Abstract:
A method and apparatus for providing a wireless transmit/receive unit (WTRU) with access to at least one peripheral device, and/or at least one peripheral device associated with an available auxiliary device. The current peripheral device requirements of the WTRU are determined. The radio frequency (RF) environment of the WTRU is scanned to determine if there are any available wireless peripheral devices or wireless auxiliary devices proximate to the WTRU. A determination is also made as to whether there is a wired peripheral device or a wired auxiliary device available. A list of currently available peripheral devices is compiled by scanning at least one peripheral device registry associated with at least one of a wireless auxiliary device and a wired auxiliary device. The list is presented on the WTRU's display and a user selects at least one of the available peripheral devices from the list.
Abstract:
Tokens/keys are produced for wireless communications. These tokens/keys are used for watermarks, signature insertion, encryption and other uses. In one embodiment, contextual information is used to generate tokens/keys. The tokens/keys may be derived directly from the contextual information. The contextual information may be used in conjunction with other information to derive the tokens/keys. Tokens/keys may be exchanged between transmit/receive units. The exchange of these tokens/keys may be encrypted.
Abstract:
In a wireless communication system comprising at least one wireless transmit/receive unit (WTRU) and a trusted entity, a method and apparatus for processing data during an event, includes storing data in a memory of the WTRU. The stored data is classified in the memory of the WTRU. The WTRU detects an event and transmits a notification signal to the trusted entity in response to the event detected. The trusted entity transmits a readiness signal to the WTRU. The WTRU transmits data classified for transfer to the trusted entity, and the trusted entity stores the data classified for transfer in a memory of the trusted entity.
Abstract:
In one embodiment, a signal associated with a service not permitted in the controlled area of a wireless transmit/receive unit is received. An identifier is sent indicating that the WTRU is in a controlled area. In a second embodiment, the transfer of data associated with a controlled area is controlled. In the controlled area, the transfer of certain data is restricted. The data associated with the controlled area is collected. The collected data is identified as being associated with the controlled area. The transfer of the identified collected data is restricted, where data that is not identified as being associated with the controlled area is not restricted.
Abstract:
A plurality of virtual wireless networks are defined. Each of the plurality of virtual wireless networks has a different set of requirements. A node (22) is capable of producing a plurality of antenna beams or patterns (20-1 - 20-4). Each virtual wireless network is associated with a unique group of the antenna beams or patterns (20-1 - 20-4). Users (16-1 - 16-4) of each of the virtual wireless networks communicate using the antenna beams or patterns (20-1 - 20-4) associated with that virtual wireless network.
Abstract:
A method and apparatus are disclosed for selectively regulating devices. In a wireless communication system, a regulation zone is defined. Devices within a regulation zone (e.g. an electronic do-not-disturb (EDND) zone) are regulated by generating and transmitting inhibiting signals into or near the regulation zone. The inhibiting signals may be messages instructing devices to disable one or more of their sensing components or actual interference signals that prevent sensing components from functioning properly or watermarks that mark illicit recordings so that such illicit recordings are precluded from being transmitted over the network.
Abstract:
The present invention is a method and apparatus for the detection of portable electronic device(100)e functionality. In a preferred embodiment, the present invention includes a chemically coated antenna(100) to serve as a trigger for device functionality detection. The chemically coated antenna may be passively or actively detected. In active detection, a detection apparatus releases a chemical which reacts or otherwise responds with the chemical trigger in a detectable manner. The detection apparatus detects the reaction, which is specific to the functionality of the portable electronic device. In a passive detection, a detection device simply detects the chemical trigger which is specific to the portable electronic device functionality. Other trigger embodiments utilizing optics, radio frequency (RF) signals, sound waves, and magnetic identification are also disclosed.
Abstract:
A method (200) for tracking content objects created on a wireless device in a wireless communication system begins by creating a content object at the wireless device (step 208). A content creation request message is sent from the wireless device to an information storage entity (ISE) (step 210). The ISE determines whether any permissions are required to create the content object (step 212). A content creation response message is sent from the ISE to the wireless device (step 224), the content creation response message including an identification key specific to the content object. The identification key is embedded into the content object by the wireless device.
Abstract:
The present invention relates to secret key generation and authentication methods that are based on joint randomness not shared by others (JRNSO), in which unique channel response between two communication terminals generates a secret key. Multiple network access points use a unique physical location of a receiving station to increase user data security. High data rate communication data is encrypted by generating a random key and a pseudo-random bit stream. A configurable interleaving is achieved by introduction of JRNSO bits to an encoder used for error-correction codes. Databases of user data are also protected by JRNSO-based key mechanisms. Additional random qualities are induced on the joint channel using MIMO eigen-beamforming, antenna array deflection, polarization selection, pattern deformation, and path selection by beamforming or time correlation. Gesturing induces randomness according to uniquely random patterns of a human user's arm movements inflected to the user device.
Abstract:
A method and system for securing wireless communications is disclosed. In on embodiment, different security policies are used based on the distance between a receiver and a transmitter, whereby data in the wireless communications can only be demodulated if received in particular trust zones. In another embodiment, a plurality of bit stream fragments are transmitted by a plurality of transmitters to a receiver located in an area where transmission patterns radiated by the transmitters intersect. Alternatively, the receiver performs a function on packet data units (PDUs) transmitted by the transmitters. In yet another embodiment, primary modulation points of a modulation points which can be demodulated only by a receiver that is within range of the transmitter. In yet another embodiment, a main waveform is transmitted which overlays a QPSK signal with hierarchical modulation (HM) having encoded descrambling information.