METHOD AND APPARATUS FOR SECURING LOCATION INFORMATION AND ACCESS CONTROL USING THE LOCATION INFORMATION

    公开(公告)号:CA2676450C

    公开(公告)日:2014-09-09

    申请号:CA2676450

    申请日:2008-01-25

    Abstract: A method and apparatus for securing location information and access control using the location information are disclosed. A wireless transmit/receive unit (WTRU) includes a location sensing entity and a subscriber identity module (SIM). The location sensing entity generates location information of the WTRU and the location information is embedded in a message in an SIM. A trusted processing module in the WTRU verifies integrity of the location information. The trusted processing module may be on the SIM. The location information may be physical location information or contextual location-related information. The trusted processing module is configured to cryptographically secure and bind the location information to the WTRU, and verify trust metrics of an external entity prior to granting an access to the location information or accepting information from the external entity. The trusted processing module may be a trusted computing group (TCG) trusted platform module (TPM) or mobile trusted module (MTM). The location information may be used for an authentication purpose or access control. The location information may be combined with time information.

    IMPLEMENTING A SMART ANTENNA IN A WIRELESS LOCAL AREA NETWORK

    公开(公告)号:MY149609A

    公开(公告)日:2013-09-13

    申请号:MYPI20054203

    申请日:2005-09-07

    Abstract: A METHOD FOR IMPLEMENTING A SMART ANTENNA IN ESTABLISHING ASSOCIATION BETWEEN A STATION (STA) AND AN ACCESS POINT (AP) IN A WIRELESS LOCAL AREA NETWORK BEGINS BY TRANSMITTING A BEACON FRAME (200) BY THE AP ONE ANTENNA BEAM. THE BEACON FRAME IS RECEIVED AT THE STA, WHICH MEASURES THE SIGNAL QUALITY OF THE BEACON FRAME. THE AP SWITCHES TO A DIFFERENT ANTENNA BEAM AND REPEATS THE METHOD UNTIL THE BEACON FRAME HAS BEEN TRANSMITTED ON ALL ANTENNA BEAMS (232). THE STA ASSOCIATES TO THE AP THAT TRANSMITS THE BEACON FRAME WITH THE HIGHEST SIGNAL QUALITY ON ONE OF ITS ANTENNA BEAMS. A SIMILAR METHOD MAY BE USED IN WHICH THE STA SENDS A PROBE REQUEST FRAME TO THE AP, WHICH THEN RESPONDS WITH PROBE RESPONSE FRAMES SENT ON MULTIPLE ANTENNA BEAMS.

    Virtual subscriber identity module
    73.
    发明专利

    公开(公告)号:AU2008302172B2

    公开(公告)日:2013-03-07

    申请号:AU2008302172

    申请日:2008-09-19

    Abstract: A mobile trusted platform (MTP) configured to provide virtual subscriber identify module (vSIM) services is disclosed. In one embodiment, the MTP includes: a device manufacturer- trusted subsystem (TSS-DM) configured to store and provide credentials related to a manufacturer of the MTP; a mobile network operator - trusted subsystem (MNO-TSS) configured to store and provide credentials related to a mobile network operator (MNO); and a device user/owner - trusted subsystem (TSS-DO/TSS-U) configured to store and provide credentials related to user of the MTP. The TSS-MNO includes a vSIM core services unit, configured to store, provide and process credential information relating to the MNO. The TSS-DO/TSS-U includes a vSIM management unit, configured to store, provide and process credential information relating to the user/owner of the MTP. The TSS-DO/TSS-U and the TSS-MNO communicate through a trusted vSIM service.

    METHOD AND APPARATUS FOR ANTENNA MAPPING SELECTION IN MIMO-OFDM WIRELESS NETWORKS MIMO-OFDM

    公开(公告)号:HK1161449A1

    公开(公告)日:2012-08-24

    申请号:HK12101893

    申请日:2012-02-24

    Abstract: The method involves selecting an antenna mapping at a transmitting wireless transmit/receive unit (Tx WTRU) from a candidate set of currently available antenna mappings. Another antenna mapping is selected at a receiving (Rx WTRU) from the candidate set of currently available antenna mappings. A determination is made whether the currently selected antenna mappings are calibrated at the Tx WTRU. The selected antenna mappings are calibrated if it is determined that the selected antenna mappings are not calibrated. An independent claim is also included for a wireless communication system.

    Method and apparatus for securing location information and access control using the location information

    公开(公告)号:AU2012202189A1

    公开(公告)日:2012-05-03

    申请号:AU2012202189

    申请日:2012-04-16

    Abstract: A method and apparatus for securing location information and access control using the location information are disclosed. A wireless transmit/receive unit (WTRU) includes a location sensing entity and a subscriber identity module (SIM). The location sensing entity generates location information of the WTRU and the location information is embedded in a message in an SIM. A trusted processing module in the WTRU verifies integrity of the location information. The trusted processing module may be on the SIM. The location information may be physical location information or contextual location-related information. The trusted processing module is configured to cryptographically secure and blind the location information to the WTRUU, and verify trust metrics of an external entity prior to granting an access to the location information or accepting information from the external entity. The trusted processing module may be a trusted computing group (TCG) trusted platform module (TPM) or mobile trusted module (MTM). The location information may be used for an authentication purpose or access control. The location information may be combined with time information. cAJ ~~co LL ~ C% .

    DIGITAL RIGHTS MANAGEMENT USING TRUSTED PROCESSING TECHNIQUES

    公开(公告)号:SG171651A1

    公开(公告)日:2011-06-29

    申请号:SG2011031887

    申请日:2007-05-04

    Abstract: The present invention discloses several methods to strengthen the integrity of entities, messages, and processing related to content distribution as defined by the Open Mobile Alliance (OMA) Digital Rights Management (DRM). The methods use techniques related to the Trusted Computing Group (TCG) specifications. A first embodiment uses TCG techniques to verify platform and DRM software integrity or trustworthiness, both with and without modifications to the DRM rights object acquisition protocol (ROAP) and DRM content format specifications. A second embodiment uses TCG techniques to strengthen the integrity of ROAP messages, constituent information, and processing without changing the existing ROAP protocol. A third embodiment uses TCG techniques to strengthen the integrity of the ROAP messages, information, and processing with some changes to the existing ROAP protocol.

    METHOD AND APPARATUS FOR ANTENNA MAPPING SELECTION IN MIMO-OFDM WIRELESS NETWORKS

    公开(公告)号:CA2604105C

    公开(公告)日:2011-06-07

    申请号:CA2604105

    申请日:2006-04-07

    Abstract: A method and apparatus for selecting an antenna mapping in multiple-in/multiple-out (MIMO) enabled wireless communication networks. A candidate set of currently available antenna mappings is determined based upon measured long term channel conditions. An antenna mapping is selected from the candidate set, and the mapping is calibrated with a selected antenna mapping of a receiving wireless transmit/receive unit (WTRU). When the selected mappings are calibrated, packet data transmission begins. In an alternative embodiment, a calibration training frame (CTF) is used to calibrate multiple antenna mappings simultaneously or sequentially. Also disclosed are physical layer and medium access control layer frame formats for implementing antenna mapping selection according to the invention.

    Digital rights management using trusted processing techniques

    公开(公告)号:AU2007347234B2

    公开(公告)日:2011-03-03

    申请号:AU2007347234

    申请日:2007-05-04

    Abstract: The present invention discloses several methods to strengthen the integrity of entities, messages, and processing related to content distribution as defined by the Open Mobile Alliance (OMA) Digital Rights Management (DRM). The methods use techniques related to the Trusted Computing Group (TCG) specifications. A first embodiment uses TCG techniques to verify platform and DRM software integrity or trustworthiness, both with and without modifications to the DRM rights object acquisition protocol (ROAP) and DRM content format specifications. A second embodiment uses TCG techniques to strengthen the integrity of ROAP messages, constituent information, and processing without changing the existing ROAP protocol. A third embodiment uses TCG techniques to strengthen the integrity of the ROAP messages, information, and processing with some changes to the existing ROAP protocol.

Patent Agency Ranking