Patent application number | Description | Published |
20100329202 | CHANNEL UTILIZATION IMPROVEMENT IN COEXISTING WIRELESS NETWORKS - A wireless device comprises a first wireless transceiver configured for communication via a first wireless network, a second wireless transceiver configured for communication via a second wireless network; and a scheduler that controls which of the first and second transceivers is granted access to a wireless medium at a given time. When the first wireless transceiver has been granted access to the wireless medium by the scheduler and the first wireless transceiver receives a packet via the first wireless network, the scheduler temporarily grants the second wireless transceiver access to the wireless medium based on the packet indicating that first wireless transceiver is not to use the wireless medium for a period of time. | 12-30-2010 |
20110086660 | CONTROL OF COEXISTING WIRELESS NETWORKS BASED ON PREDICTED TRANSMISSION ARRIVAL TIME - A system and method for optimizing medium utilization with coexisting wireless networks is described herein. In one embodiment, a wireless device includes a first wireless transceiver, a second wireless transceiver, and logic configured to determine which of the first and second wireless transceivers is enabled at a given time. The first wireless transceiver is configured for operation with a first wireless network. The second wireless transceiver is configured for operation with a second wireless network coexisting with the first wireless network. The logic is further configured to predict an arrival time of a transmission from a different device and to enable the second wireless transceiver based on the predicted arrival time. | 04-14-2011 |
20110103355 | PACKET GROUPING FOR A CO-EXISTING WIRELESS NETWORK ENVIRONMENT - In at least some embodiments, a communication device includes a host processor and a plurality of co-existing wireless technology transceivers coupled to the host processor. The plurality of co-existing wireless technology transceivers share a communication medium using time-multiplexing. A throughput for data transmissions by the plurality of co-existing wireless technology transceivers is based on an algorithm that determines a grouping option for data packets to be transmitted by one of the co-existing wireless technology transceivers, the grouping option providing a highest throughput for a predetermined baseband PHY rate without exceeding a predetermined maximum grouping delay. | 05-05-2011 |
20110188391 | INTERRELATED WiFi AND USB PROTOCOLS AND OTHER APPLICATION FRAMEWORK PROCESSES, CIRCUITS AND SYSTEMS - A master electronic circuit ( | 08-04-2011 |
20110235600 | METHOD AND SYSTEM FOR USING RESOURCES ALLOCATED TO A WIRELESS NETWORK IN A COEXISTING WIRELESS NETWORK - A wireless device includes a first wireless transceiver and a second wireless transceiver. The first wireless transceiver is configured to communicate via a first wireless network, and includes a first scheduler configured to schedule communication via the first wireless network. The second wireless transceiver is configured to communicate via a second wireless network. The second wireless transceiver includes a second scheduler. The second scheduler is configured to identify a resource allocated to the second wireless transceiver for a transaction via the second wireless network, to identify a portion of the resource used by the second wireless transceiver for the transaction, and to transfer information defining the portion to the first transceiver. The first scheduler is also configured to schedule, based on the information transferred by the second scheduler, the first transceiver to communicate via the first wireless network using the resource allocated to the second wireless transceiver for the transaction. | 09-29-2011 |
20120106381 | SYSTEM AND METHOD FOR SOFT ACCESS POINT POWER REDUCTION - A system and method for reducing power consumption of a wireless device operating as a soft access point. In one embodiment, a wireless device includes a soft access point controller that configures the wireless device to operate as a group owner in a peer-to-peer wireless local area network. The soft access point controller includes a beacon controller. The beacon controller is configured to transmit beacon frames at a first periodic interval. The beacon controller is also configured to extend a discovery interval of a wireless station by transmitting acknowledgement packets at a second periodic interval. The second periodic interval is shorter than the first periodic interval and shorter than a minimum discovery scan timeout of the wireless station. | 05-03-2012 |
20120163312 | Reducing the Number of Silencing Frames Transmitted in a Coexistence Network - Systems and methods for reducing the number of silencing frames transmitted in a coexistence network are described. In some embodiments, a method may include abstaining from transmitting silencing frames until detection of a predetermined event. Predetermined events include, for example, detection of a retransmitted packet, detection of a transmission or packet rate drop, and/or detection that an expected packet has been missed. In some cases, two or more predetermined events may be logically combined in any suitable manner or order, and may occur in series or in parallel with respect to each other. Once the predetermined event(s) have been detected, a silencing frame may then be transmitted. In some cases, subsequent silencing frames may be transmitted to facilitate return to a maximum attainable transmission rate. An investigation or observation period during which silencing frames are transmitted despite the absence of a predetermined event may enable the collection of network statistics. | 06-28-2012 |
20120182979 | PERFORMANCE IN A DUAL BSS ENVIRONMENT - An integrated circuit includes logic configured to adjust an original service time of a first Wi-Fi Basic Service Set connection (“BSS”), out of a plurality of BSSs configured to be associated with a communication device, to an adjusted service time based on an unsuccessful acknowledgement transmission or reception in a previous service time on the first BSS. At least one of the plurality of BSSs is supportive of a peer-to-peer connection. | 07-19-2012 |
20120184330 | SELECTIVE PROTECTION BASED ON SEQUENCE NUMBERS IN COEXISTING NETWORKS - A wireless device comprises a first wireless transceiver, a second wireless transceiver, and control logic. The control logic is coupled to the first wireless transceiver and the second wireless transceiver. The control logic is configured to determine whether to transmit protection frames (e.g., clear-to-send 2 self frames) based upon sequence numbers in frames received from another device. | 07-19-2012 |
20120195227 | ADVERTIZED POWER-SAVE MODES FOR DIFFERENT TRAFFIC CONDITIONS - In at least some embodiments, a wireless communication device includes a transceiver having control logic to detect traffic conditions for a communication group and to enter different power-save modes for different traffic conditions. The control logic is configured to advertize a first power-save mode to the communication group in response to a first detected traffic condition, to advertize a second power-save mode to the communication group in response to a second detected traffic condition, and to advertize a third power-save mode to the communication group in response to a third detected traffic condition. | 08-02-2012 |
20140013018 | WiFi USB Protocol - A wireless universal serial bus (USB) system that includes a wireless USB host, a first wireless USB device, and a second wireless USB device. The wireless USB host is configured to wirelessly transmit a beacon over a wireless USB network based on a wireless USB protocol. The first and second wireless USB devices are configured to exchange wireless packets with the wireless USB host. The beacon designates the wireless USB network address access times for the first and second wireless USB devices. | 01-09-2014 |
Patent application number | Description | Published |
20130301830 | DEVICE, SYSTEM, AND METHOD OF SECURE ENTRY AND HANDLING OF PASSWORDS - Devices, system, and methods of secure entry and handling of passwords and Personal Identification Numbers (PINs), as well as for secure local storage, secure user authentication, and secure payment via mobile devices and via payment terminals. A mobile electronic device includes: a secure execution environment (SEE) to securely execute code; and a secure video path (SVP) to securely exchange information between the SEE and a touch-screen of the mobile electronic device; wherein the SEE includes a secure password entry module to generate a scrambled on-screen interface, and to send the scrambled on-screen interface to the touch-screen through the SVP. | 11-14-2013 |
20130305041 | METHOD, DEVICE, AND SYSTEM OF SECURE ENTRY AND HANDLING OF PASSWORDS - Devices, system, and methods of secure entry and handling of passwords and Personal Identification Numbers (PINs), as well as for secure local storage, secure user authentication, and secure payment via mobile devices and via payment terminals. A server includes: an authentication module to send, to a remote client device, a server authentication certificate; an accreditation certificate stored in a pre-defined location on the server, wherein the pre-defined location is accessible to the remote client device; wherein the accreditation certificate indicates a condition that the server authentication certificate needs to meet in order for the server authentication certificate to be accepted for authentication by the remote client device. | 11-14-2013 |
20130305392 | SYSTEM, DEVICE, AND METHOD OF SECURE ENTRY AND HANDLING OF PASSWORDS - Devices, system, and methods of secure entry and handling of passwords and Personal Identification Numbers (PINs), as well as for secure local storage, secure user authentication, and secure payment via mobile devices and via payment terminals. A computing device includes: a secure storage unit to securely store a confidential data item; a non-secure execution environment to execute program code, the program code to transport to a remote server a message; a secure execution environment (SEE) to securely execute code, the SEE including: a rewriter module to securely obtain the confidential data item from the secure storage, and to securely write the confidential data item into one or more fields in said message prior to its encrypted transport to the remote server. | 11-14-2013 |
Patent application number | Description | Published |
20090070596 | Secure Read-Write Storage Device - A method is described for securing a read write storage (RWS) device, the method comprising, providing the RWS device, the RWS device comprising a controller comprising a processor and a bit bucket and employing, in response to a decision making process, a sanction in the RWS device. Related apparatus and methods are also described. | 03-12-2009 |
20090080647 | Method and System for Usage of Block Cipher Encryption - A block cipher system for encrypting a plurality of blocks from plaintext to ciphertext, each of the blocks being associated with a constant root key, the system including an encryption key module to determine an input key for each of blocks based on a function having a plurality of inputs including the root key and an initialization vector, for a first one of the blocks, and the plaintext of at least one of the blocks which was previously encrypted and the root key, for the blocks other than the first block, and an encryption module to encrypt each of the blocks based on the input key determined for each of the blocks, respectively. Related apparatus and methods also included. | 03-26-2009 |
20100153717 | Security device and building block functions - A method and system of securing content is described, the method including establishing communication between a secure module source and a content rendering device, loading a dynamically generated pseudo-unique secure module to the content rendering device from the secure module source, establishing communication between the secure module source and the dynamically generated pseudo-unique secure module, and transferring a decryption key from the secure module source to the dynamically generated pseudo-unique secure module, thereby enabling decryption of encrypted content, the encrypted content being encrypted according to the decryption key. Related methods and apparatus are also described. | 06-17-2010 |
20110271104 | Security device and building block functions - A method and system of securing content is described, the method including establishing communication between a secure module source and a content rendering device, loading a dynamically generated pseudo-unique secure module to the content rendering device from the secure module source, establishing communication between the secure module source and the dynamically generated pseudo-unique secure module, and transferring a decryption key from the secure module source to the dynamically generated pseudo-unique secure module, thereby enabling decryption of encrypted content, the encrypted content being encrypted according to the decryption key. Related methods and apparatus are also described. | 11-03-2011 |
Patent application number | Description | Published |
20130073855 | Collision Based Multivariate Signature Scheme - A cryptographic method and system is described, the method and system including providing a key pair that includes a private key and a corresponding public key, which defines a multivariate polynomial mapping, computing, using a processor and the private key, a digital signature for a message such that a first application of the mapping to the digital signature gives a first result, and a second application of the mapping to the message gives a second result that is equal to the first result, and conveying the message with the digital signature to a recipient for authentication using the public key. Related hardware, methods, and systems are also described. | 03-21-2013 |
20130129090 | Efficient Multivariate Signature Generation - A cryptographic method and apparatus, including providing a public key that defines a multivariate polynomial mapping Q( ) over a finite field F, extracting a first vector Y of verification values from a message, computing over the first vector, using a processor, a digital signature X including a second vector of signature values such that application of the mapping to the digital signature gives a third vector Q(X) of output values such that each output value is equal to a corresponding element of a vector sum Y+aY | 05-23-2013 |
20130174279 | Secure Read-Write Storage Device - A method and system for securing a read write storage (RWS) device, the method comprising, providing the RWS device, the RWS device comprising a controller comprising a processor and a bit bucket storing data, and employing the controller to corrupt at least a portion of the data. | 07-04-2013 |
20130177151 | Attack-Resistant Multivariate Signature Scheme - A cryptographic method, apparatus, and system, including selecting a first multivariate polynomial mapping, which includes first multivariate polynomial equations over first variables in a finite field, defining a second multivariate polynomial mapping, which includes at least some of the first multivariate polynomial equations and further includes second multivariate polynomial equations over the first variables together with second variables in the finite field, generating a public key based on the second multivariate polynomial mapping, and digitally signing a message, using a processor, with a digital signature that is verifiable using the public key and is generated by solving the first multivariate polynomial mapping to find respective first values of the first variables, solving a set of linear equations using the first values to find respective second values of the second variables, and applying a transform to the first and second values so as to generate a vector corresponding to the digital signature, wherein the second values are chosen so that a predefined group of elements of the vector will be zero. Related methods, apparatus, and systems are also described. | 07-11-2013 |
20130294601 | Efficient Multivariate Signature Generation - A cryptographic method and apparatus, including providing a public key that defines a multivariate polynomial mapping Q( ) over a finite field F, extracting a first vector Y of verification values from a message, computing over the first vector, using a processor, a digital signature X including a second vector of signature values such that application of the mapping to the digital signature gives a third vector Q(X) of output values such that each output value is equal to a corresponding element of a vector sum Y+aY | 11-07-2013 |
20140143552 | Glitch Resistant Device - A system and method for device security is described, the system and method including at least one integrated circuit including a CPU, a key register storing a hardware enabling key, the key including a large number of bits, such that each bit of the large number of bits has a correct value, and if any one bit of the large number of bits is set to an incorrect value the key will not function correctly a combination circuit for performing a function, f, the function f being essential for correct functionality of the CPU, such that the combination circuit is activated by the key, the combination circuit only performing function f if each of the large number of bits of the key is set to the correct value, and there exists no set of intermediate or output bits derived from the large number of bits of the key, which determine if the combination circuit performs function f, the set intermediate or output bits including fewer bits than are included in the key. Related apparatus, methods, and systems are also described. | 05-22-2014 |
20140150046 | Distributing Audio Video Content - A method of distributing audio video content is described. The method includes: receiving configuration data for a plurality of devices; for each device in the plurality of devices, computing a set of bit rates based, at least in part, on the configuration data; encoding audio video content at each bit rate in each set of bit rates to produce a plurality of encoded audio video content streams; splitting each encoded audio video content stream in the plurality of encoded audio video content streams into chunks to produce a plurality of chunked encoded audio video content streams; for each device in the plurality of devices, creating a separate index file, each separate index file including references to at least one of the plurality of chunked encoded audio video content streams; publishing a locator for each separate index file in a catalogue; and transmitting the plurality of chunked encoded audio video content streams and each separate index file to a network. Related systems, apparatus, and methods are also described. | 05-29-2014 |
20140172188 | Security for a Wireless ECU Vehicle System - A secure wireless vehicle control system includes a power source installed in a vehicle and a plurality of electronic control units (ECUs) operative to control the operation of components of the vehicle, where each of the ECUs is connected to the power source via electrical wiring, configured with at least a communications unit for receiving security information via the electrical wiring, and also configured with a wireless transceiver operative to use the security information to secure wireless transmission. An ECU includes a wired connection to a vehicle's power source, a communications unit operative to at least receive security information via the wired connection, and a wireless transceiver operative to communicate with at least one other ECU, where the wireless transceiver is configured to use the security information to secure communications with the at least one other ECU. A method for securing wireless communications for an ECU includes receiving security information on a communications unit via a wired connection to a vehicle's power source, and using the security information to secure the wireless communications. | 06-19-2014 |