Unlock instant, AI-driven research and patent intelligence for your innovation.

Communication apparatus and method for secure communication

A communication device and security technology, applied in security devices, secure communication, wireless communication, etc.

Pending Publication Date: 2022-03-18
SONY CORP
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

According to traditional methods, information that should not be shared with all potential recipients may be encrypted with a key known only to the sender and recipient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Communication apparatus and method for secure communication
  • Communication apparatus and method for secure communication
  • Communication apparatus and method for secure communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In traditional communication systems, a single sender and a single receiver are observed. A typical metric characterizing the upper bound of communication throughput for these systems is the Shannon capacity, measured in bits / sec / Hz or bits / channel usage [bpcu]. The Shannon capacity (assuming an additive white Gaussian noise channel model (AWGN)) can be determined based on the received signal-to-noise ratio (SNR) according to the following equation:

[0041]

[0042] Among them, S is the signal power, N is the noise power. In such systems, the signal-to-noise ratio (S / N) is usually (in linear systems) related to the transmit power PTX Proportional. Typically, communication systems are designed in such a way as to maximize C, assuming a single information source A and a single information sink B are involved.

[0043] Assuming that there is another information sink E (also called "wire eavesdropper" or "Eve" for "eavesdropper") that can eavesdrop on the signal sent ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A first communication device for communicating with a second communication device in a wireless communication system includes circuitry configured to perform beamforming training with the second communication device to train a plurality of antenna beam combinations of antenna beams used by the first and second communication devices to transmit and / or receive signals; selecting one or more trained antenna beam combinations according to a security criterion intended to reduce the probability that a third communication device may eavesdrop communications between the first communication device and the second communication device; and communicating with the second communication device using the selected one or more antenna beam combinations.

Description

technical field [0001] The present disclosure relates to the use in a wireless communication system of first and second communication devices communicating with each other in a secure manner. The disclosure further relates to corresponding communication methods. Background technique [0002] Secure messaging between information senders and intended recipients is one of the fundamental challenges in communication systems. In order to prevent information from being passed on to unintended recipients (adversaries or eavesdroppers), care must be taken to control the environment and / or secure the information in an encrypted manner so that only the intended recipient can understand the transmitted information. Encryption methods typically operate on top of transport protocols. Once a signal is intercepted at a lower layer such as the PHY layer (on a medium such as an RF wave), brute force decryption is possible, especially when the packet length and encryption key are relatively...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04K1/08H04W12/02H04W12/122
CPCH04K1/08H04W12/02H04W12/122H04L63/1475H04B7/0617
Inventor 费利克斯·费尔豪尔马克西米利安·阿诺尔德斯蒂芬·蒂德曼达纳·乔基纳托马斯·翰特纳比尔·斯文·洛金
Owner SONY CORP