H04K1/02

OPTICAL COMMUNICATION SYSTEM USING MODE-LOCKED FREQUENCY COMB AND ALL-OPTICAL PHASE ENCODING FOR SPECTRAL AND TEMPORAL ENCRYPTED AND STEALTHY TRANSMISSION, AND FOR OPTICAL PROCESSING-GAIN APPLICATIONS
20220360337 · 2022-11-10 ·

A method for transmitting data carrying optical information over an optical channel, comprising the steps of providing an optical transmitter consisting of a light source being a Mode-Locked Optical Frequency Comb (MLFC) for generating a frequency comb of multiple carriers, each of which being modulated by a baseband signal; an optical modulator for modulating each and all of the multiple carriers in a modulation bandwidth extending up to the modes' frequency spacing between the multiple carriers; performing all-optical encoding of the modulated carriers by manipulating the optical amplitude and/or phase and/or polarization of all optically modulated carriers; and transmitting, by the optical transmitter, the encoded modulated carriers to an optical receiver, over an optical channel

INJECTABLE HARDWARE AND SOFTWARE ATTESTATION OF SENSORY INPUT DATA
20230045734 · 2023-02-09 ·

Methods of sensory input integrity attestation are provided. Artifacts included within devices under test inject a known noise signal into the output signal of one or more output devices that are detectable by one or more input devices (i.e., sensors) of an embedded device, and monitor the received input data. By comparing the received signal against the expected noise signal, attestation of the validity of sensory input data is possible. Such sensory input data attestation is capable either locally or using a remote attestation device with knowledge of the expected data stream.

Injectable hardware and software attestation of sensory input data

Methods of sensory input integrity attestation are provided. Artifacts included within devices under test inject a known noise signal into the output signal of one or more output devices that are detectable by one or more input devices (i.e., sensors) of an embedded device, and monitor the received input data. By comparing the received signal against the expected noise signal, attestation of the validity of sensory input data is possible. Such sensory input data attestation is capable either locally or using a remote attestation device with knowledge of the expected data stream.

JOINT RANDOM SUBCARRIER SELECTION AND CHANNEL-BASED ARTIFICIAL SIGNAL DESIGN AIDED PLS
20230082251 · 2023-03-16 ·

In the area of Joint Random Subcarrier Selection and Channel-Based Artificial Signal Design Aided PLS, a method for providing physical layer security (PLS) depending on the randomness of wireless channel is proposed. Specifically, a channel-based joint random subcarrier selection and artificial signal design are introduced to protect the communication in the presence of a passive eavesdropper which can be even stronger than the legitimate receiver. Our analysis assumes a window-based subcarrier selection method in which the strongest subcarriers in each window are selected. Chosen subcarriers are considered for secret sequence extraction. The generated channel dependent secret sequence is used for both random subcarrier selection and artificial signal design. We evaluate the efficiency of the proposed method through some representative metrics, such as secret sequence disagreement rate (SSDR), throughput and bit error rate (BER), in both perfect and imperfect channel estimation cases. Simulation results are presented and insightful discussions are drawn.

JOINT RANDOM SUBCARRIER SELECTION AND CHANNEL-BASED ARTIFICIAL SIGNAL DESIGN AIDED PLS
20230082251 · 2023-03-16 ·

In the area of Joint Random Subcarrier Selection and Channel-Based Artificial Signal Design Aided PLS, a method for providing physical layer security (PLS) depending on the randomness of wireless channel is proposed. Specifically, a channel-based joint random subcarrier selection and artificial signal design are introduced to protect the communication in the presence of a passive eavesdropper which can be even stronger than the legitimate receiver. Our analysis assumes a window-based subcarrier selection method in which the strongest subcarriers in each window are selected. Chosen subcarriers are considered for secret sequence extraction. The generated channel dependent secret sequence is used for both random subcarrier selection and artificial signal design. We evaluate the efficiency of the proposed method through some representative metrics, such as secret sequence disagreement rate (SSDR), throughput and bit error rate (BER), in both perfect and imperfect channel estimation cases. Simulation results are presented and insightful discussions are drawn.

SYSTEM AND METHOD FOR TRANSMITTING COVERT WIRELESS SIGNALS WITHIN AN OVERT WIRELESS SIGNAL TRANSMISSION
20230078254 · 2023-03-16 ·

A system and method for transmitting, from an encoder to a decoder, one or more covert wireless signals within an overt wireless signal. The encoder receives a bitstream and encodes the received bitstream into an encoded noise signal that replicates a noise signal of a predetermined hardware device. The encoded noise signal is then combined with a cover modulated signal to form at least one covert wireless signal that is distinct from and conceals the received bitstream. The covert wireless signal is transmitted within an overt wireless signal to a decoder that receives the covert wireless signal, removes the cover modulated signal from the received covert wireless signal to isolate the encoded noise signal, and then converts the isolated encoded noise signal into a decoded bitstream. The covert wireless signal can be a plurality of carrier signals, optionally established through orthogonal frequency-division multiplexing (OFDM) or quadrature amplitude modulation (QAM).

SYSTEM AND METHOD FOR TRANSMITTING COVERT WIRELESS SIGNALS WITHIN AN OVERT WIRELESS SIGNAL TRANSMISSION
20230078254 · 2023-03-16 ·

A system and method for transmitting, from an encoder to a decoder, one or more covert wireless signals within an overt wireless signal. The encoder receives a bitstream and encodes the received bitstream into an encoded noise signal that replicates a noise signal of a predetermined hardware device. The encoded noise signal is then combined with a cover modulated signal to form at least one covert wireless signal that is distinct from and conceals the received bitstream. The covert wireless signal is transmitted within an overt wireless signal to a decoder that receives the covert wireless signal, removes the cover modulated signal from the received covert wireless signal to isolate the encoded noise signal, and then converts the isolated encoded noise signal into a decoded bitstream. The covert wireless signal can be a plurality of carrier signals, optionally established through orthogonal frequency-division multiplexing (OFDM) or quadrature amplitude modulation (QAM).

Privacy device for smart speakers
11606658 · 2023-03-14 ·

Systems, apparatuses, and methods are described for a privacy blocking device configured to prevent receipt, by a listening device, of video and/or audio data until a trigger occurs. A blocker may be configured to prevent receipt of video and/or audio data by one or more microphones and/or one or more cameras of a listening device. The blocker may use the one or more microphones, the one or more cameras, and/or one or more second microphones and/or one or more second cameras to monitor for a trigger. The blocker may process the data. Upon detecting the trigger, the blocker may transmit data to the listening device. For example, the blocker may transmit all or a part of a spoken phrase to the listening device.

PHYSICAL LAYER SECURITY ACTIVATION

Methods, systems, and devices for wireless communications are described. In some wireless communications systems, a user equipment (UE) may receive, from a base station, control signaling identifying a configuration of a set of time intervals for communication with the base station, the set of time intervals including a subset of the time intervals for which the UE is to perform a physical layer security procedure. In some cases, the UE may activate a timer associated with performing the physical layer security procedure in response to a trigger. The UE and the base station may communicate one or more messages using the physical layer security procedure, for example, in the subset of the time intervals identified by the control signaling, while the timer is active, or both. The physical layer security procedure may involve the UE performing physical layer security encoding, signal jamming, or both.

Systems and methods for ultra wideband impulse radio transceivers

Ultra-Wideband (UWB) technology exploits modulated coded impulses over a wide frequency spectrum with very low power over a short distance for digital data transmission. Today's leading edge modulated sinusoidal wave wireless communication standards and systems achieve power efficiencies of 50 nJ/bit employing narrowband signaling schemes and traditional RF transceiver architectures. However, such designs severely limit the achievable energy efficiency, especially at lower data rates such as below 1 Mbps. Further, it is important that peak power consumption is supportable by common battery or energy harvesting technologies and long term power consumption neither leads to limited battery lifetimes or an inability for alternate energy sources to sustain them. Accordingly, it would be beneficial for next generation applications to exploit inventive transceiver structures and communication schemes in order to achieve the sub nJ per bit energy efficiencies required by next generation applications.