H04K1/003

Secure open-air communication system utilizing multichannel decoyed transmission

A secure communication system utilizes multiple decoy data signals to hide one or more true data signals. The true data signal(s) are encrypted, and received at a scrambling unit according to an original set of channel assignments. The channel assignments are optically switched with multiple decoy data signals to form a multi-channel scrambled output signal that is thereafter transmitted across a communication system. The greater the number of decoy signals, the greater the security provided to the open-air system. Further security may be provided by encrypting the decoy signals prior to scrambling and/or by utilizing a spatially diverse set of transmitters and receivers. Without the knowledge of the channel assignment(s) for the true signal(s), an eavesdropper may be able to intercept (and, with time, perhaps descramble) the open-air transmitted signals, will not be able to distinguish the true data from the decoys without also knowing the channel assignment(s).

Technologies for enhancing computer security
10057250 · 2018-08-21 · ·

A method includes providing a plurality of variables and a variable. The variables differ from each other. The variables differ from the variable. The further method includes providing a lookup table indexing a plurality of characters via a plurality of values based on a first numeral system, converting a message into a first sequence of values based on the table, converting the first sequence into a second sequence of values based on a second numeral system different from the first system and according to a preset format, combining the second sequence into a single sequence via removing the format, generating a first plurality of subsequences from the single sequence based on segmentation of the sequence via alternating the variables, converting the first subsequences into a second plurality of subsequences such that each of the second subsequences is sized according to the variable, and transmitting the second subsequences.

SYSTEMS AND METHODS FOR VARIABLE-LENGTH ENCODING AND DECODING FOR ENHANCING COMPUTER SYSTEMS
20240356913 · 2024-10-24 ·

A method for variable length decoding, the method including: receiving, in a default word length mode, at least one first data word having a default first word length; combining the received at least one first data word as a first portion of data; receiving, after the at least one first data word, a transition word indicative of transitioning to a variable word length mode; receiving, after the transition word, a first word length word indicative of a second word length; receiving, after the first word length word, at least one second data word having the second word length; and combining the received at least one second data word as a second portion of the data.

METHOD FOR PROCESSING DATA BY MEANS OF AN ELECTRONIC DATA-ACQUISITION DEVICE, CORRESPONDING DEVICE AND PROGRAM
20180026679 · 2018-01-25 ·

A method for processing data by an electronic data-acquisition device, requesting to obtain data from an electronic data-providing device. The electronic data-acquisition device and the electronic data-providing device communicate with each other by using a short-range wireless (NFC) communications technology defining a transmission/reception reference frequency. The method includes the following acts performed by the electronic data-acquisition device: determining a frequency of transmission/reception of an interrogation signal that is different from said transmission/reception reference frequency, as a function of a frequency-determining parameter, delivering an interrogation frequency; and after determining the interrogation frequency, transmitting the interrogation signal to said data-providing device at the interrogation frequency.

COMMUNICATION SYSTEM
20180026711 · 2018-01-25 ·

A system is provided where one of a broadband termination unit or a gateway unit is supplied with power by the other one of the broadband termination unit or the gateway unit. Supplying may be done via a universal serial bus cable like a universal serial bus Type-C cable.

SECURE OPEN-AIR COMMUNICATION SYSTEM UTILIZING MULTICHANNEL DECOYED TRANSMISSION

A secure communication system utilizes multiple decoy data signals to hide one or more true data signals. The true data signal(s) are encrypted, and received at a scrambling unit according to an original set of channel assignments. The channel assignments are optically switched with multiple decoy data signals to form a multi-channel scrambled output signal that is thereafter transmitted across a communication system. The greater the number of decoy signals, the greater the security provided to the open-air system. Further security may be provided by encrypting the decoy signals prior to scrambling and/or by utilizing a spatially diverse set of transmitters and receivers. Without the knowledge of the channel assignment(s) for the true signal(s), an eavesdropper may be able to intercept (and, with time, perhaps descramble) the open-air transmitted signals, will not be able to distinguish the true data from the decoys without also knowing the channel assignment(s).

FREQUENCY HOPPING
20240421848 · 2024-12-19 ·

A frequency hopping method and associated apparatus and system using the frequency hopping method are described. The frequency hopping method includes obtaining a key value based on or including a current time value obtained from a current time value source. The key value is used to determine a hop frequency value by querying a data structure stored on a storage medium for a value associated with the key value. The data structure includes a plurality of values, each of which having been generated from a truly random process such that there is no mathematical relationship between the values. A carrier frequency of a transceiver module is set to the hop frequency value for transmitting and receiving radio signals using the carrier frequency.

SYSTEM AND METHOD FOR INTELLIGENT POWER MANAGEMENT

A system and method for enhancing RF signal jamming. The method includes steps of pre-distorting an input signal to define a pre-distorted signal; adjusting a voltage of a power supply of a power amplifier based upon the pre-distorted signal to envelope track; power sequencing the power amplifier to power up and power down the amplifier; achieve a low probability of intercept of the signal, and transmitting the adjusted signal. Systems are other methods are likewise disclosed.

Technologies for enhancing computer security
RE046652 · 2017-12-26 · ·

A method includes providing a plurality of variables and a variable. The variables differ from each other. The variables differ from the variable. The further method includes providing a lookup table indexing a plurality of characters via a plurality of values based on a first numeral system, converting a message into a first sequence of values based on the table, converting the first sequence into a second sequence of values based on a second numeral system different from the first system and according to a preset format, combining the second sequence into a single sequence via removing the format, generating a first plurality of subsequences from the single sequence based on segmentation of the sequence via alternating the variables, converting the first subsequences into a second plurality of subsequences such that each of the second subsequences is sized according to the variable, and transmitting the second subsequences.

Secure open-air communication system utilizing multichannel decoyed transmission

A secure communication system utilizes multiple decoy data signals to hide one or more true data signals. The true data signal(s) are encrypted, and received at a scrambling unit according to an original set of channel assignments. The channel assignments are optically switched with multiple decoy data signals to form a multi-channel scrambled output signal that is thereafter transmitted across a communication system. The greater the number of decoy signals, the greater the security provided to the open-air system. Further security may be provided by encrypting the decoy signals prior to scrambling and/or by utilizing a spatially diverse set of transmitters and receivers. Without the knowledge of the channel assignment(s) for the true signal(s), an eavesdropper may be able to intercept (and, with time, perhaps descramble) the open-air transmitted signals, will not be able to distinguish the true data from the decoys without also knowing the channel assignment(s).