Abstract:
A method and apparatus for securing transmission of content created by a content generation device embedded in a wireless transmit/receive unit (WTRU) by determining what type of watermarks should be applied to the content and incorporating the watermarks in the content. The WTRU includes a content generation unit, a watermark incorporation unit, and a communication subsystem. The content generation unit is embedded in the WTRU and generates content, such as audio, video, image, text or a combination thereof. The watermark incorporation unit determines the type of watermarks that should be incorporated in the content and incorporates the watermarks in the content. The communication subsystem transmits the watermarked content.
Abstract:
A method and apparatus for protecting sensed content and warning a target of sensing is disclosed. A first transceiver, (e.g., a network server), includes a database which defines at least one zone in which sensing a target is not permitted. A second transceiver, (e.g., a cell phone), senses a target to obtain content and temporarily stores the content in a memory, after being encrypted. The cell phone transmits information to the network server which indicates the location of the cell phone. The network server receives the location information from the cell phone and determines whether the target was sensed in a "Do Not Disturb Zone". If so, the network server instructs the cell phone to delete the encrypted content from the memory. Otherwise, the network server indicates to the cell phone that the temporarily stored content may be decrypted, stored in a permanent memory and used as desired.
Abstract:
A method for protecting a content object with rights management information begins by creating a content object. Permissions are assigned to the content object, an encryption key is generated, and a content protection utility is cloned. The cloned content protection utility, the encryption key, and the permissions are appended to the content object to create a composite object. The composite object is encrypted with the encryption key to create a protected content object.
Abstract:
A method and system for using watermarks in communication systems is disclosed. Watermarks are typically small amounts of auxiliary data embedded in a cover signal. The cover signal is the primary communication signal, and may be binary bits, multi valued symbols, analog waveforms, or any other type of primary communication signal. Security strength indication, location tracking, intrusion detection and transmission of non-security information using watermarks are disclosed, along with a system for managing watermarks.
Abstract:
An Application Server Autonomous Access (ASAA) system for providing autonomous access to a wireless infrastructure by devices employing different types of access technology. The system includes a server, having an associated data storage device, for storing at least one policy, and a plurality of subnetworks, coupled to server, provide access to the server. The plurality of subnetworks employ at least two different types of access technology. A plurality of wireless transmit/receive units (WTRUs) are wirelessly coupled to at least one of the sub-networks. The server monitors the wireless coupling and, depending upon the at least one policy, switches the WTRU between different ones of the subnetworks.