifier. The transmitter is configured to send at least two of the messages having sequential encrypted counter values in response to a single user input.01-27-2011
20090141897Content Communication Over a Wireless Communication Link - In a method of communicating content over a wireless communication link between a base station set-top (BSS) and one or more hosts, where each of the one or more hosts have an interface protocol substantially complying with at least a subset of a copy protection standard, an encrypted signal is at least one of received and stored in the BSS, and the encrypted signal is turned into an encrypted data packet stream. The BSS wirelessly transmits the data packet stream to one or more wireless interface apparatuses (WIAs) which are interfaced with at least one host through the interface protocol. In addition, the WIA forwards the encrypted data packet stream to the one or more hosts through implementation of the interface protocol.06-04-2009
20090034730PROCESS FOR DIGITAL SIGNING OF A MESSAGE - A method and apparatus for the digital signing of a message to be signed, the message to be signed is transmitted via a communication network to a mobile radio telephone to be used as a signing unit. A message to be signed is transmitted from a transmitter to a receiver and then from the receiver to the mobile radio telephone via a telephone network. The mobile radio telephone user indicates that the message to be signed should be signed, and the mobile radio telephone generates a signed message. The signed message is then transmitted from the mobile radio telephone to the receiver and from the receiver to an addressee.02-05-2009
20090034731Information processing apparatus and information processing method - In an information processing apparatus, a first communication unit receives encrypted data from a portable terminal device when the portable terminal device is within a first communication range, a second communication unit receives decryption information from the portable terminal device when the portable terminal device is within a second communication range shorter than the first communication range, and a decryption unit decrypts the encrypted data with the decryption information.02-05-2009
20090034729SECURE MESSAGE HANDLING ON A MOBILE DEVICE - Systems, methods, and software for providing digital security to a child message transmitted from a mobile device to a messaging server, where the mobile device typically does not transmit the parent message with the child message to the messaging server. Whether to apply digital security, such as encryption or a digital signature, or both, is determined, and if the mobile device does not include a complete copy of a parent message for insertion into the child message, the mobile device selectively downloads the parent message from the messaging server prior to the computation of a digital signature or prior to encryption. The systems and methods may also provide a check of the child message size, when the child message includes inserted parent content, to ensure that the child message does not exceed any prescribed limits on message size.02-05-2009
20110116632Methods and Systems for Obscuring Network Topologies - Node, computer software and method for preventing an external party (05-19-2011
20110116631METHOD AND APPARATUS FOR FORMING SECURITY CHANNEL IN SHORT RANGE COMMUNICATION - A channel connection of a device that performs short range wireless communication is provided. If a public key that is broadcast by a specified device is received, the device encrypts its own UID (Unique Identifier) using the public key to transmit the encrypted UID to the specified device, transmits a pairing request to the specified device, and safely receives a key seed from the specified device using a security address included in a pairing device and the UID to form a security channel with the specified device.05-19-2011
20090214036AUTHENTICATION MECHANISMS FOR WIRELESS NETWORKS - Security techniques and security mechanisms for wireless networks that transmit content such as advertisements. According to exemplary techniques, control messages comprising unrequested content (e.g., advertisement data) may be transmitted in response to a request from a client device, while in other exemplary techniques the control messages may be transmitted without any request from a client device. In some exemplary implementations, security mechanisms such as public key cryptography algorithms may be used to secure transmissions. In some of these techniques which implement public key cryptography, a user may be required to retrieve a public key from a source other than the wireless access point transmitting encrypted advertisements (e.g., a sign or terminal in a commercial entity transmitting such advertisements, or from a web service), such that the user may confirm that the encrypted content is from a source matching the retrieved public key and thus confirm the authenticity of a wireless access point.08-27-2009
20120243686System and Method for Remote Asset Managment - A remote asset management system comprising a network of programmable wireless modules, each having an antenna and an identification module and configured to communicate via a radio communication protocol. The system further includes a plurality of assets each linked to one of the wireless modules and configured to be managed by the linked wireless module. A remote system server service platform is configured to receive remote asset data from the wireless modules, pass the remote asset data to and from the wireless modules, send messages to at least one of the wireless modules, monitor the wireless modules by requesting and receiving current mode information, and remotely program the wireless modules. A data processing module located within the wireless module(s) and configured to process messages received by the wireless module, authenticate said message, analyze authenticated messages, and carry out asset management instructions included in the message.09-27-2012
20090214039METHOD AND SYSTEM FOR SHORT-RANGE MOBILE DEVICE COMMUNICATION MANAGEMENT - A method and system for managing short-range mobile device communications are provided. The method includes receiving a user-defined criteria for requested information. The method includes automatically detecting a set of in-range devices, wherein each in-range device is associated with an identifier. The method includes receiving a broadcasted public information from each in-range device. The method includes, responsive to detecting the received broadcasted public information satisfies the user-defined criteria, displaying public info to a user. The method includes, responsive to a user command, transmitting a message in response to the broadcasted public information.08-27-2009
20090214038SECURITY-ENHANCED RFID SYSTEM - The present invention relates to RFID systems. In particular, the invention relates to an RFID system having enhanced security of communication between a tag and a tag reader. In a first aspect of the present invention there is provided an RFID system comprising at least one RFID reader; control means for communicating with an RFID tag by public-key encryption via said reader; at least one RFID tag adapted to encrypt a response to a transmission by a reader using a public-key transmitted to the tag; unauthorised broadcast detection means for detecting a broadcast made by an unauthorised reader; and alert means for providing an alert in the event a broadcast by an unauthorised reader is detected.08-27-2009
20090214037Methods and Apparatuses to Secure Data Transmission in RFID Systems Against Eavesdropping - Methods and apparatuses to secure data transmission in a radio frequency identification (RFID) system and other Vernam-cipher based cryptography methods against eavesdropping. In one embodiment, a method implemented in an RFID system includes generating an encryption key using previously shared information and random information received in a current communication session and securing a communication in the current session using the encryption key.08-27-2009
20110142239SECURITY PROTECTED NON-ACCESS STRATUM PROTOCOL OPERATION SUPPORTING METHOD IN A MOBILE TELECOMMUNICATION SYSTEM - The present invention relates to a method and system for the management of the mobility, the management of an idle mode, the registration management (management of attachment and detachment), and the location management (management of tracking area) of a terminal by using a non-access stratum (i.e., network stratum, hereinafter referred to as “NAS”) in a mobile telecommunication network. To this end, the method for the management of mobility, the management of an idle mode, the registration management, and the location management of a terminal by using a NAS protocol, i.e., messages, according to an embodiment of the present invention, includes a terminal (hereinafter, referred to as “UE”) and a mobility management entity (hereinafter, referred to as “MME”), and addresses to a method for efficiently processing security protected NAS messages if received messages are security protected NAS messages, in a case of sending or receiving messages serving as EMM (EPS Mobility Management) messages, i.e., mobility management messages, in a network such as an EPS (Evolved Packet System) of 3GPP, when the terminal performs handover in an active mode, performs location management in an idle mode, and registers to a network, thereby achieving improved efficiency in the mobility management, the position management, and the registration management of a terminal.06-16-2011
20100014673RADIO FREQUENCY IDENTIFICATION (RFID) AUTHENTICATION APPARATUS HAVING AUTHENTICATION FUNCTION AND METHOD THEREOF - Disclosed are an RFID authentication apparatus having an authentication function and a method thereof. An RFID authentication method includes determining, by an authentication reader, an AES key using authentication information received from an authentication tag, generating an output key, encrypting a predetermined length of confirmation data by using the output key, transmitting the encrypted confirmation data to the authentication tag, receiving encrypted confirm response data corresponding to the confirmation data from the authentication tag to decrypt the encrypted confirm response data, and comparing the predetermined length of the confirmation data with the decrypted confirm response data to verify authenticity of the authentication tag.01-21-2010
20110064223METHOD FOR CONTROLLING REMOTE WIRELESS DEVICE WITH A USER DEVICE - A method for controlling a remote wireless device with a user device includes the user device sending a request message packet to the remote wireless device, where the remote wireless device verifies the request message packet and sends a reply message packet to the user device if the request message packet passes verification. The user device verifies the reply message packet and sends a control message packet to the remote wireless device if the reply message packet passes verification. The remote wireless device verifies the control message packet and sends an acknowledgment message packet to the user device if the control message packet passes verification.03-17-2011
20100034387COMMUNICATION APPARTUS, READER/WRITER, COMMUNICATION SYSTEM, AND COMMUNICATION METHOD - There is provided a communication apparatus including a non-contact communication unit for performing a non-contact communication with a reader/writer; a storage unit for storing data for every logic system corresponding to at least one encryption method, and retransmission interval information of each communication command transmitted from the reader/writer for every encryption method; and a selection unit for selecting the retransmission interval information of each communication command in the encryption method to which the logic system specified by the reader/writer corresponds from the storage unit. The retransmission interval information selected by the selection unit is transmitted from the non-contact communication unit to the reader/writer.02-11-2010
20100054473Display Apparatus and Key Management Method - According to one embodiment, a display apparatus includes a card slot configured to be insertable a memory card including a user data area in which one or more encrypted content keys encrypted with a user key and list information of content-specific information unique to each of content items corresponding to the respective encrypted content keys are stored, a close-proximity wireless transfer device configured to be able to transfer with an external device, an information acquisition module configured to acquire the content-specific information of content held by the external device with which the close-proximity wireless transfer device is executing close-proximity wireless transfer, a content-specific information detection module configured to detect the content-specific information corresponding with information indicating the acquired content, from the list information stored in the user data area, and a display processing module configured to display a list of content items corresponding to the detected content-specific information.03-04-2010
20100034386DEVICE MANAGER REPOSITORY - Apparatus, systems and methods for managing wireless devices. A wireless device identifier from an access device is received. An encryption key associated with the wireless device identifier that matches an encryption key stored in the wireless device is identified. The identified encryption key is transmitted to the access device so that the access device can communicate with the wireless device over an encrypted communication channel that is established by use of the identified encryption key and the encryption key stored in the wireless device.02-11-2010
20110081020TERRESTIAL-SIGNAL BASED EXCLUSION ZONE COMPLIANCE - An exclusion zone compliance circuit comprises a terrestrial radio signal reception component for receiving a terrestrial radio signal comprising a unique identification of a transmission source. A non-volatile memory component of the circuit stores an encrypted data set describing boundaries of an exclusion zone. A navigation data deriving component of the circuit accesses a data set and compares the unique identification with a station identification of the transmission source and the geographic position of the transmission source. The navigation data deriving component derives a geographic position of the exclusion zone compliance circuit and determines whether the exclusion zone compliance circuit is located within an exclusion zone. A data blocking component of the circuit accesses the encrypted data set. A data control component of the exclusion zone compliance circuit blocks output of a signal in response to an indication that the circuit is located within an exclusion zone.04-07-2011
20110069838Apparatus and method for reducing channel reproduction delay in mobile terminal - An apparatus and a method reduce delay when reproducing digital broadcasting in a mobile terminal. More particularly, the apparatus and method reduce a reproduction delay, from having to stand by until an encrypted stream that matches with a traffic key is received, by receiving the traffic key in advance prior to the encrypted stream when a mobile terminal receives encrypted broadcasting. The apparatus includes a controller. The controller receives and stores a traffic key corresponding to an encrypted channel even when not entering the encrypted channel, and deciphers and reproduces the relevant channel using the stored traffic key when entering the encrypted channel.03-24-2011
20110069837METHOD OF TRANSMITTING USER MESSAGE, TERMINAL AND BASE STATION USING THE METHOD - When transmitting a user message, in a call setting period of a base station and a terminal and a radio connection state between a base station and a terminal, whenever a data transmittable channel resource is available, user messages of an amount corresponding to the available channel resource are transmitted. Therefore, user messages can be divided and transmitted according to an available channel in a call setting period.03-24-2011
20110075844Adaptive packet ciphering - Embodiments of the present invention provide methods and apparatus for adaptive packet ciphering.03-31-2011
20100260338METHOD AND APPARATUS FOR ESTABLISHING A CRYPTOGRAPHIC RELATIONSHIP IN A MOBILE COMMUNICATIONS NETWORK - A method and apparatus for establishing a cryptographic relationship between a first node and a second node in a communications network. The first node receives at least part of a cryptographic attribute of the second node, uses the received at least part of the cryptographic attribute to generate an identifier for the first node. The cryptographic attribute may a public key belonging to the second node, and the identifier may be a Cryptographically Generated IP address. The cryptographic relationship allows the second node to establish with a third node that it is entitled to act on behalf of the first node.10-14-2010
20100098254METHOD AND DEVICE FOR SENDING ENCRYPTION PARAMETERS - A transmitting device encrypts DMR voice superframes using encryption parameters and sends the encryption parameters in at least one of the voice superframes by: identifying a selected number of bits from a plurality of vocoder frames the voice superframe; replacing each of the identified bits with a corresponding bit of a first encryption parameter; placing at least one encryption parameter in an embedded signaling field of the voice superframe; and transmitting the voice superframe with the encryption parameters to a receiving device. The receiving device extracts the encryption parameters, which can be a key identifier, an algorithm identifier, and an initialization vector for use in decrypting messages from the transmitting device.04-22-2010
20120033813Method of Selective Protection of the Satellite Rebroadcasting of Data Broadcast Publicly and Collected by the Satellite - The AIS (Automatic Identification System) is a communication system between ships, for example fishing boats, which is used to limit collisions between these ships and that allows maritime traffic in sight of the coasts to be monitored by virtue of coastal stations that listen to the communications. The collection by satellite of these data allows for maritime monitoring far from the coasts and allows the data transmitted to be checked by analysis of the received signal. The maritime monitoring authorities do not want the data concerning, for example, the position of the ships in their territorial waters, collected by satellite, to be broadcast globally. This is because this would enable a user, by listening to the satellite, to know the AIS messages exchanged far from these coasts. The AIS messages contain the position of the transmitting ship, and its identifier, its direction, etc. The invention consists in putting in place an encryption of the data returned from the satellite based on the content of these data. The encryption of the data also enables the authorities to supply the AIS data as a service, possibly a paying service.02-09-2012
20090022316Methods And Apparatus For Reducing Airlink Congestion And Processing Time Associated With Ciphering Information In A Wireless Network - One illustrative method involves the steps of receiving a ciphering mode information message from a wireless network; identifying and processing valid radio bearer downlink ciphering activation time information in the ciphering mode information message when it is part of a security mode command message; and refraining from processing any valid radio bearer downlink ciphering activation time information in the ciphering mode information message when it is part of a message that is different from the security mode command message (i.e. when it is part of a radio network subsystem relocation procedure). The method may include the additional steps of producing valid radio bearer uplink ciphering activation time information for inclusion within a response message when the ciphering mode information message is part of the security mode command message; refraining from producing any valid radio bearer uplink ciphering activation time information when the ciphering mode information message is part of a message that is different from the security mode command message; and causing the response message to be sent to the wireless network.01-22-2009
20090141900METHOD AND APPARATUS FOR ENABLING PHYSICAL LAYER SECRET KEY GENERATION - A method and apparatus for generating physical layer security keys is provided. Channel impulse response (CIR) measurements are recorded. Each CIR measurement is associated with a time-stamp. Where possible, the time-stamps are paired with time-stamps that are associated with another plurality of CIR measurements. The CIR data associated with the paired time-stamps is aggregated. Each of the aggregated CIR measurements is aligned, and at least one CIR measurement is selected for use in secret key generation.06-04-2009
20110255692POWER SAVINGS THROUGH COOPERATIVE OPERATION OF MULTIRADIO DEVICES - Trust establishment in short range protocol pairing between client and proxy devices includes a first aspect in which application level security is used to encrypt all packets transmitted between the client and proxy. An application-based security derives a public key from the General Bootstrapping Architecture (GBA) and used that public key to generate an encryption key in an AES encryption algorithm. A second aspect provides for out of band security to be used to establish short range protocol pairing. In this second aspect, the client and proxy exchange identification information over a third party network that is out of band to the short range protocol. With this identification information exchanged out of band, the client and proxy may establish pairing in the short range protocol.10-20-2011
20110164750METHOD FOR COMMUNICATING IN A NETWORK, A COMMUNICATION DEVICE AND A SYSTEM THEREFOR - The present invention relates to a communication system comprising a first node and second node adapted for communicating in a network, wherein the first node comprises a first list of keying materials including a plurality of keying materials, wherein the second node comprises a second list of keying materials including a plurality of keying materials, wherein the first node further comprises a receiver for receiving from the second node a second node identifier, a controller being arranged for determining from the second node identifier the position in the first list of at least one keying material having a common root with one keying material of the second list, and for generating an encryption key by means of the keying material having a common root and the second node identifier.07-07-2011
20110164749SYSTEM AND METHOD FOR SECURE TRANSACTION OF DATA BETWEEN A WIRELESS COMMUNICATION DEVICE AND A SERVER - The present invention provides a system and method for a set of Extensible Authentication Protocols (EAPs) that can serve Confidentiality, Authentication, Authorization and Accounting (CAAA) issues at an affordable cost. According to one embodiment of the invention, a system and method is provided to generate random sequences (through prime numbers) which can be used in the authentication process of certificateless extensible authentication protocols (EAPs) for mobile and wireless communications. The invention also provides a light weight security with better performance in comparison to the lower layer chip level security provided by 2G, 3G or 4G applications.07-07-2011
20110255693Apparatus and method for transitioning from a serving network node that supports an enhanced security context to a legacy serving network node - Disclosed is a method for transitioning a remote station from a current serving network node having an enhanced security context to a new serving network node. In the method, the remote station provides at least one legacy key, and generates at least one session key based on an information element associated with the enhanced security context. The remote station forwards a first message having the information element to the new serving network node. The remote station receives a second message, from the new serving network node, having a response based on either the legacy key or the session key. The remote station determines that the new serving network node does not support the enhanced security context if the response of the second message is based on the legacy key. Accordingly, the remote station protects communications based on the legacy key upon determining that the enhanced security context is not supported.10-20-2011
20100329462COMMUNICATION SYSTEM, WIRELESS COMMUNICATION APPARATUS, AND COMMUNICATION METHOD - In a communication system, a first wireless communication apparatuses belonging to a communication group receives a connection request frame including a notifying security level from a second communication apparatus outside of the communication group. The first communication apparatus stores a reference security level peculiar to the communication group, which is selected from security levels depending on one of encryption methods including non-encryption and encryption strengths. In the first communication apparatus, the notifying security level is compared with the reference level, and a response frame including one of a connect rejection and a connection permission is described, is generated and transferred to the second communication apparatus. The connect rejection represents a rejection of connection to the second communication apparatus and the connection permission represents a permission of connection to the second communication apparatus.12-30-2010
20100329461AUTOMATIC DETECTION OF WIRELESS NETWORK TYPE - A system and method for facilitating automatic detection of a type of wireless network is provided. In accordance with an aspect of the present invention, wireless network client(s) can automatically detect the “type” of a network (e.g., method of authentication and encryption) without requiring input from the user. For example, unencrypted network, WEP encrypted net work requiring a WEP key, WPA encrypted network requiring a pre-shared key, an IEEE 802.1x enabled net work supporting WPA anchor an IEEE 802.1x enabled network not supporting WPA. In accordance with an aspect of the present invention, a wireless network detection system having a connection component and a detection component is provided. The connection component facilitates connection of a client system to at least one of a plurality of wireless networks The detection component identities a type of an available wireless network. Identification can be based for example, upon information received in an information element and/or iterative probing of the wireless network beacon.12-30-2010
20110033052WIRELESS COMMUNICATION DEVICE, WIRELESS COMMUNICATION SYSTEM, AND NETWORK DEVICE - The wireless communication system 02-10-2011
20110135094SECRET DATA TRANSMISSION METHOD, SECRET DATA TRANSMISSION SYSTEM, AND SECRET DATA TRANSMISSION DEVICE - There is provided a secret data transmission method where a first device generates plural pieces of distributed data including data of a master key and transmits these by wireless communication to a second device and where the second device receives the plural pieces of distributed data and reconstructs the master key, wherein the first device arranges data obtained by performing an EXOR operation in sequence on plural pieces of random number data and the master key to generate secret data, generates a last piece of distributed data by performing an EXOR operation in sequence on the plural pieces of distributed data and the secret data, and transmits the plural pieces of distributed data to the second device, and the second device performs an EXOR operation in sequence on the plural pieces of distributed data to reconstruct the secret data, divides the reconstructed secret data, and performs an EXOR operation on the divided pieces of data to reconstruct the master key.06-09-2011
20100296654CONFIGURING A NETWORK CONNECTION - A communication system for accessing media items via a display device. A receiver is coupled to the display device and a transmitter is coupled to a computer system. Media items stored locally on the computer system and/or remotely on a remote server may be wirelessly transferred from the transmitter to the receiver for display on the display device. In addition, the transmitter and the receiver may be pre-paired prior to delivery to the user, allowing for the network to be configured without any user input. Advantageously, embodiments provide a user with the ability to conveniently view content stored on a computer or a web server without the user having to perform any wireless network setup procedures.11-25-2010
20120148046Secure Wireless Communication Using Rate-Adaptive Codes - Data are communicated in a wireless network between a transmitter to a receiver. The transmitter estimates a first channel response between the receiver and the transmitter at the transmitter, and generating a first key based on the first channel response. The data are encoded at the transmitter using a rate-adaptive code to produce encoded data, which is scrambling using the first key before broadcasting. Subsequently, the receiver can estimate a second channel response to generate a second key to be used to descramble the broadcast data.06-14-2012
20110096927METHOD AND APPARATUS FOR UPDATING AN AUTHORIZATION KEY IN A COMMUNICATION SYSTEM - Provided is an apparatus and method for updating an Authorization Key (AK) of a mobile station in an idle mode in a wireless communication system. A method for operating a mobile station in an idle mode to update an AK in a wireless communication system includes transmitting a first location update request to a base station, the first location update request including a request for updating an AK, receiving a response to the first location update request from the base station, the response to the first location update request including a NONCE_BS, wherein the NONCE_BS is a random number associated with the base station and used for updating the AK, generating a NONCE_MS, wherein the NONCE_MS is a random number used for updating the AK, generating the AK using the NONCE_BS and the NONCE_MS, transmitting a second location update request to the base station, the second location update request including the NONCE_BS and the NONCE_MS, receiving a response to the second location update request from the base station, the response to the second location update request including the NONCE_BS and the NONCE_MS, and confirming the AK based on the NONCE_BS and the NONCE_MS.04-28-2011
20110116633APPARATUS AND METHOD FOR DETERMINING UPLINK CIPHERING ACTIVATION TIME IN UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM USER EQUIPMENT - The details of an apparatus and method for determining uplink ciphering activation time in universal mobile telecommunications system user equipment are disclosed herein. The ciphering activation time is determined for radio bearers other than RB05-19-2011
20100166183OPTIMIZING SECURITY BITS IN A MEDIA ACCESS CONTROL (MAC) HEADER - A method of retrieving security information in a media access control (MAC) header by a wireless station may include receiving a data unit, such as a protocol data unit (PDU), from a remote wireless station. The PDU may include the MAC header. The method may also include reading two encryption key sequence (EKS) bits in the MAC header that denote both whether the data unit is encrypted and a position in an encryption key sequence for the data unit.07-01-2010
20110051932SYNCHRONIZING MANAGEMENT SIGNALING IN A NETWORK - A method includes receiving a communication from a management domain associated with managing a cellular communication network. The method also includes determining whether the communication corresponds to a polling signal from the management domain, and generating a first ping for transmission to a data center associated with managing virtual private networks (VPNs) in the cellular network in response to determining that the received signal corresponds to the polling signal. The method may further include generating a second ping for transmission via an encrypted path in the cellular communication network in response to determining that the received signal corresponds to the polling signal and that data is ready to be transmitted via the encrypted path. The first ping and the second ping may be used to ensure that cellular connections through the cellular communication network are operating properly.03-03-2011
20100067697ENCRYPTION IN A WIRELESS TELECOMMUNICATIONS - An example of the present invention is a method of transmitting encrypted user data to a mobile terminal in a wireless telecommunications network. The method comprises sending to the mobile terminal a data packet. The data packet comprises both an identifier of encryption information to used in recovering encrypted user data, and user data encrypted using said encryption information.03-18-2010
20100067698METHOD FOR SELECTIVELY ENCRYPTING CONTROL SIGNAL - Various methods and apparatus for encrypting signals in a wireless access system are disclosed. A method for selectively encrypting a management message in an MS includes steps of generating a Medium Access Control Protocol Data Unit (MAC PDU) including the selectively encrypted management message and an Fragmentation Extended Header (FEH) and transmitting the MAC PDU to the BS. The FEH includes indication information indicating whether the management message was encrypted.03-18-2010
20100260337Context-Free Protocol for Enforcing Data Forwarding in Wireless Ad Hoc Networks - Described herein is a context-free protocol (i.e., the COFFEE protocol) for stimulating cooperation among selfish nodes. Various embodiments have the ability to transmit a packet over the path successfully without the dependency on the information of other packets' transmissions. It is assumed that every node in the network is rational, and therefore during the packet forwarding stage, if the intermediate nodes can not clearly tell whether the packet is destined to them or not, they do not simply drop the packet. Thus, in the COFFEE protocol, by introducing several techniques, for a packet received by a node, the node thinks the packet could potentially be destined to itself and forwards the packet to find out the answer. Detailed analysis and performance evaluations have been conducted to demonstrate the effectiveness of the COFFEE protocol.10-14-2010
20110188657METHOD FOR CONNECTING WIRELESS COMMUNICATIONS, WIRELESS COMMUNICATIONS TERMINAL AND WIRELESS COMMUNICATIONS SYSTEM - A method for connecting wireless communications, a wireless communications terminal and a wireless communications system are provided. The method includes receiving a first signal including assumed configuration data; determining an availability of a wireless communications connection using the assumed configuration data; sending an association request message, if it is determined that the wireless communications connection is available; and receiving a second signal including connection configuration data, which is different from the assumed configuration data, in response to the association request message.08-04-2011
20090175447COMMUNICATION SYSTEM, WIRELESS COMMUNICATION APPARATUS, AND COMMUNICATION METHOD - In a communication system, a first wireless communication apparatuses belonging to a communication group receives a connection request frame including a notifying security level from a second communication apparatus outside of the communication group. The first communication apparatus stores a reference security level peculiar to the communication group, which is selected from security levels depending on one of encryption methods including non-encryption and encryption strengths. In the first communication apparatus, the notifying security level is compared with the reference level, and a response frame including one of a connect rejection and a connection permission is described, is generated and transferred to the second communication apparatus. The connect rejection represents a rejection of connection to the second communication apparatus and the connection permission represents a permission of connection to the second communication apparatus.07-09-2009
20100020975SYSTEM AND METHOD FOR ELECTRONIC DATA SECURITY - A method and related secure communications system. The method includes detecting, by a base station, a mobile device docked with the base station and in response to the detecting, generating at least one encryption key in the base station. The method also includes transmitting the encryption key to the mobile station by the base station while the mobile device is docked with the base station. The method also includes communicating encrypted data with the mobile station, the encrypted data corresponding to the encryption key.01-28-2010
20110216904METHOD AND APPARATUS FOR IMPROVED SECURE TRANSMISSION BETWEEN WIRELESS COMMUNICATION COMPONENTS - A method for transmitting secured data over a wireless communication network. The method includes transmitting a subframe. The subframe has a preamble, an initialization vector comprising an encrypting key and a burst wherein the burst is encrypted based on the initialization vector and wherein the burst further has a payload and a cyclic redundancy check. The method further includes providing a decrypting key wherein the decrypting key allows the burst to be decrypted.09-08-2011
20120308007METHOD AND SYSTEM FOR SECURITY PROCESSING DURING RRC CONNECTION RE-ESTABLISHMENT - This disclosure claims a method for security processing during RRC connection re-establishment, comprising: a UE sends an RRC connection re-establishment request message to the eNB; after receiving the request message, the eNB determines whether an original access layer security algorithm used by the UE is supported by the eNB itself according to the current status and configuration; if supported, the communication protection with UE is implemented via the original access layer security algorithm; if not supported, according to the security capability of UE, the access layer security algorithm which has the highest priority and is supported by the UE is selected from the access layer security algorithms configured by the eNB itself to be the new access layer security algorithm, and the communication protection between the eNB and the UE is implemented by the new access layer security algorithm. This disclosure also claims a system for security processing during the RRC connection re-establishment.12-06-2012
20110019824LOW POWER RADIOFREQUENCY (RF) COMMUNICATION SYSTEMS FOR SECURE WIRELESS PATCH INITIALIZATION AND METHODS OF USE - Provided herein is a wireless healthcare system comprising at least one sensor and a base unit adaptable to be in communication with the sensor. The sensor can be is adaptable to communicate with the base unit at a first power during formation of a communication link and is further adaptable to communicate with the base unit at a second power after the communication link has been formed, and wherein the sensor and base unit are components of a wireless healthcare system. The sensor can be a patch adaptable to be positioned on the surface of a patient. Further provided herein is a method of using the wireless healthcare system and kit.01-27-2011
20090136035Public key infrastructure-based bluetooth smart-key system and operating method thereof - A public key infrastructure (PKI)-based Bluetooth smart-key system and operating method thereof. The system includes a locking device and a mobile communication terminal. The locking device enables Bluetooth communication and enables PKI-based data transmission. The mobile communication terminal embedded with a Bluetooth module performs a remote unlocking or keyless entry function through Bluetooth communication with the locking device.05-28-2009
20120148045SYSTEM FOR THE CONTROLLED DATA EXCHANGE BETWEEN AT LEAST TWO DATA CARRIERS VIA MOBILE READ-WRITE MEMORIES - The present invention relates to a data transmission system (06-14-2012
20110150222PORTABLE ELECTRONIC DEVICE AND ASSOCIATED METHOD FOR MAKING INFORMATION AVAILABLE - A portable electronic device includes at least one near-field or medium-field wireless communication interface (06-23-2011
20110305340AUTOMATIC DATA ENCRYPTION AND ACCESS CONTROL BASED ON BLUETOOTH DEVICE PROXIMITY - A method, apparatus, and system for using Bluetooth devices to secure sensitive data on other Bluetooth devices is described. A Bluetooth device is paired with a “trusted” Bluetooth device. When contact with the trusted device is lost, designated sensitive data on the secured Bluetooth device is automatically encrypted. When contact is restored, the data is automatically decrypted. In an alternate embodiment, a secured device can be associated with multiple trusted devices, and the secured device designate different sensitive data for each trusted device. In this way, multiple users can share a common, “public” Bluetooth device without concern that the other users will access their sensitive data on the device when the device is not being used by that user.12-15-2011
20110305338METHOD AND SYSTEM FOR SECURE PROVISIONING OF A WIRELESS DEVICE - A method and system for enabling one or more communication services on a wireless device are provided. The method comprises: sending a request for provisioning information from a carrier provisioning system to a device developer provisioning system; receiving, from the device developer provisioning system, secure provisioning information corresponding to the request; and sending the secure provisioning information corresponding to the request from the carrier provisioning system to the wireless device.12-15-2011
20090232308SYSTEM AND METHOD FOR SCRAMBLING WIRELESS SIGNALS USING A SECURE TIME VALUE - According to one embodiment, the invention is directed to a method for securing communications with an electronic device. The method comprises obtaining a dynamic, non-repeating value from internal logic within a remote control. Thereafter, information including the non-repeating value is encrypted to produce an encrypted value, which is transmitted along with a radio frequency (RF) command from the remote control in order to restrict wireless control of the electronic device.09-17-2009
20120039472METHOD AND DEVICE FOR ESTABLISHING A SECURITY MECHANISM FOR AN AIR INTERFACE LINK - A method, a device, and a system for establishing a security mechanism for an air interface are provided in embodiments of the present invention. The method includes: performing security processing for a shared key of an access link according to a shared key between a relay node and a mobility management entity; and sending the shared key of the access link after the security processing to the relay node to enable the relay node to obtain the shared key of the access link based on the shared key between the relay node and the mobility management entity. The present invention reduces the possibility at which the air interface link is hacked, thereby improving the security of the air interface link.02-16-2012
20120039471EFFICIENT SECURITY-RELATED PROCESSING - An efficient security related procedure is disclosed. A plurality of service data units (SDUs) having the same priority is multiplexed to one unit signal. The unit signal is ciphered using a mask generated by a first parameter combination. The receiver simultaneously deciphers the multiplexed service data units (SDUs), such that a Layer-02-16-2012
20120039470Method and Device for Establishing a Communication Session - Devices are provided with secret information to indicate which other devices are eligible to establish communication sessions. Information leaks about the eligibility of devices are prevented when no communication sessions are established. Each device makes a set of preference information items publicly available. Each preference information item selects an eligible device in cloaked way. Each protected information item contains protected information such as an encrypted random number that can be decrypted only by the eligible device. When a request to establish a communication is processed by a first and second device, the first and second device indicate which of their preference information items should be used. The devices then each attempt to decrypt the protected information from the other one's indicated preference information item and each combines the result with the protected information used to make the preference information item that it indicated to the other. The results from the first and second device are compared and when a match is detected, establishment of the communication session is enabled. If no match is detected a first device that did not make the second device eligible is unable to detect whether it was made eligible by the second device.02-16-2012
20120121089INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, OPERATION TERMINAL, AND INFORMATION PROCESSING SYSTEM - Provided is an information processing apparatus including a security level determination section which determines a security level at a time of transmitting a key to an operation terminal, as a transmission security level, a transmission power determination section which determines a transmission power in accordance with the transmission security level and a key-dividing number included in a key transmission request, a key acquisition section which acquires each key fragment by dividing the key into the key-dividing number, and a transmission section which transmits the each key fragment acquired by the key acquisition section using the transmission power determined by the transmission power determination section, via a wireless signal to the operation terminal.05-17-2012
20130010960Methods to Improve Bluetooth Low Energy Performance - An expanded sequence number is added to PDUs in a Bluetooth® low energy system. The expanded sequence number provides more accurate identification of the PDUs and allows the system to avoid delaying transmission of PDUs while retransmitting other PDUs. A PDU security sequence number may also be added to the PDUs. The security sequence number is used to create a unique nonce for use in encrypting or decrypting and authenticating the PDU. Using the security sequence number, a failed connection can be reestablished between two devices without the need of generating an encryption key. The security sequence number allows the devices to perform encryption or decryption and authentication using an existing key and a nonce generated from the security sequence number.01-10-2013
20130010961COMMUNICATION TERMINAL, CONTROL DEVICE, AND BASE STATION - A transmitting side UE01-10-2013
20130010958METHODS AND APPARATUSES FOR ADMINISTRATOR-DRIVEN PROFILE UPDATE - Apparatuses and methods for security profile update are presented. In one embodiment, the method comprises determining the version of a security profile associated with a wireless client and determining whether a new security profile exists. The method includes calculating a one-time password based at least on a random character table and some image areas within an image. The method further includes generating an encrypted version of the new security profile by using a first part of the one-time password as an encryption key and sending to the wireless client a profile update request.01-10-2013
20090279701CONTROLLING ACCESS NODES WITH NETWORK TRANSPORT DEVICES WITHIN WIRELESS MOBILE NETWORKS - A network controls provision of access functionality by an access node to provide a network service to a subscriber device. For example, the network device may control the queuing and forwarding of packets by the access node to facilitate packet transmission according to, for example, a Quality of Service class. The network device may send control messages to the access node to dynamically configure a control object stored by the access node, such as a Quality of Service profile. The network device may be a router, and the access node may be a base station that wireless communicates with a subscriber device, e.g., a cellular phone. The access node may then delivery the packets in accordance with the dynamically configured control object.11-12-2009
20110317839INFORMATION PROCESSING DEVICE AND METHOD, PROGRAM, AND INFORMATION PROCESSING SYSTEM - An information processing device which shares data with one or more communication partners includes a creation unit which creates its own encryption key that the device uses for itself and encryption keys that the communication partners use, a first communication unit which transmits all the encryption keys created by the creation unit to the communication partners with the first communication, a division unit which divides the data, an encryption unit which encrypts its own data that the device is to save for itself among the data divided by the division unit with its own encryption key, a second communication unit which transmits other data that the communication partners are to save among the data divided by the division unit to the communication partners with the second communication, and a storage unit which stores its own data encrypted by the encryption unit and the other encryption keys.12-29-2011
20120045058APPARATUS AND METHOD FOR AUTHENTICATION FOR MOTOR VEHICLES - An arrangement on monitoring of authentication, in particular for motor vehicles, includes a first communication apparatus and at least a second communication apparatus, between which a wireless communication channel can be set up. The communication apparatus items have means for authentication and encryption, with which the exchangeable data may be encrypted via the communication channel. The items of communication apparatus have storage means in which one of the digital keys usable for authentication and encryption can be stored, and in that in the storage device there is either in addition to the digital key and/or in the individual key at least one piece of information regarding at least one past communication between the first communication apparatus and the second apparatus that can be stored in memory.02-23-2012
20120002816Method and system for realizing secure forking call session in IP multimedia subsystem - The present invention relates to a method for realizing a secure forking call session, which comprises: performing authentication between a calling party and a KMS or between each called party and the KMS, and acquiring a shared key between the calling party and the KMS or a shared key between each called party and the KMS; generating a random number by the calling party and calling each called party through an IMS; generating a random number by each called party and acquiring a media root key from the KMS; generating a media key, which is shared with the calling party, by each called party according to the media root key and the random number generated by the called party; sending the media root key and the generated random number by a called response party in the called parties, who responds the call, to the calling party through the IMS network; generating a media key identical to that of the called response party by the calling party according to the media root key and the random number generated by the called response party; and performing a secure media session between the calling party and the called response party with the identical media key.01-05-2012
20120002814VPN NETWORK CLIENT FOR MOBILE DEVICE HAVING DYNAMICALLY CONSTRUCTED DISPLAY FOR NATIVE ACCESS TO WEB MAIL - An integrated, multi-service network client for cellular mobile devices is described. The multi-service network client can be deployed as a single software package on cellular mobile network devices to provide integrated services including secure enterprise virtual private network (VPN) connectivity, acceleration, security management including monitored and enforced endpoint compliance, and collaboration services. The VPN network client is programmed to receive a web-based home page from an enterprise VPN appliance, process the web-based home page to identify a bookmark embedded within the response that corresponds to an enterprise webmail for the user and dynamically construct a user interface to have an input control native to the cellular mobile device for launching a native email client of the cellular mobile device to access the email without launching a web browser.01-05-2012
20080205649Power distribution system secure access communication system and method - A power distribution system may have source, switching and load components, wherein at least one of the source, switching and load components has a wireless communication capability such that it is operable to act as a wireless communication access point. A mobile station seeking to associate with the one component may use a secure access protocol to gain such access. The secure access protocol may provide for receiving at the one component a management message from the mobile station. From the management message the component may obtain mobile identification information used to verify the identity of the mobile station and to initiate communication by sending an association message. Until after successful verification of the mobile station identity the component remains radio silent.08-28-2008
20120207304METHOD AND APPARATUS FOR ENCRYPTING DATA IN A WIRELESS COMMUNICATION SYSTEM - In a communications system, a method of transforming a set of message signals representing a message comprising the steps of first encoding one of the set of message signals in accordance with a first keyed transformation, a second encoding of the one of the set of message signals in accordance with at least one additional keyed transformation, a third encoding of the one of the set of message signals in accordance with a self inverting transformation in which at least one of the set of message signals is altered, a fourth encoding of the one of the set of message signals in accordance with at least one additional inverse keyed transformation wherein each of the at least one additional inverse keyed transformation is a corresponding inverse of at least one additional keyed transformation, and fifth encoding the one of the set of message signals in accordance with first inverse keyed transformation wherein the first inverse keyed transformation is the inverse of the first keyed transformation.08-16-2012
20120177199METHOD AND APPARATUS FOR ENCRYPTING SHORT DATA IN A WIRELESS COMMUNICATION SYSTEM - A method and apparatus is capable of encrypting short data in a wireless communication system When a terminal generates a short data burst in idle mode, the apparatus generates a Traffic Encryption Key (TEK) using a Cipher-based Message Authentication Code (CMAC)-TEK prekey derived from an Authorization Key (AK) related to Security Association (SA) between the terminal and a Base Station (BS). A nonce is constructed with a Packet Number (PN) identical to an uplink CMAC PN (CMAC-PN_U) transmitted together with a Ranging Request (RNG-REQ) message carrying the short data burst The short data burst is encrypted using the TEK and the nonce. A Medium Access Control (MAC) Protocol Data Unit (PDU) is generated by attaching a MAC header and a CMAC digest for integrity protection to the RNG-REQ message carrying the encrypted short data burst. The MAC PDU is transmitted to the BS.07-12-2012
20120008783SECURE CONFIGURATION OF A WIRELESS SENSOR NETWORK - A method for secure configuration of a sensor system involves identifying a new sensor not activated within the sensor system, the new sensor including a new sensor identifier, establishing a first transmission link between the new sensor and a sensor controller, transmitting the new sensor identifier between the sensor and the sensor controller, generating a key pair for the sensor controller, the key pair including a controller public key and a controller private key, generating a key pair for the new sensor, the key pair including a sensor public key and a sensor private key, transmitting the controller public key to the new sensor and the sensor public key to the sensor controller, and generating a pairwise key within the sensor controller and the new sensor.01-12-2012
20120057705TWO-WAY AUTHENTICATION BETWEEN TWO COMMUNICATION ENDPOINTS USING A ONE-WAY OUT-OF-BAND (OOB) CHANNEL - Techniques for two-way authentication between two communication endpoints (e.g., two devices) using a one-way out-of-band (OOB) channel are presented. Here, in embodiments, both communication endpoints may be securely authenticated as long as the one-way OOB channel is tamper-proof. Embodiments of the invention do not require the one-way OOB channel to be private to ensure that both endpoints are securely authenticated. Since providing a two-way or private OOB channel adds to the cost of a platform, embodiments of the invention provide for a simple and secure method for two-way authentication that uses only a non-private one-way OOB channel and thus helping to reduce platform cost. Other embodiments may be described and claimed.03-08-2012
20120057704System and Method for Providing Security in a Wireless Communications System - A system and method for providing security in a wireless communications system are provided. A method for device operations includes generating a security key from an initial key, producing secured information by applying the security key to radio resource allocation information, and transmitting the secured information to the communications device. The radio resource allocation information comprises a location of radio resource allocated to a communications device.03-08-2012
20120063598BLUETOOTH.RTM. DEVICE AND METHOD OF CONNECTING BLUETOOTH.RTM. DEVICES USING A BLUETOOTH.RTM. CHANNEL - Provided are a method of connecting BLUETOOTH® devices using a single BLUETOOTH® channel and a BLUETOOTH® device using the method. A public key may be exchanged via a predefined single BLUETOOTH® channel, thereby preventing a Man-in-the-middle (MITM) attack. For example, when an MITM attacker intercepts the public key and attempts to perform an attack on the other BLUETOOTH® devices, other BLUETOOTH® devices may also receive the public key via the single BLUETOOTH® channel. Accordingly, the other BLUETOOTH® devices may recognize that the MITM attacker attempts to carry out the MITM attack using a disguised address.03-15-2012
20110096928Wireless Communication Base Station Device, Wireless Communication Mobile Station Device, and Method for Scrambling Response Signal in ARQ - A wireless communication base station device which does not fail in ARQ control even when a mobile station fails to receive allocation information and collision of the uplink data transmitted from mobile stations occurs. In the device, a CRC unit (04-28-2011
20120300934ARRANGING DATA CIPHERING IN A WIRELESS TELECOMMUNICATION SYSTEM - Arranging data ciphering in a telecommunication system comprising at least one wireless terminal, a wireless local area network and a public land mobile network. At least one first ciphering key according to the mobile network is calculated in the mobile network and in the terminal for a terminal identifier using a specific secret key for the identifier. Data transmission between the mobile network and the terminal is carried out through the wireless local area network. A second ciphering key is calculated in the terminal and in the mobile network using said at least one first ciphering key. The second ciphering key is sent from the mobile network to the wireless local area network. The data between the terminal and the network is ciphered using said second ciphering key.11-29-2012
20120300933SYSTEM AND METHOD FOR ENHANCED RFID INSTRUMENT SECURITY - A system and method for using an RFID read/write device to secure an RFID operable instrument or an RF communication is provided. The invention includes security databases in communication with a processor for storing and communicating security protocols to the RFID read/write device. The invention includes a method for restricting the unauthorized use of an RFID read/write device. The invention includes a subscription service for communicating user credentials to a certificate authority to obtain a counter security protocol. The invention also includes decrypting information stored on an RF operable device or transmitted via radio-frequency using counter security protocols.11-29-2012
20120300932Systems and Methods for Encrypting Mobile Device Communications - Embodiments of the invention can provide systems and methods for encrypting mobile device communications. According to one example embodiment of the invention, a method for encrypting mobile device communications is provided. The method can include generating, by a first application stored on a first memory of a mobile device, a message to be communicated to an intended recipient; providing, by the first application to an authentication application stored on a second memory of the mobile device, the message; encrypting, by the authentication application, the message; providing, by the authentication application to the first application, the encrypted message; and directing, by the first application, communication of the message to the intended recipient.11-29-2012
20120155644METHOD TO MAINTAIN END-TO-END ENCRYPTED CALLS THROUGH A TETRA TMO-DMO GATEWAY WHEN USING SUPER GROUPS - A method for communicating end-to-end encrypted super group information is provided. Temporary address data, which identifies a temporary address on which the super group is to communicate, is transmitted from a gateway to a back-to-back communications device using a direct mode or data message. The back-to-back communications device retrieves an encryption key associated with the temporary address and uses the encryption key to decrypt super group information sent from a networked communications device on the temporary address. The back-to-back communications reverts back to its original encryption key when super group communications are terminated.06-21-2012
20120155643SECURE PROTOCOL FOR PEER-TO-PEER NETWORK - A wireless computing device operating as a controller of a peer-to-peer group configured to generate unique master keys for each device joining the group. The wireless computing device may use the unique master keys to selectively remove remote devices from the group such that the remote device cannot later rejoin the group. Other remote devices, each possessing a master key that remains valid, can disconnect from the group and later reconnect to the group without express user action. To support such behavior, the wireless device may provide a user interface through which a user may manage connected remote devices by providing commands to selectively disconnect or remove remote devices from the group.06-21-2012
20110103586System, Method and Device To Authenticate Relationships By Electronic Means - The present invention is in the Information Technology field, specifically in the authentication of systems' users by using wireless remote communication technologies and refers to a system, a method, and a device capable of authenticating users and providers of centralized services, safely and reciprocally. More specifically, the invention's field of application is that of methods of management of people authenticating processes, in their relationships through digital electronic means.05-05-2011
20110103585Mobile Content Magnet - Methods and apparatus for a Mobile Content Magnet are disclosed. One embodiment of the present invention is a miniature electronic device, which functions as a fully-powered personal computer, which stores digital files and content, and which communicates wirelessly with external input and output devices and a network such as the Internet. In one embodiment, the present invention may be carried in a pocket or purse, clipped on a belt or incorporated into a pair of glasses. In another embodiment, the Mobile Content Magnet is configured to receive an automatic stream of digital content over a wireless connection from a remote server which functions as a content aggregator. The content which is automatically pushed to the user is either directly chosen by the user, or may be suggested by software running on the remote server that seeks and identifies additional content using keyword or relevance searches.05-05-2011
20100091992ADDING RANDOMNESS INTERNALLY TO A WIRELESS MOBILE COMMUNICATION DEVICE - A mobile communication device is provided with an integral transducer used to refresh a random data pool without connection to an external source of new random data.04-15-2010
20100290621TUNNELING SUPPORT FOR MOBILE IP USING A KEY FOR FLOW IDENTIFICATION - In a network that supports mobility of a mobile node, a tunnel between a first mobility node and a second mobility node is established in the network. The established tunnel is according to a tunneling protocol (e.g., Generic Routing Encapsulation tunneling protocol) that uses at least one key (11-18-2010
20120314867ENCRYPTED COMMUNICATION SYSTEM, TRANSMITTER AND RECEIVER USING SAME - High-security communications against information leakage as well as high-speed communications are realized using present optical fiber networks. The methods are as follows: (1) A seed key is shared between a transmitter and a receiver in advance. Random numbers are transmitted using carrier light accompanied by fluctuations and bases that are decided by random numbers. The transmitter and receiver compare a shared basis that is determined by the seed key with the random basis, and decompose the random numbers superimposed on each bit into two sequences, based on whether the shared basis coincides with the random basis or not. Error correction is processed for each sequence in the receiver, and then the random numbers are shared between the transmitter and the receiver. (2) The amount of the random numbers shared between the transmitter and the receiver is reduced to secret capacity through privacy amplification, and the resultant random numbers are used as a secret key. (3) Real data are encrypted with the obtained secret key, and they are transmitted and received.12-13-2012
20100246824APPARATUS AND METHOD FOR VIRTUAL PAIRING USING AN EXISTING WIRELESS CONNECTION KEY - Disclosed is a method for virtual pairing of a first peer device with a second peer device. In the method, a nonce is generated at the first peer device for use in virtually pairing the first and second peer devices to establish a first-type wireless connection. The nonce is forwarded from the first peer device to the second peer device over an already established second-type wireless connection between the first and second peer devices. At least one new key is generated from the nonce and a shared key for the already established second-type wireless connection. The first peer device is virtually paired with the second peer device using the at least one new key to establish the first-type wireless connection between the first and second peer devices.09-30-2010
20100246825WIRELESS COMMUNICATION METHOD AND SYSTEM FOR TRANSMISSION AUTHENTICATION AT THE PHYSICAL LAYER - The subject authentication scheme encompasses a large family of authentication systems which may be built over existing transmission systems. By superimposing a carefully designed secret modulation on the waveforms, authentication is added to the signal without requiring additional bandwidth. The authentication information (tag signal) is sent concurrently with data (message signal). The authentication is designed to be stealthy to the uninformed user, robust to interference, and secure for identity verification. The tradeoffs between these three goals are identified and analyzed. The use of the authentication for channel estimation is also considered, and improved bit errors are demonstrated for time-varying channels. With a long enough authentication code word an authentication system is achieved with very slight data degradation. Additionally, by treating the authentication tag as a sequence of pilot symbols, the data recovery may be improved by the aware receiver.09-30-2010
20100246823APPARATUS AND METHOD FOR ADDRESS PRIVACY PROTECTION IN RECEIVER ORIENTED CHANNELS - Disclosed is a method for address privacy protection for a first wireless device sharing a privacy key with a second wireless device. In the method, a first resolution tag is generated at the first wireless device using a pseudo-random function with the seed value and the privacy key as input arguments. The privacy key is only known to the first and second wireless devices. A privacy address is generated for the first wireless device based on the seed value and the first resolution tag. A packet is transmitted from the first wireless device to the second wireless device. The packet includes the privacy address and the first resolution tag.09-30-2010
20120128158SYSTEM AND METHOD FOR PROVIDING VARIABLE SECURITY LEVEL IN A WIRELESS COMMUNICATION SYSTEM - A system and method for providing variable security levels in a wireless communication network. The present invention optimizes the often conflicting demands of highly secure wireless communications and high speed wireless communications. According to a preferred embodiment of the present invention, various security sensors are scanned to determine the likely presence of an intruder within a predetermined trust zone. If an intruder is likely present, the security level is changed to the highest setting, and consequently a lower data rate, while the intruder is identified. If the identified intruder is in fact a trusted node, the security level is returned to a lower setting. If the identified intruder is not a trusted node, the security level is maintained at an elevated state while the intruder is within the trust zone.05-24-2012
20120128157AUTHENTICATION OF AN RFID TAG USING AN ASYMMETRIC CRYPTOGRAPHY METHOD - A method for the authentication of an RFID tag uses an asymmetric cryptography method which ensures protection against the recycling of authentication RFID tags and needs no deactivation of the corresponding RFID tag for this purpose. To this end, the certificate of an RFID tag to be checked is not stored on the RFID tag but is stored physically separately from the RFID tag. Firstly, the RFID reader reads the certificate of the RFID tag to be checked before the challenge-response protocol is carried out successfully with the RFID tag to be checked. Consequently, an RFID tag can be reused for authentication only when the certificate relating to this RFID tag is known.05-24-2012
20120128156CROSS-COMPONENT CRYPTOGRAPHIC MESSAGE SYNTAX MESSAGE CONSTRUCTION - Often, for reasons of wireless bandwidth conservation, incomplete messages are provided to wireless messaging devices. Employing cryptography, for confidentiality or authentication purposes, when including a received message that has been incompletely received can lead to lack of context on the receiver's end. By automatically obtaining the entirety of the message to be included, an outgoing message that includes the received message can be processed in a manner that securely and accurately represents the intended outgoing message. Alternatively, a server can assemble a composite message from a new message and an original message and, in cooperation with a wireless messaging device, construct a cryptographic message syntax message.05-24-2012
20120163601Method for Handling Ciphering Keys in a Mobile Station - Techniques for handling ciphering keys in a mobile station comprising a mobile equipment (ME) and a Universal Subscriber Identity Module (USIM) are disclosed. An example method includes obtaining a UMTS cipher key (CK), integrity key (IK), and ciphering key sequence number (CKSN) from the USIM, deriving a 128-bit ciphering key (Kc-128) from the CK and the IK, and storing the Kc-128 and the CKSN on the mobile equipment, separate from the USIM. The stored CKSN is associated with the stored Kc-128, so that the Kc-128's correspondence to the most current UMTS security context can be tracked. This example method applies to the generation and storage of a 128-bit ciphering key for either the packet-switched or circuit-switched domains. A corresponding user equipment apparatus is also disclosed.06-28-2012
20120163599WIRELESS COMMUNICATION SYSTEM AND METHOD - A method of commissioning wireless network devices in a communication network includes assigning a user-defined number to a wireless network device. The method further includes generating, by the wireless network device, an identification number based on the user-defined number using a first hashing algorithm, generating, by the wireless network device, an encryption key based on the user-defined number using a second hashing algorithm, and transmitting, by the wireless network device, a message that is encrypted using the encryption key for joining the wireless network device to the communication network. The user-defined number is to be provided by a user using an input device that is coupled to, or integral to, the wireless network device.06-28-2012
20120213366Aggregate Signature Schemes - An authenticated RFID system is provided that uses elliptic curve cryptography (ECC) to reduce the signature size and read/write times when compared to traditional public key implementations such as RSA. Either ECDSA or ECPVS can be used to reduce the signature size and ECPVS can be used to hide a portion of the RFID tag that contains sensitive product identifying information. As a result, smaller tags can be used or multiple signatures can be written at different stages in a manufacturing or supply chain. A key management system is used to distribute the verification keys and aggregate signature schemes are also provided for adding multiple signatures to the RFID tags, for example in a supply chain.08-23-2012
20120213368AUTHENTICATION AND DATA INTEGRITY PROTECTION OF A TOKEN - In deriving a cryptographic key from the response message in a challenge-response message in a challenge-response authentication, the related response is calculated after receiving a challenge message which has not yet been transferred. A cryptographic key is derived from the response, which is used to determine a cryptographic check sum of data. The cryptographic check sum is transferred in a first time period after receiving the challenge message. The response message is transferred during a later, second time period. The duration of validity of the key derived from the response message ends before the response message is transferred. A theoretical attacker who can overhear and manipulate the communication will not know the response message until a point in time when the cryptographic key which can be derived therefrom is already no longer valid.08-23-2012
20120213367METHOD AND SYSTEM FOR PROVIDING CONTENT TO A CONTENT DISTRIBUTION SYSTEM SUITABLE FOR A MULTIPLE DWELLING UNIT USING AN ENCRYPTION - A communication system includes a head end. The head end communicates with a system gateway. A plurality of user devices is coupled to the gateway. The gateway receives the plurality of first encrypted signals, decrypts the plurality of first encrypted signals to form unencrypted signals and encrypts the unencrypted signals with a second encryption to form a plurality of second encrypted signals and communicates the second encrypted signals to the plurality of user devices. The signals may also be super-encrypted signals. That is, rather than un-encrypting at the gateway, the first encrypted signals may be again encrypted.08-23-2012
20120213365SYSTEM AND METHOD FOR PROCESSING ATTACHMENTS TO MESSAGES SENT TO A MOBILE DEVICE - A system and method for processing attachments to messages sent to a mobile device is described herein. Embodiments described herein apply to encrypted messages comprising multiple message parts, in which different encryption keys (e.g. session keys) have been used to encrypt the different message parts. In at least one example embodiment, the encrypted session keys for every message content part comprising an attachment is received at the mobile device. In one embodiment, all of the encrypted session keys are stored together in a main message header. The mobile device may then decrypt the encrypted session key associated with a user requested attachment, and transmits the decrypted session key to one or more remote servers in an attachment request for use in decrypting the requested attachment. Data associated with the requested attachment, in decrypted form, is returned to the mobile device.08-23-2012
20120314866Method and Device for Data Processing in a Wireless Network - A method and a device for data processing in a wireless network are provided, wherein a direct connection between two mobile terminals is set up based on a seed information provided by the wireless network. Furthermore, a communication system is suggested including at least one such device.12-13-2012
20120170746Method, Network Element, and Mobile Station for Negotiating Encryption Algorithms - A method, network element, and mobile station (MS) are disclosed. The method includes: obtaining information that a plug-in card of the MS does not support a first encryption algorithm; deleting the first encryption algorithm from an encryption algorithm list permitted by a core network element according to the information that the plug-in card of the MS does not support the first encryption algorithm; sending the encryption algorithm list excluding the first encryption algorithm to an access network element, so that the access network element selects an encryption algorithm according to the encryption algorithm list excluding the first encryption algorithm and the MS capability information sent from the MS and sends the selected encryption algorithm to the MS. By using the method, network element, and MS, errors due to the fact that the plug-in card of the MS does not support an encryption algorithm may be avoided during the encryption process.07-05-2012
20120170747METHOD AND SYSTEM FOR PROTECTING BROADCAST SERVICE/CONTENT IN A MOBILE BROADCAST SYSTEM, AND METHOD FOR GENERATING SHORT TERM KEY MESSAGE THREFOR - A system and method are provided for generating a Short Term Key Message (STKM) for protection of a broadcast service being broadcasted to a terminal in a mobile broadcast system. The method includes transmitting, by a Broadcast Service Subscription Management (BSM) for managing subscription information, at least one key information for authentication of the broadcast service to a Broadcast Service Distribution/Adaptation (BSD/A) for transmitting the broadcast service, generating, by the BSD/A, a Traffic Encryption Key (TEK) for deciphering of the broadcast service in the terminal and inserting the TEK into a partially created STKM, and performing, by the BSD/A, Message Authentication Code (MAC) processing on the TEK-inserted STKM using the at least one key information, thereby generating a completed STKM.07-05-2012
20120170745Method and device for encrypting user identity during paging procedure - The disclosure discloses a method and device for encrypting a subscriber identity during a paging procedure, which are particularly adapted to the paging performed by an MME using an IMSI. The method includes: A, using a key generated by the subscriber identity of the called UE to encrypt data Y which is obtained on the basis of the subscriber identity, then performing paging using a cipher text; and B, after the called UE receives the paging, determining by the called UE whether the cipher text is included, and if the cipher text is included, regarding itself as the called UE. In the first preferred embodiment, the data Y is the subscriber identity; in the second preferred embodiment, the data Y is the data combined by the subscriber identity and the random data X, and the random data X is sent along with the cipher text during the paging; in the third preferred embodiment, the data Y is the data combined by the subscriber identity and the random data Z, and the data Y contains the subscriber identity at a specific location, when receiving the paging, the UE performs decryption using the subscriber identity and determines whether the decrypted plaintext contains the subscriber identity at a location the same as the specific location to determine whether the paging is for itself.07-05-2012
20120076303INTERCEPT ACCESS POINT FOR COMMUNICATIONS WITHIN LOCAL BREAKOUTS - Embodiments of the present disclosure provide for the capability within a gateway to dynamically monitor communications and protocols from a targeted user in a local breakout. A gateway product with this capability thus performs the function of an intercept access point (IAP). Communications to and from the targeted user are directed through the gateway and are intercepted in a manner not visible to the targeted user.03-29-2012
20120314865NFC Communications Device for Setting Up Encrypted Email Communication - NFC communication is utilized to provide methods, apparatus and systems for increasing the security of cryptographic keys and cryptographic processes. For the encryption and decryption of a message, public key cryptography requires the use of a pair of keys, i.e., the public key and the private key. Various embodiments of the present invention provide storage of information needed for one or more aspects of encrypting and/or decrypting messages, wherein that information is made available through an NFC communications interface. An NFC-enabled device is brought into physical proximity with a computational platform that is executing, or otherwise providing access to, an email client. Once the NFC-enabled device and the computational platform are within NFC communication range of each other, transfer of information needed to set up an encryption and/or decryption process takes place. Since the encryption/decryption keys and/or related cryptographic process parameters are not stored on the computational platform the security of this information is improved. In some embodiments the encrypted communication is encrypted email, or PUP encrypted email.12-13-2012
20120177198SECURE AIRCRAFT DATA CHANNEL COMMUNICATION FOR AIRCRAFT OPERATIONS - According to the application, a method for transmitting an encrypted aircraft related message is disclosed. A message is provided at one of a ground computer system or an aircraft computer system. The aircraft related message is arranged into data packets and at least one of the data packets is encrypted with an encryption key to obtain at least one encrypted data packet. The at least one encrypted data packet is transmitted from a sender to a recipient, wherein the sender is one of the ground computer system or the aircraft computer system, the recipient is the other one of the ground computer system or the aircraft computer system. The at least one encrypted data packet is received by a computer system of the recipient. A step of deciding whether the message is intended for the recipient's computer system is provided. The step of deciding comprises an attempt to decrypt the at least one encrypted data packet with an decryption key, and the decryption attempt comprises analyzing of the message content. If it is decided that the decryption that the message is intended for the recipient, a step of processing the decrypted data message by the recipient's computer system is provided.07-12-2012
20080205648APPARATUS, AND ASSOCIATED METHOD FOR LENGTHENING DATA COMMUNICATED IN A RADIO COMMUNICATION SYSTEM WITH PADDING BYTES - Apparatus, and an associated method, for facilitating transmission of block-formatted data by an EDGE-capable mobile station. When the mobile station is instructed to use an MCS-8 modulation coding scheme, in initial transmission of the data, the mobile station determines the amount of data that is to be transmitted. If only a single RLC block is to be transmitted at MCS-8, MCS-6 is instead utilized. And, padding bytes are added to the MCS-6 data blocks.08-28-2008
20100272263DECRYPTING A NAS MESSAGE TRACED TO AN E-UTRAN - A system and method for decrypting a Non-Access Stratum (NAS) message traced in an Evolved Universal Terrestrial Radio Access Network (E-UTRAN) includes a first step (10-28-2010
20100272262Systems and methods for broadcast communication and interface with assets and datasets - The present subject matter relates generally to a notification system adapted to provide real-time wireless notification of a change in condition or state of an asset or data set. More specifically, the present invention relates to a global communication and interface network for instantaneous transmission of information for tracking, monitoring, managing, and interfacing with assets and datasets. Still further, the present invention relates to broadcast communication of a change in condition or state of an asset or data set. In addition, the present invention relates to encrypted broadcast communication.10-28-2010
20100020974COMMUNICATION SYSTEM AND METHOD THEREOF - A communication system for transmitting data of a first mobile station to a second mobile station includes a base station and a relay device. The base station is utilized for configuring an uplink and a downlink of the data to correspond to a first connection ID and a second connection ID respectively and for transmitting a traffic encryption key to the first and second mobile stations so that the first and second mobile stations share the traffic encryption key. The relay device is coupled to the base station and the first and second mobile stations via wireless communication, and utilized for receiving the data encrypted by the traffic encryption key and transferring the data of the first mobile station to the second mobile station according to the first and second connection IDs without going via the base station.01-28-2010
20120314864Broadcast Replenishment of Account Parameters for Groups of Wireless Devices - A system and method are provided for the broadcast replenishment of account parameters for select groups of wireless devices, where select groups of wireless devices have their internally-stored account parameters (e.g., prepaid amount of usage authorization) simultaneously updated as a group by a single broadcast message, such as an encrypted SMS message. An account update message is generated based on the account parameters to be updated and encrypted using an encryption key uniquely associated with the select group of wireless devices. The encrypted account update message is broadcast for receipt by the select group of wireless devices, such only those wireless devices previously provided with a key for decryption can receive and decrypt the broadcast account update message. The wireless devices use information and/or instructions in the broadcast message in order to update their internally stored account parameters accordingly.12-13-2012
20080310634GENERATION OF DEVICE DEPENDENT RSA KEY - A portable electronic device for exchanging encrypted data with other electronic devices includes a processor, a memory operatively coupled to the processor, and a prime number generation circuit operatively coupled to the processor and memory. The prime number generation circuit includes logic that generates at least two prime numbers based on unique data stored in the electronic device, wherein said at least two prime numbers are always the same at least two prime numbers. The generated prime numbers then can be used to generate RSA public and private keys within the electronic device.12-18-2008
20120189124Methods and Devices for Establishing Security Associations and Performing Handoff Authentication in Communications Systems - A method of providing secure communications between a base station, a relay station, and a mobile station in a communication network includes receiving, by the relay station, an unsolicited security key from the base station; receiving, by the relay station, a signaling message from the mobile station; and authenticating, by the relay station, the mobile station using the security key. A method of providing secure communications between a base station, a relay station, and a mobile station in a communication network includes receiving, by the relay station, a signaling message from the mobile station; transmitting, by the relay station, subsequent to receiving the signaling message, a security key request to the base station; receiving, by the relay station, a security key from the base station in response to the previously sent security key request; and authenticating, by the relay station, the mobile station using the received security key.07-26-2012
20120189125METHOD FOR ESTABLISHING A SECURE COMMUNICATION CHANNEL - In a method for establishing a secure communication channel between a portable data carrier (07-26-2012
20120189123COMMUNICATION SYSTEM, WIRELESS COMMUNICATION APPARATUS, AND COMMUNICATION METHOD - A wireless communication circuit includes a receiver to receive at least one of a beacon frame and a probe response frame from a first wireless communication apparatus belonging to a first communication group, at least one of the beacon frame and the probe response frame including first security information indicating a first encryption method. The circuit includes a transmitter to transmit an association request frame to the first wireless communication apparatus, the association request frame including second security information indicating a second encryption method which is supported by the wireless communication circuit, after a determination that the second encryption method overlaps with the first encryption method. The transmitter declines to associate with the first wireless communication apparatus if the first encryption method fails to overlap with the second encryption method. The transmitter transmits a data frame including a frame body after a reception of an association response frame.07-26-2012
20120082313PRIVACY CONTROL FOR WIRELESS DEVICES - According to various embodiments, a computer-implemented method is disclosed that includes receiving, at a wireless adaptor of a device, a wireless data packet from an access point (AP), wherein the wireless data packet includes a Basic Service Set Identifier (BSSID) of the AP; changing the BSSID of the received data packet by a processor or hardware to produce a modified wireless data packet; and transmitting the modified wireless data packet to an application on the device.04-05-2012
20120257754DATA TRANSMITTING APPARATUS, DATA RECEIVING APPARATUS, DATA TRANSMITTING METHOD, AND DATA RECEIVING METHOD - The present invention provides a data transmitting apparatus in which a device information obtaining unit obtains device information of a device connected to the data transmitting apparatus; a verification unit verifies validity of a data receiving apparatus, based on the device information obtained by the device information obtaining unit; and a control unit performs control as to whether to obtain the device information through a wireless communication unit or obtain the device information through a wire communication unit, and as to whether to transmit image information encrypted by a first encryption unit from the wireless communication unit or transmit image information encrypted by a second encryption unit from the wire communication unit when the verification unit verifies that the data receiving apparatus is authorized.10-11-2012
20120257753MAC Address Anonymizer - Methods and systems for generating anonymous MAC addresses and determining permanent MAC addresses from anonymous MAC addresses are disclosed. Permanent MAC addresses may be associated with a location in a location database. Generating anonymous MAC addresses may protect user privacy and allow manufacturers and users of wireless access points to control their inclusion in location databases.10-11-2012
20120230491Wireless Extender Secure Discovery and Provisioning - According to embodiments of the invention, a first wireless access point discovers a second wireless access point, the first wireless access point tunes its radio and privacy settings, without user input, based upon parameters automatically exchanged in response to the discovery of the second wireless access point, and a secure direct wireless connection is established between the first and second wireless access points using the radio and privacy settings. Adding the first wireless to an existing mesh network includes a determination of the best available direct wireless connection.09-13-2012
20110123028SYSTEMS AND/OR METHODS OF INCREASED PRIVACY WIRELESS COMMUNICATIONS - Systems, methods and/or mobile devices are provided that enable a level of privacy/security in wireless communications to be increased responsive to a content of the wireless communications, biometric data and/or a position from which the wireless communications takes place. A plurality of communications modes is used by the system infrastructure and the plurality of mobile devices communicating therewith to increase privacy and undetectability of transmitted signals. The increased level of privacy and undetectability of signals is provided via pseudo-randomly generated signaling alphabets that are used by the mobile devices and by the system infrastructure to provide the communications. This represents a level of encryption/scrambling that is over and above the conventional encryption and/or scrambling at the bit level. Accordingly, systems, methods and/or devices providing a concatenated level of encryption/scrambling are provided.05-26-2011
20110123026DUPLICATION MEANS FOR AN ELECTRONICALLY CODED KEY AND RELATED METHOD - Method for the duplication of original electronic keys used in the automotive transports, and provided with coded and encrypted electronic authentication means, comprising: an Identification Code (ID), an encrypted secret code, a Password, an algorithm, data storage and computing means, able of being used in vehicles provided with a central processing unit able of storing an Identification Code (ID), an encrypted secret code, a Password, an algorithm, said duplication method being able of obtaining a duplicated key based on a blank key, which is originally provided with an algorithm, data storage means able of storing said Identification Code (ID), said secret code and said Password, wherein said data storage means are initially empty; said duplication is based on a duplication means and on a method which allows of using the blank key as intercepting means of secret codes sent by the vehicle central processing unit, and of transferring said information to the duplication means itself.05-26-2011
20120230489APPARATUS AND METHOD FOR SHORT RANGE COMMUNICATION IN MOBILE TERMINAL - An apparatus and method for short range communication in a mobile terminal are provided. The apparatus includes a Near Field Communication (NFC) unit for sending and receiving data to and from the outside according to near field communication, a smart card having multiple contact points, and a security module, connected with one of the contact points of the smart card through a single wire protocol, for decrypting data from the NFC unit and sending the decrypted data to the smart card, and for encrypting data from the smart card and sending the encrypted data to the NFC unit. Hence, it is possible to provide an encryption and decryption function independently of the COS, establish a common encryption and decryption standard, and secure reliability of encryption and decryption.09-13-2012
20120237034WIRELESS MESH NETWORK WITH SECURE AUTOMATIC KEY LOADS TO WIRELESS DEVICES - A wireless mesh network provides secure communication by encrypting data using one or more encryption keys. A configuration device in communication with a security manager of the network provides a temporary secure communication path between the security manager and a new field device to be added to the mesh network. Cryptographic material and other configuration data can then be transferred between the security manager of the network and the new field device securely via the configuration device.09-20-2012
20120237033NODE, A ROOT NODE, AND A COMPUTER READABLE MEDIUM - According to one embodiment, a wireless mesh network includes a plurality of nodes of which one is a root node and two nodes hierarchically adjacent have a parent-child relationship. In a node in the wireless mesh network, an authentication processing unit executes an authentication for network access with the root node when the node joins in the wireless mesh network. A root key setting unit generates a root key as a common key between the root node and the node. A parent-child key setting unit generates a parent-child key as a common key between a parent node and the node, encrypts the parent-child key using the root key, and sends the parent-child key encrypted to the root node. A group key acquisition unit receives a group key encrypted using the parent-child key from the parent node, and decrypts the group key using the parent-child key.09-20-2012
20110002464Intraoccular Implant - An intraocular implant adapted to be implanted within the interior of a human eye is disclosed. The aforesaid implant is selected from a group consisting of: an intracorneal implant, an anterior chamber implant, a sulcus implant, implant in the bag, posterior chamber implant and any combination thereof. The implant comprises means selected from a group consisting of reflective surfaces and electronic device. The implant is adapted to form at least one image of at least part of the field of vision on the retina. The image is selected of a group consisting of: artificial image and reflected image, and any combination thereof. The image is formed on the retina by a predetermined indirect path selected from (z) optical reflective path and (U) electronic processing. Optionally, also a refracted image may also be created on the retina.01-06-2011
20110038480SECURITY METHOD IN WIRELESS COMMUNICATION SYSTEM HAVING RELAY NODE - A security method in a wireless communication system is provided, which is used for providing a plurality of security associations between a user equipment, a relay node, and a base station node in a wireless communication system. The user equipment authenticates with a serving gateway in the wireless communication system through the relay node, such that a security association between the user equipment and the relay node is established correspondingly. The relay node establishes a second security association between the relay node and the base station node through the base station node.02-17-2011
20120269346DEVICE AND SYSTEM FOR FACILITATING COMMUNICATION AND NETWORKING WITHIN A SECURE MOBILE ENVIRONMENT - The present invention relates generally to facilitating secure voice and data communication by way of a commercially available communication device (i.e., smartphone/smartdevice). Specifically, the device and system for pairing a specialized cryptographic device with a non-specialized communication device, wherein the two devices engage in bidirectional communication to facilitate encryption of voice and data for secure transmission over a network. While providing the sensitive cryptographic features for secure communications, the cryptographic device further implements and enforces security policies for the communication device by way if an intermediary native application executed at the communication device. The encryption device is suitably designed to be carried discreetly and may be used in conjunction with a commercially available communication device.10-25-2012
20110216903METHOD AND DEVICE FOR EMITTING MESSAGES FOR GUARANTEEING THE AUTHENTICITY OF A SYSTEM AND METHOD AND DEVICE FOR VERIFYING THE AUTHENTICITY OF SUCH A SYSTEM - The invention relates to a method for emitting messages in order to guarantee the authenticity of the system that emitted said messages. The method includes the following steps, namely: a step comprising the selection of a threshold value used in a threshold-based cryptographic scheme, which value is greater than or equal to 1;—a step comprising the generation of a set of partial information items, such that knowledge of a number i, greater than or equal to the threshold value K, of partial information items can be used to verify a signature of at least part of the messages; and a fourth step comprising the sending of each partial information item separately in a distinct message. The invention also relates to a device for emitting messages for guaranteeing the authenticity of the system that emitted the messages, as well as to a method and a device for verifying the authenticity of such a system. In particular, the invention is suitable for global satellite-based radiocommunication and radionavigation systems.09-08-2011
20110158409WIRELESS COMMUNICATION APPARATUS, WIRELESS COMMUNICATION METHOD, AND WIRELESS COMMUNICATION PROGRAM - A wireless communication apparatus that establishes connection with an access point wirelessly to perform wireless communication is provided. The apparatus includes: a beacon receiving section that receives a beacon that includes identification information of the access point; a key input accepting section that accepts an input of a security key that is to be used for encryption of wireless communication between the wireless communication apparatus and the access point that is a connection target; a communication method determining section that determines, on the basis of the security key, a communication method that is to be used for communication with the access point by selection out of a plurality of communication methods using encryption available for connection with the access point; and a communication controlling section that carries out control for communicating with the access point by using the received identification information of the access point and the determined communication method.06-30-2011
20110158410METHOD FOR TRANSMITTING DATA BETWEEN NETWORK NODES - A method transmits data between network nodes of a network in a cryptographically protected manner. The network nodes are, for example, sensor nodes of a wireless sensor network. In the method, in order to transmit the data in a message, a NONCE value is created from a count value which is updated in the transmission of the message and from a constant value which is provided in a shared manner to the network nodes of the network. The data transmitted in the message is then encrypted and decrypted within the network nodes by a cryptographic key and the created NONCE value. The method offers in particular protection against replay attacks while at the same time minimizing the use of resources of the network nodes.06-30-2011
20120087501SYSTEMS AND METHODS FOR RFID SECURITY - An RFID system includes an RFID tag, an RFID reader, and a server. The RFID tag communicates to the server via encrypted information. The information may be encrypted with synchronized encryption keys. In this manner, the reader need not decrypt the information from the RFID tag. The effectiveness of malicious readers is thereby reduced, resulting in improved RFID tag security.04-12-2012
20120281835Methods And Apparatus For Use In Transferring User Data Between Two Different Mobile Communication Devices Using A Removable Memory Card - Techniques for use in processing user data associated with a user account of a mobile device having an application is described. The mobile device includes a memory and an interface configured to receive a removable memory card. A encryption/decryption key is stored in the memory, but is not stored in the removable memory card. The mobile device regularly receives and stores updates to the user data in the memory for use in the application. For updates to the user data, the mobile device updates a copy of the user data stored in the removable memory card in an encrypted format in accordance with the encryption/decryption key.11-08-2012
20120281834Generation of Perfectly Secret Keys in Wireless Communication Networks - A method and apparatus is used for generating a perfectly random secret key between two or more transceivers in a wireless communication network. In a point-to-point system, both transceivers produce an estimate of the channel impulse response (CIR) based on the received radio signal. The CIR estimation is synchronized and may include error correction and detection. A long secret key of bits is generated from a digitized version of the CIR estimate, from which a perfectly secret encryption key is derived by privacy amplification.11-08-2012
20120281833METHOD TO MANAGE REVOCATIONS IN A GROUP OF TERMINALS - The present invention concerns the field of broadcast encryption method, i.e. a method to organize the distribution of keys into a group of users so that it is possible to manage the revocation of one member of the group in an efficient way. The proposed solution is a private encryption key ciphertext constant collusion-resistant broadcast encryption. The main idea behind the invention is to mix the notion of efficient tree-based key derivation (also called subset management) with individual and personalized key blinding thus achieving a full collusion-resistant broadcast encryption system. The key de-blinding is performed at the last moment thanks to a cryptographic technique called pairings (also known as bilinear maps) resulting in a global key commonly shared by all authorized (non-revoked) devices. It should be noted that only non-revoked devices can compute the final key (this is achieved through subset management and related subset key derivation technique) and perform the de-blinding (which is performed with one pairing).11-08-2012
20110305339Key Establishment for Relay Node in a Wireless Communication System - Techniques for providing additional security for the wireless interface between a relay node and a donor base station are based on a security association established between the relay node and the donor base station. In an example method implemented in a relay node, communications with a donor base station are established and a first cryptographic key is generated according to a radio access protocol. A security association between the relay node and the donor base station is then established, using a credential stored at the relay node, and a second cryptographic key is derived from the first cryptographic key, using the stored credential, or one or more parameters relating to the security association, or information exchanged within the security association. The second key is used to protect user plane data relayed from one or more mobile terminals to the donor base station.12-15-2011
20120328103Method and System for Managing Air Interface Key - A method and system for managing an air interface key are provided in the present invention, which relate to the communication field; the method including: a serving GPRS Support Node+ (SGSN+) or a Mobile Switching Centre/Visitor Location Register+ (MSC/VLR+) transmits a key distributing message to a Radio Network Controller+ (RNC+), wherein the message carries at least one of an intermediate key K12-27-2012
20120288095System and Method for Mobility Management in a Communications System - A method for maintaining routing information for a wireless device includes determining, by a target communications controller, an original address of the wireless device handed over from a source communications controller, where the original address is assigned by an original communications controller. The method also includes updating, by the target communications controller, routing information associated with the wireless device using a border gateway protocol message if the original address lies within a range of addresses managed by a communications system including the target communications controller and an aggregation router, where the routing information is stored at the aggregation router.11-15-2012
20100202614APPARATUS AND METHOD FOR CIPHERING OF UPLINK DATA IN MOBILE COMMUNICATION SYSTEM - An apparatus and method for ciphering uplink data in a mobile communication system are provided. The apparatus includes a Radio Network Controller (RNC) for, when receiving a Radio Bearer Setup Complete after a ciphering activation time, determining a Hyper Frame Number (HFN) value of a User Equipment (UE) and changing an HFN value of the RNC to the same HFN value determined of the UE.08-12-2010
20100202613PACKET BUNDLING AT THE PDCP LAYER WITH CIPHERING ON THE PDCP SDU - Certain aspects of the present disclosure propose techniques for bundling and ciphering service data units (SDU) in the packet data convergence protocol (PDCP) layer. The proposed techniques increase the data rate of the communication system. At the transmitter side, the PDCP layer may bundle SDUs and cipher each SDU individually before submitting them to a lower layer. At the receiver-side, the PDCP layer may unbundle and decipher the SDUs before submitting them to higher layers.08-12-2010
20090214035METHOD AND APPARATUS FOR SECURE COMMUNICATION IN A DIGITAL TWO WAY RADIO PROTOCOL - A method and apparatus for secure communication in a digital two way radio protocol is disclosed herein. The method includes the step of, at an originating radio, generating at least one control value (08-27-2009
20100166184METHOD OF HANDLING SECURITY CONFIGURATION IN WIRELESS COMMUNICATIONS SYSTEM AND RELATED COMMUNICATION DEVICE - A method of handling security configuration for a mobile device using a mapped security context in a wireless communication system includes utilizing the mapped security context to derive ciphering and integrity keys when security configuration, indicating a key update based on a cached security context, is received.07-01-2010
20130010962Proximity Authentication System - An authorized user may be provided access to a service only when a wireless token assigned to the user is in the proximity of a computing device. A user's credential may be stored on an RFID token and an RFID reader may be implemented within a security boundary on the computing device, Thus, the credential may be passed to the security boundary without passing through the computing device via software messages or applications. The security boundary may be provided, in part, by incorporating the RFID reader onto the same chip as a cryptographic processing component, Once the information is received by the RFID reader it may be encrypted within the chip. As a result, the information may never be presented in the clear outside of the chip. The cryptographic processing component may cryptographically encrypt/sign the credential received from the token.01-10-2013
20130010959DATA BACKUP DEVICE FOR SMARTPHONE - A data backup device for a Smartphone is provided. When a user electrically connects the Smartphone with a connection interface of the device, a control unit of the device is activated to execute a backup program stored in a program storage unit of the device. After the user inputs a username and a password, the backup program generates a backup folder corresponding to the input username. Then, the user selects different modes of the backup program, so that the data backup device can execute the data backup or data recovery.01-10-2013
20130016839WIRELESS COMMUNICATION APPARATUS AND METHOD OF PREVENTING LEAKAGE OF ENCRYPTED KEYAANM MIYAZAWA; KazunoriAACI Musashino-shiAACO JPAAGP MIYAZAWA; Kazunori Musashino-shi JP - A wireless communication apparatus may include a first module that stores a first key used to encrypt and decrypt communication contents, a second module that stores a second key used to encrypt and decrypt the first key, the first key being encrypted in accordance with a public key encryption scheme, and a connection bus that connects the first module and the second module to each other Each of the first module and the second module may include an encryption processing unit that encrypts and decrypts information, which is transmitted and received via the connection bus, by using a third key that is different from the first key and the second key.01-17-2013
20120243685ROOT NODE AND A COMPUTER READABLE MEDIUM - A wireless mesh network includes a plurality of nodes to which a device key is assigned. The device key belongs to one of a plurality of groups. In a root node, a correspondence relationship between the nodes and the device key thereof, and a correspondence relationship between past join nodes and a device key thereof, are stored. When a new node in the wireless mesh network is detected as a past join node, the device key assigned to the past join node is assigned to the new node again. When the new node is not the past join node, a new device key is assigned to the new node. A cipher text is generated by encrypting a message using device keys assigned to the nodes and the new node. If the number of groups to which the device keys belong is fewer, a size of the cipher text is smaller.09-27-2012
20130170643METHOD AND SYSTEM FOR TRANSMITTING SUBSCRIBER IDENTITY INFORMATION, USER EQUIPMENT, NETWORK DEVICE - A method and a system for transmitting subscriber identity information, and a network device are provided. The method includes: receiving a subscriber identity request message from a Mobility Management Entity (MME); encrypting an International Mobile Subscriber Identity (IMSI) of a User Equipment (UE) to generate a cipher text; and sending a subscriber identity response message that includes the cipher text of the IMSI to the MME. The method and the system for transmitting subscriber identity information, and the network device adopts the technical means that, the IMSI of the UE is encrypted to generate a cipher text which is fed back to the network device, thereby overcoming the problem in the current subscriber identity authentication mechanism that the IMSI of the UE is very easily resolved, so that the technical effect of transmitting the subscriber identity confidentially is improved.07-04-2013
20080226076PROVIDING A USER DEVICE WITH A SET OF ACCESS CODES - A method for providing a user device with a set of access codes comprises, in the user device, storing an encryption key and an identification code, and sending a message containing the identification code to a server via a communications network. In the server, an encryption key is stored corresponding to the key stored in the user device, allocating the set of access codes on receipt of the identification code from the user device. A look up function is performed based on the identification code received in the message to retrieve the key from storage. The set of access codes is encrypted using the retrieved key to produce an encrypted set. A message containing the encrypted set is sent to the user device via the network. In the user device, the encrypted set received from the server is decrypted using the key in storage, and storing the decrypted set of access codes for use by a user of the user device.09-18-2008
20080226075Restricted services for wireless stations - A technique for providing restricted access to a wireless network involves recognizing a service descriptive identifier (SDID). The SDID may be transmitted to wireless stations that query the wireless network so that the wireless stations can at least gain access to restricted services provided by the wireless network. The SDID may include quality of service (QoS) parameters, as well, thereby facilitating dynamically restricted access to the wireless network.09-18-2008
20080226074METHOD AND APPARATUS FOR CIPHERING PACKET UNITS IN WIRELESS COMMUNICATIONS - A method and apparatus are disclosed relating to ciphering and de-ciphering of packet units in wireless devices during retransmission in wireless communications. The packet units are re-segmented with the ciphering done on the re-segmented packet unit or on a radio link control protocol data unit (RLC PDU) with or without segmentation. Alternatively, the re-segmentation is done on the radio link control service data unit (RLC SDU) with or without segmentation. Alternatively, the ciphering process and multiplexing of the RLC PDU is done in the medium access control (MAC) layer of a MAC PU before undergoing a hybrid automatic repeat request (HARQ) process for retransmission. Further, the ciphering process in the RLC is done on a packet data convergence protocol packet data unit (PDCP PDU).09-18-2008
20080226073METHOD AND APPARATUS FOR SECURITY IN A DATA PROCESSING SYSTEM - Method and apparatus for secure transmissions. Each user is provided a registration key. A long-time updated broadcast key is encrypted using the registration key and provided periodically to a user. A short-time updated key is encrypted using the broadcast key. The short-time key is available with each broadcast message, wherein sufficient information to calculate the short-time key is provided in an Internet protocol header preceding the broadcast content. Broadcasts are then encrypted using the short-time key, wherein the user decrypts the broadcast message using the short-time key.09-18-2008
20110274275Trans-Security Components System and Methods - A system of combating the shipment of contraband goods is described. After products are ordered, custom made secure tags are created. Corresponding data is created at a central database. The tags include encrypted information about the tag, the products and the mode of shipping. The tags can be placed at several locations from inside the goods to attached to the outside of the shipping container. The encryption and other measures are used to prevent the unauthorized duplication of the tags. As the goods make there way through the distribution channels the goods can be scanned at convenient locations. The encryption scheme can be altered by reference to time. The scanner is connected to the database and can receive the proper encryption scheme will automatically and at random be remotely changed every few minutes. The scanning of the goods will reveal whether unauthorized goods are present in the shipment.11-10-2011
20130142335METHOD AND DEVICE FOR LINK LAYER DECRYPTING AND/OR ENCRYPTING A VOICE MESSAGE STREAM ALREADY SUPPORTING END TO END ENCRYPTION - Methods and systems for LLE encrypting and decrypting voice message streams (VMSs) already supporting eTe encryption are disclosed. In one example, LLE and eTe encryption initialization vectors (EIVs) are interleaved such that an LLE EIV retrieved from one of a header and a data unit is used to LLE decrypt both the header or data unit and a subsequent data unit. A recovered eTe EIV is used to eTe decrypt voice payloads in one or more subsequent data units. In another example, a base station dynamically LLE encrypts a VMS already supporting eTe encrypting by determining whether a received VMS is eTe encrypted, and ii it is not generating a new LLE EIV, and if it is, re-using the pre-existing eTe EIV for LLE encryption. The LLE encrypted (and perhaps eTe encrypted) VMS is then sent over the air to one or more mobile stations.06-06-2013
20080219447Systems and Methods of Secure Coding for Physical Layer Communication Channels - Systems and methods of securely communicating from a sender device to a receiver device on a communication channel are disclosed. One disclosed method is for securely communicating from a sender device to a receiver device on a main channel when an eavesdropper device is listening on an eavesdropper channel. The main channel has an signal-to-noise ratio SNR09-11-2008
20130114814ADDING RANDOMNESS INTERNALLY TO A WIRELESS MOBILE COMMUNICATION DEVICE - An electronic device is provided with an integral transducer used to update a random data pool without connection to an external source of new random data. In one embodiment, there is provided a method for providing random data on an electronic device, the method comprising: storing random data in a random data pool in a memory; sensing motion of the electronic device using a transducer integrally carried as part of the electronic device, wherein the transducer is configured to generate an output in response to sensed motion; generating new random data in accordance with the output of a transducer when sensed motion exceeds a threshold; and storing the new random data in the random data pool in the memory.05-09-2013
20130114813METHOD AND APPARATUS FOR REFRESHING KEY - A method for refreshing a key is provided, wherein when a counter in a PDCP layer of a RB reaches a threshold, a mobile device receives a cell handover message, re-establishes PDCP layers and RLC layers for all RBs, keeps Uplink Time Alignment Information, uplink grant resources for uplink shared channel and Physical Uplink Control Channel resources allocated semi-statically, and flushes a buffer of a MAC layer; the mobile device obtains a new root key, and obtains a new encryption and integrity protection key of a radio resource control plane according to the new root key; the mobile device transmits a cell handover complete message protected by the new encryption and integrity protection key.05-09-2013
20110268275Apparatus and method for a random wave envelope for generating a sequence of encryption keys for communication security in mobile wireless devices part III - A random wave envelope is created from a set of bounded random numbers by additively combining a triangle, a square and a sine wave. The random wave envelope is then used to create a sequence of wave random numbers from the wave envelope, which are used to generate random-variant keys for encryption in place of the pre-placed encryption key. An ambiguity envelope is thus created over the transmission of data packets as random-variant-keys are used that are distinct and separate for each packet and may also be distinct and separate for each incoming and outgoing packet. The random-variant keys are only created at the time of the actual use for encrypting or decrypting a data packet and not before and then discarded after one time use. The random-variant keys may be used in wireless network using wireless access points, cellular phone and data networks and ad hoc mobile wireless networks.11-03-2011
20110268273Data Processing Apparatus for a Field Device - A data processing apparatus for a field device of level measurement and/or pressure measurement technology is described. An input is adapted for receiving data from a measurement processing stage and an output is adapted for providing encrypted data. The encrypted data are marked for a recipient of the data as encrypted data.11-03-2011
20130129093Secure Wireless Communication - In one embodiment, the method performed by mobile equipment to authenticate communication with a network includes generating keys using cellular authentication and voice encryption, and then generating an authentication key based on these keys. The authentication key is used to generate an expected message authentication code used in authenticating the network according to authentication and key agreement security protocol.05-23-2013
20130129091METHOD AND APPARATUS FOR MANAGING SECURITY KEYS FOR COMMUNICATION AUTHENTICATION WITH MOBILE STATION IN WIRELESS COMMUNICATION SYSTEM - Provided is a method for managing a security key for communication authentication with a Mobile Station (MS) in a communication system. The method includes acquiring a first authentication key by performing an authentication procedure for the communication authentication in a cloud cell having member Base Stations (BSs) that include a master BS and at least one slave BS for providing a service to the MS; and communicating with at least one member BS using a first encryption key that is generated using the first authentication key.05-23-2013
20110222689METHOD AND APPARATUS FOR PROVIDING SECURE COMMUNICATIONS FOR MOBILE COMMUNICATION DEVICES - A method and apparatus that enables secure communications from a wireless communication device is disclosed. The method may include receiving a signal to transmit data, wherein the data is at least one of voice, text, image, and video, applying a first layer of encryption to the data, applying a second layer of encryption to the data, applying a third layer of encryption to the data, and sending the encrypted data over a communications network.09-15-2011
20130148807SYSTEM FOR TRANSMITTING A DATA SIGNAL IN A NETWORK, METHOD, MOBILE TRANSMITTING DEVICE AND NETWORK DEVICE - A system for transmitting a data signal is provided, comprising a plurality of network devices; a network connecting the plurality of network devices based on at least a first communication carrier, wherein the first communication carrier is a wired communication carrier; a network key generator configured to generate a network key; a mobile transmitting device configured to transmit the network key to at least one of the plurality of network devices on a second communication carrier, wherein the second communication carrier is a wireless carrier, and wherein the network devices are configured to communicate with the other network devices based on a link encryption key based on the network key. A corresponding method, a mobile transmitting device and a network device are provided as well.06-13-2013
20130148808Wireless Network Having Multiple Communication Allowances - Multiple levels of wireless network resource granting. A user who has an authorized key, e.g., an encryption key or a key indicating that they have paid for service, gets a first, better level of access to the network resources. One without the key is granted lesser access, e.g., less total bandwidth, less bandwidth speed, no access to files or the like.06-13-2013
20120275599METHOD AND APPARATUS FOR SUPPORTING MULTIPLE BROADCASTERS INDEPENDENTLY USING A SINGLE CONDITIONAL ACCESS SYSTEM - A method and apparatus for brokering the enablement of the communication of encrypted media programs from a plurality of independent broadcasters to a plurality of receivers is disclosed. The system makes use of a pairing key for each provided service, which is differently encrypted by a pairing server and by the broadcaster providing the service. The encrypted versions of the pairing key are decrypted in a first receiver module using information known to the pairing service but not the broadcaster and in a second receiver module using information known to the broadcaster. The pairing key is used to cryptographically bind the first and second receiver modules.11-01-2012
20100284535COMMUNICATIONS SYSTEM - A mobile communications system is proposed in which a two stage procedure is used for setting up Radio Bearers within a mobile communications device and UTRAN. In the first stage, both the mobile device and UTRAN perform ciphering based on an old Start value. In the second stage, the mobile device and UTRAN perform ciphering based on a new Start value. In this way, data communication using the Radio Bearers can start without waiting for the mobile device to confirm completion of the setup procedure.11-11-2010
20100316221 SECURE TRANSMISSION METHOD FOR BROADBAND WIRELESS MULTIMEDIA NETWORK BROADCASTING COMMUNICATION - A secure transmission method for broadband wireless multimedia network broadcasting communication includes the following steps: a secure channel between big base station and small base station is established by utilizing security protocols; the big base station distributes a Broadcast Traffic Encryption Key to each small base station through the secure channel; the small base station transmits the Broadcast Traffic Encryption Key to the user passing the authentication and authorization. The above solution solves the problem of broadcast secure communication of the big base station working in the mixed covering mode of large and small cells, realizes the identification of not only the user but also the base station, and ensures that only the authorized user can receive broadcast service.12-16-2010
20100316220RADIO FREQUENCY IDENTIFICATION SYSTEM AND AUTHENTICATION METHOD THEREOF - A Radio Frequency Identification (RFID) system and method are provided that includes a reader and a tag which share a predetermined secret key. The reader transmits an authentication request random number to the tag. The reader and the tag generate a Pseudorandom Noise (PN) sequence formed of a series of binary codes from an exclusive disjunction of the authentication request random number and the predetermined secret key. The tag produces an authentication response random number by performing a predetermined conversion operation for the PN sequence and transmits the authentication response random number to the reader. The reader authenticates the tag by analyzing the PN sequence and the authentication response random number.12-16-2010
20130156190Method and Device for Truncating Location Information - The embodiments herein relate to a method in a first device (06-20-2013
20130156191COMMUNICATION SECURITY METHOD AND APPARATUS OF FIRST NODE AND SECOND NODE COMMUNICATING BASED ON FULL DUPLEX COMMUNICATION SCHEME USING NEAR FIELD - A communication security method and apparatus of a first node and a second node are provided. The first node and the second node communicate with each other based on a full duplex communication scheme using a near field. In the communication security method and apparatus, information to be transmitted may be encrypted based on received information and the encrypted information may be transmitted, in a TX node and an RX node. The communication security method and apparatus prevent an additional node from decrypting the information, and ensure transmission and reception of reliable data. In addition, the communication security method and apparatus prevent information from being decrypted in a physical layer, by periodically or aperiodically exchanging a new encryption key.06-20-2013
20130156192MOBILE COMMUNICATION TERMINAL AND METHOD - A mobile communication terminal used in wideband code division multiple access (WCDMA) 3G mobile communication includes: a communication terminal unit configured to receive a short text message from a user and transmit encrypted data generated by encrypting the short text message; and a secure-universal subscriber identity module (S-USIM) unit configured to generate a session key for encrypting the short text message, when receiving a request to encrypt the short text message from a communication terminal unit.06-20-2013
20130156193Method and Apparatus for Determining Joint Randomness - A method and apparatus for performing Joint Randomness Not Shared by Others (JRNSO) is disclosed. In one embodiment, JRNSO is determined in Frequency Division Duplex (FDD) using a baseband signal loop back and private pilots. In another embodiment, JRNSO is determined in Time Division Duplex (TDD) using a baseband signal loop back and combinations of private pilots, private gain functions and Kalman filtering directional processing. In one example, the FDD and TDD JRSNO embodiments are performed in Single-Input-Single-Output (SISO) and Single-Input-Multiple-Output (SIMO) communications. In other examples, the FDD and TDD embodiments are performed in Multiple-Input-Multiple-Output (MIMO) and Multiple-Input-Single-Output (MISO) communications. JRNSO is determined by reducing MIMO and MISO communications to SISO or SIMO communications. JRNSO is also determined using determinants of MIMO channel products. Channel restrictions are removed by exploiting symmetric properties of matrix products.06-20-2013
20120281832SECURE WIRELESS COMMUNICATION TRANSCEIVER - An efficient hybrid encryption-coding algorithm is disclosed that requires using traditional encryption only for the first small amount of data. This amount of data, the first block, is determined by the traditional encryption algorithm to be applied on this first block. In this algorithm, all of the rest of the information will then be transmitted securely over the wireless channel, using network coding, without a need for using traditional encryption. Unlike the traditional and opportunistic encryption algorithms, the algorithm achieves higher data rates and less avalanche error effect, and, at the same time, it is as secure as traditional encryption algorithms. Assuming the additive white Gaussian noise (AWGN) channel model employing our disclosed algorithm, we analyze its performance in terms of throughput and security level.11-08-2012
20130182845SECURE COMMUNICATIONS BETWEEN DEVICES USING A TRUSTED SERVER - A method of establishing secure communication between a first mobile computing device and a second mobile computing device includes receiving a first request from the first mobile computing device to securely communicate with the second mobile computing device via a Wi Fi hot spot, verifying that the first mobile computing device is trusted, generating a public key and a private key based on a trusted certificate, sending the private key to the first mobile computing device via the Wi-Fi hot spot, receiving a second request from the second mobile computing device to securely communicate with the first mobile computing device, verifying that the second mobile computing device is trusted, and sending the public key to the second mobile computing device.07-18-2013
20130182846WIRELESS COMMUNICATION APPARATUS FOR SETTING FREQUENCY BAND FOR WIRELESS COMMUNICATIONS USING ENCRYPTION KEY INFORMATION TO PREDETERMINED FREQUENCY BAND - A controller receives first or second equipment identifier from a first wireless communication apparatus, by using one wireless communication circuit of the third and fourth wireless communication circuit. When the one wireless communication circuit is the fourth wireless communication circuit, the controller sets an encryption key information for wireless communications with the first wireless communication apparatus, to encryption key information including an equipment identifier that does not coincide with a received equipment identifier among the received plurality of encryption key information, and controls the third wireless communication circuit to transmit and receive encrypted transmission data to and from the first wireless communication apparatus by using key data included in set encryption key information.07-18-2013
20130182847COMMUNICATION SYSTEM, INFORMATION PROCESSING APPARATUS, METHOD AND COMPUTER PROGRAM - The present invention provides easy and prompt initiation of wireless communications in which security is ensured requiring additional hardware. A connection button of a PDA or first device is operated and a connection request is broadcast. If the PDA and a portable phone are in near each other, and a reception intensity of the connection request is equal to or higher than a threshold value, a request of the PDA is granted by the portable phone. Then, an encryption key is newly generated by the portable phone, and is transmitted to the PDA. An encryption key and communication parameter transmitted from the portable phone are acquired. Encrypted communications using the encryption key generated by the portable phone are established based on the communication parameter.07-18-2013
20130121492Method and apparatus for securing communication between wireless devices - A system and method for securing communications in a wireless network includes the steps of authenticating members of the wireless network, generating a member private key to be used by the members of the wireless network, and distributing the member private key to each of the members of the wireless network. A member is authenticated based on the ability of the member to be physically proximate to at least one other member of the wireless network at a given instant. The member private key is generated by one of the members, hereinafter referred to as a master member, in response to a changing value stored at the one of the members. The member private key is then securely distributed to each of the members in the WLAN network.05-16-2013
20110311052Wireless Device Enabled Locking System - An encrypted security system and associated methods for controlling physical access. The system includes a security server configured to receive a request for authentication from a mobile device, the request comprising information identifying the mobile device and a physical access control device. The security server forwards an encryption message comprising a plurality of unique identifiers to the physical access control device via the mobile device. The physical access control device is configured to authenticate the plurality of unique identifiers in the encryption message and operate an access control mechanism.12-22-2011
20110311051UTILIZING A DETERMINISTIC ALL OR NOTHING TRANSFORMATION IN A DISPERSED STORAGE NETWORK - A method begins by a processing module generating a deterministic key from data and encrypting the data using the deterministic key to produce encrypted data. The method continues with the processing module generating transformed data from the encrypted data and generating a masked key from the deterministic key and the transformed data. The method continues with the processing module combining the masked key and the encrypted data to produce a secure package.12-22-2011
20130188791Dynamic Password Update for Wireless Encryption System - A method and system for dynamically changing password keys in a secured wireless communication system includes initiating a password key change, generating a new password key, embedding the new password key and a password key indicator in a first message, encrypting the first message using an old password key, storing the new password key, sending the formatted encrypted first message over a wireless communication system, receiving a subsequent second message, and decrypting the subsequent second message using the new password key.07-25-2013
20130188792Video Surveillance System and Method for Self-Configuring Network - A mesh network surveillance system and method for providing communication between a base system having at least one input capture device ICD(s) and other ICD(s), wherein the ICD(s) are operable to provide a self-configuring network with each other, including the steps of providing this base system; at least one user accessing the ICDs and inputs remotely via a user interface through a remote server computer and/or electronic device communicating with it, for providing a secure surveillance system with extended inputs range and self-configured networking for smart cross-communication for monitoring a target environment.07-25-2013
20120002813MULTI-SERVICE VPN NETWORK CLIENT FOR MOBILE DEVICE - An integrated, multi-service network client for cellular mobile devices is described. The multi-service network client can be deployed as a single software package on cellular mobile network devices to provide integrated services including secure enterprise virtual private network (VPN) connectivity, acceleration, security management including monitored and enforced endpoint compliance, and collaboration services. Once installed on the cellular mobile device, the multi-service client integrates with an operating system of the device to provide a single entry point for user authentication for secure enterprise connectivity, endpoint security services including endpoint compliance with respect to anti-virus and spyware software, and comprehensive integrity checks. That is, the multi-service client provides a common user interface to the integrated services, and provides a VPN handler that interfaces with the operating system to provide an entry point for network traffic to which the integrated services can be seamlessly applied.01-05-2012
20130195273SHARED SECRET ARRANGEMENTS AND OPTICAL DATA TRANSFER - Digital data is optically broadcast through an environment by controllably switching the brightness or chrominance of LED solid state lamps, or of other illumination sources (e.g., television screens and backlit computer displays). This optical data channel is useful to convey cryptographic key data by which devices within the environment can authenticate themselves to a secure network. In some embodiments, the optical modulation is sensed by the camera of a smartphone. The row data output by the smartphone's camera sensor is processed to extract the modulated data signal. In some monochrome embodiments, data communication speeds far in excess of the camera's frame rate (e.g., 30/second), or even the camera's row rate (e.g., 14,400/second) are achieved. Still greater rates can be achieved by conveying different data in different chrominance channels. A great number of other features and arrangements are also detailed.08-01-2013
20130202111WIRELESS SECURITY PROTOCOL - A method of encryption and decryption applied to a transmitted plaintext message in a communication network containing multiple subscriber nodes is provided. The method comprises the steps of: processing an Integrity check value (ICV); using a private key at the first subscriber node; providing a random initialization vector (W) executing a first operation on the random IV to obtain a sum IV; using the sum IV to process an encryption on the plaintext to obtain the ciphertext; transmitting the ciphertext to the second subscriber node wherein the second node receives the ciphertext; identifies the IV; utilizes the private key and the IV to process the decryption of the ciphertext to obtain the plaintext; generates a feedback message, the feedback message is then used to generate future sum IVs.08-08-2013
20130094651FIELD PROGRAMMING OF A MOBILE STATION WITH SUBSCRIBER IDENTIFICATION AND RELATED INFORMATION - Apparatuses and methods for field programming a private security key into a mobile station are described herein. The methods may include a server initially accepting in a wireless network a connection from a mobile station that is without a factory programmed subscriber identification module (SIM). The server may then collaborate with the mobile station to field program the mobile station with an international mobile subscriber identification (IMSI) and a private security key (K04-18-2013
20120093316ACCESS POINT, TERMINAL, ENCRYPTION KEY CONFIGURATION SYSTEM, ENCRYPTION KEY CONFIGURATION METHOD, AND PROGRAM - Configuration tasks needed to form a wireless LAN are performed using a simple method while increasing security during configuration. In a wireless network configuration system GH04-19-2012
20120093315DIABETES CARE KIT THAT IS PRECONFIGURED TO ESTABLISH A SECURE BIDIRECTIONAL COMMUNICATION LINK BETWEEN A BLOOD GLUCOSE METER AND INSULIN PUMP - A diabetes care kit for providing diagnostics and therapy that is preconfigured to reduce initial setup by a user. The kit can include a handheld diabetes managing device and insulin pump. The handheld diabetes managing device and insulin pump can each be preloaded with an encryption key such that the handheld diabetes managing device and the insulin pump are paired and a secure bidirectional communication link exists between the handheld diabetes managing device and the insulin pump.04-19-2012
20120093314Dynamic content-based ciphering on a control channel - In an exemplary embodiment content of a data message to be sent on a control channel is determined, and a selection is made between ciphering and not ciphering the data message based on the determined content. By example if from the content it is determined that that the data message is a SMS message, ciphering is selected and the control channel is a SACCH; else ciphering is not selected. Such a determination may be made by checking a service access point identifier for a data block comprising the data message. A data message within a data block received on the control channel is determined to be ciphered or not ciphered using only information within the data block, and the received data message is processed according to the determination. In another embodiment the FACCH is selected for sending the message if it is a SMS, and ciphering is selected for all data blocks sent on the FACCH.04-19-2012
20130208889METHOD FOR ENCRYPTING SHORT MESSAGE OF MOBILE COMMUNICATION - The present invention relates to a method for encrypting a short message in mobile communication. According to the present invention, a user first inputs short-message content and a short-message password to a first communication electronic device. Then the first communication electronic device writes the short-message content to a short-message packet according to a short-message protocol, configures a set of unused parameters of the short-message packet as a set of encryption parameters according to the short-message protocol, and configures the short-message password to the set of encryption parameters for transmitting the short-message packet containing the set of encryption parameters to a second communication electronic device. Thereby, according to the present invention, the short message is encrypted. After the user of the second communication electronic device receives the short message, he cannot read the received short message unless he inputs the correct password to the second communication electronic device.08-15-2013
20130208890KEY WITH REMOTE CONTROL, IN PARTICULAR FOR MOTOR VEHICLES, AND ARRANGEMENT WITH SUCH A KEY - A key with remote radio operation, particularly for motor vehicles, includes a housing and electronic circuits arranged in the housing for the purpose of authentication of the key, wherein each circuit has an interface for communication with an authenticating entity outside of the key. The problem addressed is that of structuring a key for use with nascent transmission standards. This problem is addressed in that a first circuit of the key has a BTLE interface, and a second circuit of the key has an NFC interface, for the purpose of communication.08-15-2013
20130208891HANDLING MISMATCH OF CRYPTOGRAPHIC KEYS AND RELATED BATTERY DRAIN AND COMMUNICATION EXCHANGE FAILURES - A wireless communications device stores a first cryptographic key in connection with a profile, the profile indicating a security type requiring no credentials and a network name. An access point (AP) supports a wireless local area network (WLAN), the WLAN having the network name, the WLAN supporting the security type and the WLAN requiring a second cryptographic key for encryption. The wireless communications device successfully authenticates and associates with the AP, thus joining the WLAN. Subsequent to joining the WLAN, the wireless communications device conducts encrypted communications with the AP and detects from the encrypted communications that there is a mismatch between the first cryptographic key and the second cryptographic key. Responsive to detecting the mismatch, the wireless communications device bans the profile or the AP or both.08-15-2013

Patent applications in class Wireless communication

Patent applications in all subclasses Wireless communication