Patent application number | Description | Published |
20090013240 | SYSTEM FOR PRECODING PARITY BITS TO MEET PREDETERMINED MODULATION CONSTRAINTS - A system includes an encoder that manipulates postcoded data and produces parity bits, and a parity bit encoder that produces encoded parity bits by inserting into the parity bits one or more flags with polarities, or states, that are selected to produce, after precoding, precoded parity bits that meet predetermined modulation constraints. | 01-08-2009 |
20100037125 | SYSTEM FOR PROVIDING RUNNING DIGITAL SUM CONTROL IN A PRECODED BIT STREAM - A system includes an error correction encoder that encodes data and produces parity bits, and a parity bit processor that disperses the parity bits across the data, placing respective i-bit parity sub-blocks between selected multiple-bit data sub-blocks. The system also modifies one or more of the bits in predetermined positions in respective data sub-blocks based on the bits of the parity sub-blocks that precede them, such that the precoding does not sign invert the data sub-blocks. | 02-11-2010 |
20100052953 | PROVIDING RUNNING DIGITAL SUM CONTROL IN A PRECODED BIT STREAM USING PRECODER AWARE ENCODING - A system includes a precoder-aware running digital sum (RDS) encoder that encodes user data as w-bit sub-blocks, to produce an encoded data block that meets block RDS constraints and consists of encoded data sub-blocks that meet sub-block RDS constraints. The sub-block constraints include the data sub-blocks having the same magnitude RDS before and after precoding. The encoder data block is further encoded using an error correction code to produce parity bits, and the parity bits are dispersed, as i-bit parity sub-blocks, between selected data sub-blocks to form a code word. The code word is then precoded to produce a precoded bit sequence for transmission over a channel. Sub-block run length limit (“RLL”) constraints may also be included, such that the encoded data block meets both RLL and RDS, with the encoded data sub-blocks meeting respective RLL and RDS sub-block constraints. | 03-04-2010 |
20120174187 | SYSTEMS AND METHODS FOR PROVIDING PHYSICAL LAYER SECURITY - The present invention describes systems and methods for providing physical layer security. An exemplary embodiment of the present invention provides a method of providing physical layer security involving receiving message data at a pre-processing device in a wireless transmission device. Furthermore, the method of providing physical layer security involves pre-processing the message data into channel data with the pre-processing device and transmitting the channel data from the wireless transmission device over a wireless transmission link having a path loss. Subsequently, the method of providing physical layer security involves receiving the channel data at a post-processing module in a reception device. Additionally, the method involves post-processing the channel data into the message data with the post-processing module, such that an unauthorized reception device is unable to post-process the channel data when a path loss experienced over the transmission link is greater than a predetermined value. | 07-05-2012 |
20130326630 | PRE-PROCESSOR FOR PHYSICAL LAYER SECURITY - Systems and methods of secure data exchange are disclosed. One such method includes obtaining user data at a physical layer of a transmitter and securing the user data at the physical layer. The user data is secured by processing the user data with a series of non-recursive convolutional encoders interspersed with one or more bit-level permuters. The secured user data is transmitted. | 12-05-2013 |
20140153723 | SYSTEM FOR PROVIDING PHYSICAL LAYER SECURITY - Systems, devices, and methods of physical layer security are disclosed. One such device includes a physical layer security module and a physical layer processing module. The physical layer security module is operable to transform user data in accordance with security characteristics. The physical layer processing module is operable to process the transformed data into a format suitable for the communication channel and further operable to transmit the processed data onto the communication channel. The security characteristics of the physical layer security module are such that decoding the intercepted user data by the eavesdropper results in a bit error rate of about one-half. | 06-05-2014 |
20140171856 | Applications for Physical-Layer Security - Applications for physical layer security are disclosed. One such application is a system comprising a medical sensor device and a wireless communication module. The medical sensor device is operable to generate data representative of a condition of a patient. The wireless communication module is operable to transmit, on a wireless communication channel, the generated data representative of the condition of the patient. The system also includes a physical layer security module residing at a physical layer of the wireless communication module. The physical layer security module is operable to provide a secrecy zone around the physical layer security module by transforming the generated data such that transmission of the generated data is secured from interception by an eavesdropper on the wireless communication channel. | 06-19-2014 |
Patent application number | Description | Published |
20090089082 | GET PREP QUESTIONS TO ASK DOCTOR - The claimed subject matter provides a system and/or a method that facilitates dynamically providing a question to ask a medical professional during an appointment. An interface can receive a portion of medical data. A counselor component can generate a question based on the portion of medical data, wherein the question is generated to elicit an answer from a medical professional during an appointment. Moreover, the counselor component can dynamically generate a second question directed toward the medical professional based upon at least one of the answer or a value of information (VOI) computation. | 04-02-2009 |
20090254466 | SMART SECURE STORAGE - A healthcare smart card management system stores a large amount of healthcare information to overcome shortcomings of separate and largely paper medical and insurance files. Embedded security technology supports partial or separated identity proofing as well as hardware time limited storage. Dynamic contextual privacy consent enhances user, healthcare provider, and insurer privacy and proprietary information to encourage and enable universal adoption. Data is structured in self-executing (“print to device”) for legacy systems as well as in rolled-access format and archival format to balance usage and data integrity purposes. A plurality of network interfaces are incorporated as well as financial transaction codes. Card integrity is enhanced by remote usage oversight, self-destruct monitoring (e.g., time, location, hacking, malfunction, etc.), and integral write-only audit logs. Levering excess storage capacity, a user can store related healthcare information such as exercise regimen, diet journal, emergency contact information, urgent medical conditions for first providers, etc. | 10-08-2009 |