Patent application number | Description | Published |
20090164783 | METHODS, APPARATUSES, AND COMPUTER PROGRAM PRODUCTS FOR AUTHENTICATION OF FRAGMENTS USING HASH TREES - An apparatus for authentication of fragments using hash trees may include a processor. The processor may be configured to provide one or more data fragments and a hash tree representing the one or more fragments, send at least one first fragment accompanied by any nodes of the hash tree necessary to authenticate the one or more first sent fragments, and send one or more subsequent fragments accompanied by only some, but not all, of the nodes of the hash tree necessary to authenticate the one or more subsequent fragments with the other nodes that are not sent but are necessary for authentication having been previously sent in conjunction with a prior fragment. | 06-25-2009 |
20090327713 | SYSTEM AND METHOD FOR ESTABLISHING BEARER-INDEPENDENT AND SECURE CONNECTIONS - A system and method for efficiently enabling local security connectivity between electronic devices over multiple bearers. Electronic devices are configured to advertise, over each bearer, their respective configuration parameters for each bearer. After a connection has been established between the electronic devices over a first bearer, the two electronic devices use the first bearer to establish connections over the other bearers using the configuration parameters contained in the advertisements and advertised over the first bearer. Shared keys are established for the other bearers either using keys derived from the first shared key or by using the first secure connection as an out-of-band channel. The present invention also provides for the creation of an ad hoc WLAN connection once a Bluetooth connection has been established. | 12-31-2009 |
20100285774 | METHOD AND APPARATUS FOR USING PSEUDONYMS - An approach is provided for using pseudonyms to protect privacy and anonymity of communication messages. A pseudonym is extracted from a received message for comparison against a precomputed set of pseudonyms associated respectively with a plurality of communities of wireless nodes. The pseudonyms are valid only for a particular time period. | 11-11-2010 |
20120134282 | METHOD AND APPARATUS FOR SELECTING DEVICES TO FORM A COMMUNITY - An approach is provided for selecting devices to form a community. A network manager determines one or more candidate devices within proximity of at least one device. Next, the network manager determines to initiate at least one synchronized capture of sensor data by the at least one device and at least one of the one or more candidate devices. Then, the network manager determines to form the community based, at least in part, on the at least one synchronized capture. | 05-31-2012 |
20130094413 | ADAPTIVE AWAKE WINDOW - A system for facilitating communal apparatus interaction. In accordance with at least one embodiment of the present invention, an apparatus configured to communicate on a wireless channel may receive first information pertaining to wireless traffic expected from other networks also utilizing the wireless channel. The apparatus may then determine whether the received information satisfies a first criterion, and if it is determined that the first information satisfies the first criterion, the apparatus may shorten an awake window duration for communicating on the wireless channel. Alternatively, if it is determined that the information does not satisfy the first criterion, the apparatus may proceed to further determine whether second information pertaining to wireless traffic on the wireless channel that is expected from a network satisfies a second criterion. If it is determined that the second information satisfies the second criterion, the apparatus may proceed to lengthen the awake window duration. | 04-18-2013 |
20130216043 | Security Solution For Integrating a WiFi Radio Interface in LTE Access Network - A method for security for inter-RAT carrier aggregation is disclosed. The method includes encrypting a message using an encryption technique for a first RAT. The method also includes sending, to a UE, at least a portion of the encrypted message using a different, second RAT. Sending using the second RAT does not further encrypt the at least a portion of the encrypted message. The method further includes receiving the at least a portion of the message encrypted using the first RAT protocol. Receiving uses the second, different RAT. The method also includes decrypting the at least a portion of the message using the first RAT protocol. Apparatus and computer readable media are also described. | 08-22-2013 |
20140019763 | METHODS AND APPARATUS FOR AUTHENTICATION - Message authentication in an ad-hoc network. Upon creation of a message, a message authentication code is created using a key shared with members of a group comprising a subset of nodes of the ad-hoc network. The message authentication code may be created using a cryptographic process having the message and a message identifier as inputs. After or in parallel with broadcast of the message, a pointer to the message is broadcast. The message authentication code is publicly broadcast and those members of the group among which the key has been shared are able to authenticate the message as coming from a particular sender. | 01-16-2014 |
20140073290 | Methods And Apparatus For Privacy Protection In Ad Hoc Networks - Systems and techniques for wireless communication. A user device belonging to a group of user devices that may operate as wireless nodes configures a locale parameter based on its sensing of a radio channel. The locale parameter is included in a message readable by members of the group. A group member receiving a message determines a locale parameter based on its own sensing of a radio channel and responds to a received message only if the locale parameter in the message matches the locale parameter based on the sensing of the radio channel by the receiving member within specified bounds. | 03-13-2014 |
20140122882 | METHODS AND APPARATUS FOR DATA SECURITY IN MOBILE AD HOC NETWORKS - Systems and techniques for key management in mobile ad hoc networks are described. Pseudonyms are defined for group members of mobile ad hoc networks such that a pseudonym in a message can be deterministically identified with the sending device only by the sending device and the message recipient. Key management for a group is performed by a group manager, and key management may include key renewal and revocation. Key renewal is performed by a group manager, with the group manager using a set of couple pseudonyms, including a couple pseudonym between the manger and each group member. Key renewal employs a renewal key used to encrypt the updated group key, and the group manager updates the group key be transmitting a message to each group member in proximity, with the message being identified using the couple pseudonym of the manager and the group member. | 05-01-2014 |
20140254384 | Limiting Rate of MAC Address Change in Wireless Modem - A method includes receiving a command to change a medium access control (MAC) address associated with a wireless local area network (WLAN) apparatus; and changing the medium access control address, without restarting a wireless modem of the apparatus, only if a restriction on an allowed rate of medium access control address changes is not violated. An apparatus that operates in accordance with the method is also described. | 09-11-2014 |