Tokens/keys for wireless communications
First Claim
Patent Images
1. A method comprising:
- producing transmit/receive unit (TRU) specific information;
using the TRU specific information to produce a token/key;
using the produced token/key to produce a watermark, signature or encryption code for using in a wireless communication.
1 Assignment
0 Petitions
Accused Products
Abstract
Tokens/keys are produced for wireless communications. These tokens/keys are used for watermarks, signature insertion, encryption and other uses. In one embodiment, contextual information is used to generate tokens/keys. The tokens/keys may be derived directly from the contextual information. The contextual information may be used in conjunction with other information to derive the tokens/keys. Tokens/keys may be exchanged between transmit/receive units. The exchange of these tokens/keys may be encrypted.
-
Citations
41 Claims
-
1. A method comprising:
-
producing transmit/receive unit (TRU) specific information;
using the TRU specific information to produce a token/key;
using the produced token/key to produce a watermark, signature or encryption code for using in a wireless communication. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A method comprising:
-
providing a first token/key for use in producing a watermark, signature or encryption code; and
based on the first token/key, producing a second token/key, the production of the second token/key is either a function of or derived from the first token/key or controlled by the first token/key.
-
-
17. A method comprising:
-
providing a plurality of information for use in generating a token/key, for use in a watermark, signature or encryption code; and
combining the plurality of information and adjusting a length of a result to facilitate the use of the token/key in producing a watermark, signature or encryption code. - View Dependent Claims (18)
-
-
19. A method for reducing transmit/receive unit (TRU) processing in a TRU, the method comprising:
-
producing at least one watermark/signature using at least one token/key; and
inserting the at least one watermark/signature onto a plurality of abstraction layers associated with a wireless communication; and
verifying the watermark/signature on at least a lowest of the plurality of abstraction layers. - View Dependent Claims (20, 21)
-
-
22. A method for determining whether a change in criteria for generating tokens/keys is necessary, the tokens/keys are used for watermarking, signature insertion or encryption, the method comprising:
-
providing token/key criteria currently used in producing tokens/keys for watermarking, signature insertion or encryption;
determining whether a length of the tokens/keys produced by the criteria meet a length requirement;
determining whether a randomness of the tokens/keys produced by the criteria meet a desired randomness; and
determining whether the tokens/keys produced by the criteria meet a time variance requirement; and
changing the criteria for producing the tokens/keys when any of the length requirement, the desired randomness or the time variance requirement are not met.
-
-
23. A method for exchanging tokens/keys between transmit/receive units (TRUs), the method comprising:
-
a first TRU producing a first token/key, the first token/key produced using TRU specific information;
encrypting the first token/key;
transmitting the encrypted first token/key to a second TRU;
the second TRU receiving the encrypted first token/key and decrypting the encrypted first token/key to produce a first decrypted token/key. - View Dependent Claims (24)
-
-
25. A method of varying security in a wireless system, the method comprising:
-
identifying a security level of a wireless environment;
determining a rate/complexity of exchange of tokens/keys, based on the identified security level, wherein the rate/complexity of token exchange increases as the identified security level increases; and
wirelessly exchanging tokens/keys at the determined rate/complexity. - View Dependent Claims (26, 27, 28)
-
-
29. A method of varying security in a wireless system, the method comprising:
-
identifying a security level of a wireless environment;
determining a type of tokens/keys associated with the identified security level, different ones of the security levels have different types of tokens/keys; and
wirelessly exchanging the determined type of tokens/keys. - View Dependent Claims (30)
-
-
31. A method for security in sensor communication, the method comprising:
-
providing a plurality of sensors;
communicating between the sensors;
at least one sensor determining a characteristic of another sensor; and
the at least one sensor sending a signal when a change in that characteristic occurs as recognition of potential tampering with the another sensor. - View Dependent Claims (32)
-
-
33. A method for providing security in a wireless communication system, the method comprising:
-
identifying a desired security level out of a plurality of security levels associated with the wireless communication system, each of the plurality of security levels providing a different type of watermark/signature/encryption than others of the security levels; and
providing the type of watermark/signature/encryption as identified by the desired security level.
-
-
34. A method comprising:
-
providing a plurality of trust zones;
providing a transmit/receive unit (TRU) in one of the plurality of trust zones;
identifying a node in another of the plurality of trust zones that the TRU wishes to communicate;
exchanging tokens/keys with the another trust zone; and
communicating with the identified node in the another trust zone after the exchange of tokens.
-
-
35. A method comprising:
-
determining a level of security/trust assurance associated with wireless communication for a transmit/receive unit (TRU); and
in response to the determined level, displaying to a user of the TRU an indication of the determined level.
-
-
36. A method for providing security in a wireless communication system, the method comprising:
-
providing a security channel over a wireless interface having a low level of detectability; and
exchanging tokens/keys over the wireless channel. - View Dependent Claims (37, 38)
-
-
39. A method for identifying a rogue transmit/receive unit (TRU) in a wireless communication system having a plurality of TRUs, the method comprising:
-
a network node receiving tokens/keys from a first TRU;
the network node requesting other TRUs to verify information of the first TRU;
comparing the received tokens/keys with the verification information by the network node; and
based on a result of the comparison, the network node determining whether the first TRU is a rogue TRU.
-
-
40. A transmit/receive unit (TRU) comprising:
-
a TRU specific token/key generation device configured to produce a token/key derived from information associated with the TRU; and
a watermark/signature/encryption code generation device having an input configured to receive the token/key and produce a watermark/signature/encryption code; and
a watermark insertion/signature insertion/encryption device having an input configured to receive a communication signal and an output configured to produce a watermark inserted/signature inserted/encrypted signal for wireless transmission. - View Dependent Claims (41)
-
Specification