Patent classifications
H04K3/22
Method and apparatus for providing broadcast channel encryption to enhance cellular network security
A method, computer-readable storage device and apparatus for encrypting a broadcast message of a base station are disclosed. For example, the method selects an encryption key for the broadcast message and encrypts the broadcast message using the encryption key to create an encrypted broadcast message. The method then transmits an identifier of the encryption key and transmits the encrypted broadcast message over a broadcast channel. A method for decrypting a broadcast message that is encrypted is also disclosed.
Authenticated time-of-flight indoor positioning systems and methods
This disclosure describes systems, methods, and computer-readable media related to testing tools for devices. In some embodiments, a plurality of public keys may be received from a server via a secured network connection where each of the plurality of keys corresponds to a respective private key associated with an access point. A time-of-flight (ToF) measurement protocol may be initiated with one or more access points. Data generated by ToF measurement protocol with the one or more access points may be received. In some embodiments, the one or more access points may be authenticated based at least in part on the plurality of public keys. A location of a user device may be determined based at least in part on the received data.
Method for uplink jammer detection and avoidance in long-term evolution (LTE) networks
A method for handling a jamming signal in a wireless network includes obtaining network measurement data collected by a wireless network element. A first performance information relating to a Key Performance Indicator, data collected during a quiet time, or a report on a bogus Physical Random Access Channel signal, or a combination thereof, is selected from the network measurement data. The first performance information is examined with respect to a first reference information. An action is initiated if the examination of the first performance information indicates the presence of a potential jamming signal.
Network jamming detection and remediation
Methods and systems for remediation of jammed networks are provided. Exemplary methods include determining by a base unit of a jammed network and if outside connectivity available. The connectivity can include wired and wireless broadband networks. If connectivity is available, at least one external service is notified. Further, a user device can be notified. A local alert can be generated in the form of a phone call or test message. Also, a local action can be taken. Information associated with the jammed network is stored for later delivery if connectivity is not available where the base unit is located in a residence. Further, an alert can be issued in response to the detected network jamming, the alert being at least one of: sounding an audible alarm, showing a visual alarm indication, communicating with law enforcement, and communicating with an alarm monitoring station.
GNSS Jamming Signal Detection
Methods and apparatus for detecting, geo-locating and/or classifying a GPS or GNSS jamming signal are disclosed. One such method comprises the steps of analysing a spectrogram of the jamming signal using a tree-based decision process and as a result, then selecting one of a number of types of jamming signal, wherein one of the decisions (1103) in the tree is whether the spectrogram has spectral periodicity.
TRUSTED MONITORING SYSTEM AND METHOD
Methods and apparatus for monitoring remotely located objects with a system including at least one master data collection unit, remote sensor units, and a central data collection server are described. The master unit is configured to monitor any object, mobile or stationary, including monitoring multiple remote sensor units associated with the monitored objects. The master unit may be in a fixed location or attached to a mobile object. The master unit is configured for monitoring objects that enter and leave an area. The master unit may act as a parent controller for one or more child devices including remote sensors or monitors of measurable conditions including environmental conditions, substance identification, product identification, and/or biometric identification. The master unit may discover remote sensor units as they enter or leave the area where the master unit is located. The master unit can be remotely reprogrammed such as with authenticated instructions.
DETECTING TIMING ANAMOLIES
Disclosed herein are system, method, and computer program product embodiments for adapting to malware activity on a compromised computer system by detecting timing anomalies between timing signals. An embodiment operates by analyzing first timing data accessed from a validated source and second timing data accessed from an unvalidated receiver source in order to compute a threat detection value, which is utilized to determine if there is a discrepancy or anomaly in the timing or frequency of either the validated and unvalidated sources.
Localizing communications interference node
A system comprises a computer including a processor. The processor receives from each of a plurality of vehicles within a region, a respective plurality of messages and identifies for each of the plurality of vehicles, a respective communications discontinuity during which an expected message fails to be received from the respective vehicle. The processor determines, for each communications discontinuity, discontinuity edge locations at each of a beginning of the communications discontinuity and an end of the communications discontinuity. The processor further determines an interference node location based on the discontinuity edge locations.
BIASING TECHNIQUE FOR RECEIVER BASED ON RADIO FREQUENCY (RF) JAMMER DETECTION
The disclosure relates to an apparatus including a receiver configured to process a radio frequency (RF) signal to generate a baseband signal; a radio frequency (RF) jammer detector configured to generate a signal indicative of whether an RF jammer is present at an input of the receiver; and a receiver bias circuit configured to generate a supply voltage for the receiver based on the RF jammer indication signal. In another aspect, the apparatus includes constant gain bias circuit to maintain the gain of the receiver constant in response to changes in the supply voltage. In other aspects, the receiver bias circuit may suspend the generating of the supply voltage based on the RF jammer indication signal if the power level of the target received signal is above a threshold. In other aspects, the receiver bias circuit changes the supply voltage during cyclic prefix (CP) intervals between downlink intervals.
Radio wave state analysis method
A radio wave state analysis method acquires a radio wave for a place at which an audio system is sited, where the audio system includes one or more receiving devices for wireless reception of an audio signal; and generates relationship information indicative of a relationship between condition information and radio wave information indicative of the radio wave state, where the condition information includes at least one of time information indicative of a time when the radio wave state is measured or position information indicative of a position of the audio system.