SYSTEMS AND/OR METHODS OF INCREASED PRIVACY WIRELESS COMMUNICATIONS
First Claim
1. A system that is configured to communicate information, the system comprising:
- a first communications mode; and
a second communications mode that comprises an increased level of privacy compared to the first communications mode;
wherein the system is configured to preferentially use the second communications mode to communicate the information and refrain from using the first communications mode to communicate the information responsive to a privacy level of the information being at or above a threshold; and
wherein the system is further configured to preferentially use the first communications mode to communicate the information and refrain from using the second communications mode to communicate the information responsive to the privacy level of the information being below the threshold.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems, methods and/or mobile devices are provided that enable a level of privacy/security in wireless communications to be increased responsive to a content of the wireless communications, biometric data and/or a position from which the wireless communications takes place. A plurality of communications modes is used by the system infrastructure and the plurality of mobile devices communicating therewith to increase privacy and undetectability of transmitted signals. The increased level of privacy and undetectability of signals is provided via pseudo-randomly generated signaling alphabets that are used by the mobile devices and by the system infrastructure to provide the communications. This represents a level of encryption/scrambling that is over and above the conventional encryption and/or scrambling at the bit level. Accordingly, systems, methods and/or devices providing a concatenated level of encryption/scrambling are provided.
143 Citations
62 Claims
-
1. A system that is configured to communicate information, the system comprising:
-
a first communications mode; and a second communications mode that comprises an increased level of privacy compared to the first communications mode; wherein the system is configured to preferentially use the second communications mode to communicate the information and refrain from using the first communications mode to communicate the information responsive to a privacy level of the information being at or above a threshold; and wherein the system is further configured to preferentially use the first communications mode to communicate the information and refrain from using the second communications mode to communicate the information responsive to the privacy level of the information being below the threshold. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31)
-
2. The system according to claim 1, wherein said privacy level of the information is set by an element of the system, by a person who desires to communicate the information, responsive to a value of time, responsive a value of position, responsive to biometric data, responsive to a distance over which the information is to be communicated and/or responsive to a signal strength;
-
wherein said increased level of privacy of the second communications mode prevents an unintended receiver from detecting the information that is communicated via the second communications mode; and wherein the unintended receiver is capable of detecting the information if the information is communicated via the first communications mode.
-
-
3. The system according to claim 1, wherein the system is further configured to preferentially use the second communications mode to communicate the information and refrain from using the first communications mode to communicate the information responsive to a value of time, a value of position, biometric data, a distance over which the information is to be communicated and/or a signal strength.
-
4. The system according to claim 1, wherein the system is at least a part of a computer, transceiver, radioterminal, satellite, satellite gateway, airborne platform, base station, access point and/or femtocell.
-
5. The system according to claim 1, wherein the first communications mode is based upon TDM/TDMA, CDM/CDMA, FDM/FDMA, OFDM/OFDMA, GSM, WiMAX and/or LTE and comprises a first level of cyclostationarity;
-
wherein the second communications mode comprises a signaling alphabet that is pseudo-randomly generated responsive to a key, statistical distribution and orthogonalization procedure; and wherein the second communications mode comprises a second level of cyclostationarity that is less than the first level of cyclostationarity of the first communications mode.
-
-
6. The system according to claim 5, wherein the key is a user defined key and/or a network defined key;
-
wherein the user defined key is determined by a user of the system and/or by a device of the user of the system, is unique to the user of the system and differs for different users of the system; wherein the network defined key is determined by an element of a network which includes the system and/or provides communications to the system; and wherein the network defined key is commonly used by a plurality of users of the system and/or network.
-
-
7. The system according to claim 6, wherein the system is a mobile device that is configured to communicate with a base station and with an access point;
-
wherein the mobile device is further configured to preferentially communicate with the access point when proximate thereto and to refrain from communicating with the base station when proximate to the access point even thought the mobile device is able to communicate with the base station when proximate to the access point; wherein the mobile device is configured to preferentially communicate with the access point when proximate thereto and to preferentially use the second communications mode to communicate therewith; and wherein the second communications mode is based upon the user defined key and is also based upon said signaling alphabet that is pseudo-randomly generated.
-
-
8. The system according to claim 7, wherein the user defined key is unique to the mobile device, is used only for the communications of the mobile device and can be changed only by a user of the mobile device and/or by the mobile device by using an identification code, a user name and/or a password.
-
9. The system according to claim 7, wherein the user defined key is provided to the access point and/or to the base station by accessing a web site and providing to the web site said user defined key;
- and
wherein the web site is connected to the access point and/or to the base station.
- and
-
10. The system according to claim 7, wherein the second communications mode is based upon the user defined key over a first time interval and is based upon the network defined key over a second time interval;
- and
wherein the mobile device is further configured to hand-over communications from communications that are based upon the user defined key to communications that are based upon the network defined key and/or from communications that are based upon the network defined key to communications that are based upon the user defined key.
- and
-
11. The system according to claim 7, wherein the mobile device is configured to preferentially communicate with the access point using frequencies of a satellite band of frequencies.
-
12. The system according to claim 7, wherein the mobile device is configured to preferentially communicate with the access point using frequencies of an unlicensed and/or licensed band of frequencies.
-
13. The system according to claim 7, wherein the mobile device is configured to preferentially communicate with the access point using optical band frequencies, ultra violet frequencies and/or infrared frequencies.
-
14. The system according to claim 7, wherein the mobile device is further configured to communicate with the access point and/or base station using the second communications mode and the user defined key responsive to a first orientation of the mobile device relative to another device that is also communicating with the access point and/or base station concurrently and co-frequency with said mobile device;
- and
wherein the mobile device is further configured to communicate with the access point and/or base station using the second communications mode and the network defined key responsive to a second orientation of the mobile device relative to said another device that is also communicating with the access point and/or base station concurrently and co-frequency with said mobile device.
- and
-
15. The system according to claim 6, wherein the system is a mobile device that is configured to communicate with a base station and with an access point;
-
wherein the mobile device is configured to communicate with the base station using the second communications mode, the network defined key and said signaling alphabet that is pseudo-randomly generated; wherein the base station also uses said signaling alphabet to communicate with the mobile device and to also communicate with at least one other device concurrently and co-frequency with the mobile device; wherein the mobile device is further configured to use a first element of said signaling alphabet and to refrain from using a second element of said signaling alphabet that is being used by the at least one other device responsive to a first orientation of the mobile device relative to the at least one other device; and wherein the mobile device is further configured to use the first element and the second element of said signaling alphabet while said first element and said second element are also being used by the at least one other device responsive to a second orientation of the mobile device relative to the at least one other device.
-
-
16. The system according to claim 15, wherein the mobile device is further configured to communicate with the access point and/or base station using the second communications mode based upon the user defined key;
-
wherein the user defined key is provided to the access point and/or base station by accessing a web site and providing to the web site said user defined key; and wherein the web site is connected to the access point and/or to the base station.
-
-
17. The system according to claim 15, wherein the second communications mode is based upon the user defined key over a first time interval and is based upon the network defined key over a second time interval;
- and
wherein the mobile device is further configured to hand-over communications from communications that are based upon the user defined key to communications that are based upon the network defined key and/or from communications that are based upon the network defined key to communications that are based upon the user defined key.
- and
-
18. The system according to claim 6, wherein the system is a mobile device that is configured to communicate with a base station and with an access point;
-
wherein the mobile device is further configured to communicate with the base station using the second communications mode, the network defined key and said signaling alphabet that is pseudo-randomly generated, responsive to a first orientation between the mobile device and another device; and wherein the mobile device is further configured to communicate with the base station using the second communications mode, the user defined key and said signaling alphabet that is pseudo-randomly generated, responsive to a second orientation between the mobile device and said another device.
-
-
19. The system according to claim 18, wherein the user defined key is provided to the access point and/or base station by accessing a web site and providing to the web site said user defined key;
- and
wherein the web site is connected to the access point and to the base station.
- and
-
20. The system according to claim 18, wherein the second communications mode is based upon the user defined key over a first time interval and is based upon the network defined key over a second time interval;
- and
wherein the mobile device is further configured to hand-over communications from communications that are based upon the user defined key to communications that are based upon the network defined key and/or from communications that are based upon the network defined key to communications that are based upon the user defined key.
- and
-
21. The system according to claim 6, wherein the system is a base station that is configured to communicate with a first device and with a second device concurrently and co-frequency;
-
wherein the base station is configured to communicate with the first device and with the second device using the second communications mode, the network defined key and said signaling alphabet that is pseudo-randomly generated; wherein the base station is further configured to use a first element of the signaling alphabet to communicate with the first device and to refrain from using a second element of the signaling alphabet to communicate with the first device while said second element is being used by the base station to communicate with the second device, responsive to a first orientation of the first device relative to the second device; and wherein the base station is further configured to use the first element and the second element of the signaling alphabet to communicate with said first device while said first element and said second element are also being used by the base station to communicate with said second device, responsive to a second orientation of the first device relative to the second device.
-
-
22. The system according to claim 21, wherein the second orientation between the first device and the second device allows an antenna of the base station, comprising a plurality of elements, to form a first antenna pattern and use the first antenna pattern to communicate with the first device and to also form a second antenna pattern and use the second antenna pattern to communicate with the second device;
-
wherein a gain of the first antenna pattern in a direction associated with the first device is greater than a gain of the first antenna pattern in a direction associated with the second device; and wherein a gain of the second antenna pattern in a direction associated with the second device is greater than a gain of the second antenna pattern in a direction associated with the first device.
-
-
23. The system according to claim 22, wherein the plurality of elements comprises a first plurality of vertically disposed elements and/or a second plurality of horizontally disposed elements and wherein responsive to said second orientation the system uses antenna pattern discrimination between the first and second antenna patterns to reduce interference between the communications of the first and second devices;
- and
wherein responsive to said first orientation the system uses element discrimination between different elements of the signaling alphabet to reduce interference between the communications of the first and second devices.
- and
-
24. The system according to claim 6, wherein the system is a base station that is configured to communicate with a first device using the second communications mode and to communicate with a second device also using the second communications mode;
-
wherein the base station is further configured to communicate with the first device and with the second device concurrently and co-frequency; wherein the base station is configured to communicate with the first device and with the second device using the network defined key and said signaling alphabet that is pseudo-randomly generated, responsive to a first orientation between the first device and the second device; and wherein the base station is further configured to communicate with the first device using a first user defined key and a first signaling alphabet that is pseudo-randomly generated based upon the first user defined key and a statistical distribution and to communicate with the second device using a second user defined key and a second signaling alphabet that is pseudo-randomly generated based upon the second user defined key and a statistical distribution, responsive to a second orientation between the first device and the second device.
-
-
25. The system according to claim 24, wherein the second orientation between the first device and the second device allows an antenna of the base station, comprising a plurality of elements, to form a first antenna pattern and use the first antenna pattern to communicate with the first device and to also form a second antenna pattern and use the second antenna pattern to communicate with the second device;
-
wherein a gain of the first antenna pattern in a direction associated with the first device is greater than a gain of the first antenna pattern in a direction associated with the second device; and wherein a gain of the second antenna pattern in a direction associated with the second device is greater than a gain of the second antenna pattern in a direction associated with the first device.
-
-
26. The system according to claim 25, wherein the plurality of elements comprises a first plurality of vertically disposed elements and/or a second plurality of horizontally disposed elements;
-
wherein responsive to said second orientation the system uses antenna pattern discrimination between the first and second antenna patterns to reduce interference between the communications of the first and second devices; and wherein responsive to said first orientation the system uses element discrimination between different elements of the signaling alphabet to reduce interference between the communications of the first and second devices.
-
-
27. The system according to claim 6, wherein the system is an access point that is configured to preferentially communicate with a first device and is further configured to preferentially use the second communications mode to communicate with the first device responsive to an identity of the first device even though said first device is within a service area of a base station and is capable of communicating with the base station;
- and
wherein the access point is further configured to deny service to a second device responsive to an identity of the second device.
- and
-
28. The system according to claim 27, wherein the access point is configured to communicate with the first device by using only the second communications mode.
-
29. The system according to claim 27, wherein said identity of the first device is specified to the access point by accessing a web site and providing to the web site an indication of the identity of the first device and wherein the web site is connected to the access point.
-
30. The system according to claim 27, wherein the second communications mode is based upon the user defined key and wherein the user defined key is specified to the access point by accessing a web site and providing to the web site said user defined key and wherein the web site is connected to the access point.
-
31. The system according to claim 27, wherein the second communications mode is based upon the user defined key over a first time interval and is based upon the network defined key over a second time interval;
- and
wherein the access point is further configured to hand-over communications from communications that are based upon the user defined key to communications that are based upon the network defined key and/or from communications that are based upon the network defined key to communications that are based upon the user defined key.
- and
-
2. The system according to claim 1, wherein said privacy level of the information is set by an element of the system, by a person who desires to communicate the information, responsive to a value of time, responsive a value of position, responsive to biometric data, responsive to a distance over which the information is to be communicated and/or responsive to a signal strength;
-
-
32. A method of communicating information, the method comprising:
-
configuring a first communications mode; configuring a second communications mode comprising an increased level of privacy relative to the first communications mode; using the second communications mode to communicate the information and refraining from using the first communications mode to communicate the information responsive to a privacy level of the information being at or above a threshold; and using the first communications mode to communicate the information and refraining from using the second communications mode to communicate the information responsive to the privacy level of the information being below the threshold. - View Dependent Claims (33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62)
-
33. The method according to claim 32, wherein said privacy level of the information is set by a device that is communicating the information, by a person who desires to communicate the information, responsive to a value of time, responsive to a value of position, responsive to biometric data, responsive to a distance over which the information is to be communicated and/or responsive to a signal strength;
-
wherein said increased level of privacy of the second communications mode prevents an unintended receiver from detecting the information that is communicated via the second communications mode; and wherein the unintended receiver is capable of detecting the information if the information is communicated via the first communications mode.
-
-
34. The method according to claim 32, further comprising:
preferentially using the second communications mode to communicate the information and refraining from using the first communications mode to communicate the information responsive to a value of time, a value of position, biometric data, a distance over which the information is to be communicated and/or a signal strength.
-
35. The method according to claim 32, wherein said communicating information is performed by a computer, transceiver, radioterminal, satellite, satellite gateway, airborne platform, base station, access point and/or femtocell.
-
36. The method according to claim 32, wherein the first communications mode is based upon TDM/TDMA, CDM/CDMA, FDM/FDMA, OFDM/OFDMA, GSM, WiMAX and/or LTE and comprises a first level of cyclostationarity;
-
wherein the second communications mode comprises a signaling alphabet that is pseudo-randomly generated responsive to a key, statistical distribution and orthogonalization procedure; and wherein the second communications mode comprises a second level of cyclostationarity that is less than the first level of cyclostationarity of the first communications mode.
-
-
37. The method according to claim 36, wherein the key is a user defined key and/or a network defined key;
-
wherein the user defined key is determined by a user of a device that is involved in said communicating information, is unique to the user of the device and differs for different users of different devices; wherein the network defined key is determined by an element of a network which includes the device and/or provides communications to the device; and wherein the network defined key is commonly used by a plurality of users of a respective plurality of devices.
-
-
38. The method according to claim 37, wherein the device is a mobile device that is configured to communicate with a base station and with an access point;
- the method further comprising;
preferentially communicating between the mobile device and the access point when the mobile device is proximate to the access point and refraining from communicating between the mobile device and the base station when the mobile device is proximate to the access point even thought the mobile device is able to communicate with the base station when proximate to the access point; and preferentially using the second communications mode during said preferentially communicating; wherein the second communications mode is based upon the user defined key and is also based upon said signaling alphabet that is pseudo-randomly generated.
- the method further comprising;
-
39. The method according to claim 38, wherein the user defined key is unique to the mobile device, is used only for the communications of the mobile device and can be changed only by a user of the mobile device who is aware of an identification code, a user name and/or a password.
-
40. The method according to claim 38, further comprising:
-
providing the user defined key to the access point and/or to the base station by accessing a web site and providing to the web site said user defined key; and connecting the web site to the access point and/or to the base station.
-
-
41. The method according to claim 38, further comprising:
-
basing the second communications mode upon the user defined key over a first time interval and basing the second communications mode upon the network defined key over a second time interval; and configuring the mobile device to hand-over communications from communications that are based upon the user defined key to communications that are based upon the network defined key and/or from communications that are based upon the network defined key to communications that are based upon the user defined key.
-
-
42. The method according to claim 38, further comprising:
preferentially communicating between the mobile device and the access point using frequencies of a satellite band of frequencies.
-
43. The method according to claim 38, further comprising:
preferentially communicating between the mobile device and the access point using frequencies of an unlicensed and/or licensed band of frequencies.
-
44. The method according to claim 38, further comprising:
preferentially communicating between the mobile device and the access point using optical band frequencies, ultra violet frequencies and/or infrared frequencies.
-
45. The method according to claim 38, further comprising:
-
communicating between the mobile device and the access point and/or base station using the second communications mode and the user defined key responsive to a first orientation of the mobile device relative to another device that is also communicating with the access point and/or base station concurrently and co-frequency with said mobile device; and communicating between the mobile device and the access point and/or base station using the second communications mode and the network defined key responsive to a second orientation of the mobile device relative to said another device that is also communicating with the access point and/or base station concurrently and co-frequency with said mobile device.
-
-
46. The method according to claim 37, wherein the device is a mobile device that is configured to communicate with a base station and with an access point;
-
wherein the mobile device is configured to communicate with the base station using the second communications mode, the network defined key and said signaling alphabet that is pseudo-randomly generated; and wherein the base station also uses said signaling alphabet to communicate with the mobile device and to also communicate with at least one other device concurrently and co-frequency with the mobile device;
the method further comprising;using by the mobile device a first element of said signaling alphabet and refraining from using by the mobile device a second element of said signaling alphabet that is being used by the at least one other device, responsive to a first orientation of the mobile device relative to the at least one other device; and using by the mobile device the first element and the second element of said signaling alphabet while said first element and said second element are also being used by the at least one other device responsive to a second orientation of the mobile device relative to the at least one other device.
-
-
47. The method according to claim 46, wherein the mobile device is further configured to communicate with the access point and/or base station using the second communications mode based upon the user defined key, the method further comprising:
-
providing to the access point and/or base station the user defined key by accessing a web site and providing to the web site said user defined key; and connecting the web site to the access point and/or to the base station.
-
-
48. The method according to claim 46, further comprising:
-
basing the second communications mode upon the user defined key over a first time interval and basing the second communications mode on the network defined key over a second time interval; and configuring the mobile device to hand-over communications from communications that are based upon the user defined key to communications that are based upon the network defined key and/or from communications that are based upon the network defined key to communications that are based upon the user defined key.
-
-
49. The method according to claim 37, wherein the device is a mobile device that is configured to communicate with a base station and with an access point, the method further comprising:
-
configuring the mobile device to communicate with the base station using the second communications mode, the network defined key and said signaling alphabet that is pseudo-randomly generated, responsive to a first orientation between the mobile device and another device; and configuring the mobile device to communicate with the base station using the second communications mode, the user defined key and said signaling alphabet that is pseudo-randomly generated, responsive to a second orientation between the mobile device and said another device.
-
-
50. The method according to claim 49, further comprising:
-
providing the user defined key to the access point and/or base station by accessing a web site and providing to the web site said user defined key; and connecting the web site to the access point and/or to the base station.
-
-
51. The method according to claim 49, further comprising:
-
basing the second communications mode upon the user defined key over a first time interval and basing the second communications mode upon the network defined key over a second time interval; and configuring the mobile device to hand-over communications from communications that are based upon the user defined key to communications that are based upon the network defined key and/or from communications that are based upon the network defined key to communications that are based upon the user defined key.
-
-
52. The method according to claim 37, wherein the device is a base station that is configured to communicate with a first transceiver and with a second transceiver concurrently and co-frequency;
- the method further comprising;
configuring the base station to communicate with the first transceiver and with the second transceiver using the second communications mode, the network defined key and said signaling alphabet that is pseudo-randomly generated; configuring the base station to use a first element of the signaling alphabet to communicate with the first transceiver and to refrain from using a second element of the signaling alphabet to communicate with the first transceiver while said second element is being used by the base station to communicate with the second transceiver, responsive to a first orientation of the first transceiver relative to the second transceiver; and configuring the base station to use the first element and the second element of the signaling alphabet to communicate with said first transceiver while said first element and said second element are also being used by the base station to communicate with said second transceiver, responsive to a second orientation of the first transceiver relative to the second transceiver.
- the method further comprising;
-
53. The method according to claim 52, wherein the second orientation between the first transceiver and the second transceiver allows an antenna of the base station, comprising a plurality of elements, to form a first antenna pattern and use the first antenna pattern to communicate with the first transceiver and to also form a second antenna pattern and use the second antenna pattern to communicate with the second transceiver;
- wherein a gain of the first antenna pattern in a direction associated with the first transceiver is greater than a gain of the first antenna pattern in a direction associated with the second transceiver; and
wherein a gain of the second antenna pattern in a direction associated with the second transceiver is greater than a gain of the second antenna pattern in a direction associated with the first transceiver.
- wherein a gain of the first antenna pattern in a direction associated with the first transceiver is greater than a gain of the first antenna pattern in a direction associated with the second transceiver; and
-
54. The method according to claim 53, wherein the plurality of elements comprises a first plurality of vertically disposed elements and/or a second plurality of horizontally disposed elements, the method further comprising:
-
using antenna pattern discrimination between the first and second antenna patterns to reduce interference between the communications of the first and second transceivers responsive to said second orientation; and using element discrimination between different elements of the signaling alphabet to reduce interference between the communications of the first and second transceivers responsive to said first orientation.
-
-
55. The method according to claim 37, wherein the device is a base station that is configured to communicate with a first transceiver using the second communications mode and to communicate with a second transceiver also using the second communications mode;
- the method further comprising;
configuring the base station to communicate with the first transceiver and with the second transceiver concurrently and co-frequency;
configuring the base station to communicate with the first transceiver and with the second transceiver using the network defined key and said signaling alphabet that is pseudo-randomly generated, responsive to a first orientation between the first transceiver and the second transceiver; andconfiguring the base station to communicate with the first transceiver using a first user defined key and a first signaling alphabet that is pseudo-randomly generated based upon the first user defined key and a statistical distribution and to communicate with the second transceiver using a second user defined key and a second signaling alphabet that is pseudo-randomly generated based upon the second user defined key and a statistical distribution, responsive to a second orientation between the first transceiver and the second transceiver.
- the method further comprising;
-
56. The method according to claim 55, wherein the second orientation between the first transceiver and the second transceiver allows an antenna of the base station, comprising a plurality of elements, to form a first antenna pattern and use the first antenna pattern to communicate with the first transceiver and to also form a second antenna pattern and use the second antenna pattern to communicate with the second transceiver;
- wherein a gain of the first antenna pattern in a direction associated with the first transceiver is greater than a gain of the first antenna pattern in a direction associated with the second transceiver; and
wherein a gain of the second antenna pattern in a direction associated with the second transceiver is greater than a gain of the second antenna pattern in a direction associated with the first transceiver.
- wherein a gain of the first antenna pattern in a direction associated with the first transceiver is greater than a gain of the first antenna pattern in a direction associated with the second transceiver; and
-
57. The method according to claim 56, wherein the plurality of elements comprises a first plurality of vertically disposed elements and/or a second plurality of horizontally disposed elements, the method further comprising:
-
using antenna pattern discrimination between the first and second antenna patterns to reduce interference between the communications of the first and second transceivers responsive to said second orientation; and using element discrimination between different elements of the signaling alphabet to reduce interference between the communications of the first and second transceivers responsive to said first orientation.
-
-
58. The method according to claim 37, wherein said device is an access point, the method further comprising:
-
configuring the access point to preferentially communicate with a first transceiver by preferentially using the second communications mode, responsive to an identity of the first transceiver even though said first transceiver is within a service area of a base station and is capable of communicating with the base station; and configuring the access point to deny service to a second transceiver responsive to an identity of the second transceiver.
-
-
59. The method according to claim 58, further comprising:
configuring the access point to communicate with the first transceiver by using only the second communications mode.
-
60. The method according to claim 58, further comprising:
-
specifying an indication of the identity of the first transceiver to the access point by accessing a web site and providing to the web site the indication of the identity of the first transceiver; and connecting the web site to the access point.
-
-
61. The method according to claim 58, wherein the second communications mode is based upon the user defined key, the method further comprising:
-
specifying the user defined key to the access point by accessing a web site and providing to the web site said user defined key; and connecting the web site to the access point.
-
-
62. The method according to claim 58, further comprising:
-
basing the second communications mode upon the user defined key over a first time interval and basing the second communications mode upon the network defined key over a second time interval; and configuring the access point to hand-over communications from communications that are based upon the user defined key to communications that are based upon the network defined key and/or from communications that are based upon the network defined key to communications that are based upon the user defined key.
-
-
33. The method according to claim 32, wherein said privacy level of the information is set by a device that is communicating the information, by a person who desires to communicate the information, responsive to a value of time, responsive to a value of position, responsive to biometric data, responsive to a distance over which the information is to be communicated and/or responsive to a signal strength;
-
Specification
- Resources
-
Current AssigneeOdyssey Wireless, Inc.
-
Original AssigneeOdyssey Wireless, Inc.
-
InventorsKarabinis, Peter D.
-
Granted Patent
-
Time in Patent OfficeDays
-
Field of Search
-
US Class Current380/270
-
CPC Class CodesH04B 1/69 Spread spectrum techniquesH04B 1/707 using direct sequence modul...H04B 1/7097 Interference-related aspectsH04B 2201/70715 with application-specific f...H04K 1/00 Secret communicationH04K 2203/18 for wireless local area net...H04K 3/25 based on characteristics of...H04K 3/827 using characteristics of ta...H04L 1/0043 Realisations of complexity ...H04L 1/009 arrangements specific to tr...H04L 1/0091 arrangements specific to re...H04L 23/02 adapted for orthogonal sign...H04L 25/03834 using pulse shapingH04L 25/03866 using scramblingH04L 25/03987 Equalisation for sparse cha...H04L 5/0007 the frequencies being ortho...H04W 12/04 Key management, e.g. using ...H04W 12/06 AuthenticationH04W 12/08 Access securityH04W 12/50 Secure pairing of devicesH04W 36/18 : for allowing seamless resel...H04W 36/185 : using make before breakH04W 48/02 : Access restriction performe...H04W 84/045 : using private Base Stations...H04W 88/08 : Access point devices