Abstract

Systems, methods, devices, and computer program products are directed to mobility control and performance prediction in directional wireless networks. Network coverage and connectivity are optimized. Convex and non-convex network modeling is implemented to provide adaptive topology con­trol and mobility control within the network, whereby communication links are retained, released, or reconfigured based on their communication role within the network architecture.


Top

Abstract

The replacement of secret keys is a central problem in key management. Typical solutions exchange handshaking messages, involve complex computations, or require the cooperation of trusted third parties. Disclosed herein is a key replacement method that exploits the randomness of Markov models to efficiently provide fresh keys to users. Unlike other methods, the proposed method removes the need for extra communications, intensive computation, or third parties. It is demonstrated that the proposed method has perfect forward secrecy as well as resistance to known-key attacks.


Top

Abstract

Methods and apparatuses for authenticating a biometric scanner, such as area type finger print scanners, involves estimating unique intrinsic characteristics of the scanner (scanner pattern), that are permanent over time, and can identify a scanner even among scanners of the same manufacturer and model. Image processing and analysis are used to extract a scanner pattern from images acquired with the scanner.


Top

Abstract

Methods and apparatuses for authenticating a biometric scanner, such as swipe type finger print scanners, involves estimating unique intrinsic characteristics of the scanner (scanner pattern), that are permanent over time, and can identify a scanner even among scanners of the same manufacturer and model. Image processing and analysis are used to extract a scanner pattern from images acquired with the scanner.


Top

Abstract

Methods and systems involving image processing extract from an image and estimate unique intrinsic characteristics (scanner pattern) of a biometric scanner, such as area type fingerprint scanner. The scanner pattern is permanent over time, can identify a scanner even among scanners of the same manufacturer and model, and can be used to verify if a scanner acquired an image is the same as the scanner used for biometric enrollment, i.e., to authenticate the scanner and prevent security attacks on it.


Top

Top

Top

Top

Top

Abstract

A method is provided for generating a graph data representation having a plurality of nodes corresponding to respective systems engineering requirements. The method includes accessing a first data representation of a collection of systems requirements and relationships therebetween and generating a second data representation of the collection of systems requirements.


Top

Pages