Abstract:
Tokens/keys are produced for wireless communications. These tokens/keys are used for watermarks, signature insertion, encryption and other uses. In one embodiment, contextual information is used to generate tokens/keys. The tokens/keys may be derived directly from the contextual information. The contextual information may be used in conjunction with other information to derive the tokens/keys. Tokens/keys may be exchanged between transmit/receive units. The exchange of these tokens/keys may be encrypted.
Abstract:
A method and apparatus are disclosed for selectively regulating devices. In a wireless communication system, a regulation zone is defined. Devices within a regulation zone (e.g. an electronic do-not-disturb (EDND) zone) are regulated by generating and transmitting inhibiting signals into or near the regulation zone. The inhibiting signals may be messages instructing devices to disable one or more of their sensing components or actual interference signals that prevent sensing components from functioning properly or watermarks that mark illicit recordings so that such illicit recordings are precluded from being transmitted over the network.
Abstract:
At least one user data stream is layer 2/3 processed [Fig.3. ref. 24], physical layer processed [Fig. 3, ref. 26] and radio frequency processed [Fig. 3, ref. 28]. A watermark/signature is embedded [Fig. 3, ref. 30] at least one of layer 2/3, [Fig. 3, ref. 24] physical layer [Fig. 3, ref. 24] or radio frequency [Fig. 3, ref.28], producing an embedded wireless communication. The embedded wireless communication is wirelessly transferred [Fig. 3, ref. 36]. The embedded wireless communication is received [Fig. 3, ref. 34] and the watermark/signature is extracted [Fig. 3, ref. 34] from the embedded wireless communication.
Abstract:
A method and apparatus is provided for controlling a surveillance device. A recorder is configured to digitally record detected information. A privacy protection mode is selected as override mode for fully unrestricted capture of surveillance information. Otherwise, a bypass mode is selected for partially unrestricted capture of surveillance information. In bypass mode, captured information is filtered by the type of activity detected and then encrypted for access by an authorized entity. In override mode, an authorization process is used to ensure that the surveillance device remains installed in an approved location.
Abstract:
Signals encoded with watermark information are generated and broadcast into a protected area for capture by illicit recording devices along with their intended targets. An illicit recording in which at least a portion of the broadcast watermark signals are recorded is obtained and correlated with a known position of the broadcast watermark signals to yield the location of illicit recording devices. In an alternate embodiment, a surveillance device, being image and time synchronized with a signal broadcasting device, monitors and records the protected area. Illicit recordings containing the broadcast watermark are obtained and correlated with corresponding recordings taken by the surveillance device to identify the location of illicit recording devices. In an alternate embodiment, the surveillance device further monitors the quality of the broadcast watermark signals and adjusts them accordingly to achieve a desired quality level.
Abstract:
A method and system for using watermarks in communication systems is disclosed. Watermarks are typically small amounts of auxiliary data embedded in a cover signal. The cover signal is the primary communication signal, and may be binary bits, multi valued symbols, analog waveforms, or any other type of primary communication signal. Security strength indication, location tracking, intrusion detection and transmission of non-security information using watermarks are disclosed, along with a system for managing watermarks.
Abstract:
A method and apparatus for protecting and authenticating wirelessly transmitted digital information using numerous techniques. The apparatus may be a wireless orthogonal frequency division multiplexing (OFDM) communication system, a base station, a wireless transmit/receive unit (WTRU), a transmitter, a receiver and/or an integrated circuit (IC). The wireless OFDM communication system includes a transmitter which steganographically embeds digital information in an OFDM communication signal and wirelessly transmits the OFDM communication signal. The system further includes a receiver which receives the OFDM communication signal and extracts the steganographically embedded digital information from the received OFDM communication signal.
Abstract:
At least one user data stream is layer 2/3 processed [Fig.3. ref. 24], physical layer processed [Fig. 3, ref. 26] and radio frequency processed [Fig. 3, ref. 28]. A watermark/signature is embedded [Fig. 3, ref. 30] at least one of layer 2/3, [Fig. 3, ref. 24] physical layer [Fig. 3, ref. 24] or radio frequency [Fig. 3, ref.28], producing an embedded wireless communication. The embedded wireless communication is wirelessly transferred [Fig. 3, ref. 36]. The embedded wireless communication is received [Fig. 3, ref. 34] and the watermark/signature is extracted [Fig. 3, ref. 34] from the embedded wireless communication.
Abstract:
Se producen fichas virtuales/claves para comunicaciones inalámbricas. Estas fichas virtuales/claves son utilizadas para marcas de agua, inserción de firma, encriptación y otros usos. En una forma de realización, se utiliza información contextual para generar fichas/claves. Estas fichas virtuales/claves pueden derivar directamente de la información contextual. La información contextual puede ser utilizada junto con otra información para derivar las fichas virtuales/claves. Pueden intercambiarse fichas virtuales/claves entre unidades de transmisión/recepción. El intercambio de estas fichas virtuales/claves puede ser encriptado.
Abstract:
At least one user data stream is layer 2/3 processed, physical layer process ed and radio frequency processed. A watermark/signature is embedded at at least one of layer 2/3, physical layer or radio frequency, producing an embedded wireless communication. The embedded wireless communication is wirelessly transferred. The embedded wireless communication is received and the watermark/signature is extracted from the embedded wireless communication.