CN1954539A - Watermarks/signatures for wireless communications - Google Patents
Watermarks/signatures for wireless communications Download PDFInfo
- Publication number
- CN1954539A CN1954539A CN 200580002328 CN200580002328A CN1954539A CN 1954539 A CN1954539 A CN 1954539A CN 200580002328 CN200580002328 CN 200580002328 CN 200580002328 A CN200580002328 A CN 200580002328A CN 1954539 A CN1954539 A CN 1954539A
- Authority
- CN
- China
- Prior art keywords
- watermark
- transmission
- receiving element
- stamped signature
- layer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
At least one user data stream is layer 2/3 processed, physical layer processed and radio frequency processed. A watermark/signature is embedded at at least one of layer 2/3, physical layer or radio frequency, producing an embedded wireless communication. The embedded wireless communication is wirelessly transferred. The embedded wireless communication is received and the watermark/signature is extracted from the embedded wireless communication.
Description
Technical field
What the present invention was total is relevant radio communication, more especially, the invention relates to radio communication watermark/stamped signature.
Background technology
Wireless system is susceptible in some respects, also increases when new wireless technology generally increases these sensitivity.The individual user is direct communication and need not use between two parties network node produce new sensitivity in user and network with the Italian type network each other.These sensitivity can be categorized as " trust ", " right ", " identification ", " secret " reach " safety " correlated results.
" trust " is illustrated in the assurance that the data of these system communications can be shared.Be illustrative purposes, the wireless user wishes to know that communication is trusted communication node from trusted source and use to be sent to it, does not know to communicate by letter the user with the Italian type network and transmits on the tool package is checked hacker's wireless device of software.In addition, along with the use of wearing tunnel, the intermediate node that transmits communication is transparent to the wireless user.
The control of " right " (" managing entitlement ") expression data is illustrative purposes, and a wireless user has the limit right in wireless system.Yet if the Section Point collusion of user and tool supremacy (wittingly or by mistake), this user can obtain to be higher than the right that this user is allowed to.
" identification " expression is linked to the control of wireless user identification, is illustrative purposes, and the attempt of rogue's wireless device is by pretending authorized user as network with the access wireless network to use through the identification of authorized user." secret " expression keep individual, data and in the secret of literary composition, the wireless user may not wish that other people knows, he once visited which website and, particularly, be sent to the information of these addresses, as finance, medical treatment etc." safety " expression data reach the fail safe of interior literary composition, as prevent the indivedual without permission accesses to wireless user's information.
Be the sensitivity of minimizing wireless network, use as wired equity encryption (WEP), Wi-Fi Protected Access (WPA), Extensible Authentication Protocol (EAP), IEEE 802.11i and reach the technology of raising the price based on GSM.Though these technology provide some protections, they still are subject to trust, right, identification, secret and safe result influence.Be illustrative purposes, though the correct WEP gold of special wireless communication node tool key with wireless subscriber communication, this user may not know whether he can " trust " this node.
In addition, the mandate typical case who uses the user of these golden keys is the higher level generation at communication stack, in view of the above, even when these are controlled at the appropriate location, rogue wireless user or hacker's tool some (though limited) are to the access of communication stack, and this access produces leak, as blocks the service attack.
Watermark/stamped signature for establish after adding data or unique data in media to sign and/or the technology of fail safe purpose, be these sensitivity that reduce radio communication, wish that the tool alternated process is with watermark/add stamped signature in radio communication.
Summary of the invention
At least one customer traffic is that handle, the physical layer processing and radio frequency processing through layer 2/3.Watermark/stamped signature produces and embeds radio communication in wherein at least one embedding of layer 2/3, physical layer or radio frequency, and this embeds radio communication system and wirelessly transmits, and this embedding radio communication is received and this watermark/stamped signature extracts from this embedding radio communication.
Description of drawings
Fig. 1 is the explanation of existing digital communication transfer system.
Fig. 2 is the explanation of watermark digital communication transfer system.
Fig. 3 is the simplification calcspar of watermark radio communication.
Fig. 4 is the simplified flow chart of watermark radio communication.
Fig. 5 is the simplification calcspar of the transmission/receiving element (TRU) of the transmission of the various watermark of use delay transmission.
Fig. 6 is the simplification calcspar that is used for transmission/receiving element (TRU) that receive delay transmits the reception of various watermark.
Embodiment
After this, the device of wireless transmission/receiving element (WTRU) any other pattern of including, but not limited to subscriber equipment, mobile radio station, fixing or mobile subscriber's limit, beeper, stand (STA) or can under wireless environment, operating.After this alleged base station includes but not limited to B-node, address control unit, access point or at the interface arrangement of any other form of wireless environment.After this alleged transmission/receiving element (TRU) comprises WTRU, base station or radio communication device.
With reference to Fig. 1, in existing digital communication system, source data is d
Source, as binary data, these data can be represented literary composition or other numerical data in digitlization speech or image or vision signal or binary system.These data are compressed (via the method that is called source encoding) 76 sometimes and produce compressed binary data stream, are expressed as d
CompressedThis compressed data is handled by higher osi layer (as HTTP, TCP, IP layer etc.) 78 and is produced the binary data that is expressed as dHL, and the gained data are referred to as layer 380 now by the osi layer that belongs to radio interface, and layer 282, layer 184 and RF layer 86 are handled.As represented at Fig. 1, they are expressed as d respectively
3, d
2, s
1, and s
0, d
3, d
2Be binary data, however s
1, and s
0Be analog signal.At receiver-side, carry out this processing similarly, but with reverse order (after the RF serve as layer 1, then serve as layer 2, then serve as layers 3, follow to more high-rise reaching then be compressed).
To hereinafter (except claim), ' data ' and ' signal ' represents that respectively ' binary data ' reaches ' analog signal ', unless otherwise noted.
Fig. 2 shows that digital communication links processing chain, and it is modified to embed watermark/stamped signature in communication (binary system) data and/or (simulation) signal.Watermark relates to binary system watermarked data w, camouflage data or signal d or s, watermark embedding mechanisms/algorithms E and watermarked data/signal d
wOr s
w, for example according to equation 1.
s
w=E{s, w} or d
w=E{d, w} equation 1
The binary system watermarked data can be produced by the digitized simulation watermarked data, and for example, fingerprint or handwritten signature are analog signal, and it can be digitized to produce the binary system watermarked data.
Can be because of embedding the permission watermark with main source data communication, this embedding mechanism also can be considered a kind of embedding channel of definition (perhaps impliedly) in this source data itself.So, this embedding mechanism can be said and be definition ' watermark channel ' or ' embedding wireless channel '.If this channel is in layer 1 or the definition of RF layer, corresponding embedding wireless channel also can be described as ' embedding physical channels '.
This watermark/stamped signature can embed in content 85,86 (ws) before or after compression 86; During more high-rise processing 88 (wHL), embed; At layer 389 (w3), layer 290 (w2), layer 191 (w1) and layer 0 (RF) 92 (w0) embed.
Though hereinafter be, swim to be printed on the identical interior civilian of wireless transmission can use stamped signature to replace with reference to watermark.Fig. 3 narrates in the lump for the reduced graph of watermark radio communication and with the Fig. 4 that is the simplified flow chart of watermark radio communication.The user data that transmits (TX) TRU20 reception radio communication flow to reception (RX) TRU22.Customer traffic uses TX layer 2/3 processing unit 24 to handle and handles with execution level 2/3 (data link/network).Though layer 2/3 processing spec is the TRU that betides TX24 and RX42, it alternately betides other intermediate network node.Be illustrative purposes, in general mobile ground system (UMTS) communication system, layer 2/3 is handled and can be betided in radio network controller, core network or the node-b.
This is the physical layer of being handled by TX physical layer processing unit 26 through layer 2/3 deal with data, and this is handled by TX radio frequency (RF) processing unit 28 through the physical layer deal with data and is used for wireless transmission.
TX TRU20 (or alternate network node) receives the token/golden key (step 46) that is used to produce watermark, this token/golden key is to be handled by watermark flush mounting 30, it embeds this token/golden key as at any one or cross a plurality of watermark (step 48) in layer 2/3, entity or the RF layer, before embedding this token/golden key, this watermark flush mounting 30 is also carried out the coding and/or the modification of this token/golden key, so that they are for firm or more preferably meet this treated customer traffic.
It is by antenna or aerial array 32 emissions (step 50) that watermark embeds RF communication, through embedding communication is to receive (step 52) by antenna that receives (RX) TRU22 or aerial array 34 in wave point 36, this is by RX radio frequency handling device 38 handled RF through received communication, this handles communication through RF is by RX physical layer processing unit 40 handled physical layers, and this is to produce customer traffic by RX layer 2/3 processing unit 42 handled layers 2/3 through the physical layer deal with data.Any one cross radio frequency, physical layer or layer 2/3 in a plurality of processing during, this extracts (step 54) through embedding watermark by watermark extraction element 44, produces as is used to authenticate and the token/golden key of other trust, right, identification, secret and security purpose.
The lower level that use swims to be printed on open system interconnection (OSI) (OSI) pattern provides potential advantage.The authentication of radio communication can betide low osi layer and desire communication can be in these lower level identification.As a result, discardable or stop that these communications make it unlikely and handled by higher level of abstraction, exempt unnecessary higher layer process and disengage resource.In addition, because these communications of not desiring can not prevent some attack at wireless system, as block the service attack by to higher level.
Lower layer authentication also provides the increase fail safe of radio communication, lower layer authentication tends authentication specific wireless connects, as a result, use the individual without permission who suitably connects to be identified, will reach this purpose at higher level of abstraction and be more difficult reaching sometimes for impossible.Be illustrative purposes, one through authorized user can provide User names and passwords to second user to allow unauthorized user's access safe wireless network, if this unauthorized user does not know necessary wireless watermark or does not have hardware/software to produce this kind watermark, then can not allow this unauthorized user's access safe wireless network, though this user is to use validated user title and password.
Through embedding physical channels
Use two major techniques to produce this watermark radio communication: at first, use the redetermination watermark channel or the second that is embedded in physical channels, this swims to be printed on existing wireless channel direct mint-mark.In first technology, the definition new channel is to carry this watermark, and these watermark channels are to be embedded in wireless channel.Be illustrative purposes, a technology that produces this kind channel is for slowly the amplitude modulation(PAM) wireless channel is to produce the new watermark channel that coexists with existing channel discriminatively, and watermark is to be carried by these channels.This technology shapeable is as follows, and existing wireless channel can be considered masking signal s.Watermark is w, and embedding function is that E and embedding channel are EPCH, this EPCH generating technique of follow-up narration, watermarked signal s
wBe according to equation 2.
s
w=E
EPCH{ s, w} equation 2
Be further tightening security property, can add crammed and embed channel, if this rogue TRU knows that with a kind of method this is through embedding channel in case fluid stopping common people TRU can duplicate this watermark.Can use these to carry security related data from higher osi layer through embedding channel.Being illustrative purposes, is to be carried through embedding channel by this from the encryption of higher level and other golden key, and other data of carrying at these channels can comprise " challenge character ", so TRU can authenticate itself when being challenged by another TRU or network.
Channel is preferable to be taken place with long-term continuous foundation through embedding for this; Though can use discontinuous and short-term through embedding channel.In some implementations, the watermark channel operate by one's own efforts and do not have data below wireless channel transmit, the result must keep the below channel, when it will transmit without any data.The visual camouflage work of doing the watermark channel of this wireless channel is preferably, and the data that transmit at this camouflage work wireless channel are typically the data that transmit at this channel.Non-peculiar data are in the existence of this channel, for example long is a succession of zero, can attract the attention of listener-in to this channel, this kind data are preferably the emulated data that in fact transmits at this channel, it makes the listener-in will confirm to pretend data and when is transmitted as difficulty, perhaps, can pretend channel at this and use the random order form.To through encrypting or upsetting channel, the random order form can provide the safe enough of some enforcements.
In military applications, the camouflage data that transmit can be misleading data (error message), transmit the communication node that this pretends information as if enemy unit's experience, and it is complete deciphering these misleading data or pretend data with attempt that the enemy may keep this node.In a specific embodiment, suitably the generation of quality camouflage data is preferably automation, because of manual operation with produce this kind data be easy to be mistake and can be difficulty and carry out.
Can use multiple watermark channel to blend together total frequency range of watermark channel with increase, the use of channel multiplex allows the tool frequency range to be transmitted greater than the watermark information of the capacity of a watermark channel.Be further tightening security property, when using multiple watermark channel, this watermark channel to be being predetermined this channel of form frequency hopping, the listener-in that the result monitors a channel only tool to the access of a part of watermarked data.
Can use this embedding wireless channel with allow safety operation can be a kind of be that transparent way is carried out to higher level, the result can reach the fail safe of adding and need not revise higher level software and use and do not need variation at the operational load of these layers.
The watermark physical channels
In second technology, this watermark is to embed (mint-mark) in wireless channel.Be illustrative purposes, can change the synchronization position or use and be positioned at wireless channel effectively to be carried at the watermark of this wireless channel.This technology shapeable is as follows, and existing wireless channel can be considered masking signal s.Watermark is w, and embedding function is that E and password are k, and password k can be regarded as specific wireless channel embedded technology, this follow-up narration.This watermarked signal s
wBe according to equation 3.
s
w=E
k{ s, w} equation 3
This watermarked signal s
wBeing preferably about common signal and handling operation, is stable as filtration, compression or other typical wireless network function.Also wish this watermarked signal s
wFor imperceptible, the use of watermark does not influence the operation of wireless system in perceivable mode.Be illustrative purposes, do not know that the wireless system components of watermark can be handled this radio communication and not need hardware or software modification, in addition,, wish to use a kind of safe key of form to protect this exchange if this watermark technology is that the public is known.
Two kinds of technology all can be used with invador's detecting operation, handle a specific embodiment that the invador detects and be to force TRUs to authenticate again with new mandate key and combine with this wireless network again.This WEP or other golden key are feasible can authorize through authorized user another method again in order to operate, but can transmit data up to authentication again without any TRU.
The watermark technology
Classify the different technologies of watermark down as, these technology can be used with some wireless systems (as simulation, numeral, GSM, UMTS, W-CDMA (FDD, TDD and TD-SCDMA), CDMA2000, IEEE802.11a, b, g and n, IEEE802.15, IEEE802.16, blue bud).Though they are stated as different technology, these technology can merge in every way.Be illustrative purposes, some wireless systems can use orthogonal frequency division (OFDM) and code division multiple access access (CDMA), therefore, can use the combination of OFDM and CDMA correlation technique.
Bug patch code
Most of wireless communication systems utilize the error detection/correction coding, these technology are used to carry watermark/watermark channel, technology is used and is clipped to carry watermark information, uses in some wireless systems and clips with the minimizing data bits as given number and be used for other purpose.Change is clipped form to show watermark, in each change expression watermark position of clipping form.In addition, data flow can add more existing the use to more redundancy and extra bits and clips to carry watermark information with a kind of form.Be illustrative purposes, data can and be clipped downwards to existing 1/2FEC speed in the decoding of 1/3 or 1/4 forward error correction (FEC) speed.
Another technology of utilizing error correction coding to transmit watermark be by before the channel coding of data flow with the initial FEC offset buffer of watermark.Similarly, the offset buffer that is used to produce the Cyclic Redundancy Check sign indicating number is initial by watermark, and the redundant digit of FEC sign indicating number is replaced by the position that is relevant to watermark.Transmit and receive TRU and know which redundant digit is substituted, revise the FEC tail bit and swim to be printed on those positions with embedding.In addition, this watermark can be hidden in FEC output, CRC output and circle round and turbine coding information.The typical case, this watermark is to add to this FEC output, CRC output and the modulus 2 with turbine coding information of circling round, if this watermark length is not identical with the information that is hidden, then this watermark can be applied to only a part of information/output, clog, revises or repeat with zero.
Channel coding
Some wireless channels use channel codings to be used for identification, are used to distinguish communication, to remove in the deviation of data sequence and to be used for other purpose.Watermark can use these sign indicating numbers to carry.In some wireless channels, use and to confuse sign indicating number and other sign indicating number, watermark is embedded in these sign indicating numbers, change code bit number and swim to be printed in this sign indicating number for embedding, through change bit can be this yard sequence initial, in section or whole yard sequence of this yard sequence.To highly coding (high redundancy) communication, this information is what can read, though in the little deterioration of signal to noise ratio (SINR) because of taking place through change bit.
Or the multinomial that is used to produce some yards is modified to discern this watermark, and polynomial value comprises watermarked data, and the multinomial of this watermark can be used for whole sequence or little specified portions, for example leading, partly middle or afterbody.
Some wireless system tool elasticity/adaptive modulation and encoding mechanisms change modulation and coding form with identification watermark position.Be illustrative purposes, transmit TRU and can between QPSK and 16-QAM, switch to show the watermark position.
The information bits operation
Some wireless system tools do not use position/Fu Yuan (as being preserved for following purposes) and unused time at interval.These are inserted in the watermark position do not use the position and the time interval, be illustrative purposes, often the position is added in the data to meet indicator unit or figure place, use and swim to be printed on these replacements zero filling or repeat first anteposition/Fu Yuan in rate-matched.
Or, use through using position/Fu Yuan to carry the watermark position, for example pilot tone, control and information, the pre-defined location updating data bit in this is to carry this watermark.Another technology of carrying watermark is for rotating the position mutually, and as Fu Yuanqun, these changes slowly take place in time, in the change demonstration watermark position of phase.
Miscellaneous entity/RF technology
In some radio communications, use pulse shaping filter and frequency spectrum shaping filter, be modified in the employed coefficient of pulse/frequency spectrum shaping to carry watermark, the coefficient sets of selecting to produce pulse/spectral shape is carried this watermark, and reception TRU analyzes this shape through received pulse/frequency spectrum and is used for transmission to determine which coefficient.Be illustrative purposes, allow pulse/spectral shape, as many as log if use N group coefficient to produce
2Difference can be selected by each coefficient sets in the watermark position of N.
General wish accurately to transmit modulation to help being illustrative purposes in the accurate demodulation that receives TRU at the radio communication tool, at the QPSK modulation, typical case on these four potential transmissions group values can be considered a little and typical upward value (1+j, 1-j ,-1+j reach-1-j).These values can the position/symbol be first or these values do not form accurate point with the demonstration watermark by compensation, as forms little curve but not accurate point value, with identification watermark position.
Be used for the streamed wireless communication system of user data what some comprised 3GPP and 3GPP2, there be may making up of some physical layer parameters such as FEC form, FEC coding and modulation form, in 3GPP, these parameters are transformat configuration (TFC), and TFC transmits the selection of data and carried this watermark.
RF is relevant
Be to show the watermark position, adjust carrier frequency, these adjustment are preferably and occur in certain time interval and make them to rein in drift and other carrier frequency drift difference by all general.Adjustment amount is the demonstration of watermark position.Be illustrative purposes, carrier wave can be by the increment adjustment of hundreds of or thousands of hertz (Hz).
The problem of vibration for considering in communication, watermark can be imprinted at signal by producing artificial vibration.Be illustrative purposes, slowly confusing the sign indicating number vibration is to introduce about carrier frequency, and watermark information is the effective frequency shift keying at vibration top modulation.
For carrying the watermark position, revise the temporary transient of channel and postpone feature, be illustrative purposes, the transmission of data by artificial delay to show the watermark position.In the CDMA formal system, this kind delay betides channelization code, also is used to show the watermark position in the difference of code delay.
Antenna is relevant
Going into/have more in (MIMO) communication, this MIMO channel that is produced by various antenna modules can be considered spatial diffusion function more, revises institute's MIMO waveform that transmits with demonstration watermark position, be illustrative purposes, during opening the loop spatial diffusion, use matrix, as the Hadamard matrix, to carry the position.The specific rotatable sequence that is used for spatial diffusion is to be used to carry the watermark position, a method of carrying out this is for using the Shelton-Butler matrix but not the hardware version of Hadamard matrix, switch to different matrixes and input or output port and change the phase rotatable sequence automatically, produce watermark.
Transmit another technology of watermark and use antenna polarization, the polarization of change antenna or aerial array with the modulation position so that watermark to be provided.Be illustrative purposes, polarization changes with the synchronization pseudo-random way.
Concentrate at the transmission branch, use various coding techniquess, block coding during as sky (STBC) and empty block coding (SFBC) are frequently revised these and are accorded with first codings to carry the watermark position.Be illustrative purposes, every a watermark that accords with the Fu Yuanke in unit's cycle by a counter-rotating or a position of nonreversible embedding.
Delay transmit diversity
In wireless system, revise wireless channel and make the information that the receiving channels delayed data is revised as watermark carry media.At receiver, extract watermark and decipher the channel delay data characteristics of carrying this watermark with extraction by the stretching, extension of channel estimation.
Use the feature of propagating channel to embed this watermark, result, this watermark very difficulty detect or check if do not know this watermark, or this receiver is not known institute's operation technique.In addition, this technology provide the receiver of not knowing watermark can operate and this adding information not decoded, say that specifically equipment still can use these technical operations in the existing structure.
A specific embodiment of this technology is illustrated in Fig. 5 and 6, and Fig. 5 is for transmitting the simplification calcspar of TRU, and diversity conveyer 60 can be and comprises prepare any suitable conveyer that transmits on diversity antenna, specifically says, it should comprise two each and every one other conveyer chains.This diversity conveyer 60 is incorporated into and can be changed (can adjust) and postpone 64, but change delay 64 in one way modulation so that the relative delay of second antenna equal the value of watermark position.Though two transmission antennas 66 of illustrated use, this specific embodiment can extend to the antenna module of any number by adding extra delay.
Watermark form generator 62 produces the watermark sequence, as the quasi-random sequence.The signal that deferred mount 64 transmits on antenna module with respect to the reference antenna component delays is with response watermark form.Be illustrative purposes, delay can be controlled in the unit at a plurality of chips or symbol, and preferably adjusts and make average retardation
(or in a plurality of channel some) people having the same aspiration and interest frequency range greater than channel.
Transmit antenna 66 for enough incoherent to guarantee that this signal manifests diversity relative to each other, this can be by the suitably utilization of antenna, poliarizing antenna or oriented antenna and finish respectively, be preferably, this antenna separates with the value greater than the carrier wavelength twice, though can use less interval.
Though this technical descriptioon is for being used for multiple antenna, it can use at single antenna, and postponing to reach not, delayed data stream all can merge and emission at single antenna.In this kind configuration, be chosen in delay between data flow to allow the difference of these two signals.As a result, the artificial multi-path that receives TRU about this is given birth in the miscarriage of second data, specifically says, adjusts this delay and makes this average retardation
(or in a plurality of channel some) people having the same aspiration and interest frequency range greater than channel.
Fig. 6 illustrates and receives TRU, this reception antenna 68 or the wireless transmission of array received.Channel estimation or path search device 70 (the follow-up channel estimation that is called) are a kind of technology that is used for channel-identification node coefficient or delay path.Be also referred to as the delay distribution of channel in the distribution of delay path time.
Watermark sequence generator 72 be used for local produce this with reference to the secret copy of watermark (or golden key) with relatively (or associated) this through receiving watermark.Zone secret copy also can be obtained by some other devices, the duplicate of subscriber information module (SIM) card of the global system of for example mobile by being stored in (GSM) phone.
Use correlator 74 relatively should if should be relevant, then should be considered to the requirement of recipient institute through receiving watermark (in this channel estimation) and this zone secret copy through receiving watermark for high (be higher than to specify and pardon line) as>0.9.
Though the accompanying drawing of present specification is with respectively assembly explanation, these assemblies can be at single IC for both (IC), for example according to special applications customized integrated circuit (ASIC), multiple ICs, separation assembly or separation assembly and the combination of IC (s).
Though characteristic of the present invention and assembly are described in preferred embodiment with special combination, each characteristic or assembly be other characteristic of this preferred embodiment of tool and assembly and use separately or with tool or do not have other characteristic of the present invention and the various of assembly and be used in combination not.
Claims (43)
1. method, it comprises:
Handle and radio frequency processing at least one customer traffic execution level 2/3 processing, physical layer;
Embed watermark/stamped signature in layer 2/3, physical layer or radio frequency at least one of them, to produce through embedding radio communication;
Wireless transmission this through embedding radio communication; And
Receive this through embedding radio communication and extracting this watermark/stamped signature through embedding radio communication from this.
2. method according to claim 1 is characterized in that further comprising reception token/golden key and handles this through embedding token/golden key, be used to embed this watermark/stamped signature in this through embedding radio communication.
3. method according to claim 1 is characterized in that this is used for authentication one communication before layer 2/3, physical layer and radio frequency processing are being any main processing of a high osi layer through embedding watermark/stamped signature.
4. method according to claim 1 is characterized in that embedding this watermark/stamped signature and produces the watermark channel that carries at least one physical channels of this customer traffic and carry the watermark/stamped signature information that embeds this at least one physical channels.
5. method according to claim 4 is characterized in that this is the security related data of high osi layer through embedding that the watermark channel carries from layer 2/3, physical layer and radio frequency processing.
6. method according to claim 4 is characterized in that this watermark channel encrypts.
7. method according to claim 4 is characterized in that this at least one physical channels is maintained at during will be when this at least one physical channels transmits without any user data, makes and can keep this watermark channel.
8. method according to claim 1 is characterized in that this watermark/stamped signature is to be imprinted at least one physical channels.
9. method according to claim 1 is characterized in that being to use error detection/error correction coding and embeds this watermark/stamped signature.
10. method according to claim 1 is characterized in that being to use confusing/channelization code and embed this watermark/stamped signature.
11. method according to claim 1 is characterized in that being to use the customer traffic position and embeds this watermark/stamped signature.
12. method according to claim 1 is characterized in that it being to embed this watermark/stamped signature by adjusting pulse/spectral shape.
13. method according to claim 1 is characterized in that this watermark/stamped signature is to embed this watermark/stamped signature by adjusting modulation.
14. method according to claim 1 is characterized in that it being that the one at least that reaches in temporary transient/delay feature by adjustment carrier frequency, vibration embeds this watermark/stamped signature.
15. method according to claim 1 is characterized in that it being to embed this watermark/stamped signature by adjusting antenna polarization.
16. method according to claim 1 is characterized in that being to use the phase rotatable sequence and adjusts this watermark/stamped signature to be used for MIMO communication.
17. method according to claim 16 is characterized in that this rotates mutually to be to use Shelton-Butler matrix hardware and to switch input/output end port and carry out.
18. method according to claim 1 is characterized in that it being that delay by changing between a plurality of transmission antennas embeds this watermark/stamped signature.
19. method according to claim 1 is characterized in that the layer 2/3 of this user data is handled, physical layer is handled and radio frequency processing is performed by transmission/receiving element.
20. method according to claim 1 is characterized in that the layer 2/3 of this user data is handled, physical layer is handled and radio frequency processing is performed by transmission/receiving element and at least one network node.
21. a transmission/receiving element comprises:
Device at least one customer traffic execution level 2/3 processing, physical layer processing and radio frequency processing;
Embed watermark/stamped signature in layer 2/3, physical layer or radio frequency at least one of them and produce through embedding the device of radio communication;
Wireless receiving should be through embedding the device of radio communication.
22. transmission/receiving element according to claim 21, it is characterized in that further comprising reception token/golden key and handle this through embed token/golden key be used to embed this watermark/stamped signature in this through embedding radio communication.
23. transmission/receiving element according to claim 21 is characterized in that this is to be used for authentication one communication before layer 2/3, physical layer and radio frequency processing are being any main processing of high osi layer through embedding watermark/stamped signature.
24. transmission/receiving element according to claim 21 is characterized in that this embeds this watermark/stamped signature and produces the watermark channel that carries at least one physical channels of this customer traffic and carry the watermark/stamped signature information that embeds this at least one physical channels.
25. transmission/receiving element according to claim 24 is characterized in that this is the security related data of high osi layer through embedding that the watermark channel carries from layer 2/3, physical layer and radio frequency processing.
26. transmission/receiving element according to claim 24 is characterized in that this watermark channel is what encrypt.
27. transmission/receiving element according to claim 24 is characterized in that this at least one physical channels is maintained at during will be when this at least one physical channels transmits without any user data, makes and can keep this watermark channel.
28. transmission/receiving element according to claim 21 is characterized in that this watermark/stamped signature is imprinted at least one physical channels.
29. transmission/receiving element according to claim 21 is characterized in that being to use error detection/error correction coding and embeds this watermark/stamped signature.
30. transmission/receiving element according to claim 21 is characterized in that being to use confusing/channelization code and embed this watermark/stamped signature.
31. transmission/receiving element according to claim 21 is characterized in that being to use the customer traffic position and embeds this watermark/stamped signature.
32. transmission/receiving element according to claim 21 is characterized in that it being to embed this watermark/stamped signature by adjusting pulse/spectral shape.
33. transmission/receiving element according to claim 21 is characterized in that it being to embed this watermark/stamped signature by adjusting modulation.
34. transmission/receiving element according to claim 21 is characterized in that it being that the one at least that reaches in temporary transient/delay feature by adjustment carrier frequency, vibration embeds this watermark/stamped signature.
35. transmission/receiving element according to claim 21 is characterized in that embedding this watermark/stamped signature by adjusting antenna polarization.
36. transmission/receiving element according to claim 21 is characterized in that using the phase rotatable sequence to adjust this watermark/stamped signature to be used for MIMO communication.
37. transmission/receiving element according to claim 36 is characterized in that this rotates mutually to be to use Shelton-Butler matrix hardware and to switch input/output end port and carry out.
38. transmission/receiving element according to claim 21 is characterized in that it being that delay by changing between a plurality of transmission antennas embeds this watermark/stamped signature.
39. transmission/receiving element according to claim 21 is characterized in that the layer 2/3 of this user data is handled, physical layer is handled and radio frequency processing is to be carried out by transmission/receiving element.
40. transmission/receiving element according to claim 21 is characterized in that the layer 2/3 of this user data is handled, physical layer is handled and radio frequency processing is to be carried out by transmission/receiving element and at least one network node.
41. transmission/receiving element according to claim 21 is characterized in that this transmission/receiving element is wireless transmission/receiving element.
42. transmission/receiving element according to claim 21 is characterized in that this transmission/receiving element is a base station.
43. transmission/receiving element according to claim 21 is characterized in that this integrated circuit comprises this final controlling element, this flush mounting and this radio transmission device.
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US53613304P | 2004-01-13 | 2004-01-13 | |
US60/536,133 | 2004-01-13 | ||
US60/536,144 | 2004-01-13 | ||
US60/630,874 | 2004-11-24 |
Publications (1)
Publication Number | Publication Date |
---|---|
CN1954539A true CN1954539A (en) | 2007-04-25 |
Family
ID=38059773
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 200580002328 Pending CN1954539A (en) | 2004-01-13 | 2005-01-12 | Watermarks/signatures for wireless communications |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1954539A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101960776A (en) * | 2008-03-04 | 2011-01-26 | 皇家飞利浦电子股份有限公司 | Method of identifying physic layer based on embedded water mark in transmitter of OFDM communication system |
CN105323132A (en) * | 2014-07-29 | 2016-02-10 | 韩国电子通信研究院 | Method and apparatus for serial bus communication based on orthogonal signal waveform |
CN106603190A (en) * | 2016-11-28 | 2017-04-26 | 华中科技大学 | Hidden information transmission method based on radio frequency watermarking signal |
-
2005
- 2005-01-12 CN CN 200580002328 patent/CN1954539A/en active Pending
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101960776A (en) * | 2008-03-04 | 2011-01-26 | 皇家飞利浦电子股份有限公司 | Method of identifying physic layer based on embedded water mark in transmitter of OFDM communication system |
CN105323132A (en) * | 2014-07-29 | 2016-02-10 | 韩国电子通信研究院 | Method and apparatus for serial bus communication based on orthogonal signal waveform |
CN106603190A (en) * | 2016-11-28 | 2017-04-26 | 华中科技大学 | Hidden information transmission method based on radio frequency watermarking signal |
CN106603190B (en) * | 2016-11-28 | 2019-03-19 | 华中科技大学 | A kind of hidden information transmission method based on radio frequency watermark signal |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR100776936B1 (en) | Watermarks/signatures for wireless communications | |
TWI381697B (en) | Code division multiple access (cdma) method and apparatus for protecting and authenticating wirelessly transmitted digital information | |
US20070121939A1 (en) | Watermarks for wireless communications | |
EP1863301B1 (en) | Method and apparatus for encrypting a security key in a mobile communication terminal | |
KR20070100850A (en) | Method and apparatus for enhancing security of wireless communications | |
US8229118B2 (en) | Method and apparatus for authentication in wireless communications | |
Rahbari et al. | Full frame encryption and modulation obfuscation using channel-independent preamble identifier | |
US9065632B2 (en) | Message authentication using a universal hash function computed with carryless multiplication | |
US6917641B2 (en) | Method and apparatus for detecting software tampering in a subscriber device | |
CN1954539A (en) | Watermarks/signatures for wireless communications | |
CN1661954B (en) | Method of generating a cryptosynchronism | |
US20170366968A1 (en) | Reducing detectability of an encryption key | |
CN109417469B (en) | MIMO system secure pairing method | |
Fang et al. | Towards phy-aided authentication via weighted fractional fourier transform | |
CN113595719A (en) | Link layer beacon encryption method based on packet CBC mode | |
Amanna et al. | Realizing physical layer authentication using constellation perturbation on a software-defined radio testbed | |
CN113726481B (en) | Secure communication method, device and system for wireless communication | |
MXPA06007944A (en) | Watermarks/signatures for wireless communications | |
MXPA06004980A (en) | Method and apparatus for authentication in wireless communications | |
MXPA06005168A (en) | Authentication of a wireless communication using expiration marker |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
REG | Reference to a national code |
Ref country code: HK Ref legal event code: DE Ref document number: 1102655 Country of ref document: HK |
|
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Open date: 20070425 |
|
REG | Reference to a national code |
Ref country code: HK Ref legal event code: WD Ref document number: 1102655 Country of ref document: HK |