Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


Wireless communication

Subclass of:

380 - Cryptography

380255000 - COMMUNICATION SYSTEM USING CRYPTOGRAPHY

Patent class list (only not empty are listed)

Deeper subclasses:

Class / Patent application numberDescriptionNumber of patent applications / Date published
380273000 Rekeying system 29
380272000 Including hand-off based cryptographic alteration 28
380274000 Synchronization 18
380033000 Using plural paths or channels 15
380031000 Plural modulation of single carrier 9
380271000 Having receiver selection (e.g., pager) 5
20090016530ROLLING CODE SECURITY SYSTEM - A rolling code transmitter is useful in a security system for providing secure encrypted RF transmission comprising an interleaved trinary bit fixed code and rolling code. A receiver demodulates the encrypted RF transmission and recovers the fixed code and rolling code. Upon comparison of the fixed and rolling codes with stored codes and determining that the signal has emanated from an authorized transmitter, a signal is generated to actuate an electric motor to open or close a movable barrier.01-15-2009
20090161872Contact-less tag with signature, and applications thereof - A method, comprising: receiving an encrypted signature from a tag associated with an item; determining a dynamic parameter; obtaining a key based at least in part on the dynamic parameter; decrypting the signature with the key to obtain an identifier; and performing an action related to identification of the item, based on the identifier. Also, a system, comprising: a tag reader configured to receive an encrypted signature from a tag associated with an item; and a processing entity configured to (i) determine a dynamic parameter; (ii) obtain a key based at least in part on the dynamic parameter; (iii) decrypt the signature with the key to obtain an identifier; and (iv) perform an action related to identification of the item, based on the identifier.06-25-2009
20090316903TIME SYNC-TYPE OTP GENERATION DEVICE AND METHOD FOR MOBILE PHONES - The present invention relates to a time sync-type One-Time Password (OTP) generation device and method for a mobile phone. The present invention is configured such that an IC chip, in which a serial number and a secret key for OTP generation are encoded and stored, is mounted in an IC interface provided in the battery mounting part of a mobile phone, and is configured such that a decoding unit for encoding the serial number and secret key of the IC chip, a time counter for counting time information provided from a base station, and an OTP generation module for generating OTP numbers using the time information, the serial number and the secret key as a key value for an OTP program are included in the mobile phone. Accordingly, in accordance with the present invention, it is not necessary for a user to carry a separate OTP generation terminal, and concerns with respect to the hacking of OTP numbers can be alleviated because a serial number and a secret key are stored in an IC chip that cannot be hacked. Furthermore, OTP numbers are generated using time information that is provided by a satellite and is transmitted via a base station, so that no time error relative to a financial institute server occurs, therefore errors in generated time sync-type OTP numbers can be eliminated.12-24-2009
20100080390SYSTEM AND METHOD OF DISTRIBUTING GAME PLAY INSTRUCTIONS TO PLAYERS DURING A GAME - The present invention is directed to a system and method of distributing game play instructions to players during a game, more specifically a system and method for allowing a portable remote terminal and/or a game apparatus to dynamically transmit and/or receive in game instructions in real-time concerning game play instructions to be effected on the field or court, and to be distributed to one, a plurality, or all team players wearing a headgear configured to receive audio transmissions of the game play instructions from a game play apparatus, another headgear and/or the portable remote terminal.04-01-2010
20120207305SECURE SMART POSTER - A smart poster system is provided, which includes a smart poster comprising an NFC device, a mobile device for communicating with the NFC device, and a server unit for providing content to the mobile device, wherein the NFC device is arranged to provide the mobile device with an address of the server unit, the address comprising a counter value, which counter value represents the number of executed read accesses to the NFC device. Also, a method for providing a secure communication channel between a mobile device and a server unit in a smart poster system is conceived, wherein the smart poster system comprises an NFC device for providing the mobile device with an address of the server unit, and wherein the NFC device, upon generating the address, incorporates a counter value into the address, the counter value representing the number of executed read accesses to the NFC device. Thereby, the authenticity of both the NFC device and the server unit is ensured.08-16-2012
Entries
DocumentTitleDate
20080205648APPARATUS, AND ASSOCIATED METHOD FOR LENGTHENING DATA COMMUNICATED IN A RADIO COMMUNICATION SYSTEM WITH PADDING BYTES - Apparatus, and an associated method, for facilitating transmission of block-formatted data by an EDGE-capable mobile station. When the mobile station is instructed to use an MCS-8 modulation coding scheme, in initial transmission of the data, the mobile station determines the amount of data that is to be transmitted. If only a single RLC block is to be transmitted at MCS-8, MCS-6 is instead utilized. And, padding bytes are added to the MCS-6 data blocks.08-28-2008
20080205649Power distribution system secure access communication system and method - A power distribution system may have source, switching and load components, wherein at least one of the source, switching and load components has a wireless communication capability such that it is operable to act as a wireless communication access point. A mobile station seeking to associate with the one component may use a secure access protocol to gain such access. The secure access protocol may provide for receiving at the one component a management message from the mobile station. From the management message the component may obtain mobile identification information used to verify the identity of the mobile station and to initiate communication by sending an association message. Until after successful verification of the mobile station identity the component remains radio silent.08-28-2008
20080219447Systems and Methods of Secure Coding for Physical Layer Communication Channels - Systems and methods of securely communicating from a sender device to a receiver device on a communication channel are disclosed. One disclosed method is for securely communicating from a sender device to a receiver device on a main channel when an eavesdropper device is listening on an eavesdropper channel. The main channel has an signal-to-noise ratio SNR09-11-2008
20080226073METHOD AND APPARATUS FOR SECURITY IN A DATA PROCESSING SYSTEM - Method and apparatus for secure transmissions. Each user is provided a registration key. A long-time updated broadcast key is encrypted using the registration key and provided periodically to a user. A short-time updated key is encrypted using the broadcast key. The short-time key is available with each broadcast message, wherein sufficient information to calculate the short-time key is provided in an Internet protocol header preceding the broadcast content. Broadcasts are then encrypted using the short-time key, wherein the user decrypts the broadcast message using the short-time key.09-18-2008
20080226074METHOD AND APPARATUS FOR CIPHERING PACKET UNITS IN WIRELESS COMMUNICATIONS - A method and apparatus are disclosed relating to ciphering and de-ciphering of packet units in wireless devices during retransmission in wireless communications. The packet units are re-segmented with the ciphering done on the re-segmented packet unit or on a radio link control protocol data unit (RLC PDU) with or without segmentation. Alternatively, the re-segmentation is done on the radio link control service data unit (RLC SDU) with or without segmentation. Alternatively, the ciphering process and multiplexing of the RLC PDU is done in the medium access control (MAC) layer of a MAC PU before undergoing a hybrid automatic repeat request (HARQ) process for retransmission. Further, the ciphering process in the RLC is done on a packet data convergence protocol packet data unit (PDCP PDU).09-18-2008
20080226075Restricted services for wireless stations - A technique for providing restricted access to a wireless network involves recognizing a service descriptive identifier (SDID). The SDID may be transmitted to wireless stations that query the wireless network so that the wireless stations can at least gain access to restricted services provided by the wireless network. The SDID may include quality of service (QoS) parameters, as well, thereby facilitating dynamically restricted access to the wireless network.09-18-2008
20080226076PROVIDING A USER DEVICE WITH A SET OF ACCESS CODES - A method for providing a user device with a set of access codes comprises, in the user device, storing an encryption key and an identification code, and sending a message containing the identification code to a server via a communications network. In the server, an encryption key is stored corresponding to the key stored in the user device, allocating the set of access codes on receipt of the identification code from the user device. A look up function is performed based on the identification code received in the message to retrieve the key from storage. The set of access codes is encrypted using the retrieved key to produce an encrypted set. A message containing the encrypted set is sent to the user device via the network. In the user device, the encrypted set received from the server is decrypted using the key in storage, and storing the decrypted set of access codes for use by a user of the user device.09-18-2008
20080232588SYSTEM AND METHOD FOR IMPLEMENTING CONTENT PROTECTION IN A WIRELESS DIGITAL SYSTEM - A system includes a line-based receiver for receiving protected content from a source and a line-based transmitter for providing the protected content to a destination. The protected content is secure, such as by using a High-bandwidth Digital Content Protection (HDCP) mechanism. Between the line-based transmitter and receiver is a wireless transmitter and a wireless receiver. The wireless transmitter establishes an encrypted wireless link with the wireless receiver according to a second encryption mechanism. The wireless transmitter is further configured for receiving the protected content from the line-based receiver, encrypting the protected content according to the second encryption mechanism, and wirelessly transmitting the encrypted protected content. The wireless receiver is further configured for receiving the wirelessly transmitted protected content from the wireless transmitter and decrypting the protected content according to the second encryption mechanism.09-25-2008
20080240438SYSTEM AND METHOD FOR CIPHERING KEY FORWARDING AND RRC PACKET DECIPHERING IN A UMTS MONITORING SYSTEM - System and method for forwarding a ciphering key to a decipher application comprising capturing a first message carrying the ciphering key from a first network interface, identifying a network node associated with the first network interface, identifying a monitor responsible for processing messages captured from interfaces coupled to the network node, and forwarding the ciphering key to the monitor. In an alternative embodiment, the method may further comprise capturing second messages carrying encrypted messages from a second network interface, and deciphering the second messages using the ciphering key. The method may also comprise identifying user equipment associated with the first messages, and selecting a deciphering application running on the monitor using a user equipment identity.10-02-2008
20080260154METHOD AND SYSTEM FOR PROTECTING THE INTERNET ACCESS OF A MOBILE TELEPHONE, AND CORRESPONDING MOBILE TELEPHONE AND TERMINAL - SIM cards of mobile telephones contain an identification code for having access to the Internet. However, such cards can be removed from the mobile telephone which they are normally provided for, in order to be inserted into other mobile telephones, smartphones or on the PCMCIA card of a PC.10-23-2008
20080267404Security System for Devices of a Wireless Network - The invention relates to a security system for wireless networks, comprising a first portable unit (10-30-2008
20080267405System for ensuring encrypted communication after handover - During connection setup with a first radio access network, a multimode mobile station sends an unprotected initial signaling message that includes information about those encryption algorithms that the multimode mobile station supports when it communications in a second radio access network. The first radio access network saves some or all the information. Then it composes and sends an integrity-protected message that includes information about the encryption algorithms supported by the multimode mobile station in the second radio access network.10-30-2008
20080273700Systems and Methods For Multicast Retransmission over a Secure Wireless LAN - Systems and methods for broadcast and multicast retransmissions within a protected wireless communications system are described. Retransmitted broadcast or multicast frames are designated by modification of fields or subfields in the MAC header of the frame which are constituent parts of the additional authentication data used to generate encryption keys. Such modifications cause legacy receivers to disregard the retransmitted frames or render legacy receivers to be unable to decrypt the retransmitted frame, avoiding the generation of duplicate frames. Non-legacy receivers recognizing the modification conventions can restore the MAC header to the original state and can reconstruct the original encryption keys and decrypt the retransmitted frames. A non-legacy transmitter can retransmit a frame without the need to re-encrypt the frame.11-06-2008
20080279381Secure messaging - Secure authentication and messaging for mobile online transactions are performed by a secure messaging platform. The secure messaging platform may include a token coupled to a mobile device, or a mobile device alone. The token enables secure access, and client and server protocols enable secure transactions using text/SMS messaging.11-13-2008
20080285755Method and Device for Accessing a Sim Card Housed in a Mobile Terminal - The invention concerns a cryptographic device (11-20-2008
20080292101Method and System for Improving Robustness of Secure Messaging in a Mobile Communications Network - A mobile communications network has mobile communications capabilities and supports a secure messaging service, such as an SMS messaging service, that allows a message sender and at least one message receiver (at least one among the message sender and the message receiver being a user of the mobile communications network) to exchange messages encrypted by means of a cryptographic process performed by the message sender, so as to obtain an encrypted message that can be decrypted by a corresponding cryptographic process performed by the intended message receiver. End-to-end security of the exchanged message is thus achieved. A cryptographic algorithm, exploited by the user of the mobile communications network for performing the cryptographic process, is modified by exploiting the mobile communications capabilities of the mobile communications network. Robustness and reliability over time of the end-to-end security messaging is improved.11-27-2008
20080310634GENERATION OF DEVICE DEPENDENT RSA KEY - A portable electronic device for exchanging encrypted data with other electronic devices includes a processor, a memory operatively coupled to the processor, and a prime number generation circuit operatively coupled to the processor and memory. The prime number generation circuit includes logic that generates at least two prime numbers based on unique data stored in the electronic device, wherein said at least two prime numbers are always the same at least two prime numbers. The generated prime numbers then can be used to generate RSA public and private keys within the electronic device.12-18-2008
20090016529METHOD AND SYSTEM FOR PREVENTION OF UNAUTHORIZED COMMUNICATION OVER 802.11W AND RELATED WIRELESS PROTOCOLS - A method for disrupting undesirable wireless communication in wireless network is provided. The method includes providing one or more sniffer devices to monitor wireless communications in a wireless network and detecting a wireless connection established between an access point device and a client device using the one or more sniffer devices. Preferably, the wireless connection is configured for not being disconnected upon receiving a spoofed disconnection request transmitted from a wireless device other than the access point device and the client device. The method also includes disrupting the wireless connection established between the access point device and the client device by transmitting one or more spoofed connection requests from at least one of the one or more sniffer devices.01-15-2009
20090022316Methods And Apparatus For Reducing Airlink Congestion And Processing Time Associated With Ciphering Information In A Wireless Network - One illustrative method involves the steps of receiving a ciphering mode information message from a wireless network; identifying and processing valid radio bearer downlink ciphering activation time information in the ciphering mode information message when it is part of a security mode command message; and refraining from processing any valid radio bearer downlink ciphering activation time information in the ciphering mode information message when it is part of a message that is different from the security mode command message (i.e. when it is part of a radio network subsystem relocation procedure). The method may include the additional steps of producing valid radio bearer uplink ciphering activation time information for inclusion within a response message when the ciphering mode information message is part of the security mode command message; refraining from producing any valid radio bearer uplink ciphering activation time information when the ciphering mode information message is part of a message that is different from the security mode command message; and causing the response message to be sent to the wireless network.01-22-2009
20090028334Method and Apparatus for Providing Security in a Radio Frequency Identification System - One aspect involves a communication that contains a portion encrypted with a selected key can be wirelessly transmitted by a part for reception and decryption by plural tags. A different aspect involves a tag receiving a first sequence of wireless communications that each contain sequencing information regarding the first sequence, while receiving a second sequence of wireless communications that each include sequencing information regarding the second sequence, and further involves monitoring the sequencing information from received communications of the first sequence while separately monitoring the sequencing information from received communications of the second sequence.01-29-2009
20090034729SECURE MESSAGE HANDLING ON A MOBILE DEVICE - Systems, methods, and software for providing digital security to a child message transmitted from a mobile device to a messaging server, where the mobile device typically does not transmit the parent message with the child message to the messaging server. Whether to apply digital security, such as encryption or a digital signature, or both, is determined, and if the mobile device does not include a complete copy of a parent message for insertion into the child message, the mobile device selectively downloads the parent message from the messaging server prior to the computation of a digital signature or prior to encryption. The systems and methods may also provide a check of the child message size, when the child message includes inserted parent content, to ensure that the child message does not exceed any prescribed limits on message size.02-05-2009
20090034730PROCESS FOR DIGITAL SIGNING OF A MESSAGE - A method and apparatus for the digital signing of a message to be signed, the message to be signed is transmitted via a communication network to a mobile radio telephone to be used as a signing unit. A message to be signed is transmitted from a transmitter to a receiver and then from the receiver to the mobile radio telephone via a telephone network. The mobile radio telephone user indicates that the message to be signed should be signed, and the mobile radio telephone generates a signed message. The signed message is then transmitted from the mobile radio telephone to the receiver and from the receiver to an addressee.02-05-2009
20090034731Information processing apparatus and information processing method - In an information processing apparatus, a first communication unit receives encrypted data from a portable terminal device when the portable terminal device is within a first communication range, a second communication unit receives decryption information from the portable terminal device when the portable terminal device is within a second communication range shorter than the first communication range, and a decryption unit decrypts the encrypted data with the decryption information.02-05-2009
20090041246ENCRYPTION OF THE SCHEDULED UPLINK MESSAGE IN RANDOM ACCESS PROCEDURE - Systems and methodologies are described that facilitate employing a random access procedure that leverages encrypted and/or unencrypted data in a scheduled uplink message. A random access preamble can be sent from an access terminal to a base station, and a random access response can be sent from the base station to the access terminal. A scheduled transmission message can be sent from the access terminal to the base station based upon a grant included in the random access response. When contention based random access is employed, the scheduled transmission message or a portion thereof can be unencrypted. Further, non-security-critical information can be sent in an unencrypted manner in the scheduled transmission message, while security-critical information can be encrypted for transmission (e.g., included in an encrypted portion of the scheduled transmission message and/or transmitted in a subsequent encrypted normal scheduled transmission message).02-12-2009
20090041247KEY IDENTIFIER IN PACKET DATA CONVERGENCE PROTOCOL HEADER - Systems and methodologies are described that facilitate identifying a plurality of keysets utilized in a communications network. The keysets can include ciphering keys that provide data encryption and decryption and integrity keys that provide data integrity protection. A key identifier can be included in a packet data convergence protocol header that indicates a keyset employed in connection with data in a protocol data unit. In addition, a route indicator can be provided in a radio link control header that distinguishes a source cell and a target cell in networks configured without RLC reset.02-12-2009
20090046860INTEGRATED DATA TRANSCEIVER AND SENSOR FOR THE GENERATION OF A SYMMETRICAL CRYPTOGRAPHIC KEY - Systems for exchanging encrypted data communications between devices. A system can comprise a first device and a second device. The first device can comprise a first sensor adapted to create a first data profile based at least in part on a sensed condition, and a first transceiver integrated with the first sensor and adapted to generate a first cryptographic key from the first data profile. The second device can comprise a second sensor adapted to create a second data profile based at least in part on the sensed condition, the second data profile being substantially similar to the first data profile, and a second transceiver integrated with the second sensor and adapted to generate a second cryptographic key from the second data profile, the first and second cryptographic keys comprising a set of identical cryptographic keys.02-19-2009
20090046861SECURITY FOR A HETEROGENEOUS AD HOC MOBILE BROADBAND NETWORK - A server provides security for a heterogeneous ad hoc mobile broadband network. The server is configured to maintain an encrypted control session with an ad-hoc service provider and a mobile client while enabling the mobile client to support an encrypted data tunnel through the ad-hoc service provider.02-19-2009
20090060192METHOD AND APPARATUS FOR PROVIDING SECURITY IN WIRELESS COMMUNICATION NETWORKS - A method includes receiving data at a first wireless node in a wireless network, where the data is associated with an industrial control and automation system. The method also includes decrypting the received data using a first encryption key to produce decrypted data and encrypting the decrypted data using a second encryption key to produce encrypted data. The method further includes communicating the encrypted data to at least a second wireless node in the wireless network. Another method includes generating first data at a first wireless node in a wireless network, where the data is associated with an industrial control and automation system. The other method also includes encrypting the first data using an encryption key and transmitting the first data to multiple second wireless nodes in the wireless network, where the second wireless nodes are capable of using the same encryption key to decrypt the first data.03-05-2009
20090074187WIRELESS COMMUNICATION SYSTEM AND WIRELESS COMMUNICATION METHOD - The present invention provides a technology of effectively avoiding tracing on a terminal performed with an identification number being a target and DoS attack without making any significant changes to a communication system.03-19-2009
20090103731Authentication of 6LoWPAN Nodes Using EAP-GPSK - A system is provided that includes at least one processor and instructions that when executed by the processor promote exchanging extensible authentication protocol (EAP) messages for authentication by sending a plurality of data packets formatted in accordance with an IEEE 802.15.4 standard. The EAP messages are encapsulated within a data field of the IEEE 802.15.4 standard data packet and wherein the encapsulated EAP message comprises an EAP header and a data portion.04-23-2009
20090103732Method of personalizing a NFC Chipset - The invention relates to a method for personalizing a secure processor in a NFC system to execute a secure application, comprising steps of obtaining by a server identification data of a user memorized in a secure storage medium, personalization data corresponding to the user identification data, and identification data of a NFC system of the user, comprising an encryption key of the secure processor, encrypting by the server personalization data using the encryption key, transmitting to the NFC system encrypted personalization data, receiving by the secure processor encrypted personalization data, deciphering personalization data, and memorizing in a secured way personalization data by the secure processor.04-23-2009
20090122986SYSTEMS AND METHODS FOR PREVENTING TRANSMITTED CRYPTOGRAPHIC PARAMETERS FROM COMPROMISING PRIVACY - A method for secure cryptographic communication comprises transmitting information that identifies a group key from a first device to a second device. The method further comprises, in the first device, using the group key to encrypt an input vector, transmitting the encrypted input vector, encrypting privacy-sensitive information using a device key, an encryption algorithm, and the input vector, and transmitting the encrypted privacy-sensitive information to the second device.05-14-2009
20090136035Public key infrastructure-based bluetooth smart-key system and operating method thereof - A public key infrastructure (PKI)-based Bluetooth smart-key system and operating method thereof. The system includes a locking device and a mobile communication terminal. The locking device enables Bluetooth communication and enables PKI-based data transmission. The mobile communication terminal embedded with a Bluetooth module performs a remote unlocking or keyless entry function through Bluetooth communication with the locking device.05-28-2009
20090141897Content Communication Over a Wireless Communication Link - In a method of communicating content over a wireless communication link between a base station set-top (BSS) and one or more hosts, where each of the one or more hosts have an interface protocol substantially complying with at least a subset of a copy protection standard, an encrypted signal is at least one of received and stored in the BSS, and the encrypted signal is turned into an encrypted data packet stream. The BSS wirelessly transmits the data packet stream to one or more wireless interface apparatuses (WIAs) which are interfaced with at least one host through the interface protocol. In addition, the WIA forwards the encrypted data packet stream to the one or more hosts through implementation of the interface protocol.06-04-2009
20090141898Method and system for secure data aggregation in wireless sensor networks - A method for transmitting sensed data in a wireless sensor network including multiple sensors and a database, the method includes: automatically dividing the multiple sensors into sensor groups, each of the sensor groups including at least one sensor; determining a lead sensor in each of the sensor groups; encrypting the sensed data to generate encrypted data in ones of the multiple sensors excluding the determined lead sensors; and transmitting the encrypted data.06-04-2009
20090141899DUAL-MODE WIRELESS SENSOR NETWORK SYSTEM AND KEY ESTABLISHING METHOD AND EVENT PROCESSING METHOD THEREOF - A dual-mode wireless sensor network system including a local wireless sensor, a local event processing device, and a remote event processing device is provided. The local wireless senor detects and announces an abnormal event. The local event processing device and the remote event processing device receive the abnormal event announcement. When the local wireless senor detects the abnormal event, the local wireless sensor encrypts an abnormal event message related to the abnormal event with a regular mode key and transmits the encrypted abnormal event message to the local event processing device. When the local wireless sensor does not receive a response message from the local event processing device, the local wireless sensor encrypts the abnormal event message with a special mode key and transmits the encrypted abnormal event message to the remote event processing device. Thereby, the abnormal event can be successfully announced even with highly protected privacy.06-04-2009
20090141900METHOD AND APPARATUS FOR ENABLING PHYSICAL LAYER SECRET KEY GENERATION - A method and apparatus for generating physical layer security keys is provided. Channel impulse response (CIR) measurements are recorded. Each CIR measurement is associated with a time-stamp. Where possible, the time-stamps are paired with time-stamps that are associated with another plurality of CIR measurements. The CIR data associated with the paired time-stamps is aggregated. Each of the aggregated CIR measurements is aligned, and at least one CIR measurement is selected for use in secret key generation.06-04-2009
20090154701ON DEVICE NUMBER LOCK DRIVEN KEY GENERATION FOR A WIRELESS ROUTER IN WIRELESS NETWORK SECURITY SYSTEMS - The present invention solve the problems in the prior art by a embedding a number lock system on the router which serves as a input mechanism for entering the shared key or a shared seed which generates a shared key. A combination of numbers and letters may be used on the dials of the number lock. There is a slider to set the security protocol in use or turn it off. Once the user sets his key combination using the number lock on the device and sets a security mechanism he can go to his computer or a PDA or any device that supports Wi-Fi he will use the same mechanism that he does today with existing technology to enter the shared key and select the security mechanism.06-18-2009
20090154702METHOD AND SYSTEM FOR MOBILE COMMUNICATIONS - When a network pages the temporary user mobile identifier of a mobile station, the mobile station sends a response to the network. Next, the network checks the authenticity of the user using a ciphering key, corresponding to the temporary user mobile identifier and a random number. If the temporary user mobile identifier is authenticated, a normal incoming call acceptance procedure is executed. If the mobile station is authenticated although the temporary user mobile identifier is wrong, the network reassigns a new temporary user mobile identifier to the mobile station and stops the current communication. In communication, the network and the mobile station mutually notify encipherment-onset time and negotiate about encipherment manner with each other. In addition, diversity handover is commenced upon a call attempt. Furthermore, if a branch replacement is necessary, the current branch is replaced by new branches capable of executing the diversity handover. Additionally, when a new call occurs to or from the mobile station capable of treating a plurality of calls simultaneously, the mobile station uses the same branch structure and the same communication frequency band for all of calls. Additionally, when a new call occurs to or from the mobile station capable of treating a plurality of calls simultaneously, a branch structure and a communication frequency band, which can continue all of the calls, are selected and used. Therefore, the mobile communications system is suitable for transmission of various sorts of data in accordance with the development of multimedia.06-18-2009
20090161871METHOD AND SYSTEM FOR PROVIDING A GENERIC PROGRAM GUIDE DATA FROM A PRIMARY CONTENT PROVIDER TO A USER NETWORK DEVICE THROUGH A PARTNER SERVICE PROVIDER - A system and method for providing program guide data includes a partner service provider generating a request for a first encrypted token using a partner site identifier and a primary service provider having an authentication web service receiving the request for the first encrypted token. The primary service provider validates the partner site identifier, generates a first encrypted token at the authentication web service when the partner site identifier is valid and communicates the encrypted token to the partner service provider. The partner service provider requests for program guide data from the partner service provider with the first encrypted token. The primary service provider communicates program guide data to the partner service provider through the network. A user network device requesting program guide data from the partner service provider. The partner service provider communicates the program guide data from the partner service provider through the network. The user network device displays the program guide data on a display.06-25-2009
20090169008SYSTEM AND METHOD FOR TRACKING TESTING OF SOFTWARE MODIFICATION PROJECTS FROM A WIRELESS MOBILE DEVICE - A wireless mobile device for tracking the progress of testing a set of software modification projects in an install plan uses a centralized project database where the testers can update their progress of testing software modification projects as they perform the tests. The central database advantageously eliminates the need to contact individual testers of each and every project every time a status report needs to be generated. Instead, through the wireless mobile device, a manager at any time can automatically generate status reports which contain the testing progress of particular projects in real-time to more accurately monitor what projects are on track and what projects may be falling behind schedule.07-02-2009
20090175447COMMUNICATION SYSTEM, WIRELESS COMMUNICATION APPARATUS, AND COMMUNICATION METHOD - In a communication system, a first wireless communication apparatuses belonging to a communication group receives a connection request frame including a notifying security level from a second communication apparatus outside of the communication group. The first communication apparatus stores a reference security level peculiar to the communication group, which is selected from security levels depending on one of encryption methods including non-encryption and encryption strengths. In the first communication apparatus, the notifying security level is compared with the reference level, and a response frame including one of a connect rejection and a connection permission is described, is generated and transferred to the second communication apparatus. The connect rejection represents a rejection of connection to the second communication apparatus and the connection permission represents a permission of connection to the second communication apparatus.07-09-2009
20090190761METHOD AND SYSTEM FOR MOBILE COMMUNICATIONS - When a network pages the temporary user mobile identifier of a mobile station, the mobile station sends a response to the network. Next, the network checks the authenticity of the user using a ciphering key, corresponding to the temporary user mobile identifier and a random number. If the temporary user mobile identifier is authenticated, a normal incoming call acceptance procedure is executed. If the mobile station is authenticated although the temporary user mobile identifier is wrong, the network reassigns a new temporary user mobile identifier to the mobile station and stops the current communication. In communication, the network and the mobile station mutually notify encipherment-onset time and negotiate about encipherment manner with each other. In addition, diversity handover is commenced upon a call attempt. Furthermore, if a branch replacement is necessary, the current branch is replaced by new branches capable of executing the diversity handover. Additionally, when a new call occurs to or from the mobile station capable of treating a plurality of calls simultaneously, the mobile station uses the same branch structure and the same communication frequency band for all of calls. Additionally, when a new call occurs to or from the mobile station capable of treating a plurality of calls simultaneously, a branch structure and a communication frequency band, which can continue all of the calls, are selected and used. Therefore, the mobile communications system is suitable for transmission of various sorts of data in accordance with the development of multimedia.07-30-2009
20090196421METHOD OF ENCRYPTION AND DECRYPTION, TRANSMITTER, AND RECEIVER IN RADIO COMMUNICATION SYSTEM - A transmitter encrypts data blocks using the encryption key and variable number information (CTR) sequentially updated for every encryption of the respective data blocks; selectively attaches one of the variable number information (CTR) used for encrypting the respective data blocks, to the encrypted data block; and transmits the encrypted data blocks to a receiver. The receiver determines, based on (a) reception orders of a first encrypted data block with the variable number information (CTR) attached and a second encrypted data block without the variable number information (CTR) attached and (b) the variable number information (CTR) attached to the first encrypted data block, variable number information (CTR) used for encrypting the second encrypted data block; and decrypts the second encrypted data block using the determined variable number information (CTR) and the decryption key.08-06-2009
20090202076Communications System via Data Scrambling and Associated Methods - A communications system that may include a transmitter, a receiver, connected over a communications network. A communication link on the communications network may transfer data between the transmitter and the receiver. The system may also include a logic unit to scramble a plurality of portions of the data at the transmitter based upon the communication link and may unscramble the plurality of portions of the data at the receiver. As a result, the logic unit may provide improved performance of the communication link and/or reduced power consumption of the communication link.08-13-2009
20090208012DECRYPTION SYSTEM AND RELATED METHOD THEREOF - A decryption system is provided. The decryption system includes a first RFID tag, a second code providing apparatus and a decryption module. The first RFID tag is for storing an encrypted data generated by encrypting an original data according to a first code. The second code providing apparatus is for providing a second code. The decryption module includes an RFID reader and a computing unit. The RFID reader reads the encrypted data from the first RFID tag. The computing unit receives the second code from the second code providing apparatus without utilizing the Internet, and decrypts the encrypted data according to the second code to obtain the original data.08-20-2009
20090214035METHOD AND APPARATUS FOR SECURE COMMUNICATION IN A DIGITAL TWO WAY RADIO PROTOCOL - A method and apparatus for secure communication in a digital two way radio protocol is disclosed herein. The method includes the step of, at an originating radio, generating at least one control value (08-27-2009
20090214036AUTHENTICATION MECHANISMS FOR WIRELESS NETWORKS - Security techniques and security mechanisms for wireless networks that transmit content such as advertisements. According to exemplary techniques, control messages comprising unrequested content (e.g., advertisement data) may be transmitted in response to a request from a client device, while in other exemplary techniques the control messages may be transmitted without any request from a client device. In some exemplary implementations, security mechanisms such as public key cryptography algorithms may be used to secure transmissions. In some of these techniques which implement public key cryptography, a user may be required to retrieve a public key from a source other than the wireless access point transmitting encrypted advertisements (e.g., a sign or terminal in a commercial entity transmitting such advertisements, or from a web service), such that the user may confirm that the encrypted content is from a source matching the retrieved public key and thus confirm the authenticity of a wireless access point.08-27-2009
20090214037Methods and Apparatuses to Secure Data Transmission in RFID Systems Against Eavesdropping - Methods and apparatuses to secure data transmission in a radio frequency identification (RFID) system and other Vernam-cipher based cryptography methods against eavesdropping. In one embodiment, a method implemented in an RFID system includes generating an encryption key using previously shared information and random information received in a current communication session and securing a communication in the current session using the encryption key.08-27-2009
20090214038SECURITY-ENHANCED RFID SYSTEM - The present invention relates to RFID systems. In particular, the invention relates to an RFID system having enhanced security of communication between a tag and a tag reader. In a first aspect of the present invention there is provided an RFID system comprising at least one RFID reader; control means for communicating with an RFID tag by public-key encryption via said reader; at least one RFID tag adapted to encrypt a response to a transmission by a reader using a public-key transmitted to the tag; unauthorised broadcast detection means for detecting a broadcast made by an unauthorised reader; and alert means for providing an alert in the event a broadcast by an unauthorised reader is detected.08-27-2009
20090214039METHOD AND SYSTEM FOR SHORT-RANGE MOBILE DEVICE COMMUNICATION MANAGEMENT - A method and system for managing short-range mobile device communications are provided. The method includes receiving a user-defined criteria for requested information. The method includes automatically detecting a set of in-range devices, wherein each in-range device is associated with an identifier. The method includes receiving a broadcasted public information from each in-range device. The method includes, responsive to detecting the received broadcasted public information satisfies the user-defined criteria, displaying public info to a user. The method includes, responsive to a user command, transmitting a message in response to the broadcasted public information.08-27-2009
20090220084SYSTEM AND METHOD FOR DYNAMICALLY UPDATING MESSAGE LIST INDICATORS - Systems and methods for processing messages within a wireless communications system are disclosed. At least part of an encrypted message is received at a device for which it is intended. A security indicator on the device indicates that a message is encrypted. The message is decrypted, and it is determined whether the decrypted message includes a logical attachment. If there is such a logical attachment, an attachment indicator on the device indicates that the encrypted message includes an attachment associated with the message independent of the encryption attachment itself. The indicators may be updated via direct user action, or transparently and free from direct user input to said device.09-03-2009
20090220085Relay MAC Header for Tunneling in a Wireless Multi-User Multi-Hop Relay Networks - Provided is a data structure for transmitting a relay media access control (MAC) protocol data unit (PDU) between stations in a multi-hop relay network. The MAC PDU includes an encryption control bit, an allocation subheader bit, a grant management subheader bit, a fragmentation subheader bit, a packing subheader bit, a quality of service subheader bit, and an encryption key sequence. The relay MAC PDU is transmitted in a tunnel established between base station and relay station.09-03-2009
20090220086METHOD AND SYSTEM FOR SECURED WIRELESS DATA TRANSMISSION TO AND FROM A REMOTE DEVICE - The device tracking location adherence and route adherence technology, according to an exemplary embodiment of this invention, at least provides for secure message reception from a remote device. The present invention allows for secure data transmission between a remote device and while employing a small amount of bandwidth thereby providing a cost-effective data transmission system. This is especially advantageous where a fleet of remote devices is employed within a network.09-03-2009
20090225985METHOD, APPARATUS AND PRODUCT FOR RFID AUTHENTICATION - A method and apparatus for repeated communication sessions between a sender (e.g., RFID tag) and a receiver (RFID reader) that employs a proactive information security scheme is based on the assumption that the information exchanged during at least one of every n successive communication sessions is not exposed to an adversary. The sender and the receiver maintain a vector of n entries that is repeatedly refreshed by pairwise XORING entries, with a new vector of n entries that is randomly chosen by the sender and sent to the receiver as a part of each communication session. Also, a computational secure scheme based on the information secure scheme is employed to ensure that even in the case that the adversary listens to all the information exchanges, the communication between the sender and the receiver is secure. In particular, the scheme can be used in the domain of remote controls (e.g., for cars).09-10-2009
20090232307METHOD OF ESTABLISHING VIRTUAL SECURITY KEYPAD SESSION FROM A MOBILE DEVICE USING JAVA VIRTUAL MACHINE - A system and method are provided that allow mobile devices to securely communicate over wireless network with one or more security system control panels for controlling the security systems remotely. A mobile device may include an application or software that presents a virtual security keypad to the user on the mobile device for entering data or receiving data as if the user were directly using a security system control panel at a premise being secured. Mobile device communicates with a network operating center system using encrypted communication. The network operating decrypts the communication from the mobile device and sends it to a security system control panel. The network operating center system receives responses from the security system control panel, encrypts the responses and sends to the mobile device.09-17-2009
20090232308SYSTEM AND METHOD FOR SCRAMBLING WIRELESS SIGNALS USING A SECURE TIME VALUE - According to one embodiment, the invention is directed to a method for securing communications with an electronic device. The method comprises obtaining a dynamic, non-repeating value from internal logic within a remote control. Thereafter, information including the non-repeating value is encrypted to produce an encrypted value, which is transmitted along with a radio frequency (RF) command from the remote control in order to restrict wireless control of the electronic device.09-17-2009
20090232309METHOD AND APPARATUS FOR SCRAMBLING FOR DISCRIMINATION OF SEMI PERSISTENT SCHEDULING GRANTS - A method for wireless communications is provided. The method includes receiving a control payload and a check protocol on a wireless link and decoding the control payload and the check protocol. The method also includes analyzing the control payload and the check protocol in view of a scrambling protocol and determining at least one control command based on the control payload, the check protocol, and the scrambling protocol.09-17-2009
20090238366Random access method for improving scrambling efficiency - A random access method for improving scrambling performance is disclosed. In particular, when a terminal performs a random access to a specific network, the present invention proposes a scheme for transmitting an uplink transmission signal corresponding to an uplink grant by scrambling the uplink transmission signal using a terminal identification information value received via a random access response message. Preferably, the terminal identification information value used for the scrambling is able to use a temporary C-RNTI received via the random access response message.09-24-2009
20090245517SYSTEMS AND METHODS FOR GROUP KEY DISTRIBUTION AND MANAGEMENT FOR WIRELESS COMMUNICATIONS SYSTEMS - A novel group key distribution and management scheme for broadcast message security is provided that allows an access terminal to send a single copy of a broadcast message encrypted with a group key. Access nodes that are members of an active set of access nodes for the access terminal may decrypt and understand the message. The group key is generated and distributed by the access terminal to the access nodes in its active set using temporary unicast keys to secure the group key during distribution. A new group key is provided every time an access node is removed from the active set of access nodes for the access terminal.10-01-2009
20090262938METHOD FOR ENCRYPTING AND DECRYPTING WIRELESS SIGNALS AND APPARATUS THEREOF - An apparatus for encrypting wireless signals comprises an encryption engine, a transmit packet buffer and a transmit control logic. The encryption engine encrypts the wireless signals. The transmit packet buffer stores the encrypted wireless signals. The transmit control logic forwards the encrypted wireless signal from the transmit packet buffer to a wireless channel.10-22-2009
20090262939Authentication Apparatus, System and Method - An authentication apparatus includes a communication module, a storage module, a processing module and an authentication module. The communication module, based on a wireless communication protocol, establishes a communication link with an electronic apparatus. The storage module stores a plurality of encryption logics and a plurality of authentication logics corresponding to the plurality of encryption logics. The processing module chooses a first encryption logic among the plurality of encryption logics and transmits the first encryption logic to the electronic apparatus. The authentication module receives authentication data based on the first encryption logic from the electronic apparatus, retrieves a first authentication logic corresponding to the first encryption logic from the storage module, and authenticates the electronic apparatus according to the authentication data based on the first authentication logic.10-22-2009
20090268911Securing Wireless Body Sensor Networks Using Physiological Data - A password protocol for establishing secure communications between sensor nodes in a network using secure environmental values (SEV). A first sensor sends a message to a second sensor comprising the first sensor's location and a key encrypted by a first SEV. The second sensor responds with a message comprising a key encrypted by a second SEV and a first nonce encrypted by a session key. The first sensor sends a third message comprising the first nonce and a second nonce encrypted by the session key. The second sensor verifies the first nonce and sends a fourth message comprising the encrypted second nonce. The first sensor then verifies the second nonce.10-29-2009
20090268912DATA USE MANAGING SYSTEM - [Problems] To provide a data use managing system which forces a face- to face permission by an administrator of confidential data when using the confidential data stored in mobile terminal.10-29-2009
20090274301VALIDATION OF STORED OR INCOMING MESSAGES - A mobile device can save time by validating a stored message, which was previously unreadable, by utilizing a related message, which can be received at a much quicker rate. In accordance with some aspects, the mobile device can save time by validating the stored message by reading a new related message and subsequently re-reading or descrambling the stored message or its CRC. The first attempt to read the message might not be successful due to a scrambling information change or due to other reasons. The reason for the failure of the first attempt to read the message may be determined based on whether a later attempt to read the message with the same or a different scrambling information is successful.11-05-2009
20090279700INFORMATION-THEORETICALLY SECURE SECRECY GENERATION - A method and apparatus are provided for performing information-theoretically secure cryptography using joint randomness not shared by others. Two valid communicating entities independently generate samples of a shared source that is not available to an illegitimate entity. The shared source may be a satellite signal, and each legitimate entity may generate uniformly distributed samples from a binary phase-shift keying signal received on an independent channel. Alternatively, the shared source may be a channel between the two legitimate entities, such that each legitimate entity generates samples of unknown distribution based on the channel impulse response of the channel. One legitimate entity generates an encryption key, a quantization error, and a syndrome from its samples. The quantization error and the syndrome are reported to the other legitimate entity. The other legitimate entity generates a matching encryption key using its samples, the quantization error, and the syndrome.11-12-2009
20090279701CONTROLLING ACCESS NODES WITH NETWORK TRANSPORT DEVICES WITHIN WIRELESS MOBILE NETWORKS - A network controls provision of access functionality by an access node to provide a network service to a subscriber device. For example, the network device may control the queuing and forwarding of packets by the access node to facilitate packet transmission according to, for example, a Quality of Service class. The network device may send control messages to the access node to dynamically configure a control object stored by the access node, such as a Quality of Service profile. The network device may be a router, and the access node may be a base station that wireless communicates with a subscriber device, e.g., a cellular phone. The access node may then delivery the packets in accordance with the dynamically configured control object.11-12-2009
20090310786Systems for Channel Coordination of Audio and Data Transmission in a Broadcast Band - Systems for audio and data transmission in a broadcast band are disclosed. The system comprises a channel condition assessment module at the transmit side to identify an un-occupied or empty channel to transmit. The system also comprises a means to achieve automatic channel coordination between the transmit side and the receive side. Further, the transmit side includes a digital interface module and the receive side includes a digital output interface module configured to control an embedding electronic device. Means for enhancing audio privacy and digital data rate are also disclosed.12-17-2009
20090316902METHOD AND APPARATUS FOR ENCODING SECURITY STATUS INFORMATION - A method of transmitting messages from a sender to a recipient over a wireless channel, the messages including a sequence counter and a frame counter. The method comprises establishing initial values of the sequence counter and the frame counter at the sender. Initial values of the frame counter and the sequence counter are provided to the recipient. The sender sends compressed messages including the value of the sequence counter and not the frame counter and monitors for an acknowledgement of receipt by the recipient. When no acknowledgment is received, the sender sends uncompressed messages until an acknowledgement of receipt is received from the recipient. The sequence counter is incremented and the next value of the frame counter is established as the integer next larger than previous value of the frame counter which is congruent to the sequence counter modulo 12-24-2009
20090323957SCRAMBLING UNDER AN EXTENDED PHYSICAL-LAYER CELL IDENTITY SPACE - A method for wireless communications is provided. The method includes determining a set of physical layer cell identities and analyzing a current set of scrambling sequences. The method increases the current set of scrambling sequences to account for increases in the physical layer cell identities.12-31-2009
20100002882Method and Device for Anonymous Encrypted Mobile Data and Speech Communication - The invention relates to a method for anonymising the communication of mobile terminals which permit speech communication, using an anonymising network which comprises a series of routers and which has at least one access node, wherein each mobile terminal establishes a connection with at least one access node, comprising the following steps: 01-07-2010
20100014672Counter Initialization, Particularly For Radio Frames - A method for protecting traffic in a radio access network connected to at least two core networks. The method comprises maintaining a corenetwork-specific authentication protocol and a radio-bearer-specific ciphering process, and generating, for each ciphering process, a count parameter comprising a cyclical sequence number and a hyperframe number (HFN) which is incremented each time the cyclical sequence number completes one cycle. For each core network or authentication protocol, a first radio bearer of a session is initialized with a HFN exceeding the highest HFN used during the previous session. When a new radio bearer is established, the mobile station selects the highest HFN used during the session for the core network in question, increments it and uses it for initializing the count parameter for the new radio bearer. At the end of a session, the mobile station stores at least part of the highest HFN used during the session.01-21-2010
20100014673RADIO FREQUENCY IDENTIFICATION (RFID) AUTHENTICATION APPARATUS HAVING AUTHENTICATION FUNCTION AND METHOD THEREOF - Disclosed are an RFID authentication apparatus having an authentication function and a method thereof. An RFID authentication method includes determining, by an authentication reader, an AES key using authentication information received from an authentication tag, generating an output key, encrypting a predetermined length of confirmation data by using the output key, transmitting the encrypted confirmation data to the authentication tag, receiving encrypted confirm response data corresponding to the confirmation data from the authentication tag to decrypt the encrypted confirm response data, and comparing the predetermined length of the confirmation data with the decrypted confirm response data to verify authenticity of the authentication tag.01-21-2010
20100020974COMMUNICATION SYSTEM AND METHOD THEREOF - A communication system for transmitting data of a first mobile station to a second mobile station includes a base station and a relay device. The base station is utilized for configuring an uplink and a downlink of the data to correspond to a first connection ID and a second connection ID respectively and for transmitting a traffic encryption key to the first and second mobile stations so that the first and second mobile stations share the traffic encryption key. The relay device is coupled to the base station and the first and second mobile stations via wireless communication, and utilized for receiving the data encrypted by the traffic encryption key and transferring the data of the first mobile station to the second mobile station according to the first and second connection IDs without going via the base station.01-28-2010
20100020975SYSTEM AND METHOD FOR ELECTRONIC DATA SECURITY - A method and related secure communications system. The method includes detecting, by a base station, a mobile device docked with the base station and in response to the detecting, generating at least one encryption key in the base station. The method also includes transmitting the encryption key to the mobile station by the base station while the mobile device is docked with the base station. The method also includes communicating encrypted data with the mobile station, the encrypted data corresponding to the encryption key.01-28-2010
20100034386DEVICE MANAGER REPOSITORY - Apparatus, systems and methods for managing wireless devices. A wireless device identifier from an access device is received. An encryption key associated with the wireless device identifier that matches an encryption key stored in the wireless device is identified. The identified encryption key is transmitted to the access device so that the access device can communicate with the wireless device over an encrypted communication channel that is established by use of the identified encryption key and the encryption key stored in the wireless device.02-11-2010
20100034387COMMUNICATION APPARTUS, READER/WRITER, COMMUNICATION SYSTEM, AND COMMUNICATION METHOD - There is provided a communication apparatus including a non-contact communication unit for performing a non-contact communication with a reader/writer; a storage unit for storing data for every logic system corresponding to at least one encryption method, and retransmission interval information of each communication command transmitted from the reader/writer for every encryption method; and a selection unit for selecting the retransmission interval information of each communication command in the encryption method to which the logic system specified by the reader/writer corresponds from the storage unit. The retransmission interval information selected by the selection unit is transmitted from the non-contact communication unit to the reader/writer.02-11-2010
20100040232METHOD AND SYSTEM FOR MULTIMEDIA TAGS - A multimedia data construct called a tag (FIG. 02-18-2010
20100054472INTEGRITY PROTECTION AND/OR CIPHERING FOR UE REGISTRATION WITH A WIRELESS NETWORK - Techniques for performing registration with a wireless network using integrity protection and/or ciphering are described. A user equipment (UE) may perform a security procedure with the wireless network for a first session and may generate UE security context data at the UE. The UE security context data may include a cipher key used for ciphering, an integrity key used for integrity protection, a temporary UE identity, and/or other information. The UE may use the UE security context data for secure communication with the wireless network during the first session. The UE may store the UE security context data upon termination of the first session. The UE may thereafter use the stored UE security context data for registration with the wireless network for a second session following the first session. The UE may perform integrity protection and/or ciphering for message(s) for registration based on the stored UE security context data.03-04-2010
20100054473Display Apparatus and Key Management Method - According to one embodiment, a display apparatus includes a card slot configured to be insertable a memory card including a user data area in which one or more encrypted content keys encrypted with a user key and list information of content-specific information unique to each of content items corresponding to the respective encrypted content keys are stored, a close-proximity wireless transfer device configured to be able to transfer with an external device, an information acquisition module configured to acquire the content-specific information of content held by the external device with which the close-proximity wireless transfer device is executing close-proximity wireless transfer, a content-specific information detection module configured to detect the content-specific information corresponding with information indicating the acquired content, from the list information stored in the user data area, and a display processing module configured to display a list of content items corresponding to the detected content-specific information.03-04-2010
20100067697ENCRYPTION IN A WIRELESS TELECOMMUNICATIONS - An example of the present invention is a method of transmitting encrypted user data to a mobile terminal in a wireless telecommunications network. The method comprises sending to the mobile terminal a data packet. The data packet comprises both an identifier of encryption information to used in recovering encrypted user data, and user data encrypted using said encryption information.03-18-2010
20100067698METHOD FOR SELECTIVELY ENCRYPTING CONTROL SIGNAL - Various methods and apparatus for encrypting signals in a wireless access system are disclosed. A method for selectively encrypting a management message in an MS includes steps of generating a Medium Access Control Protocol Data Unit (MAC PDU) including the selectively encrypted management message and an Fragmentation Extended Header (FEH) and transmitting the MAC PDU to the BS. The FEH includes indication information indicating whether the management message was encrypted.03-18-2010
20100080388Apparatus and method for improving in-game communications during a game - The present invention is directed to an apparatus for improving communications between players and coaches during a sporting event, more specifically allowing players to dynamically receive real-time communications from their coaches concerning intended game plays to be effected on the field or court. Said game apparatus comprises of a transparent, protective top cover having the same contour as a middle portion, wherein said middle portion is provided with a display element, and wherein said top cover, middle portion and the display element are all enclosed by a rear cover forming a housing for a receiving means for receiving an encrypted signal of an intended game play from a portable remote terminal, and wherein said top cover, middle portion, display element and housing are positioned on an upper portion of an elasticized band, which has an extended flap, wherein said extended flap includes a closing means used to secure the game apparatus and to conceal the display element from public view.04-01-2010
20100080389System and method for improving in-game communications during a game - The present invention is directed to a system and method for improving communications between players and coaches during a sporting event, more specifically allowing coaches to dynamically transmit secure real-time communications of an intended game plays in text, visual, sketch and/or verbal format to their players or other coaches on/off the field to be effected on the field during a game.04-01-2010
20100091992ADDING RANDOMNESS INTERNALLY TO A WIRELESS MOBILE COMMUNICATION DEVICE - A mobile communication device is provided with an integral transducer used to refresh a random data pool without connection to an external source of new random data.04-15-2010
20100098254METHOD AND DEVICE FOR SENDING ENCRYPTION PARAMETERS - A transmitting device encrypts DMR voice superframes using encryption parameters and sends the encryption parameters in at least one of the voice superframes by: identifying a selected number of bits from a plurality of vocoder frames the voice superframe; replacing each of the identified bits with a corresponding bit of a first encryption parameter; placing at least one encryption parameter in an embedded signaling field of the voice superframe; and transmitting the voice superframe with the encryption parameters to a receiving device. The receiving device extracts the encryption parameters, which can be a key identifier, an algorithm identifier, and an initialization vector for use in decrypting messages from the transmitting device.04-22-2010
20100104099IMAGE FORMING APPARATUS AND SECURITY SETTING METHOD THEREOF - An image forming apparatus and a security setting method thereof, the method including: inputting an encryption key of a wireless network connection of the image forming apparatus; displaying a selection screen including one or more functions which the image forming apparatus provides; and selecting at least one of the displayed functions with which to share the encryption key as a password.04-29-2010
20100111306SECURITY MODEL FOR A RELAY NETWORK SYSTEM - According to one general aspect, a method may include acquiring a message. In some embodiments, the method may also include determining if a relay station (RS) is allowed to manipulate portions of the message. In some embodiments, the method may also include, if so, generating a message authentication code (MsgAC) based upon a MsgAC key (MsgACK) known to the RS. In some embodiments, the method may also include combining the message with the MsgAC. In some embodiments, the method may also include wirelessly transmitting the combined message to the RS.05-06-2010
20100124332SECURE WIRELESS COMMUNICATIONS - A system includes a sending access point and a receiving access point. The sending access point divides a data stream into sets of packets, encrypts a first set of packets using a first encryption protocol, encrypts a second set of packets using a second encryption protocol, where the second encryption protocol is different from the first encryption protocol, transmits, using a first channel over a wireless network, the first set of packets, and transmits, using a second channel over the wireless network, the second set of packets. The receiving access point receives the first set of packets and the second set of packets, decrypts the first set of packets using the first encryption protocol, and decrypts the second set of packets using the second encryption protocol.05-20-2010
20100124333System and Method for Processing Encoded Messages for Exchange with a Mobile Data Communication Device - A system and method are provided for pre-processing encrypted and/or signed messages at a host system before the message is transmitted to a wireless mobile communication device. The message is received at the host system from a message sender. There is a determination as to whether any of the message receivers has a corresponding wireless mobile communication device. For each message receiver that has a corresponding wireless mobile communication device, the message is processed so as to modify the message with respect to one or more encryption and/or authentication aspects. The processed message is transmitted to a wireless mobile communication device that corresponds to the first message receiver. The system and method may include post-processing messages sent from a wireless mobile communications device to a host system. Authentication and/or encryption message processing is performed upon the message. The processed message may then be sent through the host system to one or more receivers.05-20-2010
20100135494METHOD FOR AGGREGATING DATA IN A NETWORK - A method for aggregating data in a network, particularly in a wireless sensor network, wherein the network (06-03-2010
20100142708APPARATUS AND METHOD FOR GENERATING SECRET KEY - An apparatus for generating a secret key generates the secret key by using information of a mobile RFID terminal, transmits the generated secret key to an RFID tag attached on an article, and decrypts a unique item identifier of the article encrypted by using the generated secret key after receiving the unique item identifier of the article encrypted by using the secret key from the RFID tag. By this configuration, it is possible to protect user's personal privacy of the mobile RFID terminal in a state where user's intervention is minimized.06-10-2010
20100142709ROGUE ACCESS POINT DETECTION IN WIRELESS NETWORKS - Methods to detect rogue access points (APs) and prevent unauthorized wireless access to services provided by a communication network are provided. A mobile station (MS) reports to a serving AP the received signal strength (RSS) for all APs in the area it travels. The serving AP detect a rogue AP based on inconsistencies perceived in the RSS reports, assessed during the handover phase or whilst the communication is active.06-10-2010
20100166183OPTIMIZING SECURITY BITS IN A MEDIA ACCESS CONTROL (MAC) HEADER - A method of retrieving security information in a media access control (MAC) header by a wireless station may include receiving a data unit, such as a protocol data unit (PDU), from a remote wireless station. The PDU may include the MAC header. The method may also include reading two encryption key sequence (EKS) bits in the MAC header that denote both whether the data unit is encrypted and a position in an encryption key sequence for the data unit.07-01-2010
20100166184METHOD OF HANDLING SECURITY CONFIGURATION IN WIRELESS COMMUNICATIONS SYSTEM AND RELATED COMMUNICATION DEVICE - A method of handling security configuration for a mobile device using a mapped security context in a wireless communication system includes utilizing the mapped security context to derive ciphering and integrity keys when security configuration, indicating a key update based on a cached security context, is received.07-01-2010
20100177895System For Transmitting The Scrambled Broadcast-Signals In Single Frequency Network, And A Method Thereof - Disclosed is a system for transmitting encrypted broadcast signals to different transmitters on a single frequency network (SFN) in a digital broadcasting system. The system for transmitting encrypted broadcast signals on the SFN includes: a main broadcasting system for transmitting encrypted broadcast signals including data streams and transmitter identification information (TII) through a main broadcasting network; a repeating system for amplifying encrypted broadcast signals of the main broadcasting network and transmitting the amplified broadcast signals, or modulating and amplifying streams input by the main broadcasting system through a private line and repeating broadcast signals of the main broadcasting system through a repeating network; and a decrypting key provider for receiving a decrypting key value from the main broadcasting or repeating system and transmitting a user authentication and decrypting key to a charged subscriber terminal through a mobile communication network.07-15-2010
20100177896COMMUNICATING VIA A WIRELESS GATEWAY DEVICE AND SSL - Systems (and corresponding methodologies) of deploying an enhanced access point (or an integrated router/access point) with embedded secure socket layer (SSL) tunneling capabilities are provided. The innovation enables users to initiate or prompt secure SSL tunnels between a wireless computer or device (and browser session) and the wireless gateway device (WGD). In particular, off-the-shelf web browser applications can be used to effect secure communication between a wireless mobile device and a SWAT-(Secure Wireless Application Tunnel-) equipped access point.07-15-2010
20100177897TELECOMMUNICATION SYSTEMS AND ENCRYPTION OF CONTROL MESSAGES IN SUCH SYSTEMS - The present invention relates to a solution for handling encryption of control messages in a wireless telecommunications network. Key generation is based on sequence numbers and the present invention reduces access to core network devices for updating sequence numbers relating to network events by separating sequence number generation to different parts of the network and different types of network events. This is done by providing a solution where sequence number rollover events and handover events are separated from each other in providing input to radio resource control message encryption. Three different counters may be used for different types of events and all three may be used as input to an encryption algorithm.07-15-2010
20100177898DEVICE AND METHOD FOR PROVIDING AUTHENTICATION - The present invention relates to an electronic device, comprising a physical uncloneable function (PUF) module, and circuitry adapted to receive a cryptographic query (α) from an electronic unit, read, from the PUF module, data generated at a challenge of the PUF module, and generate a cryptographic response (β) based on the data, a random noise component comprised in the data, and the cryptographic query (α), thereby enabling authentication of the electronic device. An advantage with the invention is that it will not be necessary to include an additional random generator together with the electronic device, as the fuzzy output provided by the PUF module can be seen as already containing a random noise component. In some cryptographic schemes, the random noise provides for a possibility to reach a higher level of security and to minimize the possibility for a third party to find patterns in cryptographic responses generated during use of the electronic device. The present invention also relates to a similar authentication method.07-15-2010
20100177899ENCRYPTED COMMUNICATION SYSTEM - Systems and methods of making secure communications in a communications network comprising a user device (07-15-2010
20100183152NETWORK AND METHOD FOR INITIALIZING A TRUST CENTER LINK KEY - The invention relates in general to a network and to a method for initializing a trust center link key. According to an embodiment of the invention, a network is provided with a new node (07-22-2010
20100195832Method and a system for transmitting an encrypted control message based on mobile multimedia broadcast - This invention provides a method and a system for transmitting an encrypted control message based on the mobile multimedia broadcast. The said method includes: encapsulating the media data of the program and the encrypted control message in the multiplex sub-frames of the multiplex frame; and setting the encrypted control message identifier in the header of multiplex sub-frames for indicating whether the encrypted control message is included in the multiplex sub-frames. The mobile multimedia system sends the media data and the encrypted control message out through the multiplex frame.08-05-2010
20100202613PACKET BUNDLING AT THE PDCP LAYER WITH CIPHERING ON THE PDCP SDU - Certain aspects of the present disclosure propose techniques for bundling and ciphering service data units (SDU) in the packet data convergence protocol (PDCP) layer. The proposed techniques increase the data rate of the communication system. At the transmitter side, the PDCP layer may bundle SDUs and cipher each SDU individually before submitting them to a lower layer. At the receiver-side, the PDCP layer may unbundle and decipher the SDUs before submitting them to higher layers.08-12-2010
20100202614APPARATUS AND METHOD FOR CIPHERING OF UPLINK DATA IN MOBILE COMMUNICATION SYSTEM - An apparatus and method for ciphering uplink data in a mobile communication system are provided. The apparatus includes a Radio Network Controller (RNC) for, when receiving a Radio Bearer Setup Complete after a ciphering activation time, determining a Hyper Frame Number (HFN) value of a User Equipment (UE) and changing an HFN value of the RNC to the same HFN value determined of the UE.08-12-2010
20100208894ENCODER AND DECODER APPARATUS AND METHODS - Embodiments provide remote control encoders and decoders, encryption algorithms and methods, singularly and in combination, and not limited thereto.08-19-2010
20100232606METHOD AND SYSTEM FOR AUTHENTICATING IN A COMMUNICATION SYSTEM - A method and system for authenticating in a communication system are provided. The method includes, in a first authenticator, sending an authenticator relocation request to a second authenticator transmitting a hash value for an authentication parameter of a Mobile Terminal (MT), a random parameter 09-16-2010
20100239093Data Transfer System and Data Transfer Method - In a data transfer system provided with a mobile terminal device, an information processing apparatus, and an authentication server, the mobile terminal device transmits authentication information to the authentication server through a first communication line, the authentication server transmits a predetermined permission code to the mobile terminal device through the first communication line in a case that the authentication succeeds based on the authentication information received from the mobile terminal device, the information processing apparatus permits data transfer between the information processing apparatus and the mobile terminal device in a case that the information processing apparatus receives an input of the permission code received by the mobile terminal from the authentication server, and the information processing apparatus and the mobile terminal device conduct the permitted data transfer through a second communication line.09-23-2010
20100246823APPARATUS AND METHOD FOR ADDRESS PRIVACY PROTECTION IN RECEIVER ORIENTED CHANNELS - Disclosed is a method for address privacy protection for a first wireless device sharing a privacy key with a second wireless device. In the method, a first resolution tag is generated at the first wireless device using a pseudo-random function with the seed value and the privacy key as input arguments. The privacy key is only known to the first and second wireless devices. A privacy address is generated for the first wireless device based on the seed value and the first resolution tag. A packet is transmitted from the first wireless device to the second wireless device. The packet includes the privacy address and the first resolution tag.09-30-2010
20100246824APPARATUS AND METHOD FOR VIRTUAL PAIRING USING AN EXISTING WIRELESS CONNECTION KEY - Disclosed is a method for virtual pairing of a first peer device with a second peer device. In the method, a nonce is generated at the first peer device for use in virtually pairing the first and second peer devices to establish a first-type wireless connection. The nonce is forwarded from the first peer device to the second peer device over an already established second-type wireless connection between the first and second peer devices. At least one new key is generated from the nonce and a shared key for the already established second-type wireless connection. The first peer device is virtually paired with the second peer device using the at least one new key to establish the first-type wireless connection between the first and second peer devices.09-30-2010
20100246825WIRELESS COMMUNICATION METHOD AND SYSTEM FOR TRANSMISSION AUTHENTICATION AT THE PHYSICAL LAYER - The subject authentication scheme encompasses a large family of authentication systems which may be built over existing transmission systems. By superimposing a carefully designed secret modulation on the waveforms, authentication is added to the signal without requiring additional bandwidth. The authentication information (tag signal) is sent concurrently with data (message signal). The authentication is designed to be stealthy to the uninformed user, robust to interference, and secure for identity verification. The tradeoffs between these three goals are identified and analyzed. The use of the authentication for channel estimation is also considered, and improved bit errors are demonstrated for time-varying channels. With a long enough authentication code word an authentication system is achieved with very slight data degradation. Additionally, by treating the authentication tag as a sequence of pilot symbols, the data recovery may be improved by the aware receiver.09-30-2010
20100260337Context-Free Protocol for Enforcing Data Forwarding in Wireless Ad Hoc Networks - Described herein is a context-free protocol (i.e., the COFFEE protocol) for stimulating cooperation among selfish nodes. Various embodiments have the ability to transmit a packet over the path successfully without the dependency on the information of other packets' transmissions. It is assumed that every node in the network is rational, and therefore during the packet forwarding stage, if the intermediate nodes can not clearly tell whether the packet is destined to them or not, they do not simply drop the packet. Thus, in the COFFEE protocol, by introducing several techniques, for a packet received by a node, the node thinks the packet could potentially be destined to itself and forwards the packet to find out the answer. Detailed analysis and performance evaluations have been conducted to demonstrate the effectiveness of the COFFEE protocol.10-14-2010
20100260338METHOD AND APPARATUS FOR ESTABLISHING A CRYPTOGRAPHIC RELATIONSHIP IN A MOBILE COMMUNICATIONS NETWORK - A method and apparatus for establishing a cryptographic relationship between a first node and a second node in a communications network. The first node receives at least part of a cryptographic attribute of the second node, uses the received at least part of the cryptographic attribute to generate an identifier for the first node. The cryptographic attribute may a public key belonging to the second node, and the identifier may be a Cryptographically Generated IP address. The cryptographic relationship allows the second node to establish with a third node that it is entitled to act on behalf of the first node.10-14-2010
20100266125COMMUNICATION SYSTEM, BASE STATION DEVICE, AND TERMINAL DEVICE - An identifier generator generates a second identifier containing information on contents. The second identifier is different from a first identifier used to grant a connection request sent from a terminal apparatus. A beacon transmitter transmits the second identifier, generated by the identifier generator, as a beacon. A connection processing unit permits the connection request by the first identifier stored beforehand in the terminal apparatus, and rejects the connection request by the second identifier. A base station apparatus generates the first identifier containing address information used to access a server apparatus, as an identifier used to permit a connection request sent from the terminal apparatus. The base station apparatus transmits, as beacons, a first identifier and a second identifier used to identify the base station itself. The terminal apparatus acquires the address information contained in the received first identifier, conveys the second identifier to the server apparatus identified by the address information, and acquires information on the contents distributed by the base station apparatus.10-21-2010
20100266126FRIEND OR FOE DETECTION - An identification friend or foe (IFF) system and method can covertly identify an object as friend or foe (FoF). An encoded illumination signal can be calculated using a detected ambient signal and an identification (ID) signal and emitted. The encoded illumination signal can be detected by analyzing a detected ambient signal and decoded using a specified key.10-21-2010
20100272261Data Security Transmission Wirelessly with Zigbee Chips - A wireless network system for data transmitting securely is disclosed. The system comprises a central control end for generating a cipher password per predetermined time unit. The central control end has a first Zigbee chip, a computer terminal for a user to input parameters, and a cryptographic algorithm program provided wherein the cryptographic algorithm program and the parameters are provided for password encryption using the cryptographic algorithm program is run by a microprocessor of the first Zigbee chip. The system also comprises a data transmitting end and a several data receiving ends. The data transmitting end using the Zigbee decrypts the cipher password and encrypts the data file using the plain password and the Zigbee chip. The data receiving ends using the Zigbee decrypt the cipher password and decrypt the cipher data file into plain data file by the WiFi chips using plain password.10-28-2010
20100272262Systems and methods for broadcast communication and interface with assets and datasets - The present subject matter relates generally to a notification system adapted to provide real-time wireless notification of a change in condition or state of an asset or data set. More specifically, the present invention relates to a global communication and interface network for instantaneous transmission of information for tracking, monitoring, managing, and interfacing with assets and datasets. Still further, the present invention relates to broadcast communication of a change in condition or state of an asset or data set. In addition, the present invention relates to encrypted broadcast communication.10-28-2010
20100272263DECRYPTING A NAS MESSAGE TRACED TO AN E-UTRAN - A system and method for decrypting a Non-Access Stratum (NAS) message traced in an Evolved Universal Terrestrial Radio Access Network (E-UTRAN) includes a first step (10-28-2010
20100278342DEVICE, SYSTEM, AND METHOD OF ESTABLISHING SECURE WIRELESS COMMUNICATION - Device, system, and method of establishing secure wireless communication. A system includes at least one wireless communication device having a sensor to measure one or more parameters of a physical event shared between that device and another wireless communication device, and a processor to translate the one or more measured parameters into a secret data sequence known only to the devices sharing the event. A first of the wireless communication devices sharing the event is to combine a communication key with the secret data sequence, thereby to generate an encoded message for distribution over a wireless link accessible by the devices, and a second of the wireless communication devices sharing the event is to decode said encoded message using the secret data sequence, thereby to obtain the communication key. The wireless communication devices may then connect using the secret communication key as a basis for secure communication.11-04-2010
20100278343WIRELESS COMMUNICATION APPARATUS AND PROCESSING METHOD THEREBY - When a wireless network is constructed, a wireless communication apparatus in the wireless network constructed of a plurality of communication apparatuses decides whether to function as a providing source of communication parameters or as a provision destination that receives communication parameters. In a case where it has been decided that this apparatus is to function as the provision destination that receives communication parameters, the apparatus requests authentication when it participates in the wireless network using communication parameters. In a case where it has been decided that this apparatus is to function as the providing source of communication parameters, the apparatus execute authentication processing in response to an authentication request.11-04-2010
20100284535COMMUNICATIONS SYSTEM - A mobile communications system is proposed in which a two stage procedure is used for setting up Radio Bearers within a mobile communications device and UTRAN. In the first stage, both the mobile device and UTRAN perform ciphering based on an old Start value. In the second stage, the mobile device and UTRAN perform ciphering based on a new Start value. In this way, data communication using the Radio Bearers can start without waiting for the mobile device to confirm completion of the setup procedure.11-11-2010
20100290621TUNNELING SUPPORT FOR MOBILE IP USING A KEY FOR FLOW IDENTIFICATION - In a network that supports mobility of a mobile node, a tunnel between a first mobility node and a second mobility node is established in the network. The established tunnel is according to a tunneling protocol (e.g., Generic Routing Encapsulation tunneling protocol) that uses at least one key (11-18-2010
20100296654CONFIGURING A NETWORK CONNECTION - A communication system for accessing media items via a display device. A receiver is coupled to the display device and a transmitter is coupled to a computer system. Media items stored locally on the computer system and/or remotely on a remote server may be wirelessly transferred from the transmitter to the receiver for display on the display device. In addition, the transmitter and the receiver may be pre-paired prior to delivery to the user, allowing for the network to be configured without any user input. Advantageously, embodiments provide a user with the ability to conveniently view content stored on a computer or a web server without the user having to perform any wireless network setup procedures.11-25-2010
20100303235Method Providing the Means for Recognizing the Origin and/or Content of an RF Signal - The subject of the present invention is a method providing the means for recognizing the origin and/or the content of an RF signal without requiring substantial computation means, these recognition means being accessible only to authorized persons and being practically nonmodifiable and very difficult to detect by unauthorized persons, and this being so in various applications using RF signals transmitting information that is at least partly hidden. This method is characterized in that it spreads an item of information to be hidden with the aid of a hidden code, that it distributes, with the aid of an Exclusive OR function the information thus obtained in codes that are known with the aid of a hidden distribution algorithm, that, on reception, it applies the algorithm that is the inverse of that having served for the distribution in order to gain access to the spread code, that is correlates this spread code with the hidden code in order to find the hidden information.12-02-2010
20100303236METHOD AND APPARATUS FOR PROPAGATING ENCRYPTION KEYS BETWEEN WIRELESS COMMUNICATION DEVICES - A system for propagating encryption key information between wireless communication devices without the requirement of pairing each and every device. A wireless communication device may be paired with at least one device in a group of devices. When a secure link is established between these devices, a determination may be made as to whether encryption key information should be passed from one device to another. The additional encryption key information may allow a wireless communication device to create a secure link with other devices without having to first establish a trusted relationship (e.g., go through a pairing process) with the other devices.12-02-2010
20100303237METHOD AND APPARATUS FOR CIPHERING DATA IN WIRELESS COMMUNICATION SYSTEM - An apparatus for ciphering data in a wireless communication system. The apparatus includes a memory which stores data to be ciphered; a controller which outputs a cipher command for each layer of a wireless protocol; a protocol processing unit including a cipher hardware, which receives the cipher command outputted from the controller, reads data to be ciphered from the memory, ciphers the data and outputs the ciphered data, and a transmission data processing unit, which receives ciphered data that is directly outputted from the cipher hardware, adds a header for transmission and generates a data packet; and an RF communication unit which directly receives the generated data packet and transmits the received data packet.12-02-2010
20100310073SYSTEM AND METHOD OF CROSS-COMPONENT MESSAGE PROCESSING - Often, for reasons of wireless bandwidth conservation, incomplete messages are provided to wireless messaging devices. Employing cryptography, for secrecy or authentication purposes, when including a received message that has been incompletely received can lead to lack of context on the receiver's end. By automatically obtaining the entirety of the message to be included, an outgoing message that includes the received message can be processed in a manner that securely and accurately represents the intended outgoing message.12-09-2010
20100310074ENCRYPTION SYSTEM FOR VOCAL COMMUNICATIONS - An encryption system for audio or vocal communications, including a device for encrypted communication with a similar device, said device including at least one bluetooth chip arranged to effect a communication via at least one bluetooth connection between a first and a second of said devices, said bluetooth chip including encryption apparatus accessible to a user.12-09-2010
20100316220RADIO FREQUENCY IDENTIFICATION SYSTEM AND AUTHENTICATION METHOD THEREOF - A Radio Frequency Identification (RFID) system and method are provided that includes a reader and a tag which share a predetermined secret key. The reader transmits an authentication request random number to the tag. The reader and the tag generate a Pseudorandom Noise (PN) sequence formed of a series of binary codes from an exclusive disjunction of the authentication request random number and the predetermined secret key. The tag produces an authentication response random number by performing a predetermined conversion operation for the PN sequence and transmits the authentication response random number to the reader. The reader authenticates the tag by analyzing the PN sequence and the authentication response random number.12-16-2010
20100316221 SECURE TRANSMISSION METHOD FOR BROADBAND WIRELESS MULTIMEDIA NETWORK BROADCASTING COMMUNICATION - A secure transmission method for broadband wireless multimedia network broadcasting communication includes the following steps: a secure channel between big base station and small base station is established by utilizing security protocols; the big base station distributes a Broadcast Traffic Encryption Key to each small base station through the secure channel; the small base station transmits the Broadcast Traffic Encryption Key to the user passing the authentication and authorization. The above solution solves the problem of broadcast secure communication of the big base station working in the mixed covering mode of large and small cells, realizes the identification of not only the user but also the base station, and ensures that only the authorized user can receive broadcast service.12-16-2010
20100322425SYSTEM FOR SUPPORTING OVER-THE-AIR SERVICE AND METHOD THEREOF - Disclosed herein is a system and method for providing Over-The-Air (OTA) service. The system according to the present invention includes a mobile terminal for, when a message is received from an OTA server, dividing OTA data, included in the message, into data segments of a predetermined size depending on a size of the message, and a smart card for receiving each of the data segments, decrypting the data segment using a preset OTA key, and storing the decrypted OTA data in a preset area.12-23-2010
20100322426SELF-CONFIGURING CELLULAR BASESTATION - A basestation 12-23-2010
20100329461AUTOMATIC DETECTION OF WIRELESS NETWORK TYPE - A system and method for facilitating automatic detection of a type of wireless network is provided. In accordance with an aspect of the present invention, wireless network client(s) can automatically detect the “type” of a network (e.g., method of authentication and encryption) without requiring input from the user. For example, unencrypted network, WEP encrypted net work requiring a WEP key, WPA encrypted network requiring a pre-shared key, an IEEE 802.1x enabled net work supporting WPA anchor an IEEE 802.1x enabled network not supporting WPA. In accordance with an aspect of the present invention, a wireless network detection system having a connection component and a detection component is provided. The connection component facilitates connection of a client system to at least one of a plurality of wireless networks The detection component identities a type of an available wireless network. Identification can be based for example, upon information received in an information element and/or iterative probing of the wireless network beacon.12-30-2010
20100329462COMMUNICATION SYSTEM, WIRELESS COMMUNICATION APPARATUS, AND COMMUNICATION METHOD - In a communication system, a first wireless communication apparatuses belonging to a communication group receives a connection request frame including a notifying security level from a second communication apparatus outside of the communication group. The first communication apparatus stores a reference security level peculiar to the communication group, which is selected from security levels depending on one of encryption methods including non-encryption and encryption strengths. In the first communication apparatus, the notifying security level is compared with the reference level, and a response frame including one of a connect rejection and a connection permission is described, is generated and transferred to the second communication apparatus. The connect rejection represents a rejection of connection to the second communication apparatus and the connection permission represents a permission of connection to the second communication apparatus.12-30-2010
20110002464Intraoccular Implant - An intraocular implant adapted to be implanted within the interior of a human eye is disclosed. The aforesaid implant is selected from a group consisting of: an intracorneal implant, an anterior chamber implant, a sulcus implant, implant in the bag, posterior chamber implant and any combination thereof. The implant comprises means selected from a group consisting of reflective surfaces and electronic device. The implant is adapted to form at least one image of at least part of the field of vision on the retina. The image is selected of a group consisting of: artificial image and reflected image, and any combination thereof. The image is formed on the retina by a predetermined indirect path selected from (z) optical reflective path and (U) electronic processing. Optionally, also a refracted image may also be created on the retina.01-06-2011
20110007899SYSTEM FOR SUPPORTING OVER-THE-AIR SERVICE AND METHOD THEREOF - Disclosed herein is a system and method for providing Over-The-Air (OTA) service. The system according to the present invention includes an OTA server for, when OTA data is requested by a mobile terminal, encrypting the requested OTA data using a preset OTA key depending on the type of the requested OTA data, and creating a message for providing the encrypted OTA data; and a message center for receiving the created message, and sending the created message to the mobile terminal.01-13-2011
20110007900AUTOMATIC DATA ENCRYPTION AND ACCESS CONTROL BASED ON BLUETOOTH DEVICE PROXIMITY - A method, apparatus, and system for using Bluetooth devices to secure sensitive data on other Bluetooth devices is described. A Bluetooth device is paired with a “trusted” Bluetooth device. When contact with the trusted device is lost, designated sensitive data on the secured Bluetooth device is automatically encrypted. When contact is restored, the data is automatically decrypted. In an alternate embodiment, a secured device can be associated with multiple trusted devices, and the secured device designate different sensitive data for each trusted device. In this way, multiple users can share a common, “public” Bluetooth device without concern that the other users will access their sensitive data on the device when the device is not being used by that user.01-13-2011
20110007901COMMUNICATION DEVICE - A communication device (01-13-2011
20110019824LOW POWER RADIOFREQUENCY (RF) COMMUNICATION SYSTEMS FOR SECURE WIRELESS PATCH INITIALIZATION AND METHODS OF USE - Provided herein is a wireless healthcare system comprising at least one sensor and a base unit adaptable to be in communication with the sensor. The sensor can be is adaptable to communicate with the base unit at a first power during formation of a communication link and is further adaptable to communicate with the base unit at a second power after the communication link has been formed, and wherein the sensor and base unit are components of a wireless healthcare system. The sensor can be a patch adaptable to be positioned on the surface of a patient. Further provided herein is a method of using the wireless healthcare system and kit.01-27-2011
20110019825SYSTEM AND METHOD OF TRAINING A TRANSMIT/RECEIVE SYSTEM - A radio frequency transmitter is configured to send radio frequency messages to activate a remote system. Each message includes an encrypted counter value and a transmitter identifier. The transmitter is configured to send at least two of the messages having sequential encrypted counter values in response to a single user input.01-27-2011
20110033051METHOD AND APPARATUS FOR REDUCING PROBABILITY OF DETECTION, IMPROVING JAMMING RESISTANCE AND SECURITY FOR BROADBAND WIRELESS SYSTEMS - Systems and methods for generating OFDM signals are provided in which sub-carrier usage is selected and/or remapped in various manners. For example, in some embodiments remapping using a security sequence is employed; in other embodiments, decoy sub-carriers are employed; in other embodiments, mask sub-carriers are used to cover jammed portions of a channel.02-10-2011
20110033052WIRELESS COMMUNICATION DEVICE, WIRELESS COMMUNICATION SYSTEM, AND NETWORK DEVICE - The wireless communication system 02-10-2011
20110038480SECURITY METHOD IN WIRELESS COMMUNICATION SYSTEM HAVING RELAY NODE - A security method in a wireless communication system is provided, which is used for providing a plurality of security associations between a user equipment, a relay node, and a base station node in a wireless communication system. The user equipment authenticates with a serving gateway in the wireless communication system through the relay node, such that a security association between the user equipment and the relay node is established correspondingly. The relay node establishes a second security association between the relay node and the base station node through the base station node.02-17-2011
20110051932SYNCHRONIZING MANAGEMENT SIGNALING IN A NETWORK - A method includes receiving a communication from a management domain associated with managing a cellular communication network. The method also includes determining whether the communication corresponds to a polling signal from the management domain, and generating a first ping for transmission to a data center associated with managing virtual private networks (VPNs) in the cellular network in response to determining that the received signal corresponds to the polling signal. The method may further include generating a second ping for transmission via an encrypted path in the cellular communication network in response to determining that the received signal corresponds to the polling signal and that data is ready to be transmitted via the encrypted path. The first ping and the second ping may be used to ensure that cellular connections through the cellular communication network are operating properly.03-03-2011
20110058674Secure Communication Of Information Over A Wireless Link - Secure communication of information over a wireless link with apparatus including a blade management module and a plurality of blade servers, the blade servers connected for data communications with the blade management module through at least one wired link, the blade servers also connected for data communications with the blade management module through at least one wireless link, including sharing an encryption key between the blade management module and one or more of the blade servers only through the at least one wired link connecting the blade management module to the one or more blade servers; encrypting information by the blade management module with the encryption key; transmitting the encrypted information by the blade management module to the one or more blade servers through the at least one wireless link; and decrypting the encrypted information by the blade server with the encryption key.03-10-2011
20110064223METHOD FOR CONTROLLING REMOTE WIRELESS DEVICE WITH A USER DEVICE - A method for controlling a remote wireless device with a user device includes the user device sending a request message packet to the remote wireless device, where the remote wireless device verifies the request message packet and sends a reply message packet to the user device if the request message packet passes verification. The user device verifies the reply message packet and sends a control message packet to the remote wireless device if the reply message packet passes verification. The remote wireless device verifies the control message packet and sends an acknowledgment message packet to the user device if the control message packet passes verification.03-17-2011
20110069837METHOD OF TRANSMITTING USER MESSAGE, TERMINAL AND BASE STATION USING THE METHOD - When transmitting a user message, in a call setting period of a base station and a terminal and a radio connection state between a base station and a terminal, whenever a data transmittable channel resource is available, user messages of an amount corresponding to the available channel resource are transmitted. Therefore, user messages can be divided and transmitted according to an available channel in a call setting period.03-24-2011
20110069838Apparatus and method for reducing channel reproduction delay in mobile terminal - An apparatus and a method reduce delay when reproducing digital broadcasting in a mobile terminal. More particularly, the apparatus and method reduce a reproduction delay, from having to stand by until an encrypted stream that matches with a traffic key is received, by receiving the traffic key in advance prior to the encrypted stream when a mobile terminal receives encrypted broadcasting. The apparatus includes a controller. The controller receives and stores a traffic key corresponding to an encrypted channel even when not entering the encrypted channel, and deciphers and reproduces the relevant channel using the stored traffic key when entering the encrypted channel.03-24-2011
20110075844Adaptive packet ciphering - Embodiments of the present invention provide methods and apparatus for adaptive packet ciphering.03-31-2011
20110081020TERRESTIAL-SIGNAL BASED EXCLUSION ZONE COMPLIANCE - An exclusion zone compliance circuit comprises a terrestrial radio signal reception component for receiving a terrestrial radio signal comprising a unique identification of a transmission source. A non-volatile memory component of the circuit stores an encrypted data set describing boundaries of an exclusion zone. A navigation data deriving component of the circuit accesses a data set and compares the unique identification with a station identification of the transmission source and the geographic position of the transmission source. The navigation data deriving component derives a geographic position of the exclusion zone compliance circuit and determines whether the exclusion zone compliance circuit is located within an exclusion zone. A data blocking component of the circuit accesses the encrypted data set. A data control component of the exclusion zone compliance circuit blocks output of a signal in response to an indication that the circuit is located within an exclusion zone.04-07-2011
20110096927METHOD AND APPARATUS FOR UPDATING AN AUTHORIZATION KEY IN A COMMUNICATION SYSTEM - Provided is an apparatus and method for updating an Authorization Key (AK) of a mobile station in an idle mode in a wireless communication system. A method for operating a mobile station in an idle mode to update an AK in a wireless communication system includes transmitting a first location update request to a base station, the first location update request including a request for updating an AK, receiving a response to the first location update request from the base station, the response to the first location update request including a NONCE_BS, wherein the NONCE_BS is a random number associated with the base station and used for updating the AK, generating a NONCE_MS, wherein the NONCE_MS is a random number used for updating the AK, generating the AK using the NONCE_BS and the NONCE_MS, transmitting a second location update request to the base station, the second location update request including the NONCE_BS and the NONCE_MS, receiving a response to the second location update request from the base station, the response to the second location update request including the NONCE_BS and the NONCE_MS, and confirming the AK based on the NONCE_BS and the NONCE_MS.04-28-2011
20110096928Wireless Communication Base Station Device, Wireless Communication Mobile Station Device, and Method for Scrambling Response Signal in ARQ - A wireless communication base station device which does not fail in ARQ control even when a mobile station fails to receive allocation information and collision of the uplink data transmitted from mobile stations occurs. In the device, a CRC unit (04-28-2011
20110103585Mobile Content Magnet - Methods and apparatus for a Mobile Content Magnet are disclosed. One embodiment of the present invention is a miniature electronic device, which functions as a fully-powered personal computer, which stores digital files and content, and which communicates wirelessly with external input and output devices and a network such as the Internet. In one embodiment, the present invention may be carried in a pocket or purse, clipped on a belt or incorporated into a pair of glasses. In another embodiment, the Mobile Content Magnet is configured to receive an automatic stream of digital content over a wireless connection from a remote server which functions as a content aggregator. The content which is automatically pushed to the user is either directly chosen by the user, or may be suggested by software running on the remote server that seeks and identifies additional content using keyword or relevance searches.05-05-2011
20110103586System, Method and Device To Authenticate Relationships By Electronic Means - The present invention is in the Information Technology field, specifically in the authentication of systems' users by using wireless remote communication technologies and refers to a system, a method, and a device capable of authenticating users and providers of centralized services, safely and reciprocally. More specifically, the invention's field of application is that of methods of management of people authenticating processes, in their relationships through digital electronic means.05-05-2011
20110110520VIRTUAL NEIGHBOR OBJECTS FOR MANAGING IDLE MODE MOBILITY IN A WIRELESS NETWORK - Systems, methods, and apparatus that facilitate optimal idle mode reselection are presented herein. A virtual neighbor component can be configured to create at least one virtual neighbor object and associate the at least one virtual neighbor object with at least two wireless access points. A reselection component can be configured to facilitate idle mode reselection between a wireless access point of the at least two wireless access points and another wireless access point based on, at least in part, the at least one virtual neighbor object.05-12-2011
20110110521ELECTRONIC DEVICE AND NETWORK ACCESSING METHOD THEREOF - Disclosed are an electronic device enabling wireless networking through a wireless network and a network accessing method thereof, the electronic device including: a communicating unit which accesses the wireless network to perform wireless networking; an encoding unit which encodes a signal transmitted from or received by the communicating unit; and a controller which controls the encoding unit to encode identification information of the electronic device, in response to the electronic device being powered on, and controls the communicating unit to initiate an access to the wireless network based on the identification information encoded by the encoding unit. Accordingly, an automatic access to the wireless network is initiated when the electronic device is powered on, without any special manipulation by the user, thereby enhancing convenience to the user.05-12-2011
20110110522PAIRING METHOD AND APPARATUS FOR AD-HOC CONNECTION IN WIRELESS COMMUNICATION TERMINAL - A pairing method and an apparatus thereof for an ad-hoc connection in a wireless communication terminal are provided. In the method, an event duration that occurs according to user manipulation is measured. A pairing key is generated using the measured duration. A pairing procedure is performed with a counterpart terminal using the pairing key.05-12-2011
20110110523WIRELESS PERIMETER SECURITY DEVICE AND NETWORK USING SAME - A Radio Frequency based security system for providing security for wireless Local Area Networks (WLAN) that allows the creation and maintenance of arbitrarily shaped secure wireless access areas with boundaries around said wireless Local Area Network and prevents access to the said wireless LAN from outside the perimeter of the secure area. The system includes a plurality of perimeter Radio Frequency Sentry Devices (RFSDs) that are employed to establish the boundaries of said secure area around said wireless LAN. The wireless LAN being secured may be an industry standard IEEE 802.11a, 801.11b or 802.11g based wireless LAN or any other wireless LAN that uses packet based communication protocols. The said RFSDs may be stand-alone devices or they may be connected to a wired or wireless Local Area Network.05-12-2011
20110116631METHOD AND APPARATUS FOR FORMING SECURITY CHANNEL IN SHORT RANGE COMMUNICATION - A channel connection of a device that performs short range wireless communication is provided. If a public key that is broadcast by a specified device is received, the device encrypts its own UID (Unique Identifier) using the public key to transmit the encrypted UID to the specified device, transmits a pairing request to the specified device, and safely receives a key seed from the specified device using a security address included in a pairing device and the UID to form a security channel with the specified device.05-19-2011
20110116632Methods and Systems for Obscuring Network Topologies - Node, computer software and method for preventing an external party (05-19-2011
20110116633APPARATUS AND METHOD FOR DETERMINING UPLINK CIPHERING ACTIVATION TIME IN UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM USER EQUIPMENT - The details of an apparatus and method for determining uplink ciphering activation time in universal mobile telecommunications system user equipment are disclosed herein. The ciphering activation time is determined for radio bearers other than RB05-19-2011
20110123026DUPLICATION MEANS FOR AN ELECTRONICALLY CODED KEY AND RELATED METHOD - Method for the duplication of original electronic keys used in the automotive transports, and provided with coded and encrypted electronic authentication means, comprising: an Identification Code (ID), an encrypted secret code, a Password, an algorithm, data storage and computing means, able of being used in vehicles provided with a central processing unit able of storing an Identification Code (ID), an encrypted secret code, a Password, an algorithm, said duplication method being able of obtaining a duplicated key based on a blank key, which is originally provided with an algorithm, data storage means able of storing said Identification Code (ID), said secret code and said Password, wherein said data storage means are initially empty; said duplication is based on a duplication means and on a method which allows of using the blank key as intercepting means of secret codes sent by the vehicle central processing unit, and of transferring said information to the duplication means itself.05-26-2011
20110123027USE OF A MOBILE TELECOMMUNICATION DEVICE AS AN ELECTRONIC HEALTH INSURANCE CARD - The invention relates to a method for decoding a medicinal data object (05-26-2011
20110123028SYSTEMS AND/OR METHODS OF INCREASED PRIVACY WIRELESS COMMUNICATIONS - Systems, methods and/or mobile devices are provided that enable a level of privacy/security in wireless communications to be increased responsive to a content of the wireless communications, biometric data and/or a position from which the wireless communications takes place. A plurality of communications modes is used by the system infrastructure and the plurality of mobile devices communicating therewith to increase privacy and undetectability of transmitted signals. The increased level of privacy and undetectability of signals is provided via pseudo-randomly generated signaling alphabets that are used by the mobile devices and by the system infrastructure to provide the communications. This represents a level of encryption/scrambling that is over and above the conventional encryption and/or scrambling at the bit level. Accordingly, systems, methods and/or devices providing a concatenated level of encryption/scrambling are provided.05-26-2011
20110135094SECRET DATA TRANSMISSION METHOD, SECRET DATA TRANSMISSION SYSTEM, AND SECRET DATA TRANSMISSION DEVICE - There is provided a secret data transmission method where a first device generates plural pieces of distributed data including data of a master key and transmits these by wireless communication to a second device and where the second device receives the plural pieces of distributed data and reconstructs the master key, wherein the first device arranges data obtained by performing an EXOR operation in sequence on plural pieces of random number data and the master key to generate secret data, generates a last piece of distributed data by performing an EXOR operation in sequence on the plural pieces of distributed data and the secret data, and transmits the plural pieces of distributed data to the second device, and the second device performs an EXOR operation in sequence on the plural pieces of distributed data to reconstruct the secret data, divides the reconstructed secret data, and performs an EXOR operation on the divided pieces of data to reconstruct the master key.06-09-2011
20110142239SECURITY PROTECTED NON-ACCESS STRATUM PROTOCOL OPERATION SUPPORTING METHOD IN A MOBILE TELECOMMUNICATION SYSTEM - The present invention relates to a method and system for the management of the mobility, the management of an idle mode, the registration management (management of attachment and detachment), and the location management (management of tracking area) of a terminal by using a non-access stratum (i.e., network stratum, hereinafter referred to as “NAS”) in a mobile telecommunication network. To this end, the method for the management of mobility, the management of an idle mode, the registration management, and the location management of a terminal by using a NAS protocol, i.e., messages, according to an embodiment of the present invention, includes a terminal (hereinafter, referred to as “UE”) and a mobility management entity (hereinafter, referred to as “MME”), and addresses to a method for efficiently processing security protected NAS messages if received messages are security protected NAS messages, in a case of sending or receiving messages serving as EMM (EPS Mobility Management) messages, i.e., mobility management messages, in a network such as an EPS (Evolved Packet System) of 3GPP, when the terminal performs handover in an active mode, performs location management in an idle mode, and registers to a network, thereby achieving improved efficiency in the mobility management, the position management, and the registration management of a terminal.06-16-2011
20110150222PORTABLE ELECTRONIC DEVICE AND ASSOCIATED METHOD FOR MAKING INFORMATION AVAILABLE - A portable electronic device includes at least one near-field or medium-field wireless communication interface (06-23-2011
20110158408SUPPLEMENTAL MOBILE COMMUNICATION DEVICE - Systems and methods provide a supplemental mobile communication device that allows use of a host communication device with a network different from that associated with the host device, e.g., a network of a different service provider or that is otherwise restricted to the host device. The system may include a supplemental mobile communication device having a transmitter selectively communicating with a plurality of host devices associated with a different wireless network. The system may further include a processor configured to compare a service plan associated with the supplemental mobile communication device with a service plan associated with the host device, and selectively route communications initiated by a user interface of the host device through one of the first and second communication networks based upon at least the comparison of the first and second service plans.06-30-2011
20110158409WIRELESS COMMUNICATION APPARATUS, WIRELESS COMMUNICATION METHOD, AND WIRELESS COMMUNICATION PROGRAM - A wireless communication apparatus that establishes connection with an access point wirelessly to perform wireless communication is provided. The apparatus includes: a beacon receiving section that receives a beacon that includes identification information of the access point; a key input accepting section that accepts an input of a security key that is to be used for encryption of wireless communication between the wireless communication apparatus and the access point that is a connection target; a communication method determining section that determines, on the basis of the security key, a communication method that is to be used for communication with the access point by selection out of a plurality of communication methods using encryption available for connection with the access point; and a communication controlling section that carries out control for communicating with the access point by using the received identification information of the access point and the determined communication method.06-30-2011
20110158410METHOD FOR TRANSMITTING DATA BETWEEN NETWORK NODES - A method transmits data between network nodes of a network in a cryptographically protected manner. The network nodes are, for example, sensor nodes of a wireless sensor network. In the method, in order to transmit the data in a message, a NONCE value is created from a count value which is updated in the transmission of the message and from a constant value which is provided in a shared manner to the network nodes of the network. The data transmitted in the message is then encrypted and decrypted within the network nodes by a cryptographic key and the created NONCE value. The method offers in particular protection against replay attacks while at the same time minimizing the use of resources of the network nodes.06-30-2011
20110164749SYSTEM AND METHOD FOR SECURE TRANSACTION OF DATA BETWEEN A WIRELESS COMMUNICATION DEVICE AND A SERVER - The present invention provides a system and method for a set of Extensible Authentication Protocols (EAPs) that can serve Confidentiality, Authentication, Authorization and Accounting (CAAA) issues at an affordable cost. According to one embodiment of the invention, a system and method is provided to generate random sequences (through prime numbers) which can be used in the authentication process of certificateless extensible authentication protocols (EAPs) for mobile and wireless communications. The invention also provides a light weight security with better performance in comparison to the lower layer chip level security provided by 2G, 3G or 4G applications.07-07-2011
20110164750METHOD FOR COMMUNICATING IN A NETWORK, A COMMUNICATION DEVICE AND A SYSTEM THEREFOR - The present invention relates to a communication system comprising a first node and second node adapted for communicating in a network, wherein the first node comprises a first list of keying materials including a plurality of keying materials, wherein the second node comprises a second list of keying materials including a plurality of keying materials, wherein the first node further comprises a receiver for receiving from the second node a second node identifier, a controller being arranged for determining from the second node identifier the position in the first list of at least one keying material having a common root with one keying material of the second list, and for generating an encryption key by means of the keying material having a common root and the second node identifier.07-07-2011
20110188657METHOD FOR CONNECTING WIRELESS COMMUNICATIONS, WIRELESS COMMUNICATIONS TERMINAL AND WIRELESS COMMUNICATIONS SYSTEM - A method for connecting wireless communications, a wireless communications terminal and a wireless communications system are provided. The method includes receiving a first signal including assumed configuration data; determining an availability of a wireless communications connection using the assumed configuration data; sending an association request message, if it is determined that the wireless communications connection is available; and receiving a second signal including connection configuration data, which is different from the assumed configuration data, in response to the association request message.08-04-2011
20110211698Encryption/Decryption System for a Mobile Device - An encryption/decryption system for a mobile phone configured to make a voice packet encryption/decryption during mobile communication. The mobile phone has a connecting device for an external plug-in device. The external plug-in device has a control unit, a security chip. When a security communication mode is activated, the communication between users can be prevented from being disclosed.09-01-2011
20110216903METHOD AND DEVICE FOR EMITTING MESSAGES FOR GUARANTEEING THE AUTHENTICITY OF A SYSTEM AND METHOD AND DEVICE FOR VERIFYING THE AUTHENTICITY OF SUCH A SYSTEM - The invention relates to a method for emitting messages in order to guarantee the authenticity of the system that emitted said messages. The method includes the following steps, namely: a step comprising the selection of a threshold value used in a threshold-based cryptographic scheme, which value is greater than or equal to 1;—a step comprising the generation of a set of partial information items, such that knowledge of a number i, greater than or equal to the threshold value K, of partial information items can be used to verify a signature of at least part of the messages; and a fourth step comprising the sending of each partial information item separately in a distinct message. The invention also relates to a device for emitting messages for guaranteeing the authenticity of the system that emitted the messages, as well as to a method and a device for verifying the authenticity of such a system. In particular, the invention is suitable for global satellite-based radiocommunication and radionavigation systems.09-08-2011
20110216904METHOD AND APPARATUS FOR IMPROVED SECURE TRANSMISSION BETWEEN WIRELESS COMMUNICATION COMPONENTS - A method for transmitting secured data over a wireless communication network. The method includes transmitting a subframe. The subframe has a preamble, an initialization vector comprising an encrypting key and a burst wherein the burst is encrypted based on the initialization vector and wherein the burst further has a payload and a cyclic redundancy check. The method further includes providing a decrypting key wherein the decrypting key allows the burst to be decrypted.09-08-2011
20110222689METHOD AND APPARATUS FOR PROVIDING SECURE COMMUNICATIONS FOR MOBILE COMMUNICATION DEVICES - A method and apparatus that enables secure communications from a wireless communication device is disclosed. The method may include receiving a signal to transmit data, wherein the data is at least one of voice, text, image, and video, applying a first layer of encryption to the data, applying a second layer of encryption to the data, applying a third layer of encryption to the data, and sending the encrypted data over a communications network.09-15-2011
20110228941SYSTEMS AND METHODS FOR RFID SECURITY - An RFID system includes an RFID tag, an RFID reader, and a server. The RFID tag communicates to the server via encrypted information. The information may be encrypted with synchronized encryption keys. In this manner, the reader need not decrypt the information from the RFID tag. The effectiveness of malicious readers is thereby reduced, resulting in improved RFID tag security.09-22-2011
20110255692POWER SAVINGS THROUGH COOPERATIVE OPERATION OF MULTIRADIO DEVICES - Trust establishment in short range protocol pairing between client and proxy devices includes a first aspect in which application level security is used to encrypt all packets transmitted between the client and proxy. An application-based security derives a public key from the General Bootstrapping Architecture (GBA) and used that public key to generate an encryption key in an AES encryption algorithm. A second aspect provides for out of band security to be used to establish short range protocol pairing. In this second aspect, the client and proxy exchange identification information over a third party network that is out of band to the short range protocol. With this identification information exchanged out of band, the client and proxy may establish pairing in the short range protocol.10-20-2011
20110255693Apparatus and method for transitioning from a serving network node that supports an enhanced security context to a legacy serving network node - Disclosed is a method for transitioning a remote station from a current serving network node having an enhanced security context to a new serving network node. In the method, the remote station provides at least one legacy key, and generates at least one session key based on an information element associated with the enhanced security context. The remote station forwards a first message having the information element to the new serving network node. The remote station receives a second message, from the new serving network node, having a response based on either the legacy key or the session key. The remote station determines that the new serving network node does not support the enhanced security context if the response of the second message is based on the legacy key. Accordingly, the remote station protects communications based on the legacy key upon determining that the enhanced security context is not supported.10-20-2011
20110261960METHOD FOR ALLOCATING AUTHORIZATION KEY IDENTIFIER FOR WIRELESS PORTABLE INTERNET SYSTEM - A method and authentication apparatus for sharing information for identifying an Authorization Key (AK) with a Base Station (BS) in a subscriber station are provided. The method includes, in the subscriber station, sharing a root key with the BS by performing an authentication with the BS, sharing an AK derived from the root key with the BS, sharing an AK sequence number of the AK with the BS, and sharing an AK Identifier (AKID) of the AK with the BS. The AK sequence number is generated by a sequence number of the root key. The AKID is generated by a parameter including the AK, the AK sequence number, a Medium Access Control (MAC) address of the subscriber station, and a BS Identifier (BSID) of the BS.10-27-2011
20110268273Data Processing Apparatus for a Field Device - A data processing apparatus for a field device of level measurement and/or pressure measurement technology is described. An input is adapted for receiving data from a measurement processing stage and an output is adapted for providing encrypted data. The encrypted data are marked for a recipient of the data as encrypted data.11-03-2011
20110268274Authentication and Key Establishment in Wireless Sensor Networks - A wireless sensor network (WSN) and a method for establishing a communication key between devices in a WSN. The WSN comprises a first device configured for sending a request message to a second device, the request identifying at least a third device for communication with which a communication key is intended, a first random number, and a first authentication code generated using a first secret key shared between the first and second devices; the second device configured for authenticating the first authentication code based on the first secret key, for generating the communication key based on the first secret key, the first random number, and a second random number using a hash function, for sending an approval message to the third device, the approval message comprising, in encrypted form based on a second secret key shared between the second and third device, the communication key and the first and second random numbers; the third device configured for decrypting the communication key and the first and second random numbers based on the second secret key and for sending a notice message to the first device, the notice message comprising the first and the second random numbers; and the first device configured for recalculating the communication key, based on the first secret key and said received first and second random numbers using said hash function.11-03-2011
20110268275Apparatus and method for a random wave envelope for generating a sequence of encryption keys for communication security in mobile wireless devices part III - A random wave envelope is created from a set of bounded random numbers by additively combining a triangle, a square and a sine wave. The random wave envelope is then used to create a sequence of wave random numbers from the wave envelope, which are used to generate random-variant keys for encryption in place of the pre-placed encryption key. An ambiguity envelope is thus created over the transmission of data packets as random-variant-keys are used that are distinct and separate for each packet and may also be distinct and separate for each incoming and outgoing packet. The random-variant keys are only created at the time of the actual use for encrypting or decrypting a data packet and not before and then discarded after one time use. The random-variant keys may be used in wireless network using wireless access points, cellular phone and data networks and ad hoc mobile wireless networks.11-03-2011
20110268276Apparatus and method for communication security in a nationwide wireless network - Systems and methods for security in a nationwide wireless network with geographically dispersed wireless routers are described. The wireless routers have an interface function with an ability to receive telephone calls from an authorized caller. The router, in response and on demand generates a set of bounded random numbers (BRN) as a random seed for use in generation of encryption keys for communication security between the router and a portable wireless device of the caller.11-03-2011
20110268277COMMUNICATION SYSTEM, FEMTOCELL BASE STATION, AUTHENTICATION APPARATUS, COMMUNICATION METHOD, AND RECORDING MEDIUM - A communication system for solving a problem, in which secure communications security cannot be ensured in communications between a femtocell base station and UE, is provided. The communication system includes UE (User Equipment) and an HLR (Home Location Register) used in an IMS (IP Multimedia subsystem) network and a femtocell base station (Femto AP) that constructs a predetermined communication area. The femtocell base station exists between the UE and the HLR, acquires a concealment key corresponding to the UE from the HLR during authentication of the UE, and executes a concealment process to conceal the identity of the UE based on the concealment key.11-03-2011
20110268278Systems, Devices and Methods for Providing Access to a Distributed Network - In a cellular network system, an add-on base station (11-03-2011
20110274275Trans-Security Components System and Methods - A system of combating the shipment of contraband goods is described. After products are ordered, custom made secure tags are created. Corresponding data is created at a central database. The tags include encrypted information about the tag, the products and the mode of shipping. The tags can be placed at several locations from inside the goods to attached to the outside of the shipping container. The encryption and other measures are used to prevent the unauthorized duplication of the tags. As the goods make there way through the distribution channels the goods can be scanned at convenient locations. The encryption scheme can be altered by reference to time. The scanner is connected to the database and can receive the proper encryption scheme will automatically and at random be remotely changed every few minutes. The scanning of the goods will reveal whether unauthorized goods are present in the shipment.11-10-2011
20110280401SYSTEM AND METHOD FOR EXCHANGING ENCRYPTION KEYS BETWEEN A MOBILE DEVICE AND A PERIPHERAL DEVICE - Embodiments of a system and method for providing additional security for data being transmitted across a wireless connection that has been established using a known wireless protocol (e.g. Bluetooth) are described. An encryption key is exchanged between a computing device (e.g. a mobile device) and a wireless peripheral device (e.g. a keyboard, a printer). In exemplary embodiments, the encryption key is generated at one of the two devices. Data associated with the encryption key is output at the one device, which can be input by the user at the other device. The encryption key is then recovered at the other device from the input, thereby completing the key exchange. The encryption key can then be used to encrypt and decrypt data transmitted over the established wireless connection, providing additional security.11-17-2011
20110286597HOME AGENT PROXIED MIPv6 ROUTE OPTIMIZATION MODE - A method apparatus, processor, and computer program product for wireless communication, including employing a communication interface to obtain a binding update message from a mobile node (MN). A data process is employed to analyze the binding update message for a network address of a corresponding node (CN). A communication interface is employed to initiate a long-life secure association between the CN and a network agent serving the MN if the binding update message contains the network address of the CN, wherein the long-life secure association enables the MN and CN to participate in a route optimized (RO) mobile communication session. The method may include employing a data processor to generate a binding cache entry for the network entity or a network component serving the network entity, wherein the binding cache entry includes a security key that facilitates a route optimized communication session with the network entity or the network component.11-24-2011
20110293095SYSTEMS FOR INTELLIGENT AUTHENTICATION BASED ON PROXIMITY - A method and apparatus for intelligent authentication based on proximity and using a short wireless device.12-01-2011
20110305338METHOD AND SYSTEM FOR SECURE PROVISIONING OF A WIRELESS DEVICE - A method and system for enabling one or more communication services on a wireless device are provided. The method comprises: sending a request for provisioning information from a carrier provisioning system to a device developer provisioning system; receiving, from the device developer provisioning system, secure provisioning information corresponding to the request; and sending the secure provisioning information corresponding to the request from the carrier provisioning system to the wireless device.12-15-2011
20110305339Key Establishment for Relay Node in a Wireless Communication System - Techniques for providing additional security for the wireless interface between a relay node and a donor base station are based on a security association established between the relay node and the donor base station. In an example method implemented in a relay node, communications with a donor base station are established and a first cryptographic key is generated according to a radio access protocol. A security association between the relay node and the donor base station is then established, using a credential stored at the relay node, and a second cryptographic key is derived from the first cryptographic key, using the stored credential, or one or more parameters relating to the security association, or information exchanged within the security association. The second key is used to protect user plane data relayed from one or more mobile terminals to the donor base station.12-15-2011
20110305340AUTOMATIC DATA ENCRYPTION AND ACCESS CONTROL BASED ON BLUETOOTH DEVICE PROXIMITY - A method, apparatus, and system for using Bluetooth devices to secure sensitive data on other Bluetooth devices is described. A Bluetooth device is paired with a “trusted” Bluetooth device. When contact with the trusted device is lost, designated sensitive data on the secured Bluetooth device is automatically encrypted. When contact is restored, the data is automatically decrypted. In an alternate embodiment, a secured device can be associated with multiple trusted devices, and the secured device designate different sensitive data for each trusted device. In this way, multiple users can share a common, “public” Bluetooth device without concern that the other users will access their sensitive data on the device when the device is not being used by that user.12-15-2011
20110311051UTILIZING A DETERMINISTIC ALL OR NOTHING TRANSFORMATION IN A DISPERSED STORAGE NETWORK - A method begins by a processing module generating a deterministic key from data and encrypting the data using the deterministic key to produce encrypted data. The method continues with the processing module generating transformed data from the encrypted data and generating a masked key from the deterministic key and the transformed data. The method continues with the processing module combining the masked key and the encrypted data to produce a secure package.12-22-2011
20110311052Wireless Device Enabled Locking System - An encrypted security system and associated methods for controlling physical access. The system includes a security server configured to receive a request for authentication from a mobile device, the request comprising information identifying the mobile device and a physical access control device. The security server forwards an encryption message comprising a plurality of unique identifiers to the physical access control device via the mobile device. The physical access control device is configured to authenticate the plurality of unique identifiers in the encryption message and operate an access control mechanism.12-22-2011
20110317839INFORMATION PROCESSING DEVICE AND METHOD, PROGRAM, AND INFORMATION PROCESSING SYSTEM - An information processing device which shares data with one or more communication partners includes a creation unit which creates its own encryption key that the device uses for itself and encryption keys that the communication partners use, a first communication unit which transmits all the encryption keys created by the creation unit to the communication partners with the first communication, a division unit which divides the data, an encryption unit which encrypts its own data that the device is to save for itself among the data divided by the division unit with its own encryption key, a second communication unit which transmits other data that the communication partners are to save among the data divided by the division unit to the communication partners with the second communication, and a storage unit which stores its own data encrypted by the encryption unit and the other encryption keys.12-29-2011
20120002813MULTI-SERVICE VPN NETWORK CLIENT FOR MOBILE DEVICE - An integrated, multi-service network client for cellular mobile devices is described. The multi-service network client can be deployed as a single software package on cellular mobile network devices to provide integrated services including secure enterprise virtual private network (VPN) connectivity, acceleration, security management including monitored and enforced endpoint compliance, and collaboration services. Once installed on the cellular mobile device, the multi-service client integrates with an operating system of the device to provide a single entry point for user authentication for secure enterprise connectivity, endpoint security services including endpoint compliance with respect to anti-virus and spyware software, and comprehensive integrity checks. That is, the multi-service client provides a common user interface to the integrated services, and provides a VPN handler that interfaces with the operating system to provide an entry point for network traffic to which the integrated services can be seamlessly applied.01-05-2012
20120002814VPN NETWORK CLIENT FOR MOBILE DEVICE HAVING DYNAMICALLY CONSTRUCTED DISPLAY FOR NATIVE ACCESS TO WEB MAIL - An integrated, multi-service network client for cellular mobile devices is described. The multi-service network client can be deployed as a single software package on cellular mobile network devices to provide integrated services including secure enterprise virtual private network (VPN) connectivity, acceleration, security management including monitored and enforced endpoint compliance, and collaboration services. The VPN network client is programmed to receive a web-based home page from an enterprise VPN appliance, process the web-based home page to identify a bookmark embedded within the response that corresponds to an enterprise webmail for the user and dynamically construct a user interface to have an input control native to the cellular mobile device for launching a native email client of the cellular mobile device to access the email without launching a web browser.01-05-2012
20120002815VPN NETWORK CLIENT FOR MOBILE DEVICE HAVING FAST RECONNECT - A virtual private network client for cellular mobile devices is described. The VPN network client establishes a secure VPN connection with a remote VPN security device. The VPN network client establishes a secure control channel with the secure VPN gateway and, upon a successful authentication, receives a session cookie with a unique identifier. In the event communication with the secure VPN gateway is subsequently temporarily lost, the VPN network client performs a fast reconnect without requiring re-authentication of the cellular mobile device by communicating the session cookie to the secure VPN gateway. Prior to performing the fast reconnect, the VPN network client identifies a set of transport mechanisms currently available to the cellular mobile device and, when only a cellular network is available and not a wireless packet-based connection, the VPN network client defers the fast reconnect until application-layer data is received from a user application and is ready to be sent to the remote VPN security device via the VPN connection01-05-2012
20120002816Method and system for realizing secure forking call session in IP multimedia subsystem - The present invention relates to a method for realizing a secure forking call session, which comprises: performing authentication between a calling party and a KMS or between each called party and the KMS, and acquiring a shared key between the calling party and the KMS or a shared key between each called party and the KMS; generating a random number by the calling party and calling each called party through an IMS; generating a random number by each called party and acquiring a media root key from the KMS; generating a media key, which is shared with the calling party, by each called party according to the media root key and the random number generated by the called party; sending the media root key and the generated random number by a called response party in the called parties, who responds the call, to the calling party through the IMS network; generating a media key identical to that of the called response party by the calling party according to the media root key and the random number generated by the called response party; and performing a secure media session between the calling party and the called response party with the identical media key.01-05-2012
20120008783SECURE CONFIGURATION OF A WIRELESS SENSOR NETWORK - A method for secure configuration of a sensor system involves identifying a new sensor not activated within the sensor system, the new sensor including a new sensor identifier, establishing a first transmission link between the new sensor and a sensor controller, transmitting the new sensor identifier between the sensor and the sensor controller, generating a key pair for the sensor controller, the key pair including a controller public key and a controller private key, generating a key pair for the new sensor, the key pair including a sensor public key and a sensor private key, transmitting the controller public key to the new sensor and the sensor public key to the sensor controller, and generating a pairwise key within the sensor controller and the new sensor.01-12-2012
20120033813Method of Selective Protection of the Satellite Rebroadcasting of Data Broadcast Publicly and Collected by the Satellite - The AIS (Automatic Identification System) is a communication system between ships, for example fishing boats, which is used to limit collisions between these ships and that allows maritime traffic in sight of the coasts to be monitored by virtue of coastal stations that listen to the communications. The collection by satellite of these data allows for maritime monitoring far from the coasts and allows the data transmitted to be checked by analysis of the received signal. The maritime monitoring authorities do not want the data concerning, for example, the position of the ships in their territorial waters, collected by satellite, to be broadcast globally. This is because this would enable a user, by listening to the satellite, to know the AIS messages exchanged far from these coasts. The AIS messages contain the position of the transmitting ship, and its identifier, its direction, etc. The invention consists in putting in place an encryption of the data returned from the satellite based on the content of these data. The encryption of the data also enables the authorities to supply the AIS data as a service, possibly a paying service.02-09-2012
20120033814SHORT MESSAGE SERVICE CIPHER - A wireless phone system and methods performed thereon for cryptographically processing SMS messages is disclosed. A cryptographic pad is used to replace characters in a payload of a SMS message with coded characters. The cryptographic pad is used by the receiver of the SMS message to decode it. The cryptographic pad is one of two or more possible cryptographic pads stored in the receiver. In one embodiment, the two or more possible cryptographic pads are sent as a key where a particular cryptographic pad is referenced in the key using an index.02-09-2012
20120039470Method and Device for Establishing a Communication Session - Devices are provided with secret information to indicate which other devices are eligible to establish communication sessions. Information leaks about the eligibility of devices are prevented when no communication sessions are established. Each device makes a set of preference information items publicly available. Each preference information item selects an eligible device in cloaked way. Each protected information item contains protected information such as an encrypted random number that can be decrypted only by the eligible device. When a request to establish a communication is processed by a first and second device, the first and second device indicate which of their preference information items should be used. The devices then each attempt to decrypt the protected information from the other one's indicated preference information item and each combines the result with the protected information used to make the preference information item that it indicated to the other. The results from the first and second device are compared and when a match is detected, establishment of the communication session is enabled. If no match is detected a first device that did not make the second device eligible is unable to detect whether it was made eligible by the second device.02-16-2012
20120039471EFFICIENT SECURITY-RELATED PROCESSING - An efficient security related procedure is disclosed. A plurality of service data units (SDUs) having the same priority is multiplexed to one unit signal. The unit signal is ciphered using a mask generated by a first parameter combination. The receiver simultaneously deciphers the multiplexed service data units (SDUs), such that a Layer-02-16-2012
20120039472METHOD AND DEVICE FOR ESTABLISHING A SECURITY MECHANISM FOR AN AIR INTERFACE LINK - A method, a device, and a system for establishing a security mechanism for an air interface are provided in embodiments of the present invention. The method includes: performing security processing for a shared key of an access link according to a shared key between a relay node and a mobility management entity; and sending the shared key of the access link after the security processing to the relay node to enable the relay node to obtain the shared key of the access link based on the shared key between the relay node and the mobility management entity. The present invention reduces the possibility at which the air interface link is hacked, thereby improving the security of the air interface link.02-16-2012
20120045058APPARATUS AND METHOD FOR AUTHENTICATION FOR MOTOR VEHICLES - An arrangement on monitoring of authentication, in particular for motor vehicles, includes a first communication apparatus and at least a second communication apparatus, between which a wireless communication channel can be set up. The communication apparatus items have means for authentication and encryption, with which the exchangeable data may be encrypted via the communication channel. The items of communication apparatus have storage means in which one of the digital keys usable for authentication and encryption can be stored, and in that in the storage device there is either in addition to the digital key and/or in the individual key at least one piece of information regarding at least one past communication between the first communication apparatus and the second apparatus that can be stored in memory.02-23-2012
20120057704System and Method for Providing Security in a Wireless Communications System - A system and method for providing security in a wireless communications system are provided. A method for device operations includes generating a security key from an initial key, producing secured information by applying the security key to radio resource allocation information, and transmitting the secured information to the communications device. The radio resource allocation information comprises a location of radio resource allocated to a communications device.03-08-2012
20120057705TWO-WAY AUTHENTICATION BETWEEN TWO COMMUNICATION ENDPOINTS USING A ONE-WAY OUT-OF-BAND (OOB) CHANNEL - Techniques for two-way authentication between two communication endpoints (e.g., two devices) using a one-way out-of-band (OOB) channel are presented. Here, in embodiments, both communication endpoints may be securely authenticated as long as the one-way OOB channel is tamper-proof. Embodiments of the invention do not require the one-way OOB channel to be private to ensure that both endpoints are securely authenticated. Since providing a two-way or private OOB channel adds to the cost of a platform, embodiments of the invention provide for a simple and secure method for two-way authentication that uses only a non-private one-way OOB channel and thus helping to reduce platform cost. Other embodiments may be described and claimed.03-08-2012
20120063598BLUETOOTH.RTM. DEVICE AND METHOD OF CONNECTING BLUETOOTH.RTM. DEVICES USING A BLUETOOTH.RTM. CHANNEL - Provided are a method of connecting BLUETOOTH® devices using a single BLUETOOTH® channel and a BLUETOOTH® device using the method. A public key may be exchanged via a predefined single BLUETOOTH® channel, thereby preventing a Man-in-the-middle (MITM) attack. For example, when an MITM attacker intercepts the public key and attempts to perform an attack on the other BLUETOOTH® devices, other BLUETOOTH® devices may also receive the public key via the single BLUETOOTH® channel. Accordingly, the other BLUETOOTH® devices may recognize that the MITM attacker attempts to carry out the MITM attack using a disguised address.03-15-2012
20120076303INTERCEPT ACCESS POINT FOR COMMUNICATIONS WITHIN LOCAL BREAKOUTS - Embodiments of the present disclosure provide for the capability within a gateway to dynamically monitor communications and protocols from a targeted user in a local breakout. A gateway product with this capability thus performs the function of an intercept access point (IAP). Communications to and from the targeted user are directed through the gateway and are intercepted in a manner not visible to the targeted user.03-29-2012
20120082313PRIVACY CONTROL FOR WIRELESS DEVICES - According to various embodiments, a computer-implemented method is disclosed that includes receiving, at a wireless adaptor of a device, a wireless data packet from an access point (AP), wherein the wireless data packet includes a Basic Service Set Identifier (BSSID) of the AP; changing the BSSID of the received data packet by a processor or hardware to produce a modified wireless data packet; and transmitting the modified wireless data packet to an application on the device.04-05-2012
20120082314MOBILE COMMUNICATION SYSTEM, COMMUNICATION CONTROL METHOD, AND RADIO BASE STATION - A system includes: a first radio base station including: a first processor which performs processes to transmit and receive a first encryption key, and an first interface which transmits or receives the encapsulated packet, the second radio base station includes: a second interface which transmits or receives the encapsulated packet; and a second processor which encrypts or decrypts the packet with the first encryption key, the host node includes: a third processor which encrypts or decrypts the packet, and during processing of a handover of the mobile station, the host node transmits the packet encrypted with the first encryption key to the first radio base station, the first radio base station transmits the packet to the second radio base station by the tunneling, and the second radio base station decapsulates the packet, decrypts the packet with the first encryption key, and then transmits the packet to the mobile station.04-05-2012
20120087501SYSTEMS AND METHODS FOR RFID SECURITY - An RFID system includes an RFID tag, an RFID reader, and a server. The RFID tag communicates to the server via encrypted information. The information may be encrypted with synchronized encryption keys. In this manner, the reader need not decrypt the information from the RFID tag. The effectiveness of malicious readers is thereby reduced, resulting in improved RFID tag security.04-12-2012
20120093314Dynamic content-based ciphering on a control channel - In an exemplary embodiment content of a data message to be sent on a control channel is determined, and a selection is made between ciphering and not ciphering the data message based on the determined content. By example if from the content it is determined that that the data message is a SMS message, ciphering is selected and the control channel is a SACCH; else ciphering is not selected. Such a determination may be made by checking a service access point identifier for a data block comprising the data message. A data message within a data block received on the control channel is determined to be ciphered or not ciphered using only information within the data block, and the received data message is processed according to the determination. In another embodiment the FACCH is selected for sending the message if it is a SMS, and ciphering is selected for all data blocks sent on the FACCH.04-19-2012
20120093315DIABETES CARE KIT THAT IS PRECONFIGURED TO ESTABLISH A SECURE BIDIRECTIONAL COMMUNICATION LINK BETWEEN A BLOOD GLUCOSE METER AND INSULIN PUMP - A diabetes care kit for providing diagnostics and therapy that is preconfigured to reduce initial setup by a user. The kit can include a handheld diabetes managing device and insulin pump. The handheld diabetes managing device and insulin pump can each be preloaded with an encryption key such that the handheld diabetes managing device and the insulin pump are paired and a secure bidirectional communication link exists between the handheld diabetes managing device and the insulin pump.04-19-2012
20120093316ACCESS POINT, TERMINAL, ENCRYPTION KEY CONFIGURATION SYSTEM, ENCRYPTION KEY CONFIGURATION METHOD, AND PROGRAM - Configuration tasks needed to form a wireless LAN are performed using a simple method while increasing security during configuration. In a wireless network configuration system GH04-19-2012
20120106737System and Method for Securing Wireless Communications - A system and method for securing wireless communications are provided. A method for secure communications by a first user includes estimating a channel between the first user and a second user, thereby producing an first phase estimate of the channel, generating a first block of secret bits based on the first phase estimate of the channel, and transmitting public information regarding the first block of secret bits to the second user. The second user makes use of the public information to generate a second block of secret bits.05-03-2012
20120106738LOCATION BROKERING FOR PROVIDING SECURITY, PRIVACY AND SERVICES - Location brokering technique embodiments are presented that employ sensor data captured by a user's mobile device to determine the device's location, encrypt the location data and store it in a database. The location data is encrypted in such a way that it is possible to determine when a user's mobile device is currently in the same vicinity as another user's mobile device who is a member of the same group as the first user. However, the actual location and relative mobility or immobility of the users cannot be ascertained except by the users themselves via a decryption procedure or by trusted components. Services are provided can read the stored encrypted location data, processes it to determine if group members are in the same vicinity, and either respond to user queries about the location of other members of a group the user belongs to, or push this information to appropriate users.05-03-2012
20120106739System and Method for Securing Wireless Communications - A system and method for securing wireless communications are provided. A method for secure communications by a first user includes estimating a channel between the first user and a second user based on a pilot signal transmitted by the second user, determining a first threshold and a second threshold based on the estimate of channel, selecting a first subset of channel estimates, signaling the first subset of channel estimates to the second user, receiving a second subset of channel estimates from the second user, for each channel estimate in the second subset of channel estimates, quantizing the channel estimate based on a relationship between a gain of the channel estimate and the first threshold and the second threshold, generating a first secret key based on quantized channel estimates, verifying that the first secret key matches a second secret key generated by the second user, and transmitting information to the second user.05-03-2012
20120106740DEFAULT ENCODING - The invention relates to a method for encoding a connection between a base (05-03-2012
20120114123METHOD FOR SECURELY BROADCASTING SENSITIVE DATA IN A WIRELESS NETWORK - The invention relates to a method for securely broadcasting sensitive data in a wireless sensor networks comprising a central device, called trust center, and a plurality of sensor nodes, the trust center being initialized with a cryptographic hash chain and each node being initialized with a node key and the anchor of the trust center hash chain, the method comprising the following steps: the trust center broadcasting a first secure message to the nodes, each node, after reception of the first message, creating a first acknowledgment message, and transmitting it back to the trust center, the trust center checking whether all the nodes have transmitted respective first acknowledgment message, and in case all messages have been received, the trust center securely broadcasting sensitive data in a third message, the nodes checking, based on elements included in the first message, whether sensitive data actually originates from the trust center.05-10-2012
20120121089INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, OPERATION TERMINAL, AND INFORMATION PROCESSING SYSTEM - Provided is an information processing apparatus including a security level determination section which determines a security level at a time of transmitting a key to an operation terminal, as a transmission security level, a transmission power determination section which determines a transmission power in accordance with the transmission security level and a key-dividing number included in a key transmission request, a key acquisition section which acquires each key fragment by dividing the key into the key-dividing number, and a transmission section which transmits the each key fragment acquired by the key acquisition section using the transmission power determined by the transmission power determination section, via a wireless signal to the operation terminal.05-17-2012
20120128156CROSS-COMPONENT CRYPTOGRAPHIC MESSAGE SYNTAX MESSAGE CONSTRUCTION - Often, for reasons of wireless bandwidth conservation, incomplete messages are provided to wireless messaging devices. Employing cryptography, for confidentiality or authentication purposes, when including a received message that has been incompletely received can lead to lack of context on the receiver's end. By automatically obtaining the entirety of the message to be included, an outgoing message that includes the received message can be processed in a manner that securely and accurately represents the intended outgoing message. Alternatively, a server can assemble a composite message from a new message and an original message and, in cooperation with a wireless messaging device, construct a cryptographic message syntax message.05-24-2012
20120128157AUTHENTICATION OF AN RFID TAG USING AN ASYMMETRIC CRYPTOGRAPHY METHOD - A method for the authentication of an RFID tag uses an asymmetric cryptography method which ensures protection against the recycling of authentication RFID tags and needs no deactivation of the corresponding RFID tag for this purpose. To this end, the certificate of an RFID tag to be checked is not stored on the RFID tag but is stored physically separately from the RFID tag. Firstly, the RFID reader reads the certificate of the RFID tag to be checked before the challenge-response protocol is carried out successfully with the RFID tag to be checked. Consequently, an RFID tag can be reused for authentication only when the certificate relating to this RFID tag is known.05-24-2012
20120128158SYSTEM AND METHOD FOR PROVIDING VARIABLE SECURITY LEVEL IN A WIRELESS COMMUNICATION SYSTEM - A system and method for providing variable security levels in a wireless communication network. The present invention optimizes the often conflicting demands of highly secure wireless communications and high speed wireless communications. According to a preferred embodiment of the present invention, various security sensors are scanned to determine the likely presence of an intruder within a predetermined trust zone. If an intruder is likely present, the security level is changed to the highest setting, and consequently a lower data rate, while the intruder is identified. If the identified intruder is in fact a trusted node, the security level is returned to a lower setting. If the identified intruder is not a trusted node, the security level is maintained at an elevated state while the intruder is within the trust zone.05-24-2012
20120140927CROSS-COMPONENT MESSAGE ENCRYPTION - Often, for reasons of wireless bandwidth conservation, incomplete messages are provided to wireless messaging devices. Employing cryptography, for secrecy or authentication purposes, when including a received message that has been incompletely received can lead to lack of context on the receiver's end. By automatically obtaining the entirety of the message to be included, an outgoing message that includes the received message can be processed in a manner that securely and accurately represents the intended outgoing message. Alternatively, a server can assemble a composite message from a new message and an original message and, in cooperation with a wireless messaging device, encrypt and sign the composite message. Conveniently, security considerations are maintained even in view of bandwidth optimization measures.06-07-2012
20120148045SYSTEM FOR THE CONTROLLED DATA EXCHANGE BETWEEN AT LEAST TWO DATA CARRIERS VIA MOBILE READ-WRITE MEMORIES - The present invention relates to a data transmission system (06-14-2012
20120148046Secure Wireless Communication Using Rate-Adaptive Codes - Data are communicated in a wireless network between a transmitter to a receiver. The transmitter estimates a first channel response between the receiver and the transmitter at the transmitter, and generating a first key based on the first channel response. The data are encoded at the transmitter using a rate-adaptive code to produce encoded data, which is scrambling using the first key before broadcasting. Subsequently, the receiver can estimate a second channel response to generate a second key to be used to descramble the broadcast data.06-14-2012
20120155643SECURE PROTOCOL FOR PEER-TO-PEER NETWORK - A wireless computing device operating as a controller of a peer-to-peer group configured to generate unique master keys for each device joining the group. The wireless computing device may use the unique master keys to selectively remove remote devices from the group such that the remote device cannot later rejoin the group. Other remote devices, each possessing a master key that remains valid, can disconnect from the group and later reconnect to the group without express user action. To support such behavior, the wireless device may provide a user interface through which a user may manage connected remote devices by providing commands to selectively disconnect or remove remote devices from the group.06-21-2012
20120155644METHOD TO MAINTAIN END-TO-END ENCRYPTED CALLS THROUGH A TETRA TMO-DMO GATEWAY WHEN USING SUPER GROUPS - A method for communicating end-to-end encrypted super group information is provided. Temporary address data, which identifies a temporary address on which the super group is to communicate, is transmitted from a gateway to a back-to-back communications device using a direct mode or data message. The back-to-back communications device retrieves an encryption key associated with the temporary address and uses the encryption key to decrypt super group information sent from a networked communications device on the temporary address. The back-to-back communications reverts back to its original encryption key when super group communications are terminated.06-21-2012
20120163599WIRELESS COMMUNICATION SYSTEM AND METHOD - A method of commissioning wireless network devices in a communication network includes assigning a user-defined number to a wireless network device. The method further includes generating, by the wireless network device, an identification number based on the user-defined number using a first hashing algorithm, generating, by the wireless network device, an encryption key based on the user-defined number using a second hashing algorithm, and transmitting, by the wireless network device, a message that is encrypted using the encryption key for joining the wireless network device to the communication network. The user-defined number is to be provided by a user using an input device that is coupled to, or integral to, the wireless network device.06-28-2012
20120163600METHOD AND APPARATUS FOR SUPPORTING SECURITY IN MULITICAST COMMUNICATION - A method of supporting a security for a multicast communication is provided in a mobile station. The mobile station shares an MAK with a base station, derives a prekey based on a first parameter including the MAK, and derives a multicast security key including an MTEK based on a second parameter including the prekey, and decrypts a multicast traffic using the multicast security key.06-28-2012
20120163601Method for Handling Ciphering Keys in a Mobile Station - Techniques for handling ciphering keys in a mobile station comprising a mobile equipment (ME) and a Universal Subscriber Identity Module (USIM) are disclosed. An example method includes obtaining a UMTS cipher key (CK), integrity key (IK), and ciphering key sequence number (CKSN) from the USIM, deriving a 128-bit ciphering key (Kc-128) from the CK and the IK, and storing the Kc-128 and the CKSN on the mobile equipment, separate from the USIM. The stored CKSN is associated with the stored Kc-128, so that the Kc-128's correspondence to the most current UMTS security context can be tracked. This example method applies to the generation and storage of a 128-bit ciphering key for either the packet-switched or circuit-switched domains. A corresponding user equipment apparatus is also disclosed.06-28-2012
20120170744Mobile Communication Devices and Deciphering Methods - A wireless communications device with a wireless module and a controller module is provided. The wireless module is arranged for performing wireless transmission and reception to and from a service network. The controller module is arranged for receiving a first ciphered data packet from the service network via the wireless module, and deciphering the first ciphered data packet according to a first deciphering parameter. Also, the controller module is arranged for deciphering the first ciphered data packet according to a second deciphering parameter in response to unsuccessful deciphering of the first ciphered data packet according to the first deciphering parameter. Particularly, the second deciphering parameter is for deciphering a second ciphered data packet received prior to the first ciphered data packet from the service network.07-05-2012
20120170745Method and device for encrypting user identity during paging procedure - The disclosure discloses a method and device for encrypting a subscriber identity during a paging procedure, which are particularly adapted to the paging performed by an MME using an IMSI. The method includes: A, using a key generated by the subscriber identity of the called UE to encrypt data Y which is obtained on the basis of the subscriber identity, then performing paging using a cipher text; and B, after the called UE receives the paging, determining by the called UE whether the cipher text is included, and if the cipher text is included, regarding itself as the called UE. In the first preferred embodiment, the data Y is the subscriber identity; in the second preferred embodiment, the data Y is the data combined by the subscriber identity and the random data X, and the random data X is sent along with the cipher text during the paging; in the third preferred embodiment, the data Y is the data combined by the subscriber identity and the random data Z, and the data Y contains the subscriber identity at a specific location, when receiving the paging, the UE performs decryption using the subscriber identity and determines whether the decrypted plaintext contains the subscriber identity at a location the same as the specific location to determine whether the paging is for itself.07-05-2012
20120170746Method, Network Element, and Mobile Station for Negotiating Encryption Algorithms - A method, network element, and mobile station (MS) are disclosed. The method includes: obtaining information that a plug-in card of the MS does not support a first encryption algorithm; deleting the first encryption algorithm from an encryption algorithm list permitted by a core network element according to the information that the plug-in card of the MS does not support the first encryption algorithm; sending the encryption algorithm list excluding the first encryption algorithm to an access network element, so that the access network element selects an encryption algorithm according to the encryption algorithm list excluding the first encryption algorithm and the MS capability information sent from the MS and sends the selected encryption algorithm to the MS. By using the method, network element, and MS, errors due to the fact that the plug-in card of the MS does not support an encryption algorithm may be avoided during the encryption process.07-05-2012
20120170747METHOD AND SYSTEM FOR PROTECTING BROADCAST SERVICE/CONTENT IN A MOBILE BROADCAST SYSTEM, AND METHOD FOR GENERATING SHORT TERM KEY MESSAGE THREFOR - A system and method are provided for generating a Short Term Key Message (STKM) for protection of a broadcast service being broadcasted to a terminal in a mobile broadcast system. The method includes transmitting, by a Broadcast Service Subscription Management (BSM) for managing subscription information, at least one key information for authentication of the broadcast service to a Broadcast Service Distribution/Adaptation (BSD/A) for transmitting the broadcast service, generating, by the BSD/A, a Traffic Encryption Key (TEK) for deciphering of the broadcast service in the terminal and inserting the TEK into a partially created STKM, and performing, by the BSD/A, Message Authentication Code (MAC) processing on the TEK-inserted STKM using the at least one key information, thereby generating a completed STKM.07-05-2012
20120170748METHOD AND SYSTEM FOR PROTECTING BROADCAST SERVICE/CONTENT IN A MOBILE BROADCAST SYSTEM, AND METHOD FOR GENERATING SHORT TERM KEY MESSAGE THEREFOR - A terminal and method for receiving a broadcast service by the terminal in a broadcast system are provided. The method includes performing a registration procedure for subscription and reception of the broadcast service through a Browser And Content Mobile Broadcast (BSCAST) Subscription Management (BSM) responsible for managing subscription information; receiving a Long Term Key Message (LTKM), including key information for encryption of the broadcast service, generated from the BSM; receiving a completed Short Term Key Message (STKM), the completed STKM being generated by performing Message Authentication Code (MAC) processing on a partially created STKM; receiving, from a Broadcast Service Distribution/Adaptation (BSD/A) which is responsible for transmitting the broadcast service, an encrypted broadcast service which is encrypted by a Traffic Encryption Key (TEK) for deciphering the broadcast service; and deciphering the encrypted broadcast service by the TEK obtained using the LTKM and the completed STKM.07-05-2012
20120177198SECURE AIRCRAFT DATA CHANNEL COMMUNICATION FOR AIRCRAFT OPERATIONS - According to the application, a method for transmitting an encrypted aircraft related message is disclosed. A message is provided at one of a ground computer system or an aircraft computer system. The aircraft related message is arranged into data packets and at least one of the data packets is encrypted with an encryption key to obtain at least one encrypted data packet. The at least one encrypted data packet is transmitted from a sender to a recipient, wherein the sender is one of the ground computer system or the aircraft computer system, the recipient is the other one of the ground computer system or the aircraft computer system. The at least one encrypted data packet is received by a computer system of the recipient. A step of deciding whether the message is intended for the recipient's computer system is provided. The step of deciding comprises an attempt to decrypt the at least one encrypted data packet with an decryption key, and the decryption attempt comprises analyzing of the message content. If it is decided that the decryption that the message is intended for the recipient, a step of processing the decrypted data message by the recipient's computer system is provided.07-12-2012
20120177199METHOD AND APPARATUS FOR ENCRYPTING SHORT DATA IN A WIRELESS COMMUNICATION SYSTEM - A method and apparatus is capable of encrypting short data in a wireless communication system When a terminal generates a short data burst in idle mode, the apparatus generates a Traffic Encryption Key (TEK) using a Cipher-based Message Authentication Code (CMAC)-TEK prekey derived from an Authorization Key (AK) related to Security Association (SA) between the terminal and a Base Station (BS). A nonce is constructed with a Packet Number (PN) identical to an uplink CMAC PN (CMAC-PN_U) transmitted together with a Ranging Request (RNG-REQ) message carrying the short data burst The short data burst is encrypted using the TEK and the nonce. A Medium Access Control (MAC) Protocol Data Unit (PDU) is generated by attaching a MAC header and a CMAC digest for integrity protection to the RNG-REQ message carrying the encrypted short data burst. The MAC PDU is transmitted to the BS.07-12-2012
20120183140Methods And Apparatus For Protecting Digital Content - A processing system to serve as a source device for protected digital content comprises a processor and control logic. When used by the processor, the control logic causes the processing system to receive a digital certificate from a presentation device. The processing system then uses public key infrastructure (PKI) to determine whether the presentation device has been authorized by a certificate authority (CA) to receive protected content. The processing system may also generate a session key and use the session key to encrypt data. The processing system may transmit the encrypted data to the presentation device only if the presentation device has been authorized by the CA to receive protected content. Presentation devices and repeaters may perform corresponding operations, thereby allowing content to be transmitted and presented in a protected manner. Other embodiments are described and claimed.07-19-2012
20120189122METHOD WITH DYNAMIC KEYS FOR MUTUAL AUTHENTICATION IN WIRELESS COMMUNICATION ENVIRONMENTS WITHOUT PRIOR AUTHENTICATION CONNECTION - A mutual authentication method with which a base station and a subscriber station can mutually authentication with each other is proposed. In this method, dynamic keys are employed, and SS and BS individually input random numbers to the Diffie-Hellman Public Key Distribution System (DH-PKDS for short) to generate a set of public keys and a set of common secret keys as the strong data connection for authentication (DCA for short) between the two stations. An addition function (ADR) which is more secure than that of an exclusive OR function in key transmission is used as a data carrier. SS and BS authenticate each other by using the identity certification keys. Plaintext is encrypted by a two-dimensional stream cipher method so that ciphertext can be more securely, also efficiently, transmitted. Further, dynamic keys and all other security parameters transmitted through wireless channels are only used once to further improve system security.07-26-2012
20120189123COMMUNICATION SYSTEM, WIRELESS COMMUNICATION APPARATUS, AND COMMUNICATION METHOD - A wireless communication circuit includes a receiver to receive at least one of a beacon frame and a probe response frame from a first wireless communication apparatus belonging to a first communication group, at least one of the beacon frame and the probe response frame including first security information indicating a first encryption method. The circuit includes a transmitter to transmit an association request frame to the first wireless communication apparatus, the association request frame including second security information indicating a second encryption method which is supported by the wireless communication circuit, after a determination that the second encryption method overlaps with the first encryption method. The transmitter declines to associate with the first wireless communication apparatus if the first encryption method fails to overlap with the second encryption method. The transmitter transmits a data frame including a frame body after a reception of an association response frame.07-26-2012
20120189124Methods and Devices for Establishing Security Associations and Performing Handoff Authentication in Communications Systems - A method of providing secure communications between a base station, a relay station, and a mobile station in a communication network includes receiving, by the relay station, an unsolicited security key from the base station; receiving, by the relay station, a signaling message from the mobile station; and authenticating, by the relay station, the mobile station using the security key. A method of providing secure communications between a base station, a relay station, and a mobile station in a communication network includes receiving, by the relay station, a signaling message from the mobile station; transmitting, by the relay station, subsequent to receiving the signaling message, a security key request to the base station; receiving, by the relay station, a security key from the base station in response to the previously sent security key request; and authenticating, by the relay station, the mobile station using the received security key.07-26-2012
20120189125METHOD FOR ESTABLISHING A SECURE COMMUNICATION CHANNEL - In a method for establishing a secure communication channel between a portable data carrier (07-26-2012
20120195431METHOD FOR OPERATING A NODE IN A WIRELESS SENSOR NETWORK - The present invention relates to a method for operating a first node in a network, the network including a plurality of nodes, the method comprising (a) the first node having a first identifier joining the network by transmitting the first identifier to a second node having a second identifier, (b) the first node generating a first key on the basis of the second identifier (c) the first node authenticating the second node by means of the first key, (d) the first node communicating with a third node if the first and second keys are equal.08-02-2012
20120207304METHOD AND APPARATUS FOR ENCRYPTING DATA IN A WIRELESS COMMUNICATION SYSTEM - In a communications system, a method of transforming a set of message signals representing a message comprising the steps of first encoding one of the set of message signals in accordance with a first keyed transformation, a second encoding of the one of the set of message signals in accordance with at least one additional keyed transformation, a third encoding of the one of the set of message signals in accordance with a self inverting transformation in which at least one of the set of message signals is altered, a fourth encoding of the one of the set of message signals in accordance with at least one additional inverse keyed transformation wherein each of the at least one additional inverse keyed transformation is a corresponding inverse of at least one additional keyed transformation, and fifth encoding the one of the set of message signals in accordance with first inverse keyed transformation wherein the first inverse keyed transformation is the inverse of the first keyed transformation.08-16-2012
20120213365SYSTEM AND METHOD FOR PROCESSING ATTACHMENTS TO MESSAGES SENT TO A MOBILE DEVICE - A system and method for processing attachments to messages sent to a mobile device is described herein. Embodiments described herein apply to encrypted messages comprising multiple message parts, in which different encryption keys (e.g. session keys) have been used to encrypt the different message parts. In at least one example embodiment, the encrypted session keys for every message content part comprising an attachment is received at the mobile device. In one embodiment, all of the encrypted session keys are stored together in a main message header. The mobile device may then decrypt the encrypted session key associated with a user requested attachment, and transmits the decrypted session key to one or more remote servers in an attachment request for use in decrypting the requested attachment. Data associated with the requested attachment, in decrypted form, is returned to the mobile device.08-23-2012
20120213366Aggregate Signature Schemes - An authenticated RFID system is provided that uses elliptic curve cryptography (ECC) to reduce the signature size and read/write times when compared to traditional public key implementations such as RSA. Either ECDSA or ECPVS can be used to reduce the signature size and ECPVS can be used to hide a portion of the RFID tag that contains sensitive product identifying information. As a result, smaller tags can be used or multiple signatures can be written at different stages in a manufacturing or supply chain. A key management system is used to distribute the verification keys and aggregate signature schemes are also provided for adding multiple signatures to the RFID tags, for example in a supply chain.08-23-2012
20120213367METHOD AND SYSTEM FOR PROVIDING CONTENT TO A CONTENT DISTRIBUTION SYSTEM SUITABLE FOR A MULTIPLE DWELLING UNIT USING AN ENCRYPTION - A communication system includes a head end. The head end communicates with a system gateway. A plurality of user devices is coupled to the gateway. The gateway receives the plurality of first encrypted signals, decrypts the plurality of first encrypted signals to form unencrypted signals and encrypts the unencrypted signals with a second encryption to form a plurality of second encrypted signals and communicates the second encrypted signals to the plurality of user devices. The signals may also be super-encrypted signals. That is, rather than un-encrypting at the gateway, the first encrypted signals may be again encrypted.08-23-2012
20120213368AUTHENTICATION AND DATA INTEGRITY PROTECTION OF A TOKEN - In deriving a cryptographic key from the response message in a challenge-response message in a challenge-response authentication, the related response is calculated after receiving a challenge message which has not yet been transferred. A cryptographic key is derived from the response, which is used to determine a cryptographic check sum of data. The cryptographic check sum is transferred in a first time period after receiving the challenge message. The response message is transferred during a later, second time period. The duration of validity of the key derived from the response message ends before the response message is transferred. A theoretical attacker who can overhear and manipulate the communication will not know the response message until a point in time when the cryptographic key which can be derived therefrom is already no longer valid.08-23-2012
20120224693Method and System for Security Authentication of Radio Frequency Identification - A method and system for security authentication of radio frequency identification are disclosed. All the security control in this method is completed by the security authentication control apparatus. The reader is for the command transmission and the tag data forwarding, and there is not the security authentication control logic, the security authentication and the non security authentication can be supported at the same time. The key in the tag is unreadable, which ensures that the tag is unable to be replicated; the constant for every security authentication is randomly generated by the control module, and is returned by the tag after being encrypted, which presents the air interface from intercepting the useful information. This method provides the inventory with the mask code before the security authentication, which can have a certain filtering function on the tag data. The mask code can be configured flexibly.09-06-2012
20120224694CLASSIFIED RELATION NETWORKING OPTIMIZATION PLATFORM IN OPEN WIRELESS ARCHITECTURE (OWA) MOBILE CLOUD TERMINAL DEVICE - A fully user-centric mobile relation networking management of business networking, personal networking and social networking for mobile terminal device with networking services adaptively and intelligently optimized by converged wireless connections based on open wireless architecture (OWA) mobile cloud infrastructure with QoW (Quality of Wireless connection) control through OWA Operating System (OS) to enable highly secured relation networking for mobile business and personal networking users.09-06-2012
20120230489APPARATUS AND METHOD FOR SHORT RANGE COMMUNICATION IN MOBILE TERMINAL - An apparatus and method for short range communication in a mobile terminal are provided. The apparatus includes a Near Field Communication (NFC) unit for sending and receiving data to and from the outside according to near field communication, a smart card having multiple contact points, and a security module, connected with one of the contact points of the smart card through a single wire protocol, for decrypting data from the NFC unit and sending the decrypted data to the smart card, and for encrypting data from the smart card and sending the encrypted data to the NFC unit. Hence, it is possible to provide an encryption and decryption function independently of the COS, establish a common encryption and decryption standard, and secure reliability of encryption and decryption.09-13-2012
20120230490SMART CARD ACCESSIBLE OVER A PERSONAL AREA NETWORK - Some embodiments of a smart card accessible over a personal area network have been presented. In one embodiment, an apparatus includes a wireless transceiver to communicatively couple to a personal area network (PAN) to receive an authentication request via the PAN from a device. The device may include a computer. The apparatus further includes a storage device to store a digital certificate that uniquely identifies a user. An authentication module in the apparatus may authenticate the user in response to an authentication request from the device using the digital certificate, wherein the user is allowed to access the computer upon authentication.09-13-2012
20120230491Wireless Extender Secure Discovery and Provisioning - According to embodiments of the invention, a first wireless access point discovers a second wireless access point, the first wireless access point tunes its radio and privacy settings, without user input, based upon parameters automatically exchanged in response to the discovery of the second wireless access point, and a secure direct wireless connection is established between the first and second wireless access points using the radio and privacy settings. Adding the first wireless to an existing mesh network includes a determination of the best available direct wireless connection.09-13-2012
20120237033NODE, A ROOT NODE, AND A COMPUTER READABLE MEDIUM - According to one embodiment, a wireless mesh network includes a plurality of nodes of which one is a root node and two nodes hierarchically adjacent have a parent-child relationship. In a node in the wireless mesh network, an authentication processing unit executes an authentication for network access with the root node when the node joins in the wireless mesh network. A root key setting unit generates a root key as a common key between the root node and the node. A parent-child key setting unit generates a parent-child key as a common key between a parent node and the node, encrypts the parent-child key using the root key, and sends the parent-child key encrypted to the root node. A group key acquisition unit receives a group key encrypted using the parent-child key from the parent node, and decrypts the group key using the parent-child key.09-20-2012
20120237034WIRELESS MESH NETWORK WITH SECURE AUTOMATIC KEY LOADS TO WIRELESS DEVICES - A wireless mesh network provides secure communication by encrypting data using one or more encryption keys. A configuration device in communication with a security manager of the network provides a temporary secure communication path between the security manager and a new field device to be added to the mesh network. Cryptographic material and other configuration data can then be transferred between the security manager of the network and the new field device securely via the configuration device.09-20-2012
20120243685ROOT NODE AND A COMPUTER READABLE MEDIUM - A wireless mesh network includes a plurality of nodes to which a device key is assigned. The device key belongs to one of a plurality of groups. In a root node, a correspondence relationship between the nodes and the device key thereof, and a correspondence relationship between past join nodes and a device key thereof, are stored. When a new node in the wireless mesh network is detected as a past join node, the device key assigned to the past join node is assigned to the new node again. When the new node is not the past join node, a new device key is assigned to the new node. A cipher text is generated by encrypting a message using device keys assigned to the nodes and the new node. If the number of groups to which the device keys belong is fewer, a size of the cipher text is smaller.09-27-2012
20120243686System and Method for Remote Asset Managment - A remote asset management system comprising a network of programmable wireless modules, each having an antenna and an identification module and configured to communicate via a radio communication protocol. The system further includes a plurality of assets each linked to one of the wireless modules and configured to be managed by the linked wireless module. A remote system server service platform is configured to receive remote asset data from the wireless modules, pass the remote asset data to and from the wireless modules, send messages to at least one of the wireless modules, monitor the wireless modules by requesting and receiving current mode information, and remotely program the wireless modules. A data processing module located within the wireless module(s) and configured to process messages received by the wireless module, authenticate said message, analyze authenticated messages, and carry out asset management instructions included in the message.09-27-2012
20120257753MAC Address Anonymizer - Methods and systems for generating anonymous MAC addresses and determining permanent MAC addresses from anonymous MAC addresses are disclosed. Permanent MAC addresses may be associated with a location in a location database. Generating anonymous MAC addresses may protect user privacy and allow manufacturers and users of wireless access points to control their inclusion in location databases.10-11-2012
20120257754DATA TRANSMITTING APPARATUS, DATA RECEIVING APPARATUS, DATA TRANSMITTING METHOD, AND DATA RECEIVING METHOD - The present invention provides a data transmitting apparatus in which a device information obtaining unit obtains device information of a device connected to the data transmitting apparatus; a verification unit verifies validity of a data receiving apparatus, based on the device information obtained by the device information obtaining unit; and a control unit performs control as to whether to obtain the device information through a wireless communication unit or obtain the device information through a wire communication unit, and as to whether to transmit image information encrypted by a first encryption unit from the wireless communication unit or transmit image information encrypted by a second encryption unit from the wire communication unit when the verification unit verifies that the data receiving apparatus is authorized.10-11-2012
20120263301METHOD AND APPARATUS FOR TRANSMITTING/RECEIVING ENCRYPTION INFORMATION IN A MOBILE BROADCAST SYSTEM - A method and apparatus for transmitting/receiving encryption information in a mobile broadcast system providing broadcast service (BCAST) are disclosed. In the mobile broadcast system, a broadcast (BCAST) Service Distribution/Adaptation (BSD/A) unit comprises a transmitter for transmitting a Registration Key Material (RKM) request message for requesting delivery of an RKM for registration of the BCAST service of a terminal to a BCAST Subscription Management (BSM) unit managing subscriber information of the terminal, and a receiver for receiving an RKM request response message from the BSM unit. The RKM request message includes an identifier (ID) of the BCAST service, and the RKM request response message includes the ID of the BCAST service and the RKM. The transmitter transmits a Long-Term Key Message (LTKM) request message for requesting delivery of an LTKM provided to the terminal during subscription of the BCAST service to the BSM unit.10-18-2012
20120269346DEVICE AND SYSTEM FOR FACILITATING COMMUNICATION AND NETWORKING WITHIN A SECURE MOBILE ENVIRONMENT - The present invention relates generally to facilitating secure voice and data communication by way of a commercially available communication device (i.e., smartphone/smartdevice). Specifically, the device and system for pairing a specialized cryptographic device with a non-specialized communication device, wherein the two devices engage in bidirectional communication to facilitate encryption of voice and data for secure transmission over a network. While providing the sensitive cryptographic features for secure communications, the cryptographic device further implements and enforces security policies for the communication device by way if an intermediary native application executed at the communication device. The encryption device is suitably designed to be carried discreetly and may be used in conjunction with a commercially available communication device.10-25-2012
20120269347Medical device with secure data transmission - Secure transmission of electronic data via a data communication link is provided between a device and an additional device with independent transmission channels, wherein at least one of the devices is a medical device. Secure transmission comprises the following steps or means: providing a password in the device, receiving the password in the a additional device separate from the data communication link, selecting one of the independent transmission channels, encrypting the channel identification of the selected independent transmission channel using the received password in the additional device, transmitting the encrypted channel identification from the additional device to the device via the data communication link and decrypting the encrypted channel identification in the device, providing a session key in the device and the additional device and transmitting encrypted electronic data between the device and the additional device via the independent transmission channel.10-25-2012
20120275599METHOD AND APPARATUS FOR SUPPORTING MULTIPLE BROADCASTERS INDEPENDENTLY USING A SINGLE CONDITIONAL ACCESS SYSTEM - A method and apparatus for brokering the enablement of the communication of encrypted media programs from a plurality of independent broadcasters to a plurality of receivers is disclosed. The system makes use of a pairing key for each provided service, which is differently encrypted by a pairing server and by the broadcaster providing the service. The encrypted versions of the pairing key are decrypted in a first receiver module using information known to the pairing service but not the broadcaster and in a second receiver module using information known to the broadcaster. The pairing key is used to cryptographically bind the first and second receiver modules.11-01-2012
20120281832SECURE WIRELESS COMMUNICATION TRANSCEIVER - An efficient hybrid encryption-coding algorithm is disclosed that requires using traditional encryption only for the first small amount of data. This amount of data, the first block, is determined by the traditional encryption algorithm to be applied on this first block. In this algorithm, all of the rest of the information will then be transmitted securely over the wireless channel, using network coding, without a need for using traditional encryption. Unlike the traditional and opportunistic encryption algorithms, the algorithm achieves higher data rates and less avalanche error effect, and, at the same time, it is as secure as traditional encryption algorithms. Assuming the additive white Gaussian noise (AWGN) channel model employing our disclosed algorithm, we analyze its performance in terms of throughput and security level.11-08-2012
20120281833METHOD TO MANAGE REVOCATIONS IN A GROUP OF TERMINALS - The present invention concerns the field of broadcast encryption method, i.e. a method to organize the distribution of keys into a group of users so that it is possible to manage the revocation of one member of the group in an efficient way. The proposed solution is a private encryption key ciphertext constant collusion-resistant broadcast encryption. The main idea behind the invention is to mix the notion of efficient tree-based key derivation (also called subset management) with individual and personalized key blinding thus achieving a full collusion-resistant broadcast encryption system. The key de-blinding is performed at the last moment thanks to a cryptographic technique called pairings (also known as bilinear maps) resulting in a global key commonly shared by all authorized (non-revoked) devices. It should be noted that only non-revoked devices can compute the final key (this is achieved through subset management and related subset key derivation technique) and perform the de-blinding (which is performed with one pairing).11-08-2012
20120281834Generation of Perfectly Secret Keys in Wireless Communication Networks - A method and apparatus is used for generating a perfectly random secret key between two or more transceivers in a wireless communication network. In a point-to-point system, both transceivers produce an estimate of the channel impulse response (CIR) based on the received radio signal. The CIR estimation is synchronized and may include error correction and detection. A long secret key of bits is generated from a digitized version of the CIR estimate, from which a perfectly secret encryption key is derived by privacy amplification.11-08-2012
20120281835Methods And Apparatus For Use In Transferring User Data Between Two Different Mobile Communication Devices Using A Removable Memory Card - Techniques for use in processing user data associated with a user account of a mobile device having an application is described. The mobile device includes a memory and an interface configured to receive a removable memory card. A encryption/decryption key is stored in the memory, but is not stored in the removable memory card. The mobile device regularly receives and stores updates to the user data in the memory for use in the application. For updates to the user data, the mobile device updates a copy of the user data stored in the removable memory card in an encrypted format in accordance with the encryption/decryption key.11-08-2012
20120288095System and Method for Mobility Management in a Communications System - A method for maintaining routing information for a wireless device includes determining, by a target communications controller, an original address of the wireless device handed over from a source communications controller, where the original address is assigned by an original communications controller. The method also includes updating, by the target communications controller, routing information associated with the wireless device using a border gateway protocol message if the original address lies within a range of addresses managed by a communications system including the target communications controller and an aggregation router, where the routing information is stored at the aggregation router.11-15-2012
20120294444Method and system for establishing enhanced air interface key - The disclosure provides a method and a system for establishing an enhanced air interface key. During a serving Radio Network Controller (RNC) relocation process, a target RNC with an enhanced security capability enables a received legacy key to perform security protection on communication in the serving RNC relocation process when the target RNC cannot learn from a relocation request sent by a source RNC whether or not a user equipment supports the enhanced security capability (11-22-2012
20120300932Systems and Methods for Encrypting Mobile Device Communications - Embodiments of the invention can provide systems and methods for encrypting mobile device communications. According to one example embodiment of the invention, a method for encrypting mobile device communications is provided. The method can include generating, by a first application stored on a first memory of a mobile device, a message to be communicated to an intended recipient; providing, by the first application to an authentication application stored on a second memory of the mobile device, the message; encrypting, by the authentication application, the message; providing, by the authentication application to the first application, the encrypted message; and directing, by the first application, communication of the message to the intended recipient.11-29-2012
20120300933SYSTEM AND METHOD FOR ENHANCED RFID INSTRUMENT SECURITY - A system and method for using an RFID read/write device to secure an RFID operable instrument or an RF communication is provided. The invention includes security databases in communication with a processor for storing and communicating security protocols to the RFID read/write device. The invention includes a method for restricting the unauthorized use of an RFID read/write device. The invention includes a subscription service for communicating user credentials to a certificate authority to obtain a counter security protocol. The invention also includes decrypting information stored on an RF operable device or transmitted via radio-frequency using counter security protocols.11-29-2012
20120300934ARRANGING DATA CIPHERING IN A WIRELESS TELECOMMUNICATION SYSTEM - Arranging data ciphering in a telecommunication system comprising at least one wireless terminal, a wireless local area network and a public land mobile network. At least one first ciphering key according to the mobile network is calculated in the mobile network and in the terminal for a terminal identifier using a specific secret key for the identifier. Data transmission between the mobile network and the terminal is carried out through the wireless local area network. A second ciphering key is calculated in the terminal and in the mobile network using said at least one first ciphering key. The second ciphering key is sent from the mobile network to the wireless local area network. The data between the terminal and the network is ciphered using said second ciphering key.11-29-2012
20120308007METHOD AND SYSTEM FOR SECURITY PROCESSING DURING RRC CONNECTION RE-ESTABLISHMENT - This disclosure claims a method for security processing during RRC connection re-establishment, comprising: a UE sends an RRC connection re-establishment request message to the eNB; after receiving the request message, the eNB determines whether an original access layer security algorithm used by the UE is supported by the eNB itself according to the current status and configuration; if supported, the communication protection with UE is implemented via the original access layer security algorithm; if not supported, according to the security capability of UE, the access layer security algorithm which has the highest priority and is supported by the UE is selected from the access layer security algorithms configured by the eNB itself to be the new access layer security algorithm, and the communication protection between the eNB and the UE is implemented by the new access layer security algorithm. This disclosure also claims a system for security processing during the RRC connection re-establishment.12-06-2012
20120314864Broadcast Replenishment of Account Parameters for Groups of Wireless Devices - A system and method are provided for the broadcast replenishment of account parameters for select groups of wireless devices, where select groups of wireless devices have their internally-stored account parameters (e.g., prepaid amount of usage authorization) simultaneously updated as a group by a single broadcast message, such as an encrypted SMS message. An account update message is generated based on the account parameters to be updated and encrypted using an encryption key uniquely associated with the select group of wireless devices. The encrypted account update message is broadcast for receipt by the select group of wireless devices, such only those wireless devices previously provided with a key for decryption can receive and decrypt the broadcast account update message. The wireless devices use information and/or instructions in the broadcast message in order to update their internally stored account parameters accordingly.12-13-2012
20120314865NFC Communications Device for Setting Up Encrypted Email Communication - NFC communication is utilized to provide methods, apparatus and systems for increasing the security of cryptographic keys and cryptographic processes. For the encryption and decryption of a message, public key cryptography requires the use of a pair of keys, i.e., the public key and the private key. Various embodiments of the present invention provide storage of information needed for one or more aspects of encrypting and/or decrypting messages, wherein that information is made available through an NFC communications interface. An NFC-enabled device is brought into physical proximity with a computational platform that is executing, or otherwise providing access to, an email client. Once the NFC-enabled device and the computational platform are within NFC communication range of each other, transfer of information needed to set up an encryption and/or decryption process takes place. Since the encryption/decryption keys and/or related cryptographic process parameters are not stored on the computational platform the security of this information is improved. In some embodiments the encrypted communication is encrypted email, or PUP encrypted email.12-13-2012
20120314866Method and Device for Data Processing in a Wireless Network - A method and a device for data processing in a wireless network are provided, wherein a direct connection between two mobile terminals is set up based on a seed information provided by the wireless network. Furthermore, a communication system is suggested including at least one such device.12-13-2012
20120314867ENCRYPTED COMMUNICATION SYSTEM, TRANSMITTER AND RECEIVER USING SAME - High-security communications against information leakage as well as high-speed communications are realized using present optical fiber networks. The methods are as follows: (1) A seed key is shared between a transmitter and a receiver in advance. Random numbers are transmitted using carrier light accompanied by fluctuations and bases that are decided by random numbers. The transmitter and receiver compare a shared basis that is determined by the seed key with the random basis, and decompose the random numbers superimposed on each bit into two sequences, based on whether the shared basis coincides with the random basis or not. Error correction is processed for each sequence in the receiver, and then the random numbers are shared between the transmitter and the receiver. (2) The amount of the random numbers shared between the transmitter and the receiver is reduced to secret capacity through privacy amplification, and the resultant random numbers are used as a secret key. (3) Real data are encrypted with the obtained secret key, and they are transmitted and received.12-13-2012
20120328103Method and System for Managing Air Interface Key - A method and system for managing an air interface key are provided in the present invention, which relate to the communication field; the method including: a serving GPRS Support Node+ (SGSN+) or a Mobile Switching Centre/Visitor Location Register+ (MSC/VLR+) transmits a key distributing message to a Radio Network Controller+ (RNC+), wherein the message carries at least one of an intermediate key K12-27-2012
20130003972APPARATUS, METHOD AND SYSTEM FOR CREATING AND MAINTAINING MULTICAST DATA ENCRYPTION KEY IN MACHINE TO MACHINE COMMUNICATION SYSTEM - A wireless communication system includes a system and method for encryption of multicast data between a subscriber station and a base station that communicate a multicast service in a Machine-To-Machine (M2M) communication system. An M2M service controller manages the multicast service manages information for encrypting the multicast data and provides the information to the subscriber station and the base station.01-03-2013
20130003973METHOD AND APPARATUS FOR IMPLEMENTING A NOVEL ONE-WAY HASH FUNCTION ON HIGHLY CONSTRAINED DEVICES SUCH AS RFID TAGS - A method and apparatus for implementing a novel one-way hash function with provable security properties for authentication and non-authentication applications on highly constrained devices, with particular application to RFID tags.01-03-2013
20130003974DISPLAY OF SECURE MESSAGES ON A MOBILE COMMUNICATION DEVICE - A mobile device for the display of messages receives messages in segments or incrementally from a server, and includes a message viewer application for displaying portions of the message. On determination using the received portion of the message that the message is digitally signed or encrypted, the server is signalled to halt automatic transmission of further segments of the message. When a verify command is received by the mobile device, a command is transmitted to the server so that automatic reception of message segments can be resumed at the mobile device.01-03-2013
20130010958METHODS AND APPARATUSES FOR ADMINISTRATOR-DRIVEN PROFILE UPDATE - Apparatuses and methods for security profile update are presented. In one embodiment, the method comprises determining the version of a security profile associated with a wireless client and determining whether a new security profile exists. The method includes calculating a one-time password based at least on a random character table and some image areas within an image. The method further includes generating an encrypted version of the new security profile by using a first part of the one-time password as an encryption key and sending to the wireless client a profile update request.01-10-2013
20130010959DATA BACKUP DEVICE FOR SMARTPHONE - A data backup device for a Smartphone is provided. When a user electrically connects the Smartphone with a connection interface of the device, a control unit of the device is activated to execute a backup program stored in a program storage unit of the device. After the user inputs a username and a password, the backup program generates a backup folder corresponding to the input username. Then, the user selects different modes of the backup program, so that the data backup device can execute the data backup or data recovery.01-10-2013
20130010960Methods to Improve Bluetooth Low Energy Performance - An expanded sequence number is added to PDUs in a Bluetooth® low energy system. The expanded sequence number provides more accurate identification of the PDUs and allows the system to avoid delaying transmission of PDUs while retransmitting other PDUs. A PDU security sequence number may also be added to the PDUs. The security sequence number is used to create a unique nonce for use in encrypting or decrypting and authenticating the PDU. Using the security sequence number, a failed connection can be reestablished between two devices without the need of generating an encryption key. The security sequence number allows the devices to perform encryption or decryption and authentication using an existing key and a nonce generated from the security sequence number.01-10-2013
20130010961COMMUNICATION TERMINAL, CONTROL DEVICE, AND BASE STATION - A transmitting side UE01-10-2013
20130010962Proximity Authentication System - An authorized user may be provided access to a service only when a wireless token assigned to the user is in the proximity of a computing device. A user's credential may be stored on an RFID token and an RFID reader may be implemented within a security boundary on the computing device, Thus, the credential may be passed to the security boundary without passing through the computing device via software messages or applications. The security boundary may be provided, in part, by incorporating the RFID reader onto the same chip as a cryptographic processing component, Once the information is received by the RFID reader it may be encrypted within the chip. As a result, the information may never be presented in the clear outside of the chip. The cryptographic processing component may cryptographically encrypt/sign the credential received from the token.01-10-2013
20130016839WIRELESS COMMUNICATION APPARATUS AND METHOD OF PREVENTING LEAKAGE OF ENCRYPTED KEYAANM MIYAZAWA; KazunoriAACI Musashino-shiAACO JPAAGP MIYAZAWA; Kazunori Musashino-shi JP - A wireless communication apparatus may include a first module that stores a first key used to encrypt and decrypt communication contents, a second module that stores a second key used to encrypt and decrypt the first key, the first key being encrypted in accordance with a public key encryption scheme, and a connection bus that connects the first module and the second module to each other Each of the first module and the second module may include an encryption processing unit that encrypts and decrypts information, which is transmitted and received via the connection bus, by using a third key that is different from the first key and the second key.01-17-2013
20130016840Mobile Certificate Distribution in a PKI - A method of providing certificate issuance and revocation checks involving mobile devices in a mobile ad-hoc network (MANET). The wireless devices communicate with each other via Bluetooth wireless technology in the MANET, with an access point (AP) to provide connectivity to the Internet. A Certificate authority (CA) distributes certificates and certification revocation lists (CRLs) to the devices via the access point (AP). Each group of devices has the name of the group associated with the certificate and signed by the CA. A device that is out of the radio range of the access point may still connect to the CA to validate a certificate or download the appropriate CRL by having all the devices participate in the MANET.01-17-2013
20130022202SYSTEMS AND METHODS FOR MULTI LAYER DELIVERY OF INFORMATION - Systems and methods that may be implemented to provide digital data from a remote information source to multiple local user devices using a multi-layer communication path and a local wireless server node. The multi-layer communication path may, for example, include a relatively long range secure first layer wireless communications path from the remote information source to a local wireless server node, and relatively short range second layer wireless communications path from the local wireless server node to one or more local user devices.01-24-2013
20130028420CIRCUIT SWITCHED MOBILE TELEPHONY IN FIXED WIRELESS ACCESS - A fixed wireless terminal (01-31-2013
20130028421Method and System for Establishing Enhanced Key when Terminal Moves to Enhanced Universal Terrestrial Radio Access Network (UTRAN) - The present invention discloses a method and system for establishing an enhanced key when a terminal moves from an EUTRAN to an enhanced UTRAN, so as to ensure that the terminal can carry out normal communication safely in the enhanced UTRAN. The method includes: when the terminal moves from the EUTRAN to the enhanced UTRAN, a target enhanced serving GPRS support node (SGSN+) in the enhanced UTRAN deducing an intermediate key used in the UTRAN according to a mapped traditional key obtained from a source mobile management entity; and the terminal, after deducing the mapped traditional key, further deduces the intermediate key used in the enhanced UTRAN by using an algorithm which is the same as that of the target SGSN+ according to the mapped traditional key.01-31-2013
20130034230Method and system for embedding security in a mobile communications device - Methods and systems are provided that provide a portable, cryptographic hardware-software device allowing balancing of the needed heightened security while maintaining the modified communication device's original features and value. The system comprises a single chip comprising a self-contained security boundary and cryptographic processing, and is enabled to quickly and easily connect to and modify an existing, commercial, off the shelf mobile communication device. The systems may be enabled to modify the existing device by being contained in hardware, for example the battery of a smart phone. Then, the system may be connected to the existing device's interface, for example via a “micro-USB” or other suitable connection, and subsequently provide cryptographic functionality to the existing device.02-07-2013
20130039493DATA TRANSMITTING DEVICES, DATA RECEIVING DEVICES, METHODS FOR CONTROLLING A DATA TRANSMITTING DEVICE, AND METHODS FOR CONTROLLING A DATA RECEIVING DEVICE - In an embodiment, a data transmitting device may be provided. The data transmitting device may include a ciphering method selector configured to select a ciphering method based on a type of data to be transmitted. The data transmitting device may further include a ciphering circuit configured to cipher the data based on the selected ciphering method. The data transmitting device may further include a transmitter configured to transmit the ciphered data to a data receiving device.02-14-2013
20130044877LONG RANGE WLAN DATA UNIT FORMAT - In a method for generating a data unit for transmission in a wireless network, a physical layer (PHY) preamble is generated. In generating the PHY preamble, a first indicator is generated to indicate at least one of (i) whether the data unit includes data offloaded from a mobile telephony network separate from the wireless network, or (ii) whether the data unit (a) was generated by, or (b) is addressed to, a communication device that supports offloading of data from the mobile telephony network to the wireless network. The first indicator is included in the PHY preamble. Additionally, a media access control layer (MAC) header is generated. The data unit is generated to include the PHY preamble and the MAC header. The data unit is then caused to be transmitted.02-21-2013
20130058485RANDOMIZATION OF PLAIN TEXT FOR GSM SACCH - The present document relates to the transmission of data in a digital cellular telecommunications network. In particular, the present document relates to the secure transmission of data over Global System for Mobile Communications (GSM) networks. A method for encoding a SACCH information block in a wireless network is described. The method comprises randomizing a plurality of randomization unit input bits derived from at least some of a plurality of payload bits of the SACCH information block using a pseudo-random bit block, thereby yielding a plurality of randomized bits; and ciphering a plurality of ciphering unit input bits derived from at least some of the plurality of randomized bits, thereby yielding an encoded data burst of a SACCH frame; wherein ciphering is based on a ciphering algorithm using a ciphering key Kc and a frame number COUNT of the SACCH frame; wherein the pseudo-random bit block is determined based on the ciphering key Kc.03-07-2013
20130064372CODE HOPPING BASED SYSTEM WITH INCREASED SECURITY - An access system includes a transmitter and a receiver for exchange of secure data wherein the system uses an encryption and a decryption algorithm to exchange a secure data packet. The secure data packet may include an unencrypted data packet and an encrypted data packet. The encrypted data packet may include first data encrypted by the encryption algorithm, and data decrypted by the decryption algorithm, wherein the data decrypted by the decryption algorithm includes a combination of a secure signature and second data encrypted by the encryption algorithm.03-14-2013
20130064373METHOD TO ENCRYPT INFORMATION THAT IS TRANSFERRED BETWEEN TWO COMMUNICATION UNITS - Method for encrypting information transferred between two mobile telephones, each having a security module and where a security application contains encryption and decryption algorithms. The security application is stored on an SD card introduced into a card-holder location in the relevant telephone, then transferred from the card to the security module with a session key stored on the card, a key stream forms in the card on the basis of the session key, and during encryption is transferred from the card to the security module where encryption takes place, such encrypted stream of data is transmitted by the telephone, the stream of data is received by a second mobile telephone, decryption takes place with a corresponding key stream in the security module of the second telephone and the corresponding key stream is formed in the SD card of the second telephone on the basis of the session key.03-14-2013
20130070926TERMINAL AND METHOD FOR COMMUNICATING VIA NEAR FIELD COMMUNICATION - A near field communication (NFC) terminal includes: a NFC communication unit to communicate with a NFC communication relay device via NFC; a processor to process data; and a protocol information unit, wherein the NFC communication unit communicates the data and the profile information via to the NFC communication relay device via NFC. A method includes: at a NFC communication relay device, receiving data augmented with profile information; storing the data augmented with profile information; retrieving the data based on a request from the second NFC terminal; and transmitting the data to the second NFC terminal. A NFC relay device, includes: a processor to process data; an information storage unit to store the received data, wherein if the NFC relay device receives a request from a NFC terminal, the processor retrieves data from the information unit, and the NFC transmitter transmits the data to the NFC terminal.03-21-2013
20130094651FIELD PROGRAMMING OF A MOBILE STATION WITH SUBSCRIBER IDENTIFICATION AND RELATED INFORMATION - Apparatuses and methods for field programming a private security key into a mobile station are described herein. The methods may include a server initially accepting in a wireless network a connection from a mobile station that is without a factory programmed subscriber identification module (SIM). The server may then collaborate with the mobile station to field program the mobile station with an international mobile subscriber identification (IMSI) and a private security key (K04-18-2013
20130108046ESTABLISHING SECURE COMMUNICATION BETWEEN AN IMPLANTABLE MEDICAL DEVICE AND AN EXTERNAL DEVICE05-02-2013
20130108047WIRELESS NETWORK CONNECTION METHOD, WIRELESS NETWORK APPARATUS AND WIRELESS NETWORK ACCESS POINT (AP) APPLYING THE METHOD05-02-2013
20130108048Wirelessly Communicating a Data File05-02-2013
20130108049METHOD FOR ACCESSING TO RADIO FREQUENCY COMMUNICATION WITH LOW-FREQUENCY ELECTROMAGNETIC COMMUNICATION05-02-2013
20130114813METHOD AND APPARATUS FOR REFRESHING KEY - A method for refreshing a key is provided, wherein when a counter in a PDCP layer of a RB reaches a threshold, a mobile device receives a cell handover message, re-establishes PDCP layers and RLC layers for all RBs, keeps Uplink Time Alignment Information, uplink grant resources for uplink shared channel and Physical Uplink Control Channel resources allocated semi-statically, and flushes a buffer of a MAC layer; the mobile device obtains a new root key, and obtains a new encryption and integrity protection key of a radio resource control plane according to the new root key; the mobile device transmits a cell handover complete message protected by the new encryption and integrity protection key.05-09-2013
20130114814ADDING RANDOMNESS INTERNALLY TO A WIRELESS MOBILE COMMUNICATION DEVICE - An electronic device is provided with an integral transducer used to update a random data pool without connection to an external source of new random data. In one embodiment, there is provided a method for providing random data on an electronic device, the method comprising: storing random data in a random data pool in a memory; sensing motion of the electronic device using a transducer integrally carried as part of the electronic device, wherein the transducer is configured to generate an output in response to sensed motion; generating new random data in accordance with the output of a transducer when sensed motion exceeds a threshold; and storing the new random data in the random data pool in the memory.05-09-2013
20130121492Method and apparatus for securing communication between wireless devices - A system and method for securing communications in a wireless network includes the steps of authenticating members of the wireless network, generating a member private key to be used by the members of the wireless network, and distributing the member private key to each of the members of the wireless network. A member is authenticated based on the ability of the member to be physically proximate to at least one other member of the wireless network at a given instant. The member private key is generated by one of the members, hereinafter referred to as a master member, in response to a changing value stored at the one of the members. The member private key is then securely distributed to each of the members in the WLAN network.05-16-2013
20130121493LOCAL TRUSTED SERVICES MANAGER FOR A CONTACTLESS SMART CARD - Systems, methods, computer programs, and devices are disclosed herein for deploying a local trusted service manager within a secure element of a contactless smart card device. The secure element is a component of a contactless smart card incorporated into a contactless smart card device. An asymmetric cryptography algorithm is used to generate public-private key pairs. The private keys are stored in the secure element and are accessible by a trusted service manager (TSM) software application or a control software application in the secure element. A non-TSM computer with access to the public key encrypts and then transmits encrypted application data or software applications to the secure element, where the TSM software application decrypts and installs the software application to the secure element for transaction purposes.05-16-2013
20130129091METHOD AND APPARATUS FOR MANAGING SECURITY KEYS FOR COMMUNICATION AUTHENTICATION WITH MOBILE STATION IN WIRELESS COMMUNICATION SYSTEM - Provided is a method for managing a security key for communication authentication with a Mobile Station (MS) in a communication system. The method includes acquiring a first authentication key by performing an authentication procedure for the communication authentication in a cloud cell having member Base Stations (BSs) that include a master BS and at least one slave BS for providing a service to the MS; and communicating with at least one member BS using a first encryption key that is generated using the first authentication key.05-23-2013
20130129092SYSTEM AND METHOD FOR PROVIDING VARIABLE SECURITY LEVEL IN A WIRELESS COMMUNICATION SYSTEM - A system and method for providing variable security levels in a wireless communication network. The present invention optimizes the often conflicting demands of highly secure wireless communications and high speed wireless communications. According to a preferred embodiment of the present invention, various security sensors are scanned to determine the likely presence of an intruder within a predetermined trust zone. If an intruder is likely present, the security level is changed to the highest setting, and consequently a lower data rate, while the intruder is identified. If the identified intruder is in fact a trusted node, the security level is returned to a lower setting. If the identified intruder is not a trusted node, the security level is maintained at an elevated state while the intruder is within the trust zone.05-23-2013
20130129093Secure Wireless Communication - In one embodiment, the method performed by mobile equipment to authenticate communication with a network includes generating keys using cellular authentication and voice encryption, and then generating an authentication key based on these keys. The authentication key is used to generate an expected message authentication code used in authenticating the network according to authentication and key agreement security protocol.05-23-2013
20130136260WCDMA 3G VOICE COMMUNICATION PROTECTION METHOD AND TERMINAL USING THE SAME - A WCDMA 3G voice communication protection method and a terminal using the method are provided. The method is performed by a terminal operating in conjunction with an S-USIM for voice communication protection. When a calling terminal connects a voice communication channel to a called terminal, secure voice communication is prepared for by collecting information about relevant voice communication. At the calling terminal, synchronous data is set by exchanging the voice communication information with the called terminal, and a secure synchronization procedure is performed based on the set synchronous data. At each of S-USIMs that operate in conjunction with the calling and called terminals, a session key for secure voice communication is generated based on the synchronous data. Secure communication is performed by encrypting and transmitting voice-coded data to be transmitted based on the session key, and decrypting and reproducing received voice-coded data based on the session key.05-30-2013
20130136261Method and System for Mobile Terminals Handing Over between Clear Session and Encrypted Session Communications - The present invention discloses a method for clear session and scrambled session communication handover between mobile terminals comprising: a first terminal initiating a scrambled session handover control request to a second terminal, and the second terminal returning a scrambled session handover control response after receiving the scrambled session handover control request; and the first terminal initiating a key negotiation process with the second terminal after receiving the scrambled session handover control response returned by the second terminal, and then transferring to scrambled session communication or suspending the scrambled session communication with the second terminal; wherein the scrambled session handover control request includes a scrambled session request or a clear session request. The present invention further provides a system for clear session and scrambled session communication handover between mobile terminals comprising a scrambled session handover control module and an encryption module set in a mobile terminal. The present invention protects end to end security in the communication process of the mobile terminals effectively.05-30-2013
20130136262SYSTEM AND METHOD FOR PROVIDING SECURITY IN MOBILE WiMAX NETWORK SYSTEM - A method for providing security between a radio access station and an access control router in a mobile microwave access network includes: receiving, by the radio access station and the access control router, the same certificate from a licensed certification authority; generating, by the access control router, an access service network traffic encryption key (asn_TEK); encrypting, by the access control router, a message to be transmitted with the generated asn_TEK and transmitting the encrypted message to the radio access station; verifying, by the radio access station, the certificate of the licensed certification authority appended to the message received from the access control router to check the asn_TEK, and decrypting the message received from the access control router to obtain an actual message; encrypting, by the radio access station, the actual message with the checked asn_TEK and transmitting the encrypted message to the access control router.05-30-2013
20130142335METHOD AND DEVICE FOR LINK LAYER DECRYPTING AND/OR ENCRYPTING A VOICE MESSAGE STREAM ALREADY SUPPORTING END TO END ENCRYPTION - Methods and systems for LLE encrypting and decrypting voice message streams (VMSs) already supporting eTe encryption are disclosed. In one example, LLE and eTe encryption initialization vectors (EIVs) are interleaved such that an LLE EIV retrieved from one of a header and a data unit is used to LLE decrypt both the header or data unit and a subsequent data unit. A recovered eTe EIV is used to eTe decrypt voice payloads in one or more subsequent data units. In another example, a base station dynamically LLE encrypts a VMS already supporting eTe encrypting by determining whether a received VMS is eTe encrypted, and ii it is not generating a new LLE EIV, and if it is, re-using the pre-existing eTe EIV for LLE encryption. The LLE encrypted (and perhaps eTe encrypted) VMS is then sent over the air to one or more mobile stations.06-06-2013
20130148807SYSTEM FOR TRANSMITTING A DATA SIGNAL IN A NETWORK, METHOD, MOBILE TRANSMITTING DEVICE AND NETWORK DEVICE - A system for transmitting a data signal is provided, comprising a plurality of network devices; a network connecting the plurality of network devices based on at least a first communication carrier, wherein the first communication carrier is a wired communication carrier; a network key generator configured to generate a network key; a mobile transmitting device configured to transmit the network key to at least one of the plurality of network devices on a second communication carrier, wherein the second communication carrier is a wireless carrier, and wherein the network devices are configured to communicate with the other network devices based on a link encryption key based on the network key. A corresponding method, a mobile transmitting device and a network device are provided as well.06-13-2013
20130148808Wireless Network Having Multiple Communication Allowances - Multiple levels of wireless network resource granting. A user who has an authorized key, e.g., an encryption key or a key indicating that they have paid for service, gets a first, better level of access to the network resources. One without the key is granted lesser access, e.g., less total bandwidth, less bandwidth speed, no access to files or the like.06-13-2013
20130156190Method and Device for Truncating Location Information - The embodiments herein relate to a method in a first device (06-20-2013
20130156191COMMUNICATION SECURITY METHOD AND APPARATUS OF FIRST NODE AND SECOND NODE COMMUNICATING BASED ON FULL DUPLEX COMMUNICATION SCHEME USING NEAR FIELD - A communication security method and apparatus of a first node and a second node are provided. The first node and the second node communicate with each other based on a full duplex communication scheme using a near field. In the communication security method and apparatus, information to be transmitted may be encrypted based on received information and the encrypted information may be transmitted, in a TX node and an RX node. The communication security method and apparatus prevent an additional node from decrypting the information, and ensure transmission and reception of reliable data. In addition, the communication security method and apparatus prevent information from being decrypted in a physical layer, by periodically or aperiodically exchanging a new encryption key.06-20-2013
20130156192MOBILE COMMUNICATION TERMINAL AND METHOD - A mobile communication terminal used in wideband code division multiple access (WCDMA) 3G mobile communication includes: a communication terminal unit configured to receive a short text message from a user and transmit encrypted data generated by encrypting the short text message; and a secure-universal subscriber identity module (S-USIM) unit configured to generate a session key for encrypting the short text message, when receiving a request to encrypt the short text message from a communication terminal unit.06-20-2013
20130156193Method and Apparatus for Determining Joint Randomness - A method and apparatus for performing Joint Randomness Not Shared by Others (JRNSO) is disclosed. In one embodiment, JRNSO is determined in Frequency Division Duplex (FDD) using a baseband signal loop back and private pilots. In another embodiment, JRNSO is determined in Time Division Duplex (TDD) using a baseband signal loop back and combinations of private pilots, private gain functions and Kalman filtering directional processing. In one example, the FDD and TDD JRSNO embodiments are performed in Single-Input-Single-Output (SISO) and Single-Input-Multiple-Output (SIMO) communications. In other examples, the FDD and TDD embodiments are performed in Multiple-Input-Multiple-Output (MIMO) and Multiple-Input-Single-Output (MISO) communications. JRNSO is determined by reducing MIMO and MISO communications to SISO or SIMO communications. JRNSO is also determined using determinants of MIMO channel products. Channel restrictions are removed by exploiting symmetric properties of matrix products.06-20-2013
20130163760Method of Elliptic Curve Cryptography Using EW-MOF on Scalar Multiplication - A method of elliptic curve cryptography (ECC) using the enhanced window-based mutual opposite form (EW-MOF) on scalar multiplication. First, an elliptic curve and a base point on the elliptic curve are selected. Next, essential pre-computed points for a selected window size are calculated. Then, a private key is randomly generated and the mutual opposite form (MOF) is used to convert the private key's binary representation into a signed binary representation. Finally, a public key is calculated by using the enhanced window (EW) method. By greatly reducing the number of essential pre-computed points, the EW-MOF reduces average key generation time (including pre-computation time).06-27-2013
20130163761WIRELESS COMMUNICATION METHOD AND SYSTEM FOR TRANSMISSION AUTHENTICATION AT THE PHYSICAL LAYER - The subject authentication scheme encompasses a large family of authentication systems which may be built over existing transmission systems. By superimposing a carefully designed secret modulation on the waveforms, authentication is added to the signal without requiring additional bandwidth. The authentication information (tag signal) is sent concurrently with data (message signal). The authentication is designed to be stealthy to the uninformed user, robust to interference, and secure for identity verification. The tradeoffs between these three goals are identified and analyzed. The use of the authentication for channel estimation is also considered, and improved bit errors are demonstrated for time-varying channels. With a long enough authentication code word an authentication system is achieved with very slight data degradation. Additionally, by treating the authentication tag as a sequence of pilot symbols, the data recovery may be improved by the aware receiver.06-27-2013
20130163762RELAY NODE DEVICE AUTHENTICATION MECHANISM - A solution of relay node authentication is proposed. The solution includes mutual authentication of relay node and relay UICC, mutual authentication of relay node and network, secure channel establishment between relay UICC and relay node. AKA procedure in TS 33.401 is re-used so that no extra NAS message is needed. IMEI is sent to network in the initial NAS message, according to which MME-RN can retrieve RN's public key from HSS, and perform access control for DeNB. MME-RN will generate a session key based on IMSI, IMEI and Kasme, and encrypt it by RN's public key and send it to RN. UICC will also generate the same key and thus RN can authenticate both UICC and network. When the key or other parameters sent between UICC and RN do not match, UICC or RN will send Authentication Reject message with a new cause to inform network.06-27-2013
20130170643METHOD AND SYSTEM FOR TRANSMITTING SUBSCRIBER IDENTITY INFORMATION, USER EQUIPMENT, NETWORK DEVICE - A method and a system for transmitting subscriber identity information, and a network device are provided. The method includes: receiving a subscriber identity request message from a Mobility Management Entity (MME); encrypting an International Mobile Subscriber Identity (IMSI) of a User Equipment (UE) to generate a cipher text; and sending a subscriber identity response message that includes the cipher text of the IMSI to the MME. The method and the system for transmitting subscriber identity information, and the network device adopts the technical means that, the IMSI of the UE is encrypted to generate a cipher text which is fed back to the network device, thereby overcoming the problem in the current subscriber identity authentication mechanism that the IMSI of the UE is very easily resolved, so that the technical effect of transmitting the subscriber identity confidentially is improved.07-04-2013
20130182845SECURE COMMUNICATIONS BETWEEN DEVICES USING A TRUSTED SERVER - A method of establishing secure communication between a first mobile computing device and a second mobile computing device includes receiving a first request from the first mobile computing device to securely communicate with the second mobile computing device via a Wi Fi hot spot, verifying that the first mobile computing device is trusted, generating a public key and a private key based on a trusted certificate, sending the private key to the first mobile computing device via the Wi-Fi hot spot, receiving a second request from the second mobile computing device to securely communicate with the first mobile computing device, verifying that the second mobile computing device is trusted, and sending the public key to the second mobile computing device.07-18-2013
20130182846WIRELESS COMMUNICATION APPARATUS FOR SETTING FREQUENCY BAND FOR WIRELESS COMMUNICATIONS USING ENCRYPTION KEY INFORMATION TO PREDETERMINED FREQUENCY BAND - A controller receives first or second equipment identifier from a first wireless communication apparatus, by using one wireless communication circuit of the third and fourth wireless communication circuit. When the one wireless communication circuit is the fourth wireless communication circuit, the controller sets an encryption key information for wireless communications with the first wireless communication apparatus, to encryption key information including an equipment identifier that does not coincide with a received equipment identifier among the received plurality of encryption key information, and controls the third wireless communication circuit to transmit and receive encrypted transmission data to and from the first wireless communication apparatus by using key data included in set encryption key information.07-18-2013
20130182847COMMUNICATION SYSTEM, INFORMATION PROCESSING APPARATUS, METHOD AND COMPUTER PROGRAM - The present invention provides easy and prompt initiation of wireless communications in which security is ensured requiring additional hardware. A connection button of a PDA or first device is operated and a connection request is broadcast. If the PDA and a portable phone are in near each other, and a reception intensity of the connection request is equal to or higher than a threshold value, a request of the PDA is granted by the portable phone. Then, an encryption key is newly generated by the portable phone, and is transmitted to the PDA. An encryption key and communication parameter transmitted from the portable phone are acquired. Encrypted communications using the encryption key generated by the portable phone are established based on the communication parameter.07-18-2013
20130188791Dynamic Password Update for Wireless Encryption System - A method and system for dynamically changing password keys in a secured wireless communication system includes initiating a password key change, generating a new password key, embedding the new password key and a password key indicator in a first message, encrypting the first message using an old password key, storing the new password key, sending the formatted encrypted first message over a wireless communication system, receiving a subsequent second message, and decrypting the subsequent second message using the new password key.07-25-2013
20130188792Video Surveillance System and Method for Self-Configuring Network - A mesh network surveillance system and method for providing communication between a base system having at least one input capture device ICD(s) and other ICD(s), wherein the ICD(s) are operable to provide a self-configuring network with each other, including the steps of providing this base system; at least one user accessing the ICDs and inputs remotely via a user interface through a remote server computer and/or electronic device communicating with it, for providing a secure surveillance system with extended inputs range and self-configured networking for smart cross-communication for monitoring a target environment.07-25-2013
20130195273SHARED SECRET ARRANGEMENTS AND OPTICAL DATA TRANSFER - Digital data is optically broadcast through an environment by controllably switching the brightness or chrominance of LED solid state lamps, or of other illumination sources (e.g., television screens and backlit computer displays). This optical data channel is useful to convey cryptographic key data by which devices within the environment can authenticate themselves to a secure network. In some embodiments, the optical modulation is sensed by the camera of a smartphone. The row data output by the smartphone's camera sensor is processed to extract the modulated data signal. In some monochrome embodiments, data communication speeds far in excess of the camera's frame rate (e.g., 30/second), or even the camera's row rate (e.g., 14,400/second) are achieved. Still greater rates can be achieved by conveying different data in different chrominance channels. A great number of other features and arrangements are also detailed.08-01-2013
20130202111WIRELESS SECURITY PROTOCOL - A method of encryption and decryption applied to a transmitted plaintext message in a communication network containing multiple subscriber nodes is provided. The method comprises the steps of: processing an Integrity check value (ICV); using a private key at the first subscriber node; providing a random initialization vector (W) executing a first operation on the random IV to obtain a sum IV; using the sum IV to process an encryption on the plaintext to obtain the ciphertext; transmitting the ciphertext to the second subscriber node wherein the second node receives the ciphertext; identifies the IV; utilizes the private key and the IV to process the decryption of the ciphertext to obtain the plaintext; generates a feedback message, the feedback message is then used to generate future sum IVs.08-08-2013
20130208889METHOD FOR ENCRYPTING SHORT MESSAGE OF MOBILE COMMUNICATION - The present invention relates to a method for encrypting a short message in mobile communication. According to the present invention, a user first inputs short-message content and a short-message password to a first communication electronic device. Then the first communication electronic device writes the short-message content to a short-message packet according to a short-message protocol, configures a set of unused parameters of the short-message packet as a set of encryption parameters according to the short-message protocol, and configures the short-message password to the set of encryption parameters for transmitting the short-message packet containing the set of encryption parameters to a second communication electronic device. Thereby, according to the present invention, the short message is encrypted. After the user of the second communication electronic device receives the short message, he cannot read the received short message unless he inputs the correct password to the second communication electronic device.08-15-2013
20130208890KEY WITH REMOTE CONTROL, IN PARTICULAR FOR MOTOR VEHICLES, AND ARRANGEMENT WITH SUCH A KEY - A key with remote radio operation, particularly for motor vehicles, includes a housing and electronic circuits arranged in the housing for the purpose of authentication of the key, wherein each circuit has an interface for communication with an authenticating entity outside of the key. The problem addressed is that of structuring a key for use with nascent transmission standards. This problem is addressed in that a first circuit of the key has a BTLE interface, and a second circuit of the key has an NFC interface, for the purpose of communication.08-15-2013
20130208891HANDLING MISMATCH OF CRYPTOGRAPHIC KEYS AND RELATED BATTERY DRAIN AND COMMUNICATION EXCHANGE FAILURES - A wireless communications device stores a first cryptographic key in connection with a profile, the profile indicating a security type requiring no credentials and a network name. An access point (AP) supports a wireless local area network (WLAN), the WLAN having the network name, the WLAN supporting the security type and the WLAN requiring a second cryptographic key for encryption. The wireless communications device successfully authenticates and associates with the AP, thus joining the WLAN. Subsequent to joining the WLAN, the wireless communications device conducts encrypted communications with the AP and detects from the encrypted communications that there is a mismatch between the first cryptographic key and the second cryptographic key. Responsive to detecting the mismatch, the wireless communications device bans the profile or the AP or both.08-15-2013
20130216043Security Solution For Integrating a WiFi Radio Interface in LTE Access Network - A method for security for inter-RAT carrier aggregation is disclosed. The method includes encrypting a message using an encryption technique for a first RAT. The method also includes sending, to a UE, at least a portion of the encrypted message using a different, second RAT. Sending using the second RAT does not further encrypt the at least a portion of the encrypted message. The method further includes receiving the at least a portion of the message encrypted using the first RAT protocol. Receiving uses the second, different RAT. The method also includes decrypting the at least a portion of the message using the first RAT protocol. Apparatus and computer readable media are also described.08-22-2013
20130223626VERIFYING GENERIC BROADCAST OF LOCATION ASSISTANCE DATA - Various techniques are provided for Location Services (LCS) Assistance Data broadcast, for example for implementation in LTE and LTE-A systems. The embodiments described herein may use the LPP/LPPe positioning protocol, by making use of existing unsolicited Provide Assistance Data (PAD) messages. Embodiments avoid the need to define and implement a separate broadcast Assistance Data protocol. Additional exemplary embodiments for scheduling and verifying of the broadcast Assistance Data messages are described herein.08-29-2013
20130223627KEY DISTRIBUTION SYSTEM, KEY DISTRIBUTION METHOD, AND RECORDING MEDIUM - A key distribution system includes a server and terminal devices constructing an ad-hoc network and communicating with each other with information being encrypted by a key distributed from the server. The server obtains a predetermined attribute value desired as a communication counterparty by the terminal device from the terminal device, and obtains a plurality of keys corresponding to the obtained attribute values from a key managing information. The server obtains, among the plurality of obtained keys, m number of keys that maximize the posterior probability that the keys are stored in the terminal device having the same attribute value as the attribute value obtained from the terminal device and having the number of communications larger than a predetermined value, and transmits the m number of keys to the terminal device.08-29-2013
20130236014COMMUNICATION PROTOCOL FOR SECURE COMMUNICATIONS SYSTEMS - A method and apparatus for transmitting encryption keys in a secure communication system is provided herein. During rekeying of a device, a key encryption key (KEK) is utilized to wrap (encrypt) the traffic encryption key (TEK) when the KEK is available to the device. If unavailable, the TEK will be wrapped using public key encryption with the recipient device's public key. The receiving device will then be able to unwrap the TEK using public key decryption with its own private key. Because TEKs are always transmitted in a secure manner, secure and efficient rekeying of devices on foreign networks can occur.09-12-2013
20130236015ENCRYPTION/DECRYPTION SYSTEM AND METHOD FOR A MOBILE DEVICE - An encryption/decryption system and method are provided for a mobile phone configured to make a voice packet encryption/decryption during mobile communication. The mobile phone has a connecting interface for an external plug-in device. The encryption/decryption system inside the external plug-in device at least has a control unit, and a security chip. When a security communication mode is activated, the communication between users can be prevented from being disclosed. The present invention is to provide the encryption/decryption system and method for activating a security communication mode between two mobile users communicating in mobile communication, and for preventing communication packets from being disclosed.09-12-2013
20130236016METHOD, APPARATUS, AND SYSTEM FOR DATA PROTECTION ON INTERFACE IN COMMUNICATIONS SYSTEM - A method and an apparatus for protecting data carried on an Un interface between a eNB and a relay node are disclosed. Three types of radio bearers (RBs) are defined over the Un interface: signaling radio bearers (SRBs) for carrying control plane signaling data, signaling-data radio bearers (s-DRBs) for carrying control plane signaling date; and data-data radio bearers (d-DRBs) for carrying user plane data. An integrity protection algorithm and an encryption algorithm are negotiated for control plane signaling data on an SRB, control plane signaling data carried on an s-DRB, and user plane data carried on a d-DRB. With the respective integrity protection algorithm and encryption algorithm, the data over the Un interface can be protected respectively. Therefore, the security protection on the Un interface is more comprehensive, and the security protection requirements of data borne over different RBs can be met.09-12-2013
20130236017TELECOMMUNICATION SYSTEMS AND ENCRYPTION OF CONTROL MESSAGES IN SUCH SYSTEMS - A method for encrypting radio resource control (RRC) messages exchanged between a wireless communication device and a node in a wireless communication system includes separating sequence number rollover events from mobility events while encrypting radio resource control (RRC) messages for exchange within a wireless communication system. According to the method, the sequence number rollover events and mobility events are separated by utilizing a state transition counter, a handover counter, and an overflow counter such that, when the state counter is incremented due to occurrences of a first group of events, the handover counter and the overflow counter are re-set to zero and, when the handover counter is incremented due to occurrences of a second group of events the overflow counter is re-set to zero. The method further includes providing one or more outputs from the state transition counter, the handover counter, and the third overflow counter as one or more inputs to a crypto algorithm for encrypting RRC messages.09-12-2013
20130243194SYSTEMS AND METHODS FOR ENCODING EXCHANGES WITH A SET OF SHARED EPHEMERAL KEY DATA - A method includes generating a shared master secret. The method also includes generating a set of shared ephemeral key data. The set of shared ephemeral key data is generated independent of the shared master secret. A validity duration of the set of shared ephemeral key data is less than a validity duration of the shared master secret. The method further includes encrypting at least one message that is to be transmitted to at least one station based on at least the shared master secret and the set of shared ephemeral key data.09-19-2013
20130243195METHOD AND DEVICE FOR MANAGING ENCRYPTED GROUP REKEYING IN A RADIO NETWORK LINK LAYER ENCRYPTION SYSTEM - Disclosed is a radio system, method, and device for a mobile station to indicate to an authentication controller, in an authentication response message, which of a plurality of group key link layer encryption keys (GKEK)s it currently has in its possession, and to work with the authentication controller to more intelligently manage multiple GKEKs. The authentication controller can use the information obtained from the authentication response message to determine which of a plurality of GKEKs to advertise in a key announcement broadcast. Furthermore, individual requests for a future LLE key (LEK) to be used for link layer encryption (LLE) encrypting and decrypting inbound and outbound group communications between base station(s) and mobile station(s) are responded to with a broadcast GKEK-encrypted transmission including the future LEK. Only the requesting mobile station transmits an acknowledgment packet in response to the broadcast.09-19-2013
20130243196COMMUNICATION SYSTEM, COMMUNICATION DEVICE AND PROCESSING METHOD THEREFOR - A master generates a session key, receives public keys from a plurality of slaves, encrypts the session key using the individual public keys, transmits the encrypted session key to the plurality of slaves, encrypts data using the encrypted session key, and sends it to the plurality of slaves. A plurality of slaves transmit public keys to a master device, receive and decrypt a session key encrypted using individual public keys, receive data encrypted using the session key from the master, and decrypt it using the decrypted session key.09-19-2013
20130251149METHOD AND SYSTEM FOR WIRELESS TRANSMISSION OF CONTENT - The invention discloses a method and a system for wireless transmission of content. The present invention relates generally to wireless network technology, Problems solved by the invention is that, the method for manually entering the shared key is neither convenient nor secure, while the method for transmitting the shared key over the wireless network also makes the shared key exposed to an unsafe environment. Embodiments of the invention provide the program as follows: a method and a system for wireless transmission of content, wherein, capturing shared key, using the shared key to encrypt the content, and then transmitting the encrypted content over the wireless network. Embodiments of the invention are suitable for terminals and devices wirelessly connected, and so on.09-26-2013
20130251150METHOD OF PROVIDING AN AUTHENTICABLE TIME-AND-LOCATION INDICATION - A method of providing an authenticable time-and-location indication using a radio-navigation signal receiver comprises receiving radio-navigation signals broadcast from a plurality of radio-navigation signal sources, at least some of the radio-navigation signals containing one or more cryptographic tokens protected by encryption, the cryptographic tokens being updated from time to time. The receiver retrieves, by decryption, the cryptographic tokens from the radio-navigation signals containing them. The receiver then determines positioning data, representing its geographical position and time, based on the radio-navigation signals received. The receiver generates a digital authentication code using a cryptographic function taking as inputs at least the positioning data and the retrieved cryptographic tokens, and produces a data package including a first part containing the positioning data and a second part containing the digital authentication code.09-26-2013
20130251151WIRELESS COMMUNICATION DEVICE, WIRELESS COMMUNICATION SYSTEM, AND NETWORK DEVICE - The wireless communication system 09-26-2013
20130259230Bluetooth Low Energy Privacy - Disclosed are various embodiments of Bluetooth low energy (BLE) modules and methods implemented therein. An embodiment of the disclosure generates in a BLE central device an identity resolving key (IRK) associated with a BLE peripheral device. The IRK is transmitted to the BLE peripheral. A resolvable private address (RPA) is generated in the BLE central device that corresponds to the IRK. Packets transmitted in an advertising channel use the RPA for transmissions to the BLE peripheral.10-03-2013
20130259231METHODS AND APPARATUS FOR BASE STATION ASSISTED PEER DISCOVERY THROUGH AGGREGATION OF EXPRESSIONS - A method, an apparatus, and a computer program product for wireless communication are provided in which a UE is equipped to generate an expression associated with a wireless device for use in a peer discovery signal, generate an expression set from the expression, a first temporal frequency, and a first time duration, and transmit the generated expression set to a base station to allow the base station to broadcast each of the expressions included in the expression set at the first temporal frequency over the first time duration. Another method, apparatus, and computer program product for wireless communication are provided in which a base station is equipped to receive an expression set from a wireless device, process the received expression set to determine each of one or more instances of an expression, and transmit each of the one or more instances of the expression.10-03-2013
20130259232METHOD FOR PAIRING A MOBILE TELEPHONE WITH A MOTOR VEHICLE AND LOCKING/UNLOCKING SET - The invention relates to a method for pairing a mobile telephone with a motor vehicle, said paired mobile telephone being used to lock/unlock and/or start said motor vehicle by means of at least part of an authentication code. Said method is characterised in that the mobile telephone (10-03-2013
20130266141MOBILE DEVICE, METHOD OF PROCESSING AN INPUT IN A MOBILE DEVICE AND ELECTRONIC PAYMENT METHOD USING A MOBILE DEVICE - Handheld wireless communications devices include a data input device, which is configured to receive first input data provided by a user, a main processor and a security processor. The security processor includes an input interface and input processing block configured to extract second data from a first portion of the first input data using, for example, a data mapping operation. The security processor also includes an encryption circuit, which is configured generate secure data from the extracted second data by encrypting the extracted second data using an encryption key, and a data/control interface, which is configured to transfer the secure data to the main processor.10-10-2013
20130266142METHOD AND APPARATUS FOR SECURE DATA TRANSMISSION - A method and apparatus for secured data transmission is provided. The base station determines a first precoding matrix based on channel information of an eavesdropper. The base station determines a second precoding matrix and a third precoding matrix. The base station generates the secure data by precoding first user data for a target user with the first precoding matrix and the second precoding matrix. The base station transmits the secure data signal to the target user. The second precoding matrix is determined based on the first precoding matrix and the first channel information. The third precoding matrix is determined based on the first channel information and the second channel information.10-10-2013
20130279698SECURE WIRELESS LINK BETWEEN TWO DEVICES USING PROBES - A secure wireless communication link (pairing) between two devices can be established using cleartext wireless transmissions between devices not joined to a network (“probes”). One device can broadcast a first probe indicating that it is seeking to establish a pairing. The other device can respond with a second probe, and the two devices can establish a shared secret, e.g., by exchanging further information using additional probes. Thereafter, either device can send a message to the other by encrypting the message using a cryptographic key derived from the shared secret; encrypted messages can also be sent within probes. The receiving device can extract an encrypted message from a probe and decrypt it using the cryptographic key. The encrypted message can include credentials usable by the receiving device to join a wireless network.10-24-2013
20130287211SYSTEM FOR ACCESSING A SERVICE AND CORRESPONDING PORTABLE DEVICE AND METHOD - A system for accessing a service comprises two contact-less readers and one portable device. A first contact-less reader is configured to send to the portable device, through a first range radiofrequency link, a first message comprising first data. The first data includes an identifier allocated to the portable device and an associated key for encrypting data. The portable device is configured to send to a second contact-less reader, through a second range radiofrequency link, a second message comprising second data. The second data includes the identifier received from the first message. The second data is encrypted by using the data encryption key received from the first message. The second range radio frequency is higher than the first range radio frequency.10-31-2013
20130294603CENTRALIZED KEY MANAGEMENT IN EMBMS - A split architecture eMBMS with distributed BMSCs providing the same eMBMS service allows for a centralized key service where each BMSC is able to derive a set of MTKs from the MSK using the MTK-IDs as the differentiating input. This avoids the need to send MTKs to the BMSCs.11-07-2013
20130301834ELECTRONIC KEY REGISTRATION SYSTEM - An electronic key registration system registers a key ID and an encryption key of an electronic key to a controller installed in a communication subject that communicates with the electronic key through wireless connection. The electronic key includes a monitoring unit that monitors whether or not registration of the electronic key is attempted in a permissible period. A registration invalidation unit prohibits registration of the electronic key to the communication subject when the permissible period expires.11-14-2013
20130308778SECURE REGISTRATION OF A MOBILE DEVICE FOR USE WITH A SESSION - A computer-readable medium embodies a computer program for registering a mobile device. The computer program comprises computer-readable program code for: generating a first message including a first code in response to receiving a request to register the mobile device for use with a future session with an entity, sending the first message including the first code, receiving a second message including the first code and at least a portion encrypted using a private key associated with the mobile device, and registering the mobile device for use with the future session based on at least the portion of the second message being encrypted using the private key associated with the mobile device.11-21-2013
20130308779METHODS AND DEVICES FOR COMPUTING A SHARED ENCRYPTION KEY - Embodiments described herein are generally directed to methods and devices in which computing devices, and mobile devices in particular, establish a shared encryption key for a device group comprising at least three mobile devices. In accordance with one example embodiment, a public key of a mobile device is computed using a shared password as performed in accordance with authentication acts of a password-authenticated key exchange protocol, and transmitted to at least one other mobile device of the group. A public value is computed as a function of a mobile device private key and of a public key of at least one other mobile device of the device group, in accordance with a group key establishment protocol. The public values of the mobile devices of the device group are used to compute a shared encryption key.11-21-2013
20130308780APPARATUS FOR MANAGING MEMBERS OF AT LEAST ONE GROUP OF DECODERS HAVING ACCESS TO BROADCAST DATA - A technique to manage members of a group of decoders having access to broadcast data, each group member sharing a common broadcast encryption scheme (BES) comprising the steps of, in a stage for a decoder to become a group member, receiving keys pertaining to the position in the group according to the BES, receiving a current group access data comprising a current group access key, and in a stage of accessing broadcast data, using the current group access data to access the broadcast data, and in a stage of renewing the current group access key, sending a first group message comprising at lease a next group access key encrypted so that only non-revoked decoders can access it, said group message being further encrypted by the current group access key, updating the current group access key with the next group access key.11-21-2013
20130308781METHOD AND APPARATUS FOR TRANSMITTING SECURE CELL BROADCAST MESSAGES IN A CELLULAR COMMUNICATION NETWORK - A method and apparatus is provided for transmitting a cell broadcast message in a mobile communication network comprising in a message control node receiving a initiation request identifying a first message payload segment to be transmitted, determining an authentication group for which the first message payload segment is intended and determining a first encryption key associated with the determined authentication group. The first message payload segment is encrypted using the first encryption key. A message payload is aggregated comprising the encrypted first message payload segment and at least a second message payload segment. The cell broadcast message comprising the aggregated message payload for message broadcast is transmitted within at least a part of the communication network. A method and apparatus is also provided for decrypting a cell broadcast message at a mobile terminal.11-21-2013
20130315393AUTHENTICATION SYSTEM FOR DEVICE-TO-DEVICE COMMUNICATION AND AUTHENTICATION METHOD THEREFOR - An authentication system for device-to-device (D2D) communication and an authentication method thereof are provided. The authentication system further includes first user equipment (UE) and an authentication server. The authentication server is located within a communication range of the first UE. When the first UE sends a connection request to the authentication server, the authentication server performs a routine authentication procedure on the first UE and provides key generation information to the first UE. The authentication server generates a server key according to the key generation information and a key derivation procedure. The first UE generates an equipment key according to the key generation information and the key derivation procedure to obtain authentication for D2D communication, such that the first user equipment and a second UE obtaining the authentication for D2D communication directly perform the D2D communication without performing the D2D communication through the authentication server.11-28-2013
20130322629Method for the Encrypted Radio Transmission of Data - A method is provided for encrypted radio transmission of data telegrams spaced apart in time in a sequence between a transmitter and a receiver of a system, wherein a key is changeable and is cryptologically derived from a current piece of information. The time elapsed between a preceding telegram and the encrypted telegram implementing the desired data transmission is used as the key. The time span results from a value or entry of a parameter present in the system. The duration in the transmitter and the receiver is determinable from a previously transmitted value or entry of a parameter, or derived only in the transmitter and wirelessly transmitted to the receiver for a future telegram. In a motor vehicle tire pressure monitoring system, the transmitted data originate from a tire sensor and are wirelessly transmitted in an encrypted manner to a vehicle body.12-05-2013
20130322630LOCATION PROOFS - A wireless computing device includes an antenna that is configured to transmit and receive wireless signals. The wireless computing device comprises a transmitter component that causes a first wireless signal to be transmitted to a wireless access point via the antenna, wherein the first wireless signal comprises a request for a location proof, wherein the request for the location proof comprises data that identifies the wireless computing device, and wherein the location proof comprises data that is indicative of a geographic location of the wireless access point. The system also includes a receiver component that receives, via the antenna, a second wireless signal from the wireless access point, wherein the second wireless signal is received by the receiver component subsequent to the transmitter component causing the first wireless signal to be transmitted to the wireless access point.12-05-2013
20130329888IN-VEHICLE MOBILE TRANSACTIONS - A mobile client system initiates a wireless communication with a transaction system and receives a digital certificate from the transaction system in response. The digital certificate includes an embedded geographic location of the transaction system. The mobile client system also compares the geographic location of the transaction system with a current geographic location of the mobile client system and establishes an encrypted communication channel with the transaction system upon determining that the location of the transaction system is in proximity of the current location of the mobile client system. The mobile client system further sends the user credentials to the transaction system via the encrypted communication channel. Upon successful authentication of the mobile client system via the user credentials, the mobile client system performs a transaction with the transaction system using a graphical user interface of the client system.12-12-2013
20130329889SYSTEM AND METHOD FOR PROVIDING SECURE PRODUCT DATA COLLECTION, MONITORING, AND TRACKING - A system for providing product data collection, monitoring, and tracking contains a memory and a processor configured by the memory to perform the steps of: receiving product information and a scannable code; creating and assigning a unique product identifier to the received product information and associated scannable code; receiving customer registration information; creating and assigning a unique customer identifier to the received customer information; associating the unique product identifier with the unique customer identifier; and after receiving the scannable code from a remote device, providing the remote device with access to the received product information. The collected structured and/or unstructured data is secured during transit.12-12-2013
20130336484TRANSMITTING DEVICE, RECEIVING DEVICE, WIRELESS COMMUNICATION SYSTEM AND METHOD FOR CONTROLLING WIRELESS COMMUNICATION SYSTEM - A transmitting device, a receiving device, a wireless communication system and a method for controlling the wireless communication system are used for creating a secure wireless communication network of a limited area. The transmitting device comprises: one or more transmitters configured to transmit wireless signals, and create the limited area by a coverage scope of the wireless signals; a cryptography key generating unit configured to generate a cryptography key for the wireless signals; a cryptography key encoding unit configured to encode the cryptography key to a cryptography key frame; and a cryptography key scheduling unit configured to schedule the cryptography key frame so as to control the transmitter to transmit the wireless signals including the cryptography key frame.12-19-2013
20130336485METHOD OF CONTROLLING STATES OF MOBILE NODE AND VERIFIER THEREIN FOR RECEIVING SECRET KEY - Disclosed are a verifier used in a mobile node and a method of controlling plural states of the mobile node. The verifier comprises a secret key receiving part configured to listen and receive at least one secret key from at least one secret key transmitter in an area limited Ad-hoc network; a secret key stamp generating part configured to perform calculation on the at least one secret key according to a predetermined verification rule so as to generate a secret key stamp; and a secret key stamp verifying part configured to compare the secret key stamp and a predetermined standard value, wherein, if the secret key stamp is equal to the predetermined standard value, then the secret key is determined as valid, otherwise, the secret key is determined as invalid.12-19-2013
20130336486METHOD AND SYSTEM FOR SECURING CONTROL PACKETS AND DATA PACKETS IN A MOBILE BROADBAND NETWORK ENVIRONMENT - The present invention provides a method and an apparatus for securing data packets and control messages in a mobile broadband network environment. In one embodiment, a mobile station and a data gateway are peers for securing data packets. That is, security context for data packets is maintained at the mobile station and the data gateway. Further, security processing for data packets is performed by the mobile station and the data gateway. In another embodiment, the mobile station and a base station are peers for securing control messages. That is, security context for control messages is maintained at the mobile station and the base station(s). Further, security processing for control messages is performed by the mobile station and the base station(s).12-19-2013
20130343542METHODS AND DEVICES FOR ESTABLISHING TRUST ON FIRST USE FOR CLOSE PROXIMITY COMMUNICATIONS - Methods and devices for establishing trust on first use for close proximity communications are disclosed. An example method includes receiving a public key from a device via a close proximity communications connection, obtaining, via a user interface, an indication that the device is trusted, and storing at least one of the public key or an identifier for the device.12-26-2013
20130343543USER EXPERIENCE AND METHOD FOR PROMOTING A LOW-ASSURANCE CALL TO A HIGH-ASSURANCE CALL ON A CALLING DEVICE - A low-assurance call on a mobile device to another device may be promoted to a high-assurance call using a user interface. The participants during the call do not need to hang up and start a new high-assurance call. A caller can swipe an icon up a slider, for example, and start a process of promoting the call. The initial low assurance call using SIP servers is terminated but this is transparent to the callers. Once the swipe is performed, a DTLS negotiation is performed between the devices. During this DTLS handshake, which is done directly between the device without involvement of the SIP servers, a key is exchanged. Only the calling devices are aware of this key which is used to encrypt media during the call. Screens on the calling devices show that the call is now high-assurance and security details of the call may also be displayed.12-26-2013
20140003606SYSTEMS AND METHODS FOR COMPLYING WITH WIRELESS GUIDELINES BASED ON LOCATION01-02-2014
20140003607System and Method for Early Cut Through of Encrypted and Unencrypted Voice Streams01-02-2014
20140010368WIRELESS COMMUNICATION SYSTEM, TERMINAL, AND STORAGE MEDIUM - A wireless communication system includes a plurality of transmitters each configured to transmit transmission information including a code and an identifier of the corresponding transmitter, and a plurality of terminals configured to wirelessly communicate with each other. Each of the terminals includes an obtaining unit that obtains codes extracted from multiple sets of the transmission information transmitted from the transmitters, and a communication unit that performs encrypted communications with other terminals using the obtained codes.01-09-2014
20140010369METHODS AND DEVICES FOR HANDLING ENCRYPTED COMMUNICATION - By allowing the option of placing an Logical Link Control (LLC)-entity within the Base Station Subsystem (BSS) an improved system performance in the form of mobile stations experiencing reduced information acquisition times can be achieved by using a cache memory in the BSS. A method in the BSS can include receiving one or more LLC Packet Data Units (PDUs) from a mobile station, and extracting Sub Network (SN)-PDU(s) contained in each LLC PDU and reassembling the SN-PDU(s) to recover a single N-PDU. The N-PDU is determined to include a request for information using an LLC entity in the base station subsystem. Content of a cache memory in the base station subsystem is determined to correspond to the request for information indicated by the N-PDU. A response to the request for information from the mobile station is made using the content of cache memory in the base station subsystem.01-09-2014
20140023194Managing User Access in a Communications Network - A method of operating a node for performing handover between access networks wherein a user has authenticated for network access in a first access network. The method comprises receiving from a home network a first session key and a temporary identifier allocated to the user for the duration of a communication session. The identifier is mapped to the first session key, and the mapped identifier and key are stored at the node. A second session key is derived from the first session key and the second session key is sent to an access network, and the identifier sent to a user terminal. When the user subsequently moves to a second access network, the node receives the identifier from the user terminal. The node then retrieves the first session key mapped to the received identifier, derives a third session key and sends the third session key to the second access network.01-23-2014
20140023195RADIO FREQUENCY IDENTIFICATION (RFID) TAG, INTERROGATOR, AND METHOD FOR AUTHENTICATION BETWEEN THE RFID TAG AND THE INTERROGATOR - Provided is a method for authentication between a radio frequency identification (RFID) tag and an interrogator configured to communicate with the RFID tag. An authentication method performed by the interrogator may include: transmitting, to an RFID tag, a challenge command comprising random interrogator information for initializing an encryption engine and challenge interrogator information for authenticating the RFID tag; receiving, from the RFID tag, random tag information, encrypted challenge tag information, and encrypted tag authentication data; initializing the encryption engine based on the random to interrogator information and the random tag information; decrypting the encrypted challenge tag information and the encrypted tag authentication data; and authenticating the RFID tag based on the decrypted challenge tag information, the decrypted tag authentication data, and the challenge interrogator information.01-23-2014
20140029749WI-FI ROUTER WITH INTEGRATED TOUCH-SCREEN AND ENHANCED SECURITY FEATURES - A Wi-Fi router with an integrated configuration touch-screen, and method to use this integrated touch screen to provide enhanced security features. The Wi-Fi router, which has a wired or optical network interface, may be factory pre-configured with hard to anticipate passwords and encryption codes, thus making even its default Wi-Fi settings difficult to attack. Besides displaying interactive menus on the touch-screen, the router may also generate touch sensitive dynamic alphanumeric virtual keypads to enable administrators to interact with the device without the need of extra computers or software. Inexperienced administrators secure in the knowledge that they may access and change even difficult to remember security settings at any time through the built-in touch-screen controller and simplified user interface, are encouraged to set up secure Wi-Fi systems. The device may optionally include security software that, upon touch of a button, can provide new randomized or otherwise obfuscated router settings.01-30-2014
20140029750MULTI-SERVICE VPN NETWORK CLIENT FOR MOBILE DEVICE HAVING INTEGRATED ACCELERATION - An integrated, multi-service virtual private network (VPN) network client for cellular mobile devices is described. The multi-service network client can be deployed as a single software package on cellular mobile network devices to provide integrated services including secure enterprise VPN connectivity, acceleration, security management including monitored and enforced endpoint compliance, and collaboration services. The multi-service client integrates with an operating system of the device to provide a VPN handler to establish a VPN connection with a remote VPN security device. The VPN network client includes to data acceleration module exchange network packets with the VPN handler and apply at least one acceleration service to the network packets, and a VPN control application that provides a unified user interface that allows a user to configure both the VPN handler and the data acceleration module.01-30-2014
20140044263CENTRALIZED KEY GENERATION - A first network device is configured to receive a request for a secret key, generate the secret key, and send the secret key to a second network device, a third network device, and a wireless user device. The second network device may send content, encrypted with the secret key, to the wireless user device. The third network device may send content, encrypted with the secret key, to the wireless user device when the second network device is not sending content to the wireless user device. The wireless user device may use the secret key to decrypt the content received from the second network device or the third network device.02-13-2014
20140044264COMMUNICATIONS SYSTEM - A method performed by a mobile communications node at a setup or a reconfiguration of a radio link control unacknowledged mode (RLC-UM) radio bearer includes receiving a radio bearer setup message from a network communications node, the radio bearer setup message being applied in configuring an RLC-UM radio bearer within the mobile communications node to be able to communicate data with the network communications node, in response to receiving the radio bearer setup message, calculating new cipher data for determining values of a cipher input parameter used for ciphering and deciphering data communicated with the network communications node, and transmitting to the network communications node a radio bearer setup complete message confirming that the RLC-UM radio bearer has been setup and sending the new cipher data to the network communications node.02-13-2014
20140050319Method and Device for Setting Up Wireless Network Connection - The present invention provides a method and device for setting up a wireless network connection. The second device sets up a connection with the wireless network according to the network configuration information. With the present invention, user participation when a terminal is connected to the wireless network is reduced, and efficiency in setting up a wireless network connection is improved.02-20-2014
20140050320ENHANCEMENTS TO ENABLE FAST SECURITY SETUP - WTRUs, ARSs, APs, WLG/AAA proxies, networks, and methods thereon are disclosed for fast security setup on a multi-RAT WTRU. Methods of sharing security associations between RATs on a multi-RAT WTRU are disclosed. Methods of caching security associations are disclosed. Methods are disclosed for alerting an ANDSF server of an AP that should be considered for association. Enhancements to advertisements from an AP are disclosed where the advertisements may include SSID with a FQDN, a HESSID type information, or TAI type information. Methods of resolving AP identities to a reachable address are disclosed. An address resolution protocol is disclosed for resolving AP identities. ARSs are disclosed that may resolve a BSSID to a network routable address. Protocols for carrying AP identities and security parameters are disclosed. Methods are disclosed of using ANDSF to provide the WTRU with security information and parameters of an AP. An RSN may indicate security capabilities.02-20-2014
20140050321ULTRASONIC TRANSMISSION OF SIGNALS - Described herein are devices and systems that transmit data from a first device using an ultrasonic digital modem to a second device that receives the ultrasonic signal and can interpret the ultrasonic signal. The second device may be a telecommunications device such as a smartphone running an ultrasonic digital modem receiver application. In particular, devices, systems and methods for encoding and transmitting an ultrasonic signal that includes both digital (e.g., FSK) and analog signal components. Such hybrid ultrasonic signals may efficiently and reliably transmit information, and particularly biological information. Also described herein are devices, systems and methods for securely transmitting ultrasonic signals using encryption keys that may be read by the receiving device using a separate (e.g., non-ultrasound modality) from the transmitting device.02-20-2014
20140050322AUTHENTICATION IN A ROAMING ENVIRONMENT - One embodiment of the invention provides a mobile communication network architecture that includes a first base station (e.g., a first base station controller and/or a first transceiver station), a second base station a second base station controller and/or a second transceiver station), a mobile client, and a server coupled to the mobile client via either the first base station controller or the second base station. The first base station is coupled to an authentication center that authenticates an intended user so that the user can communicate a message between the mobile client and the server via the first base station. A credential (or status) of the authentication made at the authentication center is then transmitted from the first base station to the second base station when the mobile client moves to utilize the second base station to communicate with the server.02-20-2014
20140050323INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, OPERATION TERMINAL, AND INFORMATION PROCESSING SYSTEM - Provided is an information processing apparatus including a security level determination section which determines a security level at a time of transmitting a key to an operation terminal, as a transmission security level, a transmission power determination section which determines a transmission power in accordance with the transmission security level and a key-dividing number included in a key transmission request, a key acquisition section which acquires each key fragment by dividing the key into the key-dividing number, and a transmission section which transmits the each key fragment acquired by the key acquisition section using the transmission power determined by the transmission power determination section, via a wireless signal to the operation terminal.02-20-2014
20140064486SYSTEMS AND METHODS FOR SECURELY TRANSMITTING AND RECEIVING DISCOVERY AND PAGING MESSAGES - Methods, devices, and computer program products for transmitting and receiving discovery and paging messages in a wireless communication device are described herein. In one aspect, a wireless apparatus operable in a wireless communication system includes a receiver configured to receive a discovery packet from a first device, the discovery packet including a first public key and information advertising a service provided by the first device. The wireless apparatus further includes a processor configured to generate a paging request packet, the paging request packet including a second public key and information indicating interest in the service provided by the first device. The processor is further configured to generate an encryption key based at least in part on the first public key and the second public key and encrypt at least a portion of the paging request packet using the generated encryption key. The wireless apparatus further includes a transmitter configured to transmit the encrypted paging request packet including the second public key and the information indicating interest in the service to the first device.03-06-2014
20140064487SYSTEMS AND METHODS FOR SECURELY TRANSMITTING AND RECEIVING DISCOVERY AND PAGING MESSAGES - Methods, devices, and computer program products for transmitting and receiving discovery and paging messages in a wireless communication device are described herein. In one aspect, a wireless apparatus operable in a wireless communication system comprises a processor configured to obfuscate a medium access control address of a frame by generating a random number and a transient address obfuscation key including a first transient key, wherein the transient address obfuscation key is a function of an address obfuscation key and the random number; including the random number in an address obfuscation header field of the frame; and replacing an original first address in an address field of the frame with a new first address that is a function of the original first address and the first transient key. The processor is further configured to include an indication of the obfuscation in a first field of the frame. The wireless apparatus further comprises a transmitter configured to transmit the frame to a receiving device.03-06-2014
20140064488One-Way Key Fob and Vehicle Pairing - Key fob and vehicle control unit identifiers (IDs) are used for entity authentication or trust transfer to achieve a secured initial pairing. The key fob is capable of transmitting only (not receiving) and is paired with a control unit in a vehicle or with any other control device. Use of the key fob and control unit IDs prevents unauthorized pairing and access to the operation key (OpKey) that is later used for communications between the devices. Elliptical curve cryptography (ECC) is used for strong security and efficient implementation. In the pairing process, device IDs are used for entity authentication and public key cryptography is used for easy key management. Symmetric encryption is used for fast normal operation and to accommodate key fob addition or revocation after key fob loss.03-06-2014
20140072119System and Method for Authentication and Key Exchange for a Mobile Device via Spectrally Confined Wireless Communications - An architecture, system and associated method and apparatus for securely communicating authentication data to a communication device. In one embodiment, the method includes modulating a spectral source's radiation using the authentication data, wherein the spectral source's radiation is adapted to operate as a first transmission medium for carrying the authentication data, the first transmission medium being containable within an enclosure that inhibits passage of the spectral source's radiation (i.e., spectrally opaque enclosure). The modulated authentication data is transmitted via the first transmission medium to the communication device disposed in the spectrally opaque enclosure.03-13-2014
20140079217METHOD AND APPARATUS FOR SECURE PAIRING OF MOBILE DEVICES WITH VEHICLES USING TELEMATICS SYSTEM - A method for establishing secure wireless communications between a mobile device and a vehicle, where a user is not required to enter a password, but instead the telematics system is used to bootstrap the trust between the mobile device and the vehicle. The user initiates the process by pressing a button on the mobile device to request pairing. The vehicle uses its secure OnStar cellular communication link to verify the mobile device with the OnStar server, which generates and sends a session key to the vehicle via the vehicle-OnStar cellular connection, and also sends the session key to the mobile device via the device's own cellular connection. The session key serves as a shared secret, such that the vehicle can issue a secrecy challenge to the mobile device. When the mobile device responds appropriately, a trusted wireless communications link can be established between the mobile device and the vehicle.03-20-2014
20140079218System and Method for Device-to-Device (D2D) Assisted Dynamic Traffic Control for Cellular Networks - Method and apparatus are provided for offloading data from a cellular network via a secondary network. The offloaded data may be transported over a connection existing independently from the cellular network, such as a direct device-to-device (D2D) or direct mobile communications (DMC) link. The connection may be established between a first peer mobile device and a benefactor peer mobile device, and the benefactor peer mobile device may relay the data to/from a backhaul network via the secondary network. The benefactor peer mobile device may receive compensation for offloading the traffic, and may compete with one or more candidate benefactor devices for the task of offloading the data. The offloaded data may be uplink data originating from the beneficiary peer mobile, or downlink data destined for the beneficiary peer mobile.03-20-2014
20140079219SYSTEM AND A METHOD ENABLING SECURE TRANSMISSION OF SMS - The present invention relates to a system (03-20-2014
20140079220STREAMING ALIGNMENT OF KEY STREAM TO UNALIGNED DATA STREAM - Enhanced cryptographic techniques are provided which facilitate higher data rates in a wireless communication system. In one aspect, improvements to the ZUC algorithm are disclosed which can reduce the number of logical operations involved key stream generation, reduce computational burden on a mobile device implementing ZUC, and extend battery life. The disclosed techniques include, for instance, receiving, at a wireless communication apparatus, a data stream having data packets for ciphering or deciphering. The wireless apparatus can generate a cipher key for the cryptographic function, determine a starting address of a first data packet in the data stream and shift the cipher key to align with the starting address of the first data packet. Once aligned, the processing apparatus applies the cryptographic function to a first block of the first data packet using the shifted cipher key and manages a remaining portion of the cipher key to handle arbitrarily aligned data across multiple packets03-20-2014
20140093078DYNAMIC LOSS PROTECTION - A method comprises determining a number of radio sources within a region proximate an electronic device and adjusting one or more loss prevention policies based on the number of radio sources within the region proximate the electronic device. Other embodiments may be described.04-03-2014
20140093079SECURELY JOINING A SECURE WIRELESS COMMUNICATIONS NETWORK - Securely joining a secure wireless communications network is described, for example, where a printer or other device is securely added to a home wireless network. In various embodiments, a temporary wireless network is established between a new joiner device and a second wireless communications device which is already a member of a secure home wireless network. In an example, the temporary wireless network is set up using a secret key known to the new joiner device and the second wireless communications device by virtue of physical proximity. In various examples, the secure, temporary wireless network is used to transfer credentials of the secure home network to the new joiner device which then joins the home network. In an example the temporary wireless network is cancelled once the new joiner device becomes a member of the secure home (or other) wireless network.04-03-2014
20140093080METHOD AND SYSTEM TO DIFFERENTIATE AND ASSIGNING IP ADDRESSES TO WIRELESS FEMTO CELLS H(E)NB (HOME (EVOLVED) NODEB) AND LGW (LOCAL GATEWAY) BY USING IKEV2 (INTERNET KEY EXCHANGE VERSION 2 PROTOCOL) PROCEDURE - A method and a system to differentiate and assign IP addresses of wireless femto cells H(e)NB (Home (evolved) NodeB) by using IKEv2 (Internet Key Exchange Version 2 protocol) procedure when supporting multiple logical entities or service are provided. The present disclosure relates to broad area of IP networks and particularly relates to a signaling mechanism to support multiple services by providing particular IP address to particular service within an IP based entity. Different methods to differentiate the assigned IP addresses for multiple IP request for different entities (logical or physical), the GW (IKEv2 peer)/H(e)NB (IKEv2 peer) attaches an unique identification in the payload for each entity using IKEv2 procedure.04-03-2014
20140093081AUTHENTICATION IN SECURE USER PLANE LOCATION (SUPL) SYSTEMS - A particular method includes receiving, at a secure user plane location (SUPL) server, an indication from a mobile device of one or more transport layer security (TLS) cipher suites supported by the mobile device; determining whether the one or more TLS cipher suites include a TLS pre-shared key (TLS-PSK) cipher suite that is supported by the SUPL server; in response to determining whether the one or more TLS cipher suites include the TLS-PSK cipher suite that is supported by the SUPL server, performing a generic bootstrapping architecture (GBA)-based authentication process to authenticate the mobile device, or determining whether the SUPL server supports a certificate-based authentication method; and in response to determining that the SUPL server supports the certificate-based authentication method, performing the certificate-based authentication method that includes sending a server certificate to the mobile device and receiving a device certificate from the mobile device.04-03-2014
20140093082TRAFFIC ENCRYPTION KEY MANAGEMENT FOR MACHINE TO MACHINE MULTICAST GROUP - A method for updating a group traffic key used for encrypting and decrypting multicast data in a wireless communication system is described. The method includes receiving, from the base station, a first message comprising a new group security seed; and updating the group traffic key based on the new group security seed.04-03-2014
20140098956SIMPLE PAIRING TO GENERATE PRIVATE KEYS FOR DIFFERENT PROTOCOL COMMUNICATIONS - An integrated circuit radio transceiver and associated method comprises a multi-mode device operable to support personal area network communications as well as traditional wireless local area network communications. In one embodiment, IEEE 802.11 protocol IBSS communications are used to transport Bluetooth communication data packets. In another embodiment, a direct link comprising direct packet transfers without beaconing is performed between the multi-mode device and another multi-mode device. Thus, the multi-mode device is operable to establish traditional BSS communications with an Access Point in addition to establishing peer-to-peer communications with another multi-mode device to transport the Bluetooth communications over the 802.11 IBSS communication link or over an IEEE 802.11 direct communication link.04-10-2014
20140098957Methods and Devices for OTA Management of Subscriber Identity Modules - Methods and devices in a mobile communications system for over the air management of mobile stations contain a secure identification element such as a subscriber identity module. A standard challenge-response authentication procedure is implemented in a mobile communications system not for its intended authentication purpose, but for providing a mobile station with subscription data. The standard challenge-response authentication procedure is modified in that the challenge is used as a carrier for subscription data. The challenge containing the subscription data is provided to the mobile station in response to a request of the mobile station to be allowed access or attachment to the mobile communications system containing a special mode indicator data element, which indicates to the mobile communications system that the mobile station is requesting subscription data and suitably forwarded to a data providing unit configured to provide subscription data.04-10-2014
20140105396ADDRESSABLE RADIO DEVICE - An addressable radio is described in which the radio has an address that includes (i) a value derived from a counter and (ii) a hash of a combination of the value and an identity-resolving key for the radio device.04-17-2014
20140105397COMMUNICATION DEVICE - A communication device, which can simplify various setting processes, transmits, to a server via a network, external device information received from an external device by using proximity wireless communication. The communication device includes: an antenna for the proximity wireless communication with the external device; a proximity wireless communication unit communicating with the external device via the antenna to receive the external device information from the external device; an external device storage unit storing the external device information received by the proximity wireless communication unit; a registration information generation unit generating registration information to be registered in a database in the server based on (a) the external device information stored in the external device storage unit and (b) communication device information including communication device identification information for identifying the communication device; and a server communication unit transmitting registration information to the server via the network.04-17-2014
20140105398INPUT METHOD FOR COMMUNICATIONS TERMINALS AND COMMUNICATIONS TERMINALS - An input method for communications terminals, including: a communications terminal configured with a touch screen sends an input request message; a communications terminal configured with a keyboard returns an input acceptance message to the communications terminal configured with a touch screen; the communications terminal configured with a touch screen establishes a communications link with the communications terminal configured with a keyboard; the communications terminal configured with a keyboard generates input content, obtains a data packet through processing, and sends the data packet to the communications terminal configured a the touch screen through the communications link; the communications terminal configured with a touch screen processes the data packet to obtain the input content. The input speed and accuracy for a touch-screen mobile phone are improved, thereby solving the problem that the input experience on a touch-screen communications terminal is poor.04-17-2014
20140105399METHOD FOR PROVIDING APPLICATION SERVICE - A method for providing application service is provided. The method discloses that a user is authenticated according to a received application service acquisition request from a user mobile phone, and when the user authentication is passed, the application service acquisition request is sent to an application server, so that the application server provides an application service to the user mobile phone according to the application service acquisition request. The application server does not need to authenticate the user mobile phone by performing an authentication operation on the user mobile phone through a wireless application protocol gateway, thus being capable of reducing the workload of the application server.04-17-2014
20140112474METHODS AND APPARATUS FOR PROVIDING NETWORK-ASSISTED KEY AGREEMENT FOR D2D COMMUNICATIONS - A method, an apparatus, and a computer program product for wireless communication are provided in connection with facilitating secure D2D communications in a LTE based WWAN. In one example, a UE is equipped to send a shared key request using a first non-access stratum (NAS) message to a MME, calculate a first UE key based on a MME-first UE key, an uplink count value, and at least a portion of contextual information, receive a second NAS message from the MME, and calculate a final UE key based at least on the first UE key. In another example, a MME is equipped to receive a NAS message such as the message send by the first UE, calculate a first UE key, receive a message at least indicating successful contact with the second UE, and send a second NAS message to the first UE indicating the successful contact.04-24-2014
20140112475METHODS AND APPARATUS FOR PROVIDING ADDITIONAL SECURITY FOR COMMUNICATION OF SENSITIVE INFORMATION - A method, an apparatus, and a computer program product for wireless communication are provided in connection with providing additional security for communication of sensitive information within a LTE based WWAN. In one example, a communications device is equipped to generate a keystream based on a mobility management entity-user equipment (MME-UE) key, a non-access stratum (NAS) message count value, and a contextual string associated with an informational element, and the contextual information, and cryptographically process the informational element using the generated keystream. In such an example, the communications device may be a UE, a MME, etc.04-24-2014
20140112476INTEGRATED CIRCUIT, WIRELESS COMMUNICATION APPARATUS, AND COMPUTER PROGRAM - There is provided an integrated circuit including a communication processing section which communicates with another apparatus by non-contact communication capable of executing simultaneous communication by establishing a plurality of connections, and an encryption processing section which executes an encryption process of data transmitted by the non-contact communication based on encryption information including connections to be encrypted when performing the non-contact communication with the another apparatus.04-24-2014
20140119543METHOD FOR UPDATING GROUP TEMPORAL KEY, RELATED APPARATUS AND SYSTEM - Embodiments of the present invention disclose a method for updating a group temporal key, a related apparatus and system. A method includes: An access point AP sets an updating period of a group temporal key GTK; the access point updates the GTK whenever the updating period of the GTK arrives; the access point receives a GTK request that is sent by a mobile station STA in an association list within a preset delay time period after arrival of the updating period of the GTK, where the association list records all mobile stations communicating with the access point, and the preset delay time period is shorter than the updating period of the GTK; and when the preset delay time period after the arrival of the updating period of the GTK arrives, the access point sends the updated GTK to the mobile station in the association list according to the GTK request.05-01-2014
20140119544METHOD AND APPARATUS OF PROVIDING INTEGRITY PROTECTION FOR PROXIMITY-BASED SERVICE DISCOVERY WITH EXTENDED DISCOVERY RANGE - The present invention is directed to a method and an apparatus for use in a wireless communication system, specifically, the method is directed to perform a ProSe discovery procedure by a first ProSe-enabled UE in a cellular communication system, the method comprising: encrypting a payload of a discovery signal by using a private key of the first ProSe-enabled UE; adding a public key of the first ProSe-enabled UE to the payload of the discovery signal; and transmitting the discovery signal including the payload and the public key of the first ProSe-enabled UE to one or more second ProSe-enabled UEs, wherein the public key of the first ProSe-enabled UE is used for the one or more second ProSe-enabled UEs to decrypt the payload of the discovery signal.05-01-2014
20140126721METHOD AND APPARATUS FOR ENCRYPTING SHORT DATA IN A WIRELESS COMMUNICATION SYSTEM - A method and apparatus is capable of encrypting short data in a wireless communication system When a terminal generates a short data burst in idle mode, the apparatus generates a Traffic Encryption Key (TEK) using a Cipher-based Message Authentication Code (CMAC)-TEK prekey derived from an Authorization Key (AK) related to Security Association (SA) between the terminal and a Base Station (BS). A nonce is constructed with a Packet Number (PN) identical to an uplink CMAC PN (CMAC-PN_U) transmitted together with a Ranging Request (RNG-REQ) message carrying the short data burst The short data burst is encrypted using the TEK and the nonce. A Medium Access Control (MAC) Protocol Data Unit (PDU) is generated by attaching a MAC header and a CMAC digest for integrity protection to the RNG-REQ message carrying the encrypted short data burst. The MAC PDU is transmitted to the BS.05-08-2014
20140133655SECURE COMMUNICATION METHOD - A first computing device receives over a telecommunications network from a second computing device a verification message encrypted using a public key. The verification message is generated by the second computing device when initiating a call to the first computing device. The first computing device transmits to a wireless router via a wireless local area network (WLAN) created by the wireless router, the encrypted verification message. The first computing device receives from the wireless router over the WLAN, a decrypted verification message decrypted from the encrypted message by the wireless device using a private key associated with the public key. The first computing device transmits over the telecommunications network to the second computing device, the decrypted verification message. If the second computing device determines that the decrypted verification message corresponds to the encrypted verification message, the second computing device allows the call to the first computing device to proceed.05-15-2014
20140133656Preserving Security by Synchronizing a Nonce or Counter Between Systems - Methods, systems and devices enable synchronizing obscured identification information between a wireless identity transmitter and a central server to support one-way communication of the obscured identification information to the central server. The wireless identity transmitter may be a compact device configured to broadcast messages, such as through Bluetooth® advertisements, including an obscured identifier for receipt and relay to the central server by proximate proximity broadcast receivers via sighting messages that may also include location information. The central server may decode received identification codes to identify the wireless identity transmitter. The wireless identity transmitter may create message data by concatenating identifying information with an incrementing nonce, encrypting the concatenated information, and truncating the encrypted information. Alternatively, concatenated identification information may be encrypted with a pseudo-random function and a secret key known by the central server. The central server that may compare received data to pre-calculated encrypted data.05-15-2014
20140140509METHODS FOR PROVISIONING UNIVERSAL INTEGRATED CIRCUIT CARDS - A system is described that can perform a method for receiving a request to modify a universal integrated circuit card, generating a package comprising configuration data for modifying the universal integrated circuit card, instructing an over-the-air system to transmit the package encrypting the package with a transport key to generate an encrypted package, and transmitting the encrypted package to a communication device communicatively coupled to the universal integrated circuit card to provision the universal integrated circuit card. The system can also perform a method of providing a mobile network operator trusted service manager system information relating to the configuration data to enable the mobile network operator trusted service manager system to manage content and memory allocation of the universal integrated circuit card.05-22-2014
20140140510METHOD FOR GENERATING CONSISTENT CRYPTOGRAPHIC KEY BASED ON WIRELESS CHANNEL FEATURES - The present invention discloses a method for generating a consistent cryptographic key based on wireless channel features. First of all, channel estimated values ĥ05-22-2014
20140153722RESTRICTING USE OF MOBILE SUBSCRIPTIONS TO AUTHORIZED MOBILE DEVICES - An authentication capability is depicted and described. A user device (UD) attempts to attach to a network. The UD includes a mobile equipment (ME) portion and a network authentication module (NAM) having a mobile subscription associated therewith. The network has a network device associated therewith. Cryptographic processing of an authentication challenge parameter is performed on both the network device and the ME of the UD in order to generate a modified authentication challenge parameter. The network device uses the modified authentication challenge parameter to compute one or more parameters related to authentication. The ME of the UD provides the modified authentication challenge parameter to the NAM of the UD, which uses the modified authentication challenge parameter to compute one or more parameters related to authentication. The authentication capability supports authentication of the mobile subscription of the NAM of the UD when the UD attempts to attach to the network.06-05-2014
20140153723SYSTEM FOR PROVIDING PHYSICAL LAYER SECURITY - Systems, devices, and methods of physical layer security are disclosed. One such device includes a physical layer security module and a physical layer processing module. The physical layer security module is operable to transform user data in accordance with security characteristics. The physical layer processing module is operable to process the transformed data into a format suitable for the communication channel and further operable to transmit the processed data onto the communication channel. The security characteristics of the physical layer security module are such that decoding the intercepted user data by the eavesdropper results in a bit error rate of about one-half.06-05-2014
20140153724DATA PROCESSING METHOD, SENSOR DEVICE, AND USER TERMINAL - A data processing method performed by a sensor device, includes displaying identification information of the sensor device, and encrypting data measured by the sensor device based on the identification information. The method further includes transmitting the encrypted data to a user terminal.06-05-2014
20140161258AUTHENTICATION SERVER, MOBILE TERMINAL AND METHOD FOR ISSUING RADIO FREQUENCY CARD KEY USING AUTHENTICATION SERVER AND MOBILE TERMINAL - A method of for issuing a radio frequency (RF) card key of an authentication server is disclosed. The method includes receiving an encrypted serial number of a smart card from a mobile terminal, decrypting the encrypted serial number, extracting an RF card key corresponding to the decrypted serial number, encrypting the RF card key, and transmitting the encrypted RF card key to the mobile terminal.06-12-2014
20140169560ENHANCED WIRELESS COMMUNICATION SECURITY - Systems, methods, and devices are directed to an electronic device that includes a first wireless communication module configured to facilitate transmission and reception of data via a wireless communication link and a first secure element while a wireless communication device includes a processor, an operating system executed by the processor, a second wireless communication module configured to facilitate transmission and reception of data via the wireless communication link, and a second secure element. The second secure element exchanges information with the first secure element via the wireless communication link to establish a secure channel within the wireless communication link, and the wireless communication device employs logic configured to route the data to the second secure element for processing prior to forwarding the data to the operating system, upon establishing the secure channel.06-19-2014
20140169561Authentication and Data Security for Wireless Networks - A method and apparatus of providing a security system. The method includes the steps of a registering sensor having a secret key and an IEEE or MAC address automatically forming a commissioning key, the registering sensor forming a registration request including the IEEE or MAC address and the commissioning key, a co-ordinator sensor receiving the wireless request for registration from the registering sensor, the co-ordinator sensor having a separate copy of the secret key, the co-ordinator sensor automatically authenticating the registering sensor via the received request for registration and the separate copy of the secret key and the registering sensor joining the co-ordinator sensor of the wireless network under the 6LoWPAN operating protocol.06-19-2014
20140169562METHOD AND SYSTEM FOR DYNAMICALLY ESTABLISHING ENCRYPTED TUNNELS ON CONSTRAINED-BAND NETWORKS - A method and a system architecture making it possible to establish in a dynamic manner one or more encrypted tunnels on constrained-band communication networks is provided. It makes it possible in particular to encrypt one or more data streams while guaranteeing the quality of services on the constrained-band systems, in particular for encrypted streams of voice over IP type (Internet protocol) or of data type. These tunnels are thus adapted most suitably to the useful data streams while making it possible to control and assign the necessary values for the quality of service or QoS on these networks.06-19-2014
20140169563METHOD FOR ENSURING MEDIA STREAM SECURITY IN IP MULTIMEDIA SUB-SYSTEM - A method for ensuring media stream security in an IP Multimedia Subsystem network is disclosed. The method includes: assigning an end-to-end media stream security key for a calling User Equipment (UE) or a called UE, by a network device with which the calling UE or the called UE is registered, respectively, and transmitting the media stream security key to a network device with which the opposite end is registered; encrypting the end-to-end media stream security key using a session key shared with the calling UE or the called UE respectively, and transmitting the encrypted end-to-end media stream security key to the calling UE or the called UE, respectively, via a session message; encrypting or decrypting a media stream, by the calling UE or the called UE, respectively, using the end-to-end media stream security key.06-19-2014
20140169564METHOD AND SYSTEM FOR SECURE AND AUTHORIZED COMMUNICATION BETWEEN A VEHICLE AND WIRELESS COMMUNICATION DEVICES OR KEY FOBS - A system is provided that includes a wireless communication device (or end device), a vehicle having a central module, and a key provisioning server. The key provisioning server is communicatively coupled to the wireless communication device and the central module via wireless connections. The central module can establish a wireless connection with the wireless communication device to initiate a current communication session. When the wireless connection is established with the central module, the wireless communication device communicates a request message to request temporary security information (e.g., public key and/or a digital certificate). The key provisioning server can then provide, in response to the request message, the temporary security information to the wireless communication device and/or the central module. The temporary security information can then be used to encrypt communications between the wireless communication device and the central module.06-19-2014
20140169565METHODS, APPARATUS AND COMPUTER PROGRAMS FOR SCRAMBLING CODE SIGNALLING - Methods, apparatus and computer readable storage media are provided herein for scrambling code signalling in support of interference cancelling receivers. In some example embodiments, a method is provided that includes receiving scrambling code initialization parameters for at least one wanted codeword and for at least one interfering codeword from a base station. The method of this embodiment may also include detecting the at least one wanted codeword and the at least one interfering codeword in a transmission that is received from a base station. The method of this embodiment may also include decoding the at least one wanted codeword and the at least one interfering codeword. In some example embodiments, the decoded at least one interfering codeword is used in at least one of interference detection or interference cancellation.06-19-2014
20140169566SYSTEM AND METHOD FOR ENHANCED RFID INSTRUMENT SECURITY - A system and method for using an RFID read/write device to secure an RFID operable instrument or an RF communication is provided. The invention includes security databases in communication with a processor for storing and communicating security protocols to the RFID read/write device. The invention includes a method for restricting the unauthorized use of an RFID read/write device. The invention includes a subscription service for communicating user credentials to a certificate authority to obtain a counter security protocol. The invention also includes decrypting information stored on an RF operable device or transmitted via radio-frequency using counter security protocols.06-19-2014
20140177840Cellular Backhaul Load Distribution - A mobile carrier may selectively offload backhaul data traffic between cell sites and the core network to existing alternative relay networks to increase available backhaul bandwidth to meet higher data traffic demands without adding additional network ‘infrastructure. Data traffic may be offloaded from a cellular network to the alternative relay network based on at least one of a bandwidth capacity of the alternative relay network, a bandwidth availability of the alternative relay network, or a data class of the data. The amount of data that is offloaded to the alternative relay network may then be adjusted based on a blocking probability that is calculated for the alternative relay network.06-26-2014
20140177841SYSTEM AND METHOD FOR USER-PRIVACY-AWARE COMMUNICATION MONITORING AND ANALYSIS - Methods and systems for monitoring, analyzing and acting upon voice calls in communication networks. An identification system receives monitored voice calls that are conducted in a communication network. Some of the monitored voice calls may be conducted by target individuals who are predefined as suspects. In order to maintain user privacy, the system selects and retains only voice calls that are suspected of being conducted by predefined targets. The techniques disclosed herein are particularly advantageous in scenarios where the network identifiers of the terminal used by the target are not known, or where the target uses public communication devices. In accordance with the disclosure, content-based identifiers such as speaker recognition or keyword matching are used.06-26-2014
20140185805Securely Exchanging Cipher Keys - Methods and systems for securely exchanging cipher keys between an implantable device and an external device are described. An example method includes: receiving an authorization request from the external device, wherein the authorization request is a request to receive a first cipher key of a cipher key exchange; receiving an indication that a magnet is detected relative to the implantable device, wherein the indication signifies a secure environment for communication between the implantable device and the external device; and after receiving the authorization request and the indication of a detected magnet, generating a first cipher key transmittal instruction, wherein the first cipher key transmittal instruction instructs the first cipher key to be transmitted to the external device by the implantable device.07-03-2014
20140185806SECURE SHORT MESSAGE SERVICE (SMS) COMMUNICATIONS - Embodiments of the present disclosure provide systems and methods for secure Short Message Service (SMS) communications. According to an embodiment, a method of providing secure Short Message Service (SMS) communications comprises requesting that SMS data to be sent from a client device to a remote location be encrypted. The method also comprises encrypting the SMS data by processing the SMS data with a Message Authentication Code (MAC) and a timestamp and/or counter along with second factor authentication information. The method further comprises sending the encrypted SMS data to the remote location by a secure SMS application via a regular SMS channel of the client device.07-03-2014
20140185807DELEGATION BASED MOBILITY MANAGEMENT - A method of handling mobility-related signalling in a communications system comprising a mobile node, a mobile router, and a peer node. The method comprises providing the mobile router with a delegation certificate that is cryptographically signed by or on behalf of the mobile node. At the mobile router, a mobility-related signalling exchange is initiated with the peer node on behalf of the mobile node, the mobile router providing to the peer node within this exchange, said delegation certificate or an identification of the certificate, and a sequence number associated with the certificate. At the peer node, the received sequence number is compared with a sequence number maintained by the peer node in respect of the delegation certificate, and the exchange authorised in dependence upon the result of the comparison.07-03-2014
20140192984RECOVERY FROM DECRYPTION ERRORS IN A SEQUENCE OF COMMUNICATION PACKETS - A method in a receiver includes receiving from a transmitter a sequence of communication packets, which carry data encrypted with an encryption scheme. The encryption scheme depends on a counter value that is incremented independently by each of the transmitter and the receiver. Attempts are made to decrypt the data of a received packet multiple times using different, respective counter values, to produce multiple respective decrypted outputs. A decrypted output in which the data has been decrypted correctly is identified, the counter value is corrected, and the data of the received packet is recovered from the identified decrypted output.07-10-2014
20140198915Method and Apparatus for Selective Communication Signal Deciphering - Selective deciphering of a received signal, as taught herein, provides a number of advantages, including greater efficiency through the elimination or at least reduction of wasted decoding cycles. The technique, such as practiced in a user equipment or other wireless communication device, capitalizes on the advantageous recognition herein that the demodulation results obtained for at least some types of received data blocks may be inspected or otherwise evaluated for characteristic patterns that are indicative of whether the data block was or was not ciphered for transmission. That evaluation informs the selective deciphering decision.07-17-2014
20140205096UN-CIPHERED NETWORK OPERATION SOLUTION - The present invention relates to a solution for handling security issues of non access stratum (NAS) signaling in a telecommunications network. The NAS signaling is performed between a user equipment (UE) and a mobility management node, e.g. a mobility management entity (MME). The solution is realized in a device and in a method comprising steps of receiving an initial non access stratum message from the UE communicating wirelessly with the telecommunications network, determining security context status for the UE, determining if un ciphered mode is to be used in the security context, set ciphering algorithm to a null ciphering algorithm, transmitting a security context and activation message to the UE, comprising information indicating ciphering algorithm, and receiving a security context activation acknowledge message from the UE.07-24-2014
20140205097LOCATION BROKERING FOR PROVIDING SECURITY, PRIVACY AND SERVICES - Location brokering technique embodiments are presented that employ sensor data captured by a user's mobile device to determine the device's location, encrypt the location data and store it in a database. The location data is encrypted in such a way that it is possible to determine when a user's mobile device is currently in the same vicinity as another user's mobile device who is a member of the same group as the first user. However, the actual location and relative mobility or immobility of the users cannot be ascertained except by the users themselves via a decryption procedure or by trusted components. Services are provided can read the stored encrypted location data, processes it to determine if group members are in the same vicinity, and either respond to user queries about the location of other members of a group the user belongs to, or push this information to appropriate users.07-24-2014
20140205098ADDING RANDOMNESS INTERNALLY TO A WIRELESS MOBILE COMMUNICATION DEVICE - An electronic device is provided with an integral transducer used to update a random data pool without connection to an external source of new random data. In one embodiment, there is provided a method for providing random data on an electronic device, the method comprising: storing random data in a random data pool in a memory; sensing motion of the electronic device using a transducer integrally carried as part of the electronic device, wherein the transducer is configured to generate an output in response to sensed motion; generating new random data in accordance with the output of a transducer when sensed motion exceeds a threshold; and storing the new random data in the random data pool in the memory.07-24-2014
20140219449LPI/LPD Communication Systems - A node in a first network requests a communication channel from a second network. Upon receiving a channel assignment, nodes in the first network employ the assigned channel for communicating in a manner that is transparent to the second network. A transmitting node selects a decoy data signal as a carrier signal, synthesizes data-bearing channel distortions; and distorts the carrier signal with the channel distortions prior to transmission. An undistorted version of the decoy data may be transmitted to an intended receiver. The receiver distinguishes between the synthesized data-bearing channel distortions and natural channel distortions to decrypt the data. In a MIMO system, the transmitter generates a MIMO precoding matrix from a message to be sent to the receiver and multiplies the decoy data signal vector with the MIMO precoding matrix.08-07-2014
20140219450WIRELESS SENSOR NETWORK AND CENTRAL NODE DEVICE THEREOF - The invention is directed to a wireless sensor network system. The wireless sensor network system is adapted for a medication information security environment, and the wireless sensor network system comprising a first sensor node, a second sensor node and a central node. The first sensor node sends a request for registration and a user identification. The central node generates and stores a first set of random number and a second set of random number when receiving the request for registration and the user identification. The central node sends the first set of random number and the second set of random number to the first sensor node and the second sensor node respectively.08-07-2014
20140219451ADAPTIVE SECURITY APPARATUS AND METHOD FOR UPDATING SECURITY PARAMETER - An adaptive security apparatus is arranged for updating a security parameter in a database. The adaptive security apparatus includes a message receiver, a data processor, a security processor, and an adaptive parameter processor. The message receiver is arranged for receiving a message. The data processor is arranged for receiving the message from the message receiver and a security parameter from the database. The security processor is arranged for performing a deciphering process and a decoding process according to an output of the data processor. The adaptive parameter processor is arranged for updating the security parameter. Besides, an adaptive security method arranged for adaptively updating a security parameter includes: checking a status of a deciphering process and accordingly generating a checking result; and referring to the checking result to adaptively search a target pattern of the security parameter from a plurality of candidate patterns.08-07-2014
20140219452AUTHENTICATION OF A CHEMICAL SENSOR IN A PORTABLE ELECTRONIC DEVICE - A chemical sensor (08-07-2014
20140219453SYSTEM AND METHOD FOR NFC PEER-TO-PEER AUTHENTICATION AND SECURE DATA TRANSFER - A reader device may generate a first identifier. The reader device may transmit the first identifier to a mobile device. The reader device may receive encrypted data and unencrypted data from the mobile device in which the encrypted data includes a second identifier. The reader device may evaluate whether the first identifier and the second identifier correspond to one another.08-07-2014
20140233734RESTRICTING BROADCAST AND MULTICAST TRAFFIC IN A WIRELESS NETWORK TO A VLAN - Traffic broadcast to a VLAN is restricted. To do so, a plurality of stations are associated with a BSSID (basic service set identifier). A first VLAN is configured by sending a first group key to each station from the plurality of stations that is a member of the first VLAN, wherein each VLAN is associated with a unique group key. One or more frames addressed to the first VLAN are received. The one or more frames are encrypted with the first group key to prevent stations without the first group key from being able to decrypt the one or more frames. The one or more encrypted VLAN frames are broadcast to the plurality of stations associated with the BSSID.08-21-2014
20140233735ENCRYPTION METHOD, DECRYPTION METHOD, AND RELATED APPARATUS - Embodiments of the present application provide an encryption method, a decryption method, and a related apparatus. The encryption method includes: generating a keystream, where the keystream is used to encrypt a part of data to be encrypted in an initial layer-3 message, and the part of data to be encrypted includes small data; generating, by performing an exclusive OR operation on the keystream and the initial layer-3 message, an initial layer-3 message in which the part of data is encrypted; and sending the initial layer-3 message in which the part of data is encrypted, where the initial layer-3 message includes an added encryption indication, and the encryption indication is used to indicate that the part of data to be encrypted in the initial layer-3 message is encrypted.08-21-2014
20140233736METHOD AND RELATED DEVICE FOR GENERATING GROUP KEY - Embodiments of the present invention provide a method and a related device for generating a group key. The method includes: obtaining a group ID of a group where a machine type communication MTC device is located; obtaining a group communication root key corresponding to the group ID; generating a group key corresponding to the group ID according to the group communication root key; and sending the group key encrypted by using an access stratum key of the MTC device to the MTC device, so that the MTC device obtains the group key through decryption according to the access stratum key of the MTC device. According to the foregoing technical solutions, a base station may allocate, to an MTC device, a group key corresponding to a group where the MTC device is located.08-21-2014
20140247941SELF-CONFIGURING WIRELESS NETWORK - Methods, systems, and apparatus, are provided for wireless networking. In some implementations, a self-configuring wireless system includes one or more wireless network devices; and an access point device, wherein the one or more wireless network devices are each preconfigured with a respective key, and wherein the access point device is configured to obtain the respective keys so as to enable the access point device to establish a secure wireless network with the one or more network devices using the respective keys upon powering up the access point device and the one or more wireless network devices at a user location.09-04-2014
20140247942METHODS AND APPARATUSES TO SECURE DATA TRANSMISSION IN RFID SYSTEMS - Methods and apparatuses to secure data transmission in a radio frequency identification (RFID) system against eavesdropping, using multiple communication channels. In one embodiment, a method includes communicating key information and cipher text generated based on the key information, or plain text, using a plurality of different, distinct and separate communication channels connected to an RFID tag.09-04-2014
20140254799SYSTEMS AND METHODS FOR SECURE HIGH-SPEED LINK MAINTENANCE VIA NFC - Systems, methods, and devices for communicating with a second apparatus in a wireless communications network are described herein. In some aspects, a first wireless communication unit is configured to communicate with the second apparatus via a first wireless protocol. The first wireless communication unit may transmit a first message to the second apparatus. A second wireless communication unit is configured to communicate with the second apparatus over a communication link via a second wireless protocol. The second wireless communication unit may be further configured to disconnect the communication link if the first wireless communication unit does not receive a second message from the second apparatus within a predetermined amount of time after transmission of the first message.09-11-2014
20140254800High-Security Outdoor Wireless Communications Bridge - An appliance for transmitting and receiving encrypted wireless network signals, preferably, in a 900 MHz band, includes a radio frequency module, coupled to a cryptographic module, which, in turn is coupled to an Ethernet interface module and a power-over-Ethernet splitter. The components are affixed to a thermally conductive substrate that is mounted to the floor of a chamber defined by a thermally conductive housing.09-11-2014
20140270172SECURING A COMMAND PATH BETWEEN A VEHICLE AND PERSONAL WIRELESS DEVICE - A system and a method using that system is provided for establishing a secure communication channel between a vehicle and a mobile device. The method may include providing at least one unique mobile device identifier and at least one unique vehicle telematics unit identifier associated with the mobile device identifier to a call center. At least one of the two identifiers may be provided to a wireless service provider. Two private keys may be generated—a first private key based on the at least one unique mobile identifier and a second private key based on the at least one unique vehicle telematics unit identifier. The first private key may be provided to the mobile device within a first cryptographic envelope signed with a first cryptographic key. And the second private key may be provided to the vehicle telematics unit within a second cryptographic envelope signed with a second cryptographic key.09-18-2014
20140270173PERSONAL DIGITAL IDENTITY DEVICE RESPONSIVE TO USER INTERACTION - A personal digital ID device provides a digital identifier to a service for a predetermined duration in response to user interaction. The user interaction may include a button press. The personal digital ID device may be in the form of a bracelet, a key fob, or other form factor. The service may be provided by a mobile device, in the cloud, or elsewhere.09-18-2014
20140270174PERSONAL DIGITAL IDENTITY DEVICE RESPONSIVE TO USER INTERACTION WITH USER AUTHENTICATION FACTOR CAPTURED IN MOBILE DEVICE - A personal digital ID device provides a digital identifier to a service for a predetermined duration in response to user interaction. The user interaction may include a button press. The personal digital ID device may be in the form of a bracelet, a key fob, or other form factor. The service may be provided by a mobile device, in the cloud, or elsewhere.09-18-2014
20140270175PERSONAL DIGITAL IDENTITY DEVICE WITH IMAGER - A personal digital ID device provides a digital identifier to a service for a predetermined duration in response to user interaction. The user interaction may include a button press. The personal digital ID device may be in the form of a bracelet, a key fob, or other form factor. The service may be provided by a mobile device, in the cloud, or elsewhere.09-18-2014
20140270176ENVIRONMENTAL MONITORING DEVICE - An environmental monitoring device that monitors the operation of a legacy electronic device is described. In particular, a sensor in the environmental monitoring device provides sensor data that represents an environmental condition in an external environment that includes the environmental monitoring device. This environmental condition is associated with the operation of the legacy electronic device in the external environment. The environmental monitoring device analyzes the sensor data and provides feedback about the operation of the legacy electronic device based on the analyzed sensor data. Moreover, the sensor provides the sensor data without or excluding communication and/or electrical coupling between the environmental monitoring device and the legacy electronic device. In this way, the environmental monitoring device facilitates monitoring, analysis and feedback of the sensor data without directly interacting with the legacy electronic device.09-18-2014
20140286490RADIO COMMUNICATION APPARATUS - An inexpensive radio communication apparatus is provided which can safely generate and share a key to be used for encryption/decryption and lower the possibility of loss of the key even if a packet error occurs at the time of reestablishment of a radio link. When a request for position registration that is made to a base unit is not a request made by encrypted communication using a common encryption key, the base unit transmits a message to request generation of an initial encryption key, and when a handset correctly responds to the message, both the base unit and the handset store information on the initial encryption key.09-25-2014
20140286491RADIO FREQUENCY IDENTIFICATION TECHNOLOGY INCORPORATING CRYPTOGRAPHICS - Disclosed is a radio frequency identification (RFID) tag comprising: an RFID functional portion configured to enable wireless communication between the RFID tag and an RFID reader; a data processing functional portion with asymmetric cryptographic capability; and a power source configured to power the data processing functional portion.09-25-2014
20140286492Access Techniques Using a Mobile Communication Device - Access techniques using a mobile communication device are described. In implementations, a mobile communication device comprises a processor, hardware configured to implement multi-mode wireless communication in which at least one of the modes involves telephone communication, tamper-resistant hardware implementing a secure element as storing one or more credentials, and memory having instructions stored therein. The instructions are executable by the processor to cause the mobile communication device to perform operations comprising forming a communication having data that was generated using the one or more credentials stored in the secure element, the communication to be transmitted wirelessly using the hardware implementing the multi-mode wireless communication to initiate function of a physical lock or vehicle.09-25-2014
20140294179METHOD AND APPARATUS FOR CIPHERING PACKET UNITS IN WIRELESS COMMUNICATIONS - A method and apparatus are disclosed relating to ciphering and de-ciphering of packet units in wireless devices during retransmission in wireless communications. The packet units are re-segmented with the ciphering done on the re-segmented packet unit or on a radio link control protocol data unit (RLC PDU) with or without segmentation. Alternatively, the re-segmentation is done on the radio link control service data unit (RLC SDU) with or without segmentation. Alternatively, the ciphering process and multiplexing of the RLC PDU is done in the medium access control (MAC) layer of a MAC PU before undergoing a hybrid automatic repeat request (HARQ) process for retransmission. Further, the ciphering process in the RLC is done on a packet data convergence protocol packet data unit (PDCP PDU).10-02-2014
20140294180Personal Assistance Safety Systems and Methods - Disclosed are methods and systems related to a Personal Assistance Safety System. In one aspect, disclosed are methods and systems for vehicle communications comprising an antenna selecting unit configured to select an antenna according to an antenna selection strategy and a first antenna switch coupled to the antenna selecting unit configured to direct communications through the selected antenna.10-02-2014
20140301551Method and apparatus to provide authentication and privacy with low complexity devices - A method and apparatus to provide a cryptographic protocol for secure authentication, privacy, and anonymity. The protocol, in one embodiment, is designed to be implemented in a small number of logic gates, executed quickly on simple devices, and provide military grade security.10-09-2014
20140301552METHOD FOR WIRELESS LOCAL AREA NETWORK (WLAN)-BASED PEER TO PEER (P2P) COMMUNICATION AND APPARATUS FOR SAME - Abstract: The present invention relates to a wireless communication system. More particularly, the present invention relates to a method for performing WLAN-based P2P communication at the state where a P2P apparatus is connected to a cellular network and to a first P2P apparatus for the method. The method comprises: a step of receiving one or more pieces of key information from a cellular base station, each piece of key information including a key value corresponding to service identification information; a step of receiving an encryption data signal from a second P2P apparatus; and a step of performing a process of attempting to decrypt said encrypted data signal using one or more keys corresponding to one or more services in which said first P2P apparatus is interested, from among said one or more pieces of key information.10-09-2014
20140307870Wirelessly Communicating a Data File - A method begins by a dispersed storage (DS) processing module sending a plurality of undecodeable portions of a plurality of data files via a public wireless communication network to one or more targeted devices of a private wireless communication network. The method continues with the DS processing module sending data content indicators regarding the plurality of data files and in response to a selection of a data file of the plurality of data files based on a corresponding one of the data content indicators, sending, via the private wireless communication network, one or more encoded data slices of each of one or more sets of encoded data slices of the data file such that, for each of the one or more sets of encoded data slices, the one or more targeted devices obtains at least a decode threshold number of encoded data slices to decode the data file.10-16-2014
20140307871METHOD FOR KEY ESTABLISHMENT USING ANTI-COLLISION ALGORITHM - A method for a key establishment in RFID system using an adaptive Q anti-collision algorithm, the method comprising:generating group key between a reader and a number of tags using values of Q that are changed under the adaptive Q anti-collision algorithm; and creating session keys between the reader and the tags using unique IDs of the respective tags.10-16-2014
20140307872COMMUNICATION OF SECURITY KEY INFORMATION - Technology for communicating security key information from a macro eNB is disclosed. Security key information associated with the macro evolved node B (eNB) may be determined. The security key information may be used to cipher information communicated at the first eNB. A small eNB may be identified at the macro eNB to generate the security key information associated with the macro eNB for ciphering information communicated at the second eNB. The security key information may be communicated, from the macro eNB, to the small eNB for inter-Evolved Universal Terrestrial Radio Access (EUTRA) evolved node B (eNB) carrier aggregation.10-16-2014
20140307873APPARATUS AND METHOD FOR GENERATING KEY HIERARCHY IN WIRELESS NETWORK - A method for generating a key hierarchy by a MS in a wireless network is provided. The method includes transmitting an authentication request message to a new BS, receiving an authentication response message as a response message to the authentication request message from the new BS, determining whether to perform a full authentication operation with a H3A server based on the authentication response message, performing the full authentication operation or a crypto-handshake operation with the H3A server based on the determining result, after performing the full authentication operation or the crypto-handshake operation, determining whether a first expected signature value received from the new BS is identical to a first expected signature value calculated by the MS, and if the first expected signature value received from the new BS is equal to a first expected signature value calculated by the MS, determining that an authentication for the new BS has succeeded.10-16-2014
20140307874COMMUNICATION SYSTEM, WIRELESS COMMUNICATION APPARATUS, AND COMMUNICATION METHOD - A wireless communication circuit includes a receiver to receive at least one of a beacon frame and a probe response frame from a first wireless communication apparatus belonging to a first communication group, at least one of the beacon frame and the probe response frame including first security information indicating a first encryption method. The circuit includes a transmitter to transmit an association request frame to the first wireless communication apparatus, the association request frame including second security information indicating a second encryption method which is supported by the wireless communication circuit, after a determination that the second encryption method overlaps with the first encryption method. The transmitter declines to associate with the first wireless communication apparatus if the first encryption method fails to overlap with the second encryption method. The transmitter transmits a data frame including a frame body after a reception of an association response frame.10-16-2014
20140307875METHOD AND SYSTEM FOR SECURING WIRELESS COMMUNICATIONS - A method for transmitting an encrypted signal to a wireless transmit/receive unit (WTRU) such that decryption of the encrypted signal depends on a trust zone associated with the WTRU is disclosed. The encryption may be performed using hierarchical modulation, scrambling, authentication, location validation, or a combination thereof. The size of a trust zone may also be adjusted.10-16-2014
20140314236Radio Base Station Initialization - It is presented a user equipment (10-23-2014
20140321647METHOD AND ARRANGEMENT FOR PROVIDING A WIRELESS MESH NETWORK - A method and an arrangement for providing a wire-free mesh network are provided. An approval procedure is carried out in situations in which a subscriber who is registering on the mesh network transmits an MAC address which already exists in the mesh network, such that two different subscribers within the mesh network never have identical MAC addresses.10-30-2014
20140321648METHOD AND SYSTEM FOR PROVIDING INFORMATION USING AGREEMENT PROCEDURE EXECUTED BY USING PROXIMITY COMMUNICATION - A method and system for providing information using a prior agreement procedure via proximity communication is provided. Upon receiving a request for an information providing agreement from a mobile terminal which is capable of proximity communication, the information providing method transmits the information providing agreement. Accordingly, since the mobile terminals request/allow the information providing agreement by using the proximity communication, the information leakage/exposure caused by an illegal use of other's name or identity theft can be prevented beforehand. In particular, since this process requires the users to meet face to face, the security can be further enhanced.10-30-2014
20140341379RFID AUTHENTICATION ARCHITECTURE AND METHODS FOR RFID AUTHENTICATION - A method fir mutual authentication in an RFID system comprising an RFID reader and an RFID tag, the method comprising requesting an identification from the tag, receiving the identification, using the received identification to select a password associated with the identification, generating a password key based on the selected password, encrypting the selected password using the password key, and transmitting the encrypted password to the tag.11-20-2014
20140355761WIRELESS COMMUNICATIONS SYSTEM - A wireless communications system that regularly executes verification between an electronic key and an immobilizer ECU, and sends and receives deletion request signals unrelated to verification, between the electronic key and the immobilizer ECU. The sending and receiving of deletion request signals is executed at intervals between the regularly executed verifications.12-04-2014
20140355762METHOD, APPARATUS, AND SYSTEM FOR ESTABLISHING SECURITY CONTEXT - Embodiments of the present invention discloses a method, an apparatus, and a system for establishing a security context and relates to the communications field, so as to comprehensively protect UE data. The method includes: acquiring an encryption algorithm of an access node; acquiring a root key and deriving, according to the root key and the encryption algorithm, an encryption key of the access node; sending the encryption key and the encryption algorithm to the access node, so that the access node starts downlink encryption and uplink decryption; sending the encryption algorithm of the access node to the UE so as to negotiate the encryption algorithm with the UE; and instructing the access node to start downlink encryption and uplink decryption and instructing, during algorithm negotiation, the UE to start downlink decryption and uplink encryption. The present invention mainly applies to SCC security protection.12-04-2014
20140362991METHOD OF CONNECTING AN APPLIANCE TO A WIFI NETWORK - A method of provisioning an appliance to connect to a Wi-Fi network includes a mobile device having an encryption key to enable secure communication in the network, and a means to wirelessly communicate with the appliance. A wireless communication device and a software protocol in the appliance are configured to operate in an unsecured short range configuration mode by reducing transmission power and in a long range configuration mode where transmission power is not reduced. By placing the wireless communication device into the short range configuration mode and moving the mobile device to a position within the short range to establish communication with the wireless communication device, the encryption key may be transmitted from the mobile device to the appliance via the wireless communication device without security. The wireless communication device may then be placed into the long range mode to securely connect to the Wi-Fi network.12-11-2014
20140362992Systems and Methods for Conducting Secure Wired and Wireless Networked Telephony - The present invention relate to systems and methods for conducting secured telephony and transaction authentication via electronic devices. More specifically, the embodiments of the present invention relate to systems and methods for conducting secure networked telephony, including but not limited to communications over the internet, other computer networks, wired or wireless networks, or audio, video or multi-media.12-11-2014
20140362993METHOD AND APPARATUS FOR WIRELESS COMMUNICATION USING AN ACOUSTIC SIGNAL - Systems, apparatuses, and methods for securing wireless communication using an acoustic signal are described. In one method involving a first and second device, the second device generates, when connecting to the first device, connection initiation information including key information for secure communication, converts the connection initiation information to an acoustic signal, and transmits the acoustic signal to the first device through an acoustic communication channel. Then the second device monitors a radio wireless channel, which is secured using the key information for secure communication, to determine whether a valid response is received from the first device and, upon receipt of the valid response, discontinues transmission of the acoustic signal and begins communicating with the first device securely on the radio wireless channel.12-11-2014
20140376721WIRELESS CONFIGURATION USING PASSIVE NEAR FIELD COMMUNICATION - A system comprises an access point and a client device. The access point receives, using near field communication (NFC) technology, a public key associated with the client device and sends, using NFC technology, a public key associated with the access point. The access point further encrypts configuration data associated with a network and sends the encrypted configuration data to the client device. The client device receives, using NFC technology, a command indicating that a public key associated with the client device is to be sent to the access point and sends, using NFC technology, the public key to the access point. The client device further receives, using NFC technology, a public key associated with the access point and configures the client device to wirelessly connect to a network associated with the access point.12-25-2014
20140376722ACCESSING LOCAL APPLICATIONS WHEN ROAMING USING A NFC MOBILE DEVICE - A method of accessing local applications when roaming on a NFC mobile device may include creating a first partition and a second partition on a secure element (SE) of a subscriber identification module (SIM) of a near field communication (NFC) enabled device. The home TSM separates the first partition and the second partition by public key encryption. The home TSM generates cryptographic keys in response to a request by a roaming TSM for access to the second partition of the SIM. Following the exchange of security keys, the home TSM delegates to the roaming TSM access to the second partition of the SIM.12-25-2014
20150010153METHOD AND APPARATUS FOR ATTACK RESISTANT MESH NETWORKS - A method, apparatus, and system for improved approaches for allowing new links of a mesh network to be formed during an attack of the network are described. The method includes selectively initiating a plurality of communication session establishment procedures to share connection information over a plurality of respective paths with a node of a mesh network, at least one of the paths being separated from the mesh network, wherein the connection information is used to establish one link of the mesh network.01-08-2015
20150016611Method of Handling Data Transmission and Reception in Device to Device Communication in Wireless Communication Systems - A method of handling data transmission and reception in device to device communication for a first communication device in a wireless communication system is disclosed. The method comprises connecting to a network of the wireless communication system, using a first ciphering key to cipher a first plurality of data blocks in a communication path corresponding to the second communication device, wherein the communication path is used for transmitting the first plurality of data blocks to the second communication device and is not traversing the network, being configured to release the communication path by the network, and using a second ciphering key different to the first ciphering key to cipher a second plurality of data blocks in a connection corresponding to the network, wherein the second plurality of data blocks include data transmitted to the second communication device.01-15-2015
20150023502COMMUNICATING RF FINGERPRINT-BASED GEOFENCES - Systems, apparatus and methods for communicating and using a geofence while maintaining privacy are presented. A geofence is based on at least one RF fingerprint. The RF fingerprints include absolute information that is transformed into a one-way matrix (A) by application of a one-way function. The absolute information may identify a transmitter (e.g., by location, address or the like). An equation 0=Ax (where 0 is a zero vector, A is the one-way matrix and x is a signature vector) is solved to reveal one possible solution for the signature vector (x). This signature vector (x) is communicated rather than the RF fingerprints themselves, thus obscuring the absolute information and maintaining privacy.01-22-2015
20150023503APPARATUS AND METHOD FOR TRANSMITTING SECURE DATA IN WIRELESS COMMUNICATION SYSTEM - An apparatus and method for transmitting secure data in a wireless communication system are provided. The apparatus includes a key generation unit, and a transmission and reception unit. The key generation unit generates an encryption key stream that is used to convert plain text data into an encrypted data signal. The transmission and reception unit obtains wireless channel state information from a received pilot signal and transmits the obtained wireless channel state information to the key generation unit, and encrypts the plain text data based on the encryption key stream and transmits the encrypted plain text data to a counterpart terminal over a wireless channel. The key generation unit generates the encryption key stream based on the wireless channel state information, and transmits the encryption key stream to the transmission and reception unit.01-22-2015
20150030156MULTI-FACTOR CALLER IDENTIFICATION - A method and apparatus for authenticating directory information is described. The method includes: receiving a request to initiate a voice communication session over a signaling network that includes a data network, the request including directory information specifying origination of the voice communication session; determining verification information associated with the directory information; authenticating the directory information using the determined verification information; and selectively providing notification of the authentication for handling of the voice communication session.01-29-2015
20150030157TECHNIQUES FOR TRUSTED LOCATION APPLICATION AND LOCATION PROVIDER COMMUNICATIONS - Various embodiments are generally directed to techniques for conveying location information between a location provider and a trusted location application within a mobile device through trusted communications to preclude its provision to an untrusted location application. An apparatus includes a processor component; and a location provider for execution by the processor component comprising a location baseband to determine a current location in a venue based on wireless signals received from a location network of the venue, a verification component to verify a trusted location application associated with the venue based at least on credentials received from the trusted location application, and an encryption component to encrypt location information indicating the current location and convey the location information to the trusted location application through a location manager interposed between the location provider and the trusted location application based on verification of the trusted location application. Other embodiments are described and claimed.01-29-2015
20150030158SENSOR NETWORK, SENSOR MANAGEMENT SERVER, KEY UPDATING METHOD AND KEY UPDATING PROGRAM - A sensor network includes a sensor management server which is mutually connected with many sensor terminals. The sensor management server includes: a key delivery module for transmitting a key update message to the respective sensor terminals; a communication volume detection module for detecting a communication volume used for transmitting the key update message; and a multiplicity determination module for specifying a numerical value as a multiplicity, which represents the lower limit number of key update messages transmitted to the respective sensor terminals, according to the detected communication volume. The multiplicity determination module specifies the multiplicity such that the communication volume for transmitting or retransmitting the key update message takes the minimum value, and the key delivery module transmits the key update message by using the minimum communication volume that corresponds to the specified multiplicity.01-29-2015
20150036821Physical Layer Encryption for MIMO Communication Networks - Systems and methods are provided for encrypting a data transmission from a base station at the physical layer, such that the data transmission can only be decoded successfully by an intended UE. In an embodiment, a desired signal component, including a data signal for an intended UE, is combined with an interference component to generate a signal for transmission. The interference component is designed such that it falls in a null space of the channel from the base station to the intended UE and is therefore not received by the intended UE. In contrast, for an unintended UE, the interference component is designed to interfere with the desired signal component at the unintended UE, preventing the unintended UE from successfully decoding the data transmission.02-05-2015
20150036822INFORMATION PROCESSING APPARATUS AND INFORMATION PROCESSING METHOD - According to at least one embodiment, an information processing apparatus includes: a content acquiring module configured to receive or store a content according to a first copyright protection method; a filter configured to acquire PIDs from first packets of the content; an analyzing module configured to acquire a PAT/PMT from each of the PIDs; a generating module configured to generate a PMT based on the PAT/PMT according to a second copyright protection method; encrypters configured to encrypt PES payloads by managing independent sets of an encryption key and an initial vector for the respective PIDs; and a packet generating module configured to generate second packets based on encryption results.02-05-2015
20150043734APPARATUS AND METHOD FOR TRANSITIONING FROM A SERVING NETWORK NODE THAT SUPPORTS AN ENHANCED SECURITY CONTEXT TO A LEGACY SERVING NETWORK NODE - Disclosed is a method for transitioning a remote station from a current serving network node having an enhanced security context to a new serving network node. In the method, the remote station provides at least one legacy key, and generates at least one session key based on a calculation using a root key and using an information element associated with the enhanced security context. The remote station forwards a first message having the information element to the new serving network node. The remote station receives a second message, from the new serving network node, having a response based on either the legacy key or the session key. The remote station determines that the new serving network node does not support the enhanced security context if the response of the second message is based on the legacy key. Accordingly, the remote station protects communications based on the legacy key upon determining that the enhanced security context is not supported.02-12-2015
20150049871SYSTEMS AND METHODS FOR IMPLEMENTING BLUETOOTH LOW ENERGY COMMUNICATIONS - Systems and methods for implementing Bluetooth Low Energy (BLE) communications are provided. In some aspects, a method includes receiving, by a first BLE device, a first advertisement packet from a second BLE device. The first advertisement packet includes a payload encrypted based on a predetermined key. The method also includes decrypting the payload of the first advertisement packet using the predetermined key. The method also includes processing, by the first BLE device, the decrypted payload. At least one of the receiving, the decrypting, or the processing is performed without a BLE connection being established between the first BLE device and the second BLE device.02-19-2015
20150055779METHOD OF SECURE COMMUNICATION, CONTROLLED DEVICE, AND CONTROL PROGRAM - A controlled device generates an authentication random number. A control device accepts input of a random number from an input device. The controlled device verifies if the displayed authentication random number and the random number transferred from the control device are identical to transfer a public key of the controlled device to the control device. The controlled device generates a token. The control device encrypts the token with the public key of the controlled device. The controlled device decrypts the token and verifies if the token transferred from the control device and the generated token are identical to generate a session key. The control device stores the session key into the storage device. The control device controlling the controlled device by encrypted communication using the session key.02-26-2015
20150063568APPARATUS AND METHOD FOR GENERATING A SEQUENCE OF ENCRYPTION KEYS FOR COMMUNICATION SECURITY IN MOBILE WIRELESS DEVICES - A random wave envelope is created from a set of bounded random numbers by additively combining a triangle, a square and a sine wave. The random wave envelope is then used to create a sequence of wave random numbers from the wave envelope, which are used to generate random-variant keys for encryption in place of the pre-placed encryption key. An ambiguity envelope is thus created over the transmission of data packets as random-variant-keys are used that are distinct and separate for each packet and may also be distinct and separate for each incoming and outgoing packet. The random-variant keys are only created at the time of the actual use for encrypting or decrypting a data packet and not before and then discarded after one time use. The random-variant keys may be used in wireless network using wireless access points, cellular phone and data networks and ad hoc mobile wireless networks.03-05-2015
20150063569Information Coding and Transmission Method Based on UDP Network Transmission Protocol - This invention discloses an information coding and transmission method that is based on UDP network transmission protocol. It consists of the following procedures: (1) define data transmitting terminal A; (2) define data transmitting terminal B; (3) data transmitting terminals A and B are pre-agreed; (4) establish mapping relationship between data transmitting terminals A and B; complete data transmission and communication according to characteristic value m. The beneficial effect of this invention lies in that implicit data transmission enables the actually transmitted data to be independent from the method of network information encryption; mapping relationship between data transmitted and actual data is pre-set by the data transmitting terminals A and B, so as to achieve strong confidentiality and enable equipment in the encrypted wireless network to send information to those outside of the network by connectionless means.03-05-2015
20150063570METHOD FOR ENSURING SECURITY AND PRIVACY IN A WIRELESS COGNITIVE NETWORK - In some embodiments, authentication, confidentiality, and privacy are enhanced for a wireless network of cognitive radios by encryption of network management and control messages as well as data traffic, thereby protecting information pertaining to node identification, node location, node-sensed incumbent transmissions, CRN frequency channel selections, and such like. During initial network registration, a temporary ID can be issued to a node, and then replaced once encrypted communication has been established. This prevents association of initial, clear-text messages with later encrypted transmissions. Elliptic curve cryptography can be used for mutual authentication between subscribers and the base station. ECC-based implicit digital certificates can be embedded in co-existence beacons used by CRN nodes to coordinate use of frequency channels, thereby preventing denial of service attacks due to transmitting of falsified beacons. Similar certificates can be embedded within identity beacons used to protect certain incumbents from interference by the CRN.03-05-2015
20150071441METHODS AND SYSTEM FOR SECURE COMMUNICATION BETWEEN AN RFID TAG AND A READER - Methods and a system involve secure communication between an RFID tag and a reader via the over-the-air interface, and to corresponding RFID tags and corresponding readers. A modification of the Rabin method is employed wherein within the framework of the encryption of a plaintext M into which an identification element of the RFID tag or of an object furnished therewith is incorporated, there is computed by the RFID tag, the Montgomery residue (Montgomery reduction) of the square of the plaintext M modulo n with respect to a Montgomery base R, i.e. C*=M03-12-2015
20150071442DATA-ENCRYPTING METHOD AND DECRYPTING METHOD FOR A MOBILE PHONE - Disclosed is a cell phone data encryption method, which comprises the steps of obtaining a PIN code which is input by a user, obtaining a SIM card code from a SIM card according to the PIN code, and combining the PIN code with the SIM card code to form a password string; and encryption source data using the password string, so as to obtain encrypted data. Also provided is a cell phone data encryption method. Through the manner mentioned above, the technical solution provided in the present invention can protect cell phone data.03-12-2015
20150071443SYSTEMS AND METHODS FOR FAST INITIAL LINK SETUP SECURITY OPTIMIZATIONS FOR PSK & SAE SECURITY MODES - Systems, methods, and devices for communicating data in a wireless communications network are described herein. In some aspects, an access point transmits a beacon to a station. The beacon comprises a Wi-Fi Protected Access II pre-sharked key (WPA2-PSK) authentication type. The access point further receives an authentication request from the station. The access point further transmits an authentication response to the station. The authentication response comprises the WPA2-PSK authentication type. The access point further retrieves a PSK and generates a PMK based on the PSK. The access point further receives an association request from the station after generation of the PMK. The association request comprises a key confirmation derived from the PSK. The access point further transmits an association response to the station in response to reception of the association request. The association response comprises the key confirmation.03-12-2015
20150071444SECURE WIRELESS CHARGING - A wireless charging apparatus and method utilizing a secure element is disclosed. Illustratively, a receiver containing a secure element securely communicates with a charging pad also equipped with a secure element. The communication can be used to establish the identity of the receiver and facilitate billing for the wireless charging. The charging pad may further communicate in a secure manner with a server to authenticate the identity and other information about the receiver before providing wireless charging. Direct communication between the receiver and server is also contemplated.03-12-2015
20150086017Secure Near Field Communication Server Information Handling System Lock - Secure NFC interactions with a server information handling system management controller, such as a baseboard management controller, are supported with an NFC application running on a mobile information handling system. A private key is applied by the mobile application to create an application hash that a baseboard management controller verifies to authorize access by the NFC application. The private key encrypts a user name and password so that the baseboard management controller decrypts the user credentials to look up access privileges in a security database. If user privileges include access to components, the baseboard management controller automatically actuates locks to provide access.03-26-2015
20150092942Security Key Generation for Dual Connectivity - Techniques for the secure generation of a set of encryption keys to be used for communication between a wireless terminal and an assisting base station in a dual-connectivity scenario. An example method includes generating (04-02-2015
20150098570APPARATUS AND METHODS FOR SEPARATED SECURITY IMPLEMENTATIONS IN WIRELESS COMMUNICATIONS - Systems, methods, and devices for communicating MPDUs having a plurality of types are described herein. One aspect of the disclosure provides a method of processing a media access control (MAC) protocol data unit (MPDU) in a wireless system. The method includes receiving the MAC protocol data unit, the MAC protocol data unit comprising an indication of a communication in accordance with a protocol version. The method further includes selecting a replay counter from one of a first and second sets of replay counters based at least in part on the indication. The method further includes processing the received MAC protocol data unit in accordance with the selected replay counter.04-09-2015
20150104017SECURE GROUP KEY AGREEMENT FOR WIRELESS NETWORKS - A method for secure key agreement among a subset of a plurality of transceivers includes generating a first ordered subset of a plurality of keys k04-16-2015
20150104018Broadcast Replenishment of Account Parameters for Groups of Wireless Devices - A system and method are provided for the broadcast replenishment of account parameters for select groups of wireless devices, where select groups of wireless devices have their internally-stored account parameters (e.g., prepaid amount of usage authorization) simultaneously updated as a group by a single broadcast message, such as an encrypted SMS message. An account update message is generated based on the account parameters to be updated and encrypted using an encryption key uniquely associated with the select group of wireless devices. The encrypted account update message is broadcast for receipt by the select group of wireless devices, such only those wireless devices previously provided with a key for decryption can receive and decrypt the broadcast account update message. The wireless devices use information and/or instructions in the broadcast message in order to update their internally stored account parameters accordingly.04-16-2015
20150104019Direct Link Setup Method, Key Updating Method and Device - A method includes transmitting, by a first station to an access point, a direct link setup request message destined for a second station, where the direct link setup request message is used to request setup of a direct link between the first station and the second station, receiving, by the first station from the access point, a direct link setup response message point, where the direct link setup response message includes a first key information, and where the first key information is used to perform a secure transmission for service data transmitted in the direct link between the first station and the second station, and transmitting, by the first station to the second station over the direct link, a first direct link setup confirm message, where the first direct link setup confirm message is used to indicate that the first station has received the first key information.04-16-2015
20150110271ELECTRIC SYSTEM - An electric system including a first wireless apparatus, a display apparatus and a second wireless apparatus is provided. A first information is encrypted to be a first encrypted information and sent wirelessly by the first wireless apparatus. The display apparatus includes a display unit and a wireless communication unit electrically connected to the display unit. The wireless communication unit receives the first encrypted information and cause the display unit to display a first representative information corresponding to the first encrypted information. The first representative information and the first encrypted information are different. The second wireless apparatus reads the first encrypted information by the wireless communication unit, and the first encrypted information is decrypted to be the first encrypted information by the second wireless apparatus.04-23-2015
20150117646SYSTEM AND METHOD FOR PERFORMING A SECURE CRYPTOGRAPHIC OPERATION ON A MOBILE DEVICE INCLUDING AN ENTROPY FILTER - In a mobile communication device, multiple sets of sensor measurement data are obtained, each from a corresponding hardware sensor resident on the device. Insufficiently random data is filtered from each of the data sets to produce random data sets which are combined to produce entropy data which is stored in an entropy data cache. An entropy pool is monitored to determine a level of entropy data available and, based on the level determined, entropy data is provided from the entropy data cache to the entropy pool. Entropy data from the entropy pool is then applied to perform a cryptographic operation such as the generation of an encryption key for encrypting communications sent or received by the mobile communication device.04-30-2015
20150117647STORYTELLING ENVIRONMENT: INTRADEVICE COMMUNICATIONS - One embodiment provides a device that includes one or more line of sight transmitters configured to transmit signals over a line of sight communications medium, one or more transmitters configured to transmit signals over another communications medium and a controller. The controller is configured to perform an operation that includes retrieving a key adapted for use in decrypting encrypted content. The operation further includes transmitting the key to a second device over the line of sight communications medium using the one or more line of sight transmitters. Additionally, the operation includes encrypting data such that the data can be decrypted using the retrieved key. The operation also includes transmitting the encrypted data to the second device over the other communications medium using the one or more transmitters, where the second device is configured to decrypt the encrypted data using the key received over the line of sight communications medium.04-30-2015
20150124966END-TO-END SECURITY IN AN IEEE 802.11 COMMUNICATION SYSTEM - A communication network comprises a front-end network communication device arranged to operate as a front-end access point for establishing at least one data connection, such as an IEEE 802.11 data connection, between at least one mobile communications terminal and at least one back-end network communication device, protected end-to-end with an encryption key unknown to said at least one front-end network communication device. The front-end network communication device includes a memory, a controller and a data port and the back-end network communication device includes a memory, a controller and a data port.05-07-2015
20150124967METHOD TO DETECT AN OTA (OVER THE AIR) STANDARD MESSAGE AFFECTED BY AN ERROR - A method is to detect a message compatible with the OTA (Over The Air) standard and affected by a wrong ciphering. The method may include receiving the ciphered OTA message; deciphering the OTA message; and reading a counter field of padding bytes in the deciphered OTA message and reading corresponding padding bytes in the OTA message deciphered. The method may also include detecting at least one bit in at least one of the padding bytes of the OTA message deciphered, with the at least one bit being indicative of the wrong ciphering.05-07-2015
20150124968SECURELY JOINING A SECURE WIRELESS COMMUNICATIONS NETWORK - Securely joining a secure wireless communications network is described, for example, where a printer or other device is securely added to a home wireless network. In various embodiments, a temporary wireless network is established between a new joiner device and a second wireless communications device which is already a member of a secure home wireless network. In an example, the temporary wireless network is set up using a secret key known to the new joiner device and the second wireless communications device by virtue of physical proximity. In various examples, the secure, temporary wireless network is used to transfer credentials of the secure home network to the new joiner device which then joins the home network. In an example the temporary wireless network is cancelled once the new joiner device becomes a member of the secure home (or other) wireless network.05-07-2015
20150131797EXECUTING ELECTRONIC CONTRACT ON NFC ENABLED MOBILE DEVICES - A method, system and/or NFC (Near field communication) enabled mobile device is provided for executing an electronic contract on NFC enabled mobile devices. A first contracting party is provided to apply an electronic signature thereof in an electronic contract provided on a first NFC enabled mobile device used by the first contracting party, the electronic signature is applied through a secure element of the first NFC enabled mobile device. The electronically signed contract is transmitted from the first NFC enabled mobile device to a second NFC enabled mobile device used by a second contracting party for providing the second contracting party to apply an electronic signature thereof in the received electronically signed contract from the first NFC enabled mobile device through a secure element in the second NFC enabled mobile device.05-14-2015
20150131798Enabling Packet Handling Information in the Clear for MACSEC Protected Frames - Techniques are provided to append packet handling information “in the clear” ahead of security related information in a packet to be routed over a network to optimize wide area network deployments of security-configured equipment. In one form, at a network device that performs connectionless secure communication and network routing of packets, data is received from a source device to be sent through a network to a destination device. Packet handling information is inserted in a packet that is to be used to transport the data. The packet handling information is configured to enable controlled handling of the packet in the network and is inserted in an unprotected portion of the packet. Encrypted payload data is generated from the data received from the source device. The encrypted payload data and security information are inserted in a protected portion of the packet and the packet is sent to the network.05-14-2015
20150139422METHOD AND APPARATUS FOR PROVIDING BROADCAST CHANNEL ENCRYPTION TO ENHANCE CELLULAR NETWORK SECURITY - A method, computer-readable storage device and apparatus for encrypting a broadcast message of a base station are disclosed. For example, the method selects an encryption key for the broadcast message and encrypts the broadcast message using the encryption key to create an encrypted broadcast message. The method then transmits an identifier of the encryption key and transmits the encrypted broadcast message over a broadcast channel. A method for decrypting a broadcast message that is encrypted is also disclosed.05-21-2015
20150139423PROTECTION FOR A MEANS OF TRANSPORTATION AGAINST UNAUTHORISED USAGE OR THEFT - The present invention relates to a method for protection of a means of transportation against unauthorised usage or theft using a lock and an end device that can be operated in a cellular network. Subject of the invention are further a lock for protection of a means of transportation against unauthorised usage or theft as well as a end device that can be operated in a cellular network, that are particularly designed to carry out process steps of the inventive method which need to be carried out by the lock respectively the end device.05-21-2015
20150139424KEY AGREEMENT FOR WIRELESS COMMUNICATION - Methods, systems, and computer programs for performing key agreement operations in a communication system are described. In some aspects, a wireless network operator receives a mobile device identifier and accesses a secret key associated with the mobile device. A message authentication code function is evaluated based on the secret key to produce an output value. A session key and a challenge value are obtained based on the output value. In some aspects, a mobile device accesses a secret key in response to receiving the challenge value from the wireless network operator. A message authentication code function is evaluated based on the secret key to produce an output value. A response value and a session key are obtained based on the output value. The response value is transmitted to the wireless network operator.05-21-2015
20150146872APPARATUS AND METHOD FOR TRANSMITTING SENSITIVE DATA USING RELAY - An apparatus and method for transmitting sensitive data using a relay are disclosed. The apparatus for transmitting sensitive data includes a receiver, a key generation unit, and a transmitter. The receiver receives a pilot signal via an antenna, and estimates the state of a wireless channel using the received pilot signal. The key generation unit generates an encryption key stream based on information including the state of the wireless channel. The transmitter transmits plain text data using the encryption key stream, or transmits a pilot signal.05-28-2015
20150296374APPARATUS FOR MANAGING MEMBERS OF AT LEAST ONE GROUP OF DECODERS HAVING ACCESS TO BROADCAST DATA - A technique to manage members of a group of decoders having access to broadcast data, each group member sharing a common broadcast encryption scheme (BES) comprising the steps of, in a stage for a decoder to become a group member, receiving keys pertaining to the position in the group according to the BES, receiving a current group access data comprising a current group access key, and in a stage of accessing broadcast data, using the current group access data to access the broadcast data, and in a stage of renewing the current group access key, sending a first group message comprising at lease a next group access key encrypted so that only non-revoked decoders can access it, said group message being further encrypted by the current group access key, updating the current group access key with the next group access key.10-15-2015
20150296376COMMUNICATION SYSTEM, COMMUNICATION UNIT, AND COMMUNICATION METHOD - This communication system ensures the security of a communication message with a low computational load. Communication units are capable of exchanging a communication message containing a check bit. The check bit is used to determine the reliability of the communication message. Communication unit, which transmits the communication message, is equipped with a storage position determination part. The storage position determination part determines one of multiple positions within the communication message where the check bit can be stored as a storage position. The communication unit generates a communication message with the check bit stored at the storage position and transmits the communication message. Communication unit, which receives the communication message, is equipped with a storage position determination part. The storage position determination part determines the storage position of the check bit in the communication message in accordance with the manner the storage position was determined.10-15-2015
20150312410NETWORK RECORDING AND SPEECH ANALYTICS SYSTEM AND METHOD - A system and method for network recording and speech analytics wherein a recording system receives media exchanged between first and second communication devices during a telephony call. The media is received by the recording system over a wide area network. The recording system bridges a media path between the first and second communication devices, and replicates media exchanged in the media path for storing the replicated media in a mass storage device. The recording system further captures metadata associated with the call, and stores the captured metadata in association with the stored media. The stored media and metadata may then be provided to a requesting device over the wide area network. The recording system may also be configured to analyze the call recording along with the associated metadata for detecting key words or phrases and/or triggering actionable events.10-29-2015
20150312755AUDIO SUMMING SYSTEMS AND METHODS IN RADIO COMMUNICATION SYSTEMS - A method, a device, and a communication system include receiving one or more concurrent transmissions from one or more source devices in the communication system; responsive to the one or more concurrent transmissions comprising a single source transmission from a single source device, retransmitting the single source transmission either clear or encrypted based on the single source transmission; responsive to the one or more concurrent transmissions comprising multiple transmissions from multiple source devices, performing one of: summing audio to create a summed resultant stream and broadcasting the summed resultant stream based on matching encryption parameters associated with each of the multiple transmissions; and broadcasting only a selected transmission of the one or more concurrent transmissions from a higher priority source device based on an encryption parameter mismatch between the multiple transmissions, wherein the selected transmission is broadcast based on encryption parameters associated with the selected transmission.10-29-2015
20150318983ULTRASONIC-WAVE COMMUNICATION SYSTEM - Provided is an ultrasonic-wave communication system where the influence of ambient noise and the Doppler effect are suppressed and where a user of a portable terminal is prevented from hearing unwanted sound. After performing encryption processing of predetermined information such as store information, a beacon 11-05-2015
20150326537SECURE DEVICE-TO-DEVICE (D2D) COMMUNICATION - User equipment decrypt information received in a first frame over an air interface during device-to-device (D2D) communication with another user equipment. The information is decrypted using a cryptographic function that is applied to a security key and a first frame number of the first frame.11-12-2015
20150334631ESTABLISHING RELIABLE ROUTES WITHOUT EXPENSIVE MESH PEERING - A device may join an existing mesh network by authenticating with only one of a plurality of member devices of the existing mesh network. Once the device has successfully authenticated with the only one member device, the device may receive a common group key. The device may send a route request message encrypted with the common key to one or more of the plurality of member devices of the existing mesh network. In response, the device may receive one or more route reply messages encrypted with the common key from one or more of the plurality of member devices of the existing mesh network. The device may determine an optimal route to one or more provider member devices of the existing mesh network based on the received route reply messages.11-19-2015
20150341343RFID Tag and Method for Operating an RFID Tag - The invention relates to an RFID tag, which comprises a receiving means, a first and a second verification means, and a transmitting means. The receiving means is designed to receive a challenge message sent by an RFID reading device. Said challenge message comprises a challenge data set, which has a digital certificate issued for the RFID reading device by a certification authority and signed by means of a private key of the certification authority and which has a request message, and a digital signature at least of the request message, which digital signature is generated by means of a private key of the RFID reading device. The first verification means is designed to verify the digital certificate by means of a public key of the certification authority. The second verification means is designed to verify the digital signature by means of a public key of the RFID reading device. The transmitting means transmits a response message to the REID reading device if the certificate and the digital signature are verified. By verifying the challenge message, the RFID tag can ensure that the RFID tag transmits a response message only to such a requesting REID reading device that is actually authorized to communicate with said RFID tag.11-26-2015
20150349949System and Method for Determining Distance Between Signals - A pairwise distance computation transforms first and second signals using an absolute distance preserving mapping, such that a k-norm distance between the first mapped signal and the second mapped signal represents an absolute distance between the first signal and the second signal. The absolute distance preserving mapping maps an element of a first or a second signal to a vector having a size equal to a cardinality of the finite alphabet of the signals. The absolute distance preserving mapping determines a position N of the element in an ordered sequence of symbols of the finite alphabet and determines values for each of N elements of the vector as a fractional power 1/k of positive increments in the finite alphabet. The values for subsequent elements of the vector are determined as zero.12-03-2015
20150350894Method and System for Establishing a Secure Communication Channel - A method and system for establishing a secure communication channel is disclosed. A remotely accessible server updates a used counter value to yield an updated counter value. The used counter value was used to generate a previously used symmetric key for encrypting communications between the server and a mobile handset. The updated counter value is used to generate a symmetric key, which is included in a key transfer message. The key transfer message is asymmetrically encrypted using a handset public key and transmitted to the handset such that it is capable of using a handset private key to decrypt the key transfer message and obtain the symmetric key. Further data received from the handset is decrypted asymmetrically using a server private key and symmetrically using the symmetric key, and further data communicated to the handset is encrypted symmetrically using the symmetric key and asymmetrically using the handset public key.12-03-2015
20150358820Method for Establishing Connection Between Devices, Configuration Device, and Wireless Device - A method for establishing a connection between devices, a configuration device, and a wireless device. The method includes acquiring configuration password information of a first wireless device and device identifier information of the first wireless device; performing verification on the configuration password information of the first wireless device with the first wireless device; and sending, to the first wireless device, a first encryption value obtained after a generated device connection code is encrypted; acquiring configuration password information of the second wireless device and device identifier information of the second wireless device; performing verification on the configuration password information of the second wireless device with the second wireless device; and sending, to the second wireless device, a second encryption value obtained after the device connection code is encrypted and the device identifier information of the first wireless device.12-10-2015
20150365233HYBRID MOBILE DEVICE AND RADIO SYSTEM - Certain embodiments disclose an integrated dual-device architecture for marrying modern computing devices (e.g. laptops, smartphones and tablets) with standalone tactical radios (e.g. military or first-responder push-to-talk radios) with the goal of leveraging modern mobile devices for improved interfaces and usability (compared to a tactical radio) while reducing the footprint (size, weight, battery power/capacity, and cost) of the tactical radio. Certain embodiments encompass offloading various traditional radio workloads (e.g. voice processing, control/management processing, and cryptographic processing) from the radio onto the mobile device, dramatically simplifying the tactical radio design and cost (e.g. making the radio a “dumb” transceiver only), and physically conjoining the mobile device with the reduced tactical radio into a single, conveniently operated and transported system.12-17-2015
20150382188METHOD AND APPARATUS FOR PROVIDING BROADCAST CHANNEL ENCRYPTION TO ENHANCE CELLULAR NETWORK SECURITY - A method, computer-readable storage device and apparatus for encrypting a broadcast message of a base station are disclosed. For example, the method selects an encryption key for the broadcast message and encrypts the broadcast message using the encryption key to create an encrypted broadcast message. The method then transmits an identifier of the encryption key and transmits the encrypted broadcast message over a broadcast channel. A method for decrypting a broadcast message that is encrypted is also disclosed.12-31-2015
20160007193System and Method for Wireless Network Access Protection and Security Architecture - Wireless network specific (WN-specific) key can be used to provide access protection over the radio access link. A WN-specific key may be associated with (or assigned to) a wireless network, and distributed to access points of the wireless network, as well as to user equipments (UEs) following UE authentication. The WN-specific key is then used to encrypt/decrypt data transported over the radio access link. The WN-specific key can be used in conjunction with the UE-specific keys to provide multi-level access protection. In some embodiments, WN-specific keys are shared between neighboring wireless networks to reduce the frequency of key exchanges during handovers. Service-specific keys may be used to provide access protection to machine to machine (M2M) services. Group-specific keys may be used to provide access protection to traffic communicated between members of a private social network.01-07-2016
20160014599ID-BASED CONTROL UNIT-KEY FOB PAIRING01-14-2016
20160014604Method of Securing Network Access Radio Systems01-14-2016
20160028703Method, System and Device for Negotiating Security Capability when Terminal Moves - An MME negotiates security in case of idle state mobility for a UE from a first network to a LTE network. The UE sends its security capabilities including non-access stratum (NAS) security capabilities supported by the UE to the LTE network. The MME selects a NAS security algorithm, in accordance with the NAS security capabilities of the UE, and sends the selected NAS security algorithm to the UE, sharing the NAS security algorithm between the UE and the LTE network when the UE moves from the first network to the LTE network. The MME also derives, in accordance with the selected NAS security algorithm, a NAS protection key from an authentication vector-related key so as to security communication between the UE and the LTE network.01-28-2016
20160029211TERMINAL DEVICE, COMMUNICATION SYSTEM, AND TERMINAL DEVICE READABLE STORAGE MEDIUM - A terminal device using a protocol stack including an upper layer and a lower layer includes a first encryption unit configured to perform first encryption and/or first decryption of data in the upper layer, a second encryption unit configured to perform second encryption and/or second decryption of data in the lower layer, a determination unit configured to determine an encryption level of the second encryption and/or second decryption according to a condition of the terminal device, a generation unit configured to generate terminal capability information according to the determined encryption level, a transmission unit configured to transmit the generated terminal capability information to a base station, and a reception unit configured to receive setting information according to the determined encryption level, from the base station, in response to transmission of the terminal capability information.01-28-2016
20160036586MOBILE TERMINAL, CONTROL METHOD THEREOF, ONBOARD UNIT, CONTROL METHOD THEREOF, BACKEND SERVER, AND CONTROL METHOD THEREOF - There is provided a mobile terminal for use in a system which includes a backend server having a first encryption key and an onboard unit (OBU).A first receiving unit receives, from the backend server, a base shared key encrypted with a second encryption key, the base shared key encrypted with the first encryption key, and a digital signature. A deriving unit decrypts the base shared key with the second encryption key and derives first authentication information based on the base shared key and a first temporary parameter. A second sending unit sends, to the OBU, the base shared key encrypted with the first encryption key, the digital signature, the first authentication information, identification information of the base shared key, and the first temporary parameter.02-04-2016
20160037336SHARED SECRET FOR WIRELESS DEVICES - In some examples, a device may include a communication interface configured to exchange signals with another device, and a computing component configured to autonomously calculate a centroid of a plurality of devices of which the device is a part, based at least in part on relative distances between the device and others of the plurality of devices and relative distances among the others of the plurality of devices, and autonomously establish the centroid as a shared secret.02-04-2016
20160044006DEVICE-TO-DEVICE DISCOVERY INFORMATION ENCRYPTION - In embodiments, apparatuses, methods, and storage media may be described for secure broadcast of discovery information of a discoverable user equipment (UE) in a device-to-device (D2D) network. Specifically, the discovery information may be encrypted with a first encryption key, and then the result of that encryption may be re-encrypted with a second encryption key. The dual-encrypted discovery information may then be broadcast in a cell. Upon reception of the dual-encrypted discovery information, a discovering UE with the appropriate decryption keys may decrypt the message to identify the discovery information. Based on the decrypted discovery information, the discovering UE may identify the presence of the discoverable UE.02-11-2016
20160044508METHOD FOR PROVIDING APPLICATION SERVICE - A method for providing application service is provided. The method discloses that a user is authenticated according to a received application service acquisition request from a user mobile phone, and when the user authentication is passed, the application service acquisition request is sent to an application server, so that the application server provides an application service to the user mobile phone according to the application service acquisition request. The application server does not need to authenticate the user mobile phone by performing an authentication operation on the user mobile phone through a wireless application protocol gateway, thus being capable of reducing the workload of the application server.02-11-2016
20160094988SERVING NETWORK AUTHENTICATION - A method, an apparatus, and a computer program product for wireless communication are provided. The method may include establishing a connection with a serving network, transmitting an encrypted authentication credential that includes a randomly selected key encryption key (KEK) and a serving network identifier to the serving network, receiving authentication information and a signature from the serving network, and authenticating the serving network by verifying the signature based on the KEK. The encrypted authentication credential may be operative to identify the serving network. The signature may be generated using the KEK.03-31-2016
20160094989LPI/LPD Communication Systems - In a wireless communication system, a secure communication link is provided by selecting a decoy data signal vector for transmission, generating a MIMO precoding matrix from a message to be sent; and multiplying the decoy data signal vector by the MIMO precoding matrix to construct a precoded signal vector. The MIMO precoding matrix produces information-bearing synthesized channel distortions in the transmitted signal. An undistorted version of the decoy data may be transmitted to an intended receiver. The receiver distinguishes between the synthesized information-bearing channel distortions and natural channel distortions to decrypt the information, while an eavesdropper would find it difficult to distinguish between natural and synthesized channel distortions in the signals it receives.03-31-2016
20160094994Method and System for Provisioning an Electronic Device - This application discloses a method of provisioning an electronic device. The electronic device proactively broadcasts an advertising packet that includes a device identifier associated with the electronic device. A server receives the device identifier via a client device, and issues a link approval response when it verifies that the electronic device associated with the device identifier is available for provisioning in association with a user account. In response to the link approval response, the electronic device and the client device establish communication via a short range wireless link. The client device encrypts at least a portion of network credentials of a secure wireless network using a password key generated at the server, and provides the encrypted network credentials to the electronic device. The electronic device decrypts the encrypted network credentials using a key generated at the electronic device, and accesses the secure wireless network using the decrypted network credentials.03-31-2016
20160100309Secure Remote User Device Unlock - A device unlock application on a user device may interact with a server to automatically carrier unlock the user device. The server may receive a carrier unlock request for a user device. The server may determine one or more verifications to be performed based at least on a unlock scenario requested by the carrier unlock request. The server may perform the one or more verifications to determine whether the user device is eligible for a carrier unlock. The server may send a unlock command to the user device in response to determining that the user device is eligible for the carrier unlock. The unlock command may disable a comparison of a device carrier code of the user device to a subscriber identity module (SIM) carrier code stored in a SIM card of the user device.04-07-2016
20160127329SYSTEMS AND METHODS FOR PROVIDING CONDITIONAL ACCESS TO TRANSMITTED INFORMATION - Controlling access to position information at a receiver, or at another device external to the receiver. Various considerations, including a requested service type, a user type, a device type, a software application type, a payment, and/or other characteristics associated with a particular software application or distributor of that software application, may be used to control access to position information.05-05-2016
20160127894CONNECTIONLESS WIRELESS ACCESS - A capability for connectionless wireless access is presented. A wireless end device is configured to encrypt context information of the wireless end device, based on a security key associated with attachment of the wireless end device to a wireless communication network, to form encrypted context information, generate a packet including a header and a payload where the header includes the encrypted context information, and propagate the packet toward a wireless access node of the wireless communication network. The wireless access node is configured to receive the packet and propagate the encrypted context information toward a controller of the wireless communication network. The controller is configured to receive the encrypted context information from the wireless access node, decrypt the encrypted context information based on a security key associated with attachment of the wireless end device to the wireless communication network to recover the context information of the wireless end device, and determine, based on the context information, whether the wireless end device is permitted to communicate via the wireless communication network.05-05-2016
20160135042ENHANCED CELL BROADCAST SERVICE VIA SECURE GROUP BROADCAST - A secure cell broadcast method entails defining a group of mobile devices, reserving a channel for the group, associating cryptographic key material with the group, notifying the mobile devices of the channel for the group, securely providing the key material to the mobile devices of the group, and broadcasting on the channel a secure broadcast message that is encrypted such that the mobile devices of the group receiving on the channel can receive and decrypt the secure broadcast message using the key material.05-12-2016
20160135043SECURITY FOR NETWORK LOAD BROADCASTS OVER CELLULAR NETWORKS - A method, computer readable medium and apparatus for obtaining cellular network load information in a secure manner are disclosed. For example, the method receives the cellular network load information, where the cellular network load information is encrypted. The method then decrypts the cellular network load information using a decryption key and performs a task responsive to the network load information that is decrypted.05-12-2016
20160135051Telephone Caller Authentication - Techniques for authenticating the identity of a caller in a telephone call are disclosed. The device generating the call implements encrypting caller identification information and initiating the telephone call, said initiating comprising providing a voice carrier signal including the caller identification information; and simultaneously providing a data carrier signal including the encrypted caller identification information. The receiving device implements receiving the telephone call; decrypting the encrypted caller identification information at the recipient device; and verifying the identity of at least an unknown caller at the recipient device by at least one of verifying the authenticity of a certificate used to encrypt the caller identification information; and comparing the decrypted caller identification information with the caller identification information from the voice carrier signal. A telephony device implementing such an authentication technique is also disclosed.05-12-2016
20160142210SIGNATURES FOR NEAR FIELD COMMUNICATIONS - A data-carrying device and methods of authenticating the same are disclosed. The data-carrying device is described as being capable of communicating via the Near Field Communications (NFC) protocol and may have one or more NFC Data Exchange Format (NDEF) records stored in its memory. The data-carrying device also comprises or has the ability to generate a signature that proves the data-carrying device is the authorized device for storing the one or more NDEF records. A data-carrying device that attempts to transmit an NDEF record without a valid signature may be identified as an unauthorized data-carrying device.05-19-2016
20160150403SYSTEM AND METHOD FOR TRANSMITTING A SECURE MESSAGE OVER A SIGNALING NETWORK - A system and method for transmitting a secure message is disclosed. According to one embodiment, a method includes providing a request for one or more attributes associated with a phone number for a recipient mobile device, generating a key based on the one or more attributes, receiving an encrypted message for a recipient mobile device, where the encrypted message is encrypted based on the key, requesting the one or more attributes from the recipient mobile device, receiving the one or more attributes from the recipient mobile device, regenerating the key based on the one or more attributes received from the recipient mobile device, decrypting the encrypted message based on the regenerated key, and delivering the decrypted message to the recipient mobile device.05-26-2016
20160157099WIRELESS TIME OF FLIGHT SECURITY, USER AUTHENTICATION, AND VARIABLE QoS POSITION ACCURACY PROTOCOL06-02-2016
20160164678Secure PKI Communications for "Machine-To-Machine" Modules, Including Key Derivation by Modules and Authenticating Public Keys - Methods and systems are provided for efficient and secure “Machine-to-Machine” (M2M) between modules and servers. A module can communicate with a server by accessing the Internet, and the module can include a sensor and/or actuator. The module and server can utilize public key infrastructure (PKI) such as public keys to encrypt messages. The module and server can use private keys to generate digital signatures for datagrams sent and decrypt messages received. The module can internally derive pairs of private/public keys using cryptographic algorithms and a set of parameters. A server can use a shared secret key to authenticate the submission of derived public keys with an associated module identity. For the very first submission of a public key derived the module, the shared secret key can comprise a pre-shared secret key which can be loaded into the module using a pre-shared secret key code.06-09-2016
20160165436Scrambling Sequences for Wireless Networks - An integrated circuit includes logic configured to generate scrambling sequences, each based on a different scrambling seed, for a smart-utility-network data packet communication. A Hamming distance between any two scrambling sequences is half the length of a PSDU of the data packet or greater.06-09-2016
20160174070Security Key Generation for Dual Connectivity06-16-2016
20160182460RECOVERY FROM DECRYPTION ERRORS IN A SEQUENCE OF COMMUNICATION PACKETS06-23-2016
20160182469Information Handling System Secure RF Wireless Communication Management with Out-of-Band Encryption Information Handshake06-23-2016
20160192186MESH NETWORK WITH PERSONAL PRE-SHARED KEYS - A mesh network with a network-wide pre-shared key (PSK) that can be updated is described. The PSK can be used to establish secure communication between arbitrary electronic devices in the mesh network. In order to prevent electronic devices from being inadvertently ‘stranded,’ i.e., unable to securely communicate with other electronic devices in the mesh network when the PSK is updated, pairs of electronic devices in the mesh network establish personal PSKs (PPSKs). In particular, after securely associating with each other, a given pair of electronic devices may have used the current PSK to authenticate and encrypt their communication. Then, the given pair of electronic devices may define a PPSK, e.g., by exchanging one or more random numbers. If a subsequent attempt at establishing secure or encrypted communication between the given pair of electronic devices fails, these electronic devices may use the PPSK as a backup to establish the encrypted communication.06-30-2016
20160192187Frame Transfer Method, Related Apparatus, and Communications System - A frame transfer method includes sending, by an access point to a wireless terminal associated with the access point, a group key of a virtual local area network to which the wireless terminal belongs; receiving, by the access point, a frame, where the frame is a broadcast frame of the virtual local area network or a multicast frame of the virtual local area network; encrypting, by the access point, the frame using the group key of the virtual local area network, to obtain an encrypted frame; and sending, by the access point and in a wireless local area network of the access point, the encrypted frame. The method reduces complexity of implementing virtual local area network (VLAN) isolation between wireless terminals in a wireless local area network (WLAN) and reduces frame forwarding load of an access point (AP).06-30-2016
20160192188METHODS, SYSTEMS AND APPARATUS FOR RECOGNIZING GENUINE PRODUCTS - Methods, apparatus and systems are described for identifying potentially counterfeited products or goods.06-30-2016
20160198343COMMUNICATION OF SECURITY KEY INFORMATION07-07-2016
20160255666SYSTEM FOR UTILIZING IDENTITY BASED ON PAIRING OF WIRELESS DEVICES09-01-2016
20160380763SECURITY COMMUNICATION USING POLAR CODE SCHEME - A method and apparatus for providing a security communication are provided. A device generates an output bit sequence by applying a polar code scheme to an input bit sequence and transmit the output bit sequence to a target receiver. The output bit sequence is generagted based on a double layer polar coding scheme.12-29-2016
20170238172METHODS AND SYSTEMS FOR ENCRYPTING COMMUNICATIONS USING A SECURE ELEMENT08-17-2017
20180027410METHOD FOR REMOTE SUBSCRIPTION MANAGEMENT OF AN eUICC, CORRESPONDING TERMINAL01-25-2018

Patent applications in class Wireless communication

Patent applications in all subclasses Wireless communication

Website © 2025 Advameg, Inc.