Patents by Inventor Akinlolu Oloruntosi Kumoluyi

Akinlolu Oloruntosi Kumoluyi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9130693
    Abstract: A method and apparatus is used for generating a perfectly random secret key between two or more transceivers in a wireless communication network. In a point-to-point system, both transceivers produce an estimate of the channel impulse response (CIR) based on the received radio signal. The CIR estimation is synchronized and may include error correction and detection. A long secret key of bits is generated from a digitized version of the CIR estimate, from which a perfectly secret encryption key is derived by privacy amplification.
    Type: Grant
    Filed: July 12, 2012
    Date of Patent: September 8, 2015
    Assignee: InterDigital Technology Corporation
    Inventors: Alexander Reznik, Akinlolu Oloruntosi Kumoluyi, Guodong Zhang, Prabhakar R. Chitrapu, Gregory S. Sternberg, Yogendra C. Shah, Alain Charles Louis Briancon, Chunxuan Ye
  • Publication number: 20150044994
    Abstract: A system and method for providing variable security levels in a wireless communication network. The present invention optimizes the often conflicting demands of highly secure wireless communications and high speed wireless communications. According to a preferred embodiment of the present invention, various security sensors are scanned to determine the likely presence of an intruder within a predetermined trust zone. If an intruder is likely present, the security level is changed to the highest setting, and consequently a lower data rate, while the intruder is identified. If the identified intruder is in fact a trusted node, the security level is returned to a lower setting. If the identified intruder is not a trusted node, the security level is maintained at an elevated state while the intruder is within the trust zone.
    Type: Application
    Filed: September 4, 2014
    Publication date: February 12, 2015
    Applicant: INTERDIGITAL TECHNOLOGY CORPORATION
    Inventors: Akinlolu Oloruntosi Kumoluyi, Alexander Reznik, Guodong Zhang, Prabhakar R. Chitrapu, Sung-Hyuk Shin, Yingming Tsai
  • Patent number: 8855313
    Abstract: A system and method for providing variable security levels in a wireless communication network. The present invention optimizes the often conflicting demands of highly secure wireless communications and high speed wireless communications. According to a preferred embodiment of the present invention, various security sensors are scanned to determine the likely presence of an intruder within a predetermined trust zone. If an intruder is likely present, the security level is changed to the highest setting, and consequently a lower data rate, while the intruder is identified. If the identified intruder is in fact a trusted node, the security level is returned to a lower setting. If the identified intruder is not a trusted node, the security level is maintained at an elevated state while the intruder is within the trust zone.
    Type: Grant
    Filed: December 21, 2012
    Date of Patent: October 7, 2014
    Assignee: InterDigital Technology Corporation
    Inventors: Akinlolu Oloruntosi Kumoluyi, Alexander Reznik, Guodong Zhang, Prabhakar R. Chitrapu, Sung-Hyuk Shin, Yingming Tsai
  • Patent number: 8341408
    Abstract: A system and method for providing variable security levels in a wireless communication network. The present invention optimizes the often conflicting demands of highly secure wireless communications and high speed wireless communications. According to a preferred embodiment of the present invention, various security sensors are scanned to determine the likely presence of an intruder within a predetermined trust zone. If an intruder is likely present, the security level is changed to the highest setting, and consequently a lower data rate, while the intruder is identified. If the identified intruder is in fact a trusted node, the security level is returned to a lower setting. If the identified intruder is not a trusted node, the security level is maintained at an elevated state while the intruder is within the trust zone.
    Type: Grant
    Filed: February 2, 2012
    Date of Patent: December 25, 2012
    Assignee: InterDigital Technology Corporation
    Inventors: Akinlolu Oloruntosi Kumoluyi, Alexander Reznik, Guodong Zhang, Prabhakar R. Chitrapu, Sung-Hyuk Shin, Yingming Tsai
  • Publication number: 20120281834
    Abstract: A method and apparatus is used for generating a perfectly random secret key between two or more transceivers in a wireless communication network. In a point-to-point system, both transceivers produce an estimate of the channel impulse response (CIR) based on the received radio signal. The CIR estimation is synchronized and may include error correction and detection. A long secret key of bits is generated from a digitized version of the CIR estimate, from which a perfectly secret encryption key is derived by privacy amplification.
    Type: Application
    Filed: July 12, 2012
    Publication date: November 8, 2012
    Applicant: INTERDIGITAL TECHNOLOGY CORPORATION
    Inventors: Alexander Reznik, Akinlolu Oloruntosi Kumoluyi, Guodong Zhang, Prabhakar R. Chitrapu, Gregory S. Sternberg, Yogendra C. Shah, Alain Charles Louis Briancon, Chunxuan Ye
  • Patent number: 8238551
    Abstract: A method and apparatus is used for generating a perfectly random secret key between two or more transceivers in a wireless communication network. In a point-to-point system, both transceivers produce an estimate of the channel impulse response (CIR) based on the received radio signal. The CIR estimation is synchronized and may include error correction and detection. A long secret key of bits is generated from a digitized version of the CIR estimate, from which a perfectly secret encryption key is derived by privacy amplification.
    Type: Grant
    Filed: January 26, 2006
    Date of Patent: August 7, 2012
    Assignee: InterDigital Technology Corporation
    Inventors: Alexander Reznik, Akinlolu Oloruntosi Kumoluyi, Guodong Zhang, Prabhakar R. Chitrapu, Gregory S. Sternberg, Yogendra C. Shah, Alain Charles Louis Briancon, Chunxuan Ye
  • Publication number: 20120128158
    Abstract: A system and method for providing variable security levels in a wireless communication network. The present invention optimizes the often conflicting demands of highly secure wireless communications and high speed wireless communications. According to a preferred embodiment of the present invention, various security sensors are scanned to determine the likely presence of an intruder within a predetermined trust zone. If an intruder is likely present, the security level is changed to the highest setting, and consequently a lower data rate, while the intruder is identified. If the identified intruder is in fact a trusted node, the security level is returned to a lower setting. If the identified intruder is not a trusted node, the security level is maintained at an elevated state while the intruder is within the trust zone.
    Type: Application
    Filed: February 2, 2012
    Publication date: May 24, 2012
    Applicant: INTERDIGITAL TECHNOLOGY CORPORATION
    Inventors: Akinlolu Oloruntosi Kumoluyi, Alexander Reznik, Guodong Zhang, Prabhakar R. Chitrapu, Sung-Hyuk Shin, Yingming Tsai
  • Patent number: 8135953
    Abstract: A system and method for providing variable security levels in a wireless communication network. The present invention optimizes the often conflicting demands of highly secure wireless communications and high speed wireless communications. According to a preferred embodiment of the present invention, various security sensors are scanned to determine the likely presence of an intruder within a predetermined trust zone. If an intruder is likely present, the security level is changed to the highest setting, and consequently a lower data rate, while the intruder is identified. If the identified intruder is in fact a trusted node, the security level is returned to a lower setting. If the identified intruder is not a trusted node, the security level is maintained at an elevated state while the intruder is within the trust zone.
    Type: Grant
    Filed: December 22, 2009
    Date of Patent: March 13, 2012
    Assignee: InterDigital Technology Corporation
    Inventors: Akinlolu Oloruntosi Kumoluyi, Alexander Reznik, Guodong Zhang, Prabhakar R. Chitrapu, Sung-Hyuk Shin, Yingming Tsai
  • Publication number: 20100122085
    Abstract: A system and method for providing variable security levels in a wireless communication network. The present invention optimizes the often conflicting demands of highly secure wireless communications and high speed wireless communications. According to a preferred embodiment of the present invention, various security sensors are scanned to determine the likely presence of an intruder within a predetermined trust zone. If an intruder is likely present, the security level is changed to the highest setting, and consequently a lower data rate, while the intruder is identified. If the identified intruder is in fact a trusted node, the security level is returned to a lower setting. If the identified intruder is not a trusted node, the security level is maintained at an elevated state while the intruder is within the trust zone.
    Type: Application
    Filed: December 22, 2009
    Publication date: May 13, 2010
    Applicant: INTERDIGITAL TECHNOLOGY CORPORATION
    Inventors: Akinlolu Oloruntosi Kumoluyi, Alexander Reznik, Guodong Zhang, Prabhakar R. Chitrapu, Sung-Hyuk Shin, Yingming Tsai
  • Patent number: 7636842
    Abstract: A system and method for providing variable security levels in a wireless communication network. The present invention optimizes the often conflicting demands of highly secure wireless communications and high speed wireless communications. According to a preferred embodiment of the present invention, various security sensors are scanned to determine the likely presence of an intruder within a predetermined trust zone. If an intruder is likely present, the security level is changed to the highest setting, and consequently a lower data rate, while the intruder is identified. If the identified intruder is in fact a trusted node, the security level is returned to a lower setting. If the identified intruder is not a trusted node, the security level is maintained at an elevated state while the intruder is within the trust zone.
    Type: Grant
    Filed: September 30, 2005
    Date of Patent: December 22, 2009
    Assignee: InterDigital Technology Corporation
    Inventors: Akinlolu Oloruntosi Kumoluyi, Alexander Reznik, Guodong Zhang, Prabhakar R. Chitrapu, Sung-Hyuk Shin, Yingming Tsai
  • Patent number: 7532723
    Abstract: Tokens/keys are produced for wireless communications. These tokens/keys are used for watermarks, signature insertion, encryption and other uses. In one embodiment, contextual information is used to generate tokens/keys. The tokens/keys may be derived directly from the contextual information. The contextual information may be used in conjunction with other information to derive the tokens/keys. Tokens/keys may be exchanged between transmit/receive units. The exchange of these tokens/keys may be encrypted.
    Type: Grant
    Filed: November 23, 2004
    Date of Patent: May 12, 2009
    Assignee: InterDigital Technology Corporation
    Inventors: Prabhakar R. Chitrapu, Alain Charles Louis Briancon, Akinlolu Oloruntosi Kumoluyi, Alan Gerald Carlton, Kiran Kumar S. Vanganuru, Richard Dan Herschaft, John Erich Hoffmann, John Thommana, Debashish Purkayastha, Guodong Zhang, Robert Lind Olesen, Alexander Reznik, TieJun Shan, Sung-Hyuk Shin, Amit Singhal