Class / Patent application number | Description | Number of patent applications / Date published |
380033000 | Using plural paths or channels | 15 |
20090296925 | TRANSMISSION APPARATUS AND TRANSMISSION METHOD - A base station generates a unicast channel, a MBMS channel, and a pilot channel, that are multiplied by a scrambling code specific to a particular cell. The pilot channel is replicated as necessary. The unicast channel and the MBMS channel are time-multiplexed. For data in a unit transmission frame, a same frequency component is multiplied by a same scrambling code. | 12-03-2009 |
20100226497 | COMMUNICATIONS SYSTEM EMPLOYING ORTHOGONAL CHAOTIC SPREADING CODES - Systems and methods for code-division multiplex communications. The methods involve forming orthogonal or statistically orthogonal chaotic spreading sequences (CSC | 09-09-2010 |
20110007896 | Data Exchange Apparatus and Method - Data exchange apparatuses and methods are provided. Two data exchange apparatuses are able to use a plurality of channels. One of the data exchange apparatus plays the active mode, while the other data exchange apparatus plays the passive mode. The active data exchange apparatus selects a first channel and transmits a data exchange request to the passive data exchange apparatus automatically through the first channel. The passive data exchange apparatus transmits an acknowledgment signal to the active data exchange apparatus automatically. Both the active and passive data exchange apparatuses select a second channel according to the acknowledgment signal and then exchange data through the second channel. People who owned a data exchange apparatus of the present invention can easily gather information according to his or her requirement from people who also own a data exchange apparatus. | 01-13-2011 |
20110033044 | Secure Open-Air Communication System Utilizing Multi-Channel Decoyed Transmission - A secure, open-air communication system utilizes a plurality of “decoy” data signals to hide one or more true data signals. The true data signal(s) are channel hopped with the plurality of decoy data signals to form a multi-channel “scrambled” output signal that is thereafter transmitted in an open-air communication system. The greater the number of decoy signals, the greater the security provided to the open-air system. Further security may be provided by encrypting both the true and decoy signals prior to scrambling and/or by utilizing a spatially diverse set of transmitters and receivers. Without the knowledge of the channel assignment(s) for the true signal(s), an eavesdropper may be able to intercept (and, with time, perhaps descramble) the open-air transmitted signals, will not be able to distinguish the true data from the decoys without also knowing the channel assignment(s). | 02-10-2011 |
20110235800 | WIRELESS POWER SUPPLY APPARATUS - A wireless power supply apparatus generates an electric signal frequency-modulated or otherwise phase-modulated according to a transmission-side code that is determined beforehand with a wireless power reception apparatus. The electric signal thus generated is transmitted via a transmission coil so as to generate an electric power signal including any one of an electric field, a magnetic field, and an electromagnetic field. The wireless power reception apparatus receives the electric power signal using a reception coil. A control unit changes the impedance of a resonance circuit that comprises the reception coil and a resonance capacitor, according to a reception-side code that is to correspond to the transmission-side code. | 09-29-2011 |
20110243322 | SECURITY IN TELECOMMUNICATIONS SYSTEMS - Security of communications between a mobile terminal | 10-06-2011 |
20120328096 | TWO-WAY AUTHENTICATION BETWEEN TWO COMMUNICATION ENDPOINTS USING A ONE-WAY OUT-OF-BAND (OOB) CHANNEL - Techniques for two-way authentication between two communication endpoints (e.g., two devices) using a one-way out-of-band (OOB) channel are presented. Here, in embodiments, both communication endpoints may be securely authenticated as long as the one-way OOB channel is tamper-proof. Embodiments of the invention do not require the one-way OOB channel to be private to ensure that both endpoints are securely authenticated. Since providing a two-way or private OOB channel adds to the cost of a platform, embodiments of the invention provide for a simple and secure method for two-way authentication that uses only a non-private one-way OOB channel and thus helping to reduce platform cost. Other embodiments may be described and claimed. | 12-27-2012 |
20130010951 | SECURE OPEN-AIR COMMUNICATION SYSTEM UTILIZING MULTICHANNEL DECOYED TRANSMISSION - A secure, open-air communication system utilizes a plurality of “decoy” data signals to hide one or more true data signals. The true data signal(s) are channel hopped with the plurality of decoy data signals to form a multi-channel “scrambled” output signal that is thereafter transmitted in an open-air communication system. The greater the number of decoy signals, the greater the security provided to the open-air system. Further security may be provided by encrypting both the true and decoy signals prior to scrambling and/or by utilizing a spatially diverse set of transmitters and receivers. Without the knowledge of the channel assignment(s) for the true signal(s), an eavesdropper may be able to intercept (and, with time, perhaps descramble) the open-air transmitted signals, will not be able to distinguish the true data from the decoys without also knowing the channel assignment(s). | 01-10-2013 |
20130223622 | METHOD AND DEVICE FOR REKEYING IN A RADIO NETWORK LINK LAYER ENCRYPTION SYSTEM - Disclosed is a method of rekeying radios for link layer encryption (LLE) in a radio network using a bifurcated crypto period. During a first portion of a first LLE crypto period during which a first LLE key (LEK) is used to LLE encrypt communications between a base station and mobile stations operating within a corresponding coverage area of the base station, a radio network communications device prevents individual ones of the mobile stations from requesting a second LEK to be used during a second LLE crypto period after the first LLE crypto period. During a second portion of the first LLE crypto period, the radio network communications device allows individual ones of the mobile stations to request the second LEK. A mobile station configured to operate in accordance with the bifurcated crypto period, and provide information regarding keys in its possession via an authentication response ISP, is also disclosed. | 08-29-2013 |
20140064481 | SYSTEMS AND METHODS FOR SECURELY TRANSMITTING AND RECEIVING DISCOVERY AND PAGING MESSAGES - Methods, devices, and computer program products for transmitting and receiving discovery and paging messages in a wireless communication device are described herein. In one aspect, a wireless apparatus operable in a wireless communication system includes a processor configured to encrypt at least a portion of a discovery packet using one or more credentials of an application that, when executed, provides one or more services, the discovery packet including information for advertising at least one service provided by the application to one or more receiving devices. The wireless apparatus further includes a transmitter configured to transmit the discovery packet for being received by the one or more receiving devices. | 03-06-2014 |
20140093071 | SUPPORT OF MULTIPLE PDN CONNECTIONS OVER A TRUSTED WLAN ACCESS - Modifications to authentication and authorization messages are used to allow an authentication server to query both an access network and a terminal device connecting over the access network to determine whether both nodes support the terminal device forming a plurality of packet data network connections that can support tunnels. This allows a non-3GPP access network to offer terminal devices the ability to connect to a 3GPP core network with multiple connections. | 04-03-2014 |
20160119303 | INFORMATION SECURITY ATTACHMENT DEVICE FOR VOICE COMMUNICATION AND INFORMATION SECURITY METHOD FOR VOICE COMMUNICATION USING THE SAME - An information security attachment device for voice communication and an information security method for voice communication using the same are provided. The information security attachment device includes a user interface unit, a compression unit, an encryption and decryption unit, and a conversion unit. The user interface unit receives an information security request from a user, and displays whether or not information security is being performed. The compression unit compresses a voice signal. The encryption and decryption unit encrypts the compressed voice data in response to an information security request or an information security control command, requests a terminal to send the encrypted voice data, decrypts the encrypted voice data in response to an information security request or an information security control command, and outputs the decrypted voice data. The conversion unit restores the voice data to an analog voice signal, and outputs the restored analog voice signal. | 04-28-2016 |
380034000 | Plural carrier frequencies | 3 |
20090103720 | Method and system for secure and anti jamming wireless communication with high spectral efficiency - Invention presented here relates to Low Probability of Exploitation and Anti Jamming communication system offering high spectral efficiency. The object of the present invention is achieved by hopping in polarization domain and by employing an adaptive polarization-nulling algorithm (FIG. | 04-23-2009 |
20090168997 | Method to detect man-in-the-middle (MITM) or relay attacks - A method for detecting a communication relay attack involves the steps of counting a number of clock cycles occurring in a clock signal between transmission of two predetermined elements of data with a data transmission device, counting a number of clock cycles occurring in the clock signal between receipt of the two predefined elements of data and comparing the number of clock cycles counted by the data transmission device with the number of clock cycles counted by the data receiving device. | 07-02-2009 |
20130266136 | METHOD, SYSTEM, AND DEVICES FOR FAST SESSION TRANSFER OF WIRELESS DEVICES FROM ONE FREQUENCY BAND TO ANOTHER - Embodiments are directed to switching of stations STA, access points APs and PCPs that are communicating through a wireless link from one frequency band to another. One embodiment is directed to switching of stations STA that are communicating through a tunneled direct link setup (TDLS) link from one frequency band to another. A multiband element may be added to a TDLS discovery request and TDLS discovery response frames to allow each of the stations communications through a TDLS to determine if the other station has multiband capability. In one embodiment, a pairwise transient key (PTK) is created for both a current band in which the stations STA are communicating and a new band over which the stations may communicate in the future. In this way there is no need to calculate a new pairwise transient key PTK for the new frequency band. | 10-10-2013 |