Patents by Inventor Akinlolu Kumoluyi

Akinlolu Kumoluyi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20070242852
    Abstract: A method and apparatus for watermarking sensed data in a sensing device which senses a subject to obtain sensed data includes the sensing device temporarily storing the sensed data. The sensing device collects metadata associated with a user of the sensing device and temporarily stores the metadata. The sensing device generates watermarked data by watermarking the sensed data with the metadata.
    Type: Application
    Filed: November 30, 2005
    Publication date: October 18, 2007
    Applicant: InterDigital Technology Corporation
    Inventor: Akinlolu Kumoluyi
  • Publication number: 20070177729
    Abstract: A method and apparatus is used for generating a perfectly random secret key between two or more transceivers in a wireless communication network. In a point-to-point system, both transceivers produce an estimate of the channel impulse response (CIR) based on the received radio signal. The CIR estimation is synchronized and may include error correction and detection. A long secret key of bits is generated from a digitized version of the CIR estimate, from which a perfectly secret encryption key is derived by privacy amplification.
    Type: Application
    Filed: January 26, 2006
    Publication date: August 2, 2007
    Applicant: InterDigital Technology Corporation
    Inventors: Alexander Reznik, Akinlolu Kumoluyi, Guodong Zhang, Prabhakar Chitrapu, Gregory Sternberg, Yogendra Shah, Alain Charles Briancon, Chunxuan Ye
  • Publication number: 20070140494
    Abstract: A system and method for providing variable security levels in a wireless communication network. The present invention optimizes the often conflicting demands of highly secure wireless communications and high speed wireless communications. According to a preferred embodiment of the present invention, various security sensors are scanned to determine the likely presence of an intruder within a predetermined trust zone. If an intruder is likely present, the security level is changed to the highest setting, and consequently a lower data rate, while the intruder is identified. If the identified intruder is in fact a trusted node, the security level is returned to a lower setting. If the identified intruder is not a trusted node, the security level is maintained at an elevated state while the intruder is within the trust zone.
    Type: Application
    Filed: September 30, 2005
    Publication date: June 21, 2007
    Applicant: InterDigital Technology Corporation
    Inventors: Akinlolu Kumoluyi, Alexander Reznik, Guodong Zhang, Prabhakar Chitrapu, Sung-Hyuk Shin, Yingming Tsai
  • Publication number: 20070083476
    Abstract: A method and system for enforcing user rights on user data, and maintaining consistency of the user data in a data network are disclosed. Each of a plurality of entities controls one or more network devices which are connected via the data network. Each network device includes at least one user data node which contains at least one elementary piece of user data. The elementary piece of user data is associated with a traceability graph including at least one traceability link. The traceability link connects a source user data node and a destination user data node. The user data node also contains rights information which comprises a rule-based policy regarding the user data. The rights information is also propagated to other entities based on the traceability graph. Consistency of the user data is achieved and owner's rights are enforced based on the traceability graph.
    Type: Application
    Filed: August 21, 2006
    Publication date: April 12, 2007
    Applicant: InterDigital Technology Corporation
    Inventors: Sylvie Gomes, AkinLolu Kumoluyi, Alan Carlton
  • Publication number: 20070036353
    Abstract: The present invention relates to secret key generation and authentication methods that are based on joint randomness not shared by others (JRNSO), in which unique channel response between two communication terminals generates a secret key. Multiple network access points use a unique physical location of a receiving station to increase user data security. High data rate communication data is encrypted by generating a random key and a pseudo-random bit stream. A configurable interleaving is achieved by introduction of JRNSO bits to an encoder used for error-correction codes. Databases of user data are also protected by JRNSO-based key mechanisms. Additional random qualities are induced on the joint channel using MIMO eigen-beamforming, antenna array deflection, polarization selection, pattern deformation, and path selection by beamforming or time correlation. Gesturing induces randomness according to uniquely random patterns of a human user's arm movements inflected to the user device.
    Type: Application
    Filed: May 31, 2006
    Publication date: February 15, 2007
    Applicant: InterDigital Technology Corporation
    Inventors: Alexander Reznik, Debashish Purkayastha, Steven Goldberg, Robert Olesen, Marian Rudolf, Inhyok Cha, Alan Carlton, Yogendra Shah, Shamim Rahman, Rajat Mukherjee, Robert DiFazio, Gregory Sternberg, Leonid Kazakevich, Kazimierz Siwiak, Guodong Zhang, Tanbir Haque, Louis Guccione, Prabhakar Chitrapu, Akinlolu Kumoluyi, Alain Briancon
  • Publication number: 20060227640
    Abstract: A sensing apparatus having a sensing functionality controller and a method of detecting the sensing apparatus is disclosed. A signal generation unit embedded in the sensing apparatus operates in conjunction with the sensing functionality controller to support the sensing functionality of the sensing unit. The signal generation unit generates one or more sensing functionality support signals used to enhance content obtained by the sensing unit, (e.g., a flash for illuminating a sensed target such that content obtained by the sensing unit is not too dark, or a sound or light-based auto focus signal to make sure that the content is not out of focus). When the sensing functionality controller is activated, the same signal generation unit generates a detectable warning signal, (e.g., sound, light, radio wave), which indicates that the sensing functionality controller has been activated and/or the sensing unit is sensing.
    Type: Application
    Filed: November 23, 2005
    Publication date: October 12, 2006
    Applicant: InterDigital Technology Corporation
    Inventors: Richard Herschaft, Akinlolu Kumoluyi, Alain Briancon, Steven Goldberg, Peter Wang
  • Publication number: 20050226421
    Abstract: A method and system for using watermarks in communication systems is disclosed. Watermarks are typically small amounts of auxiliary data embedded in a cover signal. The cover signal is the primary communication signal, and may be binary bits, multi valued symbols, analog waveforms, or any other type of primary communication signal. Security strength indication, location tracking, intrusion detection and transmission of non-security information using watermarks are disclosed, along with a system for managing watermarks.
    Type: Application
    Filed: February 18, 2005
    Publication date: October 13, 2005
    Applicant: InterDigital Technology Corporation
    Inventors: Alain Briancon, Akinlolu Kumoluyi, Alan Carlton, Richard Herschaft, John Hoffmann, Prabhakar Chitrapu, Debashish Purkayastha
  • Publication number: 20050154925
    Abstract: Tokens/keys are produced for wireless communications. These tokens/keys are used for watermarks, signature insertion, encryption and other uses. In one embodiment, contextual information is used to generate tokens/keys. The tokens/keys may be derived directly from the contextual information. The contextual information may be used in conjunction with other information to derive the tokens/keys. Tokens/keys may be exchanged between transmit/receive units. The exchange of these tokens/keys may be encrypted.
    Type: Application
    Filed: November 23, 2004
    Publication date: July 14, 2005
    Applicant: InterDigital Technology Corporation
    Inventors: Prabhakar Chitrapu, Alain Briancon, Akinlolu Kumoluyi, Alan Carlton, Kiran Vanganuru, Richard Herschaft, John Hoffmann, John Thommana, Debashish Purkayastha, Guodong Zhang, Robert Olesen, Alexander Reznik, TieJun Shan, Sung-Hyuk Shin, Amit Singhal