Patent classifications
H04K3/00
APPARATUS AND METHOD OR FILTERING ADVERTISEMENTS IN WIRELESS NETWORKS
The present invention relates to an apparatus and method for filtering advertisements of a target device by using friendly jamming with a beamforming antenna to jam at least one advertisement channel in at least one specific sector of non-target devices. Thus, a master device can easily discover the advertisement of the target device in order to successfully connect to the target device. In addition, since the jamming is performed on advertisement channels only, data connection channels are not disturbed.
JAMMING SATELLITE AVOIDANCE METHOD AND MEGA-CONSTELLATION BUSINESS DEVICE
A jamming satellite avoidance method changes an orbital altitude for each of orbital planes with different normal vectors in a mega-constellation satellite group composed of 100 or more satellites, so as to avoid a jamming satellite controlled by a ground device that is different from a device that controls the mega-constellation satellite group. The jamming satellite is an artificial satellite that includes a propulsion device and adopts a nominal orbital altitude and a nominal orbital inclination at which the mega-constellation satellite group flies, and maintains an average orbital altitude and an average orbital inclination while operating the propulsion device irregularly, and is controlled by the ground device that is different from the device that controls the mega-constellation satellite group.
Intrusion detection and radio fingerprint tracking
A radio transmitter adjusts its radio frequency (RF) fingerprint to defeat RF fingerprinting identification without destroying the content of its transmissions. The radio transmitter comprises a frequency-upconverter configured to upconvert a baseband or intermediate-frequency signal to an RF signal, and an amplifier to amplify the RF signal to produce a transmission signal. An RF fingerprint control circuit changes the non-linear behavior of the frequency-upconverter or the amplifier in order to change the RF fingerprint. The transmitter may create RF fingerprint “personalities” to be paired with different radio protocol behaviors and subscriber terminal identification codes (e.g., MAC addresses or SMSIs) for generating different radio identities.
Techniques for using reflecting nodes to cancel interfering signals in wireless communications
Aspects described herein relate to identifying an aggressor node that transmits interfering signals that cause interference to signals received at the node, communicating a configuration for applying a phase shift to the interfering signals for forwarding to the node from a reflecting node with the phase shift applied, and communicating, from the reflecting node, the interfering signals with the phase shift applied to at least partially cancel the interference to the signals received at the node.
Near field communications system having enhanced security
A near field communication system can include a near field generator configured to generate a near field detectable information signal. The near field generator and supporting circuitry also produces incidental electromagnetic radiation. A masking signal transmitter is used with the near field generator and radiates a masking electromagnetic signal. The masking electromagnetic signal may substantially mask the incidental electromagnetic radiation.
INTERFERING IN TIME-DIVISION DUPLEX COMMUNICATION
A computer readable storage medium is presented, having computer readable program instructions thereon for causing a processor to carry out the steps of: sub-dividing a time slot into consecutive time intervals, the time slot belongs to multiple time slots allocated to a first node for transmitting to a second node using a wireless time-division duplex communication link between the first node and the second node, the second node transmitting during separate time slots allocated to said second node; and disrupting communication between said first node and said second node by transmitting, using a transmitter, respective interference signals during at least some of said time intervals, each of said interference signals being transmitted on one of said frequency bands, wherein for at least two of said time intervals said interference signals are transmitted on different frequency band.
Integrated secure device manager systems and methods for cyber-physical vehicles
Systems and methods are described for a cyber-physical vehicle management system generated by an Integrated Secure Device Manager (ISDM) Authority configured to manage licensing and approval of Cyber-Physical Vehicle (CPV)s, a public/private key pair and a unique ID for the Authority, create a self-signed Authority token signed by the private key, send the Authority token to a plurality of ISDM Node device configured to verify Module device authenticity and in communication with the Authority, store, by each Node, the Authority token, and mark, by each Node, the Authority token as trusted.
Detection, analysis, and countermeasures for radio transceivers
A computer-implementable method employs radio signal metadata to train a cognitive learning and inference system to produce an inferred function, wherein the metadata comprises a syntactic structure of at least one radio communication protocol. The inferred function is used to map metadata of a detected radio signal to a cognitive profile of a transmitter of the detected radio signal. The mapping effects intelligent discrimination of the transmitter from at least one other transmitter through corroborative or negating evidentiary observation of properties associated with the metadata of the detected radio signal. A response to the transmitter is based upon the mapping.
SYSTEMS AND METHODS FOR RADIO FREQUENCY HOPPING COMMUNICATIONS JAMMING UTILIZING SOFTWARE DEFINED RADIO PLATFORMS
A dynamically-reconfigurable multiband multiprotocol communications jamming system and method is provided that are particularly suited for the generation of effective radio-frequency waveforms/noise output that successively translates up and down the RF spectrum. The system and method are particularly suited for strategically targeting specific frequencies in order to disrupt a communications network or networks, and can be rapidly deployed via delivery platforms, such as artillery and other projectile mechanisms, remote operated vehicles (unmanned aerial, sea or land systems) or targeted air or land delivery via manned assets or automated or robotic support means, or manual delivery by personnel.
METHOD AND APPARATUS FOR PROVIDING BROADCAST CHANNEL ENCRYPTION TO ENHANCE CELLULAR NETWORK SECURITY
A method, computer-readable storage device and apparatus for encrypting a broadcast message of a base station are disclosed. For example, the method selects an encryption key for the broadcast message and encrypts the broadcast message using the encryption key to create an encrypted broadcast message. The method then transmits an identifier of the encryption key and transmits the encrypted broadcast message over a broadcast channel. A method for decrypting a broadcast message that is encrypted is also disclosed.