Patent classifications
H04K2203/16
AUTOMATIC REPEAT-REQUEST SYSTEM FOR PROVIDING ABSOLUTE SAFETY AND AUTHENTICATION IN WIRELESS NETWORKS
A system and method for providing confidentiality against eavesdropping and authentication against impersonation attacks for advanced wireless communication systems are disclosed. The method exploits ARQ as a MAC layer mechanism and artificial noise as a physical layer mechanism with maximal ratio combining to achieve secrecy. An artificial noise, not requiring class space in the channel, is designed and added to the data package based on the QoS requirements and channel condition between legitimate parties. Basically, a special AN, which does not require null-space in the channel, is designed based on the QoS requirements and the channel condition between the legitimate parties and injected to the data packet. If the same packet is requested by the legitimate receiver (Bob), an AN cancelling signal is designed and added to the next packet. Then, an AN-free packet is obtained by using MRC process at Bob, while deteriorating the eavesdropper's performance
SIGNALING-TYPE MANAGEMENT AND CONTROL METHOD FOR MOBILE PHONE SIGNAL
A signaling-type method for mobile phone signals, comprising: establishing a shielding processing system, and ensuring that the frequency reference of said system is synchronized with that of a base station; using the feature that a frame signal of a base station is repeatedly transmitted according to a frame period of the base station, receiving the frame signal of the base station at different times; performing filtering processing on the frame signals of the base station using a frame averaging method, so as to obtain purified frame reference signals of the base station; and using the purified frame reference signals to shield the base station.
Device agnostic audio path sealing
In accordance with some embodiments, an apparatus that seals the audio path of an enclosed device is provided. The apparatus includes a first housing portion and a second housing portion, when mated, are arranged to enclose a device, where a surface of the second housing portion is arranged to impart pressure on the device toward the first housing portion. The apparatus further includes a first supporting portion disposed along one side of the first housing portion and arranged to support the device. The apparatus also includes a first liner disposed in the first housing portion and arranged to form a first cavity, where the first cavity is adjacent to the first supporting portion. The apparatus further includes a noise generator operable to provide noise signal stream and a first audio output device coupled to the noise generator operable to output first masking signals to the first cavity.
NFC tags with proximity detection
Systems, apparatuses and methods provide for detecting the proximate placement of an external NFC reader to a specific location on a display surface. The display surface can be intended for viewing indicia and enabling interaction with an NFC communication device embedded within the display. A circuit can control an NFC security system that can scan for unauthorized tags affixed to the surface of a display. The NFC security system may be activated by an NFC enabled mobile phone placed proximate to the indicated region for receiving an NFC coded message from the display. An NFC security scan can be performed prior to the mobile phone reading the message from the intended NFC tag in the display. Enabling interactive display modes can allow for making selections indicated on the display or detecting motion gestures across the face of the display.
Coexistence of radio communication and radar probing
A device (112, 130) is configured to communicate data (108) on a radio channel (101, 105, 106) employing first resource elements. The device (112, 130) is further configured to participate in a radar probing (109) employing second resource elements which are orthogonal to the first resource elements.
An automated surveillance system
An internet of things is disclosed, comprising plural SDR receivers and possibly a centralised system, where one or more of the receivers may be mobile. The internet of things thus allows for a very large proportion of RF signals present within a city, for example, to be monitored and analysed for the purpose of identifying, tracking and/or preventing criminal behaviour. The receivers may be equipped with secure SDRs for increased security and privacy and the system preferably includes artificial intelligence using machine learning technology, for increased adaptability among others. The system is flexible due to the programmability of the SDRs.
Selective Jamming Detection Based on Comparing Two Or More Signal Measurement Quantities
Methods implemented by a processor in a wireless device for detecting the presence in a network of a jammer or non-benign entity that targets physical layer channels in a communication network are disclosed. Various embodiments may determine a first signal measurement quantity based on a first physical layer communication, determine a second signal measurement quantity based on a second physical layer communication, determine a difference between the first signal measurement quantity and the second signal measurement quantity, determine whether the difference between the first signal measurement quantity and the second signal measurement quantity satisfies a threshold, determine whether a jammer or non-benign entity is present in the network in response to determining that the difference between the first signal measurement quantity and the second signal measurement quantity satisfies the threshold, and perform a mitigation operation in response to determining that a jammer or non-benign entity is present in the network.
Jammer Detection and Mitigation
Methods for detecting and responding to detecting a non-benign network entity (e.g., jammer, etc.) that targets physical layer channels in a communication network. A wireless device may receive a physical downlink control channel (PDCCH) and a demodulation reference signal (DMRS) from a network entity, determine radio signal strength indicator (RSSI) for the received PDCCH, determine a signal to noise ratio (SNR) for the DMRS, determine whether the RSSI satisfies a first threshold, and determine whether the DMRS SNR satisfies a second threshold.
METHODS AND NETWORK DEVICES FOR REPORTING NETWORK DYSFUNCTION IN A WIRELESS COMMUNICATION NETWORK
The present disclosure relates to the area of telecommunication, and in particular to methods for reporting network dysfunction in a wireless communication network (1). According to a first aspect of embodiments herein it is provided a method, for use in a wireless communication device (10), for reporting network dysfunction. The method comprises obtaining information defining radio communication properties (e.g. use of a relaying wireless communication device (30)) for use when reporting network dysfunction in a wireless communication network (1). The method further comprises detecting network dysfunction, and sending a report indicating the detected network dysfunction e.g. to a radio network node 20 using the obtained radio communication properties. The disclosure also relates to a corresponding radio network node (20) and wireless communication devices (10), (30) and to a computer program for implementing the proposed method.
METHODS TO MITIGATE DENIAL OF SERVICE ATTACKS ON TIME SYNCHRONIZATION USING LINK REDUNDANCY FOR INDUSTRIAL/AUTONOMOUS SYSTEMS
Systems and methods in which devices synchronize their clocks for purposes of data transmission are described. Particularly, the disclosed systems and methods provide detection and mitigation of interference by malicious (or non-malicious) wireless devices with communication of time synchronized data over wireless networks. Systems and methods are provided where times statistics related to multiple instances of wireless time synchronization are collected and collated. Devices in the system can discipline their internal clocks based on the collated time statistics.