Patents by Inventor Akinlolu Kumoluyi
Akinlolu Kumoluyi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20070242852Abstract: A method and apparatus for watermarking sensed data in a sensing device which senses a subject to obtain sensed data includes the sensing device temporarily storing the sensed data. The sensing device collects metadata associated with a user of the sensing device and temporarily stores the metadata. The sensing device generates watermarked data by watermarking the sensed data with the metadata.Type: ApplicationFiled: November 30, 2005Publication date: October 18, 2007Applicant: InterDigital Technology CorporationInventor: Akinlolu Kumoluyi
-
Publication number: 20070177729Abstract: A method and apparatus is used for generating a perfectly random secret key between two or more transceivers in a wireless communication network. In a point-to-point system, both transceivers produce an estimate of the channel impulse response (CIR) based on the received radio signal. The CIR estimation is synchronized and may include error correction and detection. A long secret key of bits is generated from a digitized version of the CIR estimate, from which a perfectly secret encryption key is derived by privacy amplification.Type: ApplicationFiled: January 26, 2006Publication date: August 2, 2007Applicant: InterDigital Technology CorporationInventors: Alexander Reznik, Akinlolu Kumoluyi, Guodong Zhang, Prabhakar Chitrapu, Gregory Sternberg, Yogendra Shah, Alain Charles Briancon, Chunxuan Ye
-
Publication number: 20070140494Abstract: A system and method for providing variable security levels in a wireless communication network. The present invention optimizes the often conflicting demands of highly secure wireless communications and high speed wireless communications. According to a preferred embodiment of the present invention, various security sensors are scanned to determine the likely presence of an intruder within a predetermined trust zone. If an intruder is likely present, the security level is changed to the highest setting, and consequently a lower data rate, while the intruder is identified. If the identified intruder is in fact a trusted node, the security level is returned to a lower setting. If the identified intruder is not a trusted node, the security level is maintained at an elevated state while the intruder is within the trust zone.Type: ApplicationFiled: September 30, 2005Publication date: June 21, 2007Applicant: InterDigital Technology CorporationInventors: Akinlolu Kumoluyi, Alexander Reznik, Guodong Zhang, Prabhakar Chitrapu, Sung-Hyuk Shin, Yingming Tsai
-
Publication number: 20070083476Abstract: A method and system for enforcing user rights on user data, and maintaining consistency of the user data in a data network are disclosed. Each of a plurality of entities controls one or more network devices which are connected via the data network. Each network device includes at least one user data node which contains at least one elementary piece of user data. The elementary piece of user data is associated with a traceability graph including at least one traceability link. The traceability link connects a source user data node and a destination user data node. The user data node also contains rights information which comprises a rule-based policy regarding the user data. The rights information is also propagated to other entities based on the traceability graph. Consistency of the user data is achieved and owner's rights are enforced based on the traceability graph.Type: ApplicationFiled: August 21, 2006Publication date: April 12, 2007Applicant: InterDigital Technology CorporationInventors: Sylvie Gomes, AkinLolu Kumoluyi, Alan Carlton
-
Publication number: 20070036353Abstract: The present invention relates to secret key generation and authentication methods that are based on joint randomness not shared by others (JRNSO), in which unique channel response between two communication terminals generates a secret key. Multiple network access points use a unique physical location of a receiving station to increase user data security. High data rate communication data is encrypted by generating a random key and a pseudo-random bit stream. A configurable interleaving is achieved by introduction of JRNSO bits to an encoder used for error-correction codes. Databases of user data are also protected by JRNSO-based key mechanisms. Additional random qualities are induced on the joint channel using MIMO eigen-beamforming, antenna array deflection, polarization selection, pattern deformation, and path selection by beamforming or time correlation. Gesturing induces randomness according to uniquely random patterns of a human user's arm movements inflected to the user device.Type: ApplicationFiled: May 31, 2006Publication date: February 15, 2007Applicant: InterDigital Technology CorporationInventors: Alexander Reznik, Debashish Purkayastha, Steven Goldberg, Robert Olesen, Marian Rudolf, Inhyok Cha, Alan Carlton, Yogendra Shah, Shamim Rahman, Rajat Mukherjee, Robert DiFazio, Gregory Sternberg, Leonid Kazakevich, Kazimierz Siwiak, Guodong Zhang, Tanbir Haque, Louis Guccione, Prabhakar Chitrapu, Akinlolu Kumoluyi, Alain Briancon
-
Publication number: 20060227640Abstract: A sensing apparatus having a sensing functionality controller and a method of detecting the sensing apparatus is disclosed. A signal generation unit embedded in the sensing apparatus operates in conjunction with the sensing functionality controller to support the sensing functionality of the sensing unit. The signal generation unit generates one or more sensing functionality support signals used to enhance content obtained by the sensing unit, (e.g., a flash for illuminating a sensed target such that content obtained by the sensing unit is not too dark, or a sound or light-based auto focus signal to make sure that the content is not out of focus). When the sensing functionality controller is activated, the same signal generation unit generates a detectable warning signal, (e.g., sound, light, radio wave), which indicates that the sensing functionality controller has been activated and/or the sensing unit is sensing.Type: ApplicationFiled: November 23, 2005Publication date: October 12, 2006Applicant: InterDigital Technology CorporationInventors: Richard Herschaft, Akinlolu Kumoluyi, Alain Briancon, Steven Goldberg, Peter Wang
-
Publication number: 20050226421Abstract: A method and system for using watermarks in communication systems is disclosed. Watermarks are typically small amounts of auxiliary data embedded in a cover signal. The cover signal is the primary communication signal, and may be binary bits, multi valued symbols, analog waveforms, or any other type of primary communication signal. Security strength indication, location tracking, intrusion detection and transmission of non-security information using watermarks are disclosed, along with a system for managing watermarks.Type: ApplicationFiled: February 18, 2005Publication date: October 13, 2005Applicant: InterDigital Technology CorporationInventors: Alain Briancon, Akinlolu Kumoluyi, Alan Carlton, Richard Herschaft, John Hoffmann, Prabhakar Chitrapu, Debashish Purkayastha
-
Publication number: 20050154925Abstract: Tokens/keys are produced for wireless communications. These tokens/keys are used for watermarks, signature insertion, encryption and other uses. In one embodiment, contextual information is used to generate tokens/keys. The tokens/keys may be derived directly from the contextual information. The contextual information may be used in conjunction with other information to derive the tokens/keys. Tokens/keys may be exchanged between transmit/receive units. The exchange of these tokens/keys may be encrypted.Type: ApplicationFiled: November 23, 2004Publication date: July 14, 2005Applicant: InterDigital Technology CorporationInventors: Prabhakar Chitrapu, Alain Briancon, Akinlolu Kumoluyi, Alan Carlton, Kiran Vanganuru, Richard Herschaft, John Hoffmann, John Thommana, Debashish Purkayastha, Guodong Zhang, Robert Olesen, Alexander Reznik, TieJun Shan, Sung-Hyuk Shin, Amit Singhal